Логотип exploitDog
bind:CVE-2008-0671
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2008-0671

Количество 4

Количество 4

ubuntu логотип

CVE-2008-0671

почти 18 лет назад

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

CVSS2: 10
EPSS: Средний
nvd логотип

CVE-2008-0671

почти 18 лет назад

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

CVSS2: 10
EPSS: Средний
debian логотип

CVE-2008-0671

почти 18 лет назад

Stack-based buffer overflow in the add_line_buffer function in TinTin+ ...

CVSS2: 10
EPSS: Средний
github логотип

GHSA-gx26-p933-5c9f

больше 3 лет назад

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2008-0671

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

CVSS2: 10
16%
Средний
почти 18 лет назад
nvd логотип
CVE-2008-0671

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

CVSS2: 10
16%
Средний
почти 18 лет назад
debian логотип
CVE-2008-0671

Stack-based buffer overflow in the add_line_buffer function in TinTin+ ...

CVSS2: 10
16%
Средний
почти 18 лет назад
github логотип
GHSA-gx26-p933-5c9f

Stack-based buffer overflow in the add_line_buffer function in TinTin++ 1.97.9 and WinTin++ 1.97.9 allows remote attackers to execute arbitrary code via a long chat message, related to conversion from LF to CRLF.

16%
Средний
больше 3 лет назад

Уязвимостей на страницу