exploit-db-mirror/platforms/multiple/remote/31119.txt
Offensive Security 5924dde297 DB: 2015-03-19
2 new exploits
2015-03-19 09:39:10 +00:00

9 lines
No EOL
636 B
Text
Executable file

source: http://www.securityfocus.com/bid/27660/info
TinTin++ and WinTin++ are prone to multiple security vulnerabilities affecting the application's '#chat' functionality. These issues include a buffer-overflow vulnerability, a denial-of-service vulnerability, and a file-overwrite vulnerability.
Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content.
These issues affect TinTin++ and WinTin++ 1.97.9; other versions may also be affected.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/31119.tar.gz