Page 2 of 10 results (0.010 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings. El cliente de TeamSpeak 3.0.14 y anteriores permite que los usuarios autenticados remotos provoquen una denegación de servicio (desbordamiento de búfer y cierre inesperado de la aplicación) conectándose a un canal con una instancia de cliente diferente y ubicando datos manipulados en la pestaña de Chat/Server que contiene subcadenas [img]//http://. TeamSpeak Client version 3.0.14 suffers from a buffer overflow vulnerability. • https://www.exploit-db.com/exploits/34857 http://r4p3.net/forum/reverse-engineering/38/teamspeak-3-exploit-bb-code-freeze-crash-not-responding/905 http://r4p3.net/public/ts3bbcodefreeze.txt http://www.securityfocus.com/bid/70219 https://exchange.xforce.ibmcloud.com/vulnerabilities/96889 https://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 2

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. Las secuencias de comandos (1) teamspeak y (2) teamspeak-server en TeamSpeak v2.0.32 colocan un nombre de directorio de longitud cero en LD_LIBRARY_PATH, permitiendo a usuarios locales conseguir privilegios a través de una biblioteca compartida (caballo de Troya) en el directorio de trabajo actual. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598304 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598305 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in TeamSpeak Server 2.0.20.1 allow remote attackers to inject arbitrary web script or HTML via (1) the error_text parameter to error_box.html or (2) the ok_title parameter to ok_box.html. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en TeamSpeak Server 2.0.20.1 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante (1) el parámetro error_text en error_box.html ó (2) el parámetro ok_title en ok_box.html. • http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html http://osvdb.org/36048 http://osvdb.org/36049 http://secunia.com/advisories/25242 http://securityvulns.com/Rdocument6.html http://www.securityfocus.com/archive/1/477424/100/0/threaded http://www.securityfocus.com/bid/23933 https://exchange.xforce.ibmcloud.com/vulnerabilities/34252 •

CVSS: 8.5EPSS: 1%CPEs: 1EXPL: 1

The WebAdmin interface in TeamSpeak Server 2.0.20.1 allows remote authenticated users with the ServerAdmin flag to assign Registered users certain privileges, resulting in a privilege set that extends beyond that ServerAdmin's own servers, as demonstrated by the (1) AdminAddServer, (2) AdminDeleteServer, (3) AdminStartServer, and (4) AdminStopServer privileges; and administration of arbitrary virtual servers via a request to a .tscmd URI with a modified serverid parameter, as demonstrated by (a) add_server.tscmd, (b) ask_delete_server.tscmd, (c) start_server.tscmd, and (d) stop_server.tscmd. El interfaz WebAdmin en TeamSpeak Server 2.0.20.1 permite a usuarios remotos autenticados con la bandera ServerAdmin, asignar usuarios Registrados determinados privilegios, resultando en un conjunto de privilegios que se extiende mas allá de los servidores propios del ServerAdmin, como se demuestra con los privilegios: (1) AdminAddServer, (2) AdminDeleteServer, (3) AdminStartServer, y (4) AdminStopServer; y administración de servidores virtuales de su elección mediante una petición a la URI .tscmd con un parámetro serverid modificado, como se demuestra con (a) add_server.tscmd, (b) ask_delete_server.tscmd, (c) start_server.tscmd, y (d) stop_server.tscmd. • http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html http://osvdb.org/36047 http://secunia.com/advisories/25242 http://securityvulns.com/Rdocument6.html http://www.securityfocus.com/archive/1/477424/100/0/threaded http://www.securityfocus.com/bid/23935 https://exchange.xforce.ibmcloud.com/vulnerabilities/34254 •

CVSS: 7.8EPSS: 7%CPEs: 2EXPL: 1

TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534. TeamSpeak WebServer 2.0 para Windows no valida la longitud del valor del parámetro y no expiran las sesiones TCP, lo cual permite a atacantes remotos provocar denegación de servicio (consumo de CPU y memoria)a través de los parámetros username y password en una respuesta en login.tscmd sobre el puerto TCP 14534. • https://www.exploit-db.com/exploits/4205 http://osvdb.org/38595 http://secunia.com/advisories/26141 http://www.securityfocus.com/bid/24977 https://exchange.xforce.ibmcloud.com/vulnerabilities/35518 •