Page 3 of 14 results (0.004 seconds)

CVSS: 8.5EPSS: 1%CPEs: 1EXPL: 1

The WebAdmin interface in TeamSpeak Server 2.0.20.1 allows remote authenticated users with the ServerAdmin flag to assign Registered users certain privileges, resulting in a privilege set that extends beyond that ServerAdmin's own servers, as demonstrated by the (1) AdminAddServer, (2) AdminDeleteServer, (3) AdminStartServer, and (4) AdminStopServer privileges; and administration of arbitrary virtual servers via a request to a .tscmd URI with a modified serverid parameter, as demonstrated by (a) add_server.tscmd, (b) ask_delete_server.tscmd, (c) start_server.tscmd, and (d) stop_server.tscmd. El interfaz WebAdmin en TeamSpeak Server 2.0.20.1 permite a usuarios remotos autenticados con la bandera ServerAdmin, asignar usuarios Registrados determinados privilegios, resultando en un conjunto de privilegios que se extiende mas allá de los servidores propios del ServerAdmin, como se demuestra con los privilegios: (1) AdminAddServer, (2) AdminDeleteServer, (3) AdminStartServer, y (4) AdminStopServer; y administración de servidores virtuales de su elección mediante una petición a la URI .tscmd con un parámetro serverid modificado, como se demuestra con (a) add_server.tscmd, (b) ask_delete_server.tscmd, (c) start_server.tscmd, y (d) stop_server.tscmd. • http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html http://osvdb.org/36047 http://secunia.com/advisories/25242 http://securityvulns.com/Rdocument6.html http://www.securityfocus.com/archive/1/477424/100/0/threaded http://www.securityfocus.com/bid/23935 https://exchange.xforce.ibmcloud.com/vulnerabilities/34254 •

CVSS: 7.8EPSS: 7%CPEs: 2EXPL: 1

TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534. TeamSpeak WebServer 2.0 para Windows no valida la longitud del valor del parámetro y no expiran las sesiones TCP, lo cual permite a atacantes remotos provocar denegación de servicio (consumo de CPU y memoria)a través de los parámetros username y password en una respuesta en login.tscmd sobre el puerto TCP 14534. • https://www.exploit-db.com/exploits/4205 http://osvdb.org/38595 http://secunia.com/advisories/26141 http://www.securityfocus.com/bid/24977 https://exchange.xforce.ibmcloud.com/vulnerabilities/35518 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Vulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files. Vulnerabilidad en el script files.pl en Novell WebServer Examples Toolkit 2 permite a atacantes remotos leer ficheros arbitrarios. • https://www.exploit-db.com/exploits/20482 http://www.roxanne.org/faqs/www-secure/wwwsf4.html#Q35 http://www.w3.org/Security/Faq/wwwsf8.html#Q87 https://exchange.xforce.ibmcloud.com/vulnerabilities/2054 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server. • https://www.exploit-db.com/exploits/20448 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0175 •