header-logo
Suggest Exploit
vendor:
TinTin++ and WinTin++
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer-overflow, Denial-of-Service, File-Overwrite
119, 400, 787
CWE
Product Name: TinTin++ and WinTin++
Affected Version From: 1.97.9
Affected Version To: 1.97.9
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

TinTin++ and WinTin++ Multiple Security Vulnerabilities

TinTin++ and WinTin++ are prone to multiple security vulnerabilities affecting the application's '#chat' functionality. These issues include a buffer-overflow vulnerability, a denial-of-service vulnerability, and a file-overwrite vulnerability. Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content.

Mitigation:

Users should upgrade to the latest version of TinTin++ and WinTin++.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/27660/info

TinTin++ and WinTin++ are prone to multiple security vulnerabilities affecting the application's '#chat' functionality. These issues include a buffer-overflow vulnerability, a denial-of-service vulnerability, and a file-overwrite vulnerability.

Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content.

These issues affect TinTin++ and WinTin++ 1.97.9; other versions may also be affected. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31119.tar.gz