Total vulnerabilities in the database
CSRF was discovered in the web UI in Deluge before 1.3.14. The exploitation methodology involves (1) hosting a crafted plugin that executes an arbitrary program from its init.py file and (2) causing the victim to download, install, and enable this plugin.
Software | From | Fixed in |
---|---|---|
deluge-torrent / deluge | - | 1.3.14 |
debian / debian_linux | 8.0 | 8.0.x |