Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
isc inn 2.2.3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-0525
Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and previous versions allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses.
Isc Inn 2.2.3
Isc Inn 2.2
Isc Inn 2.2.2
Isc Inn 2.0
Isc Inn 2.1
Isc Inn 2.2.1
1 EDB exploit
6.8
CVSSv2
CVE-2012-3523
The STARTTLS implementation in nnrpd in INN prior to 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle malicious users to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a &quo...
Isc Inn 1.4sec
Isc Inn 1.5.1
Isc Inn 2.0
Isc Inn 2.2.3
Isc Inn 1.7
Isc Inn 1.4unoff4
Isc Inn 2.4.0
Isc Inn 2.2.1
Isc Inn 1.4sec2
Isc Inn 1.4unoff3
Isc Inn 1.4
Isc Inn 2.2
Isc Inn 1.7.2
Isc Inn
Isc Inn 1.5
Isc Inn 2.1
Isc Inn 2.2.2
4.6
CVSSv2
CVE-2001-1442
Buffer overflow in innfeed for ISC InterNetNews (INN) prior to 2.3.0 allows local users in the "news" group to gain privileges via a long -c command line argument.
Isc Inn 2.2.3
Isc Inn 2.0
Isc Inn 2.1
Isc Inn 2.2
Isc Inn 2.2.1
Isc Inn 2.2.2
2 EDB exploits
1 Github repository
1.2
CVSSv2
CVE-2001-0139
inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
Caldera Openlinux Desktop 2.3
Immunix Immunix 7.0 Beta
Caldera Openlinux Edesktop 2.4
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Caldera Openlinux Eserver 2.3
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started