
CVE-2007-4530
https://notcve.org/view.php?id=CVE-2007-4530
25 Aug 2007 — Multiple cross-site scripting (XSS) vulnerabilities in TeamSpeak Server 2.0.20.1 allow remote attackers to inject arbitrary web script or HTML via (1) the error_text parameter to error_box.html or (2) the ok_title parameter to ok_box.html. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en TeamSpeak Server 2.0.20.1 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante (1) el parámetro error_text en error_box.html ó (2) el parámetro ok_title en ok_box.h... • http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html •

CVE-2007-3956 – TeamSpeak 2.0 (Windows Release) - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-3956
24 Jul 2007 — TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534. TeamSpeak WebServer 2.0 para Windows no valida la longitud del valor del parámetro y no expiran las sesiones TCP, lo cual permite a atacantes remotos provocar denegación de servicio (consumo de CPU y memoria)a través de los... • https://www.exploit-db.com/exploits/4205 •

CVE-1999-1081 – Novell Netware Web Server 3.x - files.pl
https://notcve.org/view.php?id=CVE-1999-1081
12 Sep 2001 — Vulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files. Vulnerabilidad en el script files.pl en Novell WebServer Examples Toolkit 2 permite a atacantes remotos leer ficheros arbitrarios. • https://www.exploit-db.com/exploits/20482 •

CVE-1999-0175 – Novell NetWare Web Server 2.x - convert.bas
https://notcve.org/view.php?id=CVE-1999-0175
01 Jul 1996 — The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server. • https://www.exploit-db.com/exploits/20448 •