9 lines
No EOL
623 B
Text
9 lines
No EOL
623 B
Text
source: https://www.securityfocus.com/bid/27660/info
|
|
|
|
TinTin++ and WinTin++ are prone to multiple security vulnerabilities affecting the application's '#chat' functionality. These issues include a buffer-overflow vulnerability, a denial-of-service vulnerability, and a file-overwrite vulnerability.
|
|
|
|
Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content.
|
|
|
|
These issues affect TinTin++ and WinTin++ 1.97.9; other versions may also be affected.
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31119.tar.gz |