Log in to view product risk score details
Threat overview for Utorrent
Learn more about security ratings, threat and attack surface intelligence
by SecurityScorecard.
Top countries where our scanners detected Utorrent
Top open port discovered on systems running Utorrent 80
IPs running Utorrent 34,956
Threat actors targeting Utorrent?
Yes
Find out if Utorrent exists in your* attack surface!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Vulnerabilities by types/categories
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2015 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total |
Vulnerabilities by impact types
This page lists vulnerability statistics for all versions of Utorrent » Utorrent. Vulnerability statistics provide a quick overview for security vulnerabilities of Utorrent. You can view versions of this product or security vulnerabilities of Utorrent Utorrent .
Please note that we generate vendor, product and version statistics based on CVE and CPE data and there may be inconsistencies in data sometimes or statistics may not be reliable due to certain circumstances.