8 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

10 Jun 2021 — A Incorrect Default Permissions vulnerability in the packaging of inn of SUSE Linux Enterprise Server 11-SP3; openSUSE Backports SLE-15-SP2, openSUSE Leap 15.2 allows local attackers to escalate their privileges from the news user to root. This issue affects: SUSE Linux Enterprise Server 11-SP3 inn version inn-2.4.2-170.21.3.1 and prior versions. openSUSE Backports SLE-15-SP2 inn versions prior to 2.6.2. openSUSE Leap 15.2 inn versions prior to 2.6.2. Una vulnerabilidad de Permisos por Defecto Incorrectos e... • https://bugzilla.suse.com/show_bug.cgi?id=1182321 • CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 1

24 Jan 2020 — The packaging of inn on SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions. El empaquetado de inn en SUSE Linux Enterprise Server versión 11; openSUSE Factory, Leap versión 15.1, permite a atacante... • http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00027.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 8.1EPSS: 0%CPEs: 17EXPL: 0

11 Nov 2012 — The STARTTLS implementation in nnrpd in INN before 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación STARTTLS en nnrpd en INN antes de v2.5.3 no restringe correctamente el búfer de E/S, lo que permite a atacantes man-in-the-middle introducir comandos en s... • http://lists.opensuse.org/opensuse-updates/2012-09/msg00058.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 1%CPEs: 6EXPL: 2

11 Jun 2002 — Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses. • https://www.exploit-db.com/exploits/21375 •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

11 Jun 2002 — Vulnerability in (1) inews or (2) rnews for INN 2.2.3 and earlier, related to insecure open() calls. Vulnerabilidad en inews o rnews en INN 2.2.3 y anteriores, relacionada con llamadas poco seguras a open(). • http://archives.neohapsis.com/archives/bugtraq/2002-04/0140.html •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 7

21 Apr 2001 — Buffer overflow in innfeed for ISC InterNetNews (INN) before 2.3.0 allows local users in the "news" group to gain privileges via a long -c command line argument. • https://www.exploit-db.com/exploits/20777 •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 1

12 Jul 2000 — Buffer overflow in INN 2.2.1 and earlier allows remote attackers to cause a denial of service via a maliciously formatted article. Desbordamiento de buffer en INN 2.2.1 y anteriores permite a un atacante remoto causar denegación de servicio mediante un articulo formateado maliciosamente. • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-038.0.txt •

CVSS: 9.8EPSS: 1%CPEs: 5EXPL: 1

06 Feb 2000 — Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID. • https://www.exploit-db.com/exploits/19998 •