
CVE-2019-15502
https://notcve.org/view.php?id=CVE-2019-15502
29 Aug 2019 — The TeamSpeak client before 3.3.2 allows remote servers to trigger a crash via the 0xe2 0x81 0xa8 0xe2 0x81 0xa7 byte sequence, aka Unicode characters U+2068 (FIRST STRONG ISOLATE) and U+2067 (RIGHT-TO-LEFT ISOLATE). El cliente TeamSpeak versiones anteriores a 3.3.2, permite a los servidores remotos activar un bloqueo por medio de la secuencia de bytes 0xe2 0x81 0xa8 0xe2 0x81 0xa7, también se conoce como caracteres Unicode U+2068 (FIRST STRONG ISOLATE) y U+2067 (RIGHT-TO-LEFT ISOLATE). • https://forum.teamspeak.com/threads/141134-Release-TeamSpeak-Client-3-3-2 •

CVE-2019-11351
https://notcve.org/view.php?id=CVE-2019-11351
19 Apr 2019 — TeamSpeak 3 Client before 3.2.5 allows remote code execution in the Qt framework. El TeamSpeak Client versión 3 anterior a 3.2.5 permite la ejecución de código remota en el framework Qt. • https://forum.teamspeak.com/threads/139546-Release-TeamSpeak-3-Client-3-2-5 • CWE-426: Untrusted Search Path •

CVE-2017-9982
https://notcve.org/view.php?id=CVE-2017-9982
27 Jun 2017 — TeamSpeak Client 3.0.19 allows remote attackers to cause a denial of service (application crash) via the ᗪ Unicode character followed by the ༿ Unicode character. El cliente TeamSpeak en su versión 3.0.19 permite a un atacante remoto causar una denegación de servicio (caída de la aplicación) mediante el caracter Unicode ? seguido del carácter Unicode ?. • http://www.securityfocus.com/bid/99308 • CWE-20: Improper Input Validation •

CVE-2017-8290 – TeamSpeak Client 3.1.4 Buffer Overflow
https://notcve.org/view.php?id=CVE-2017-8290
20 Jun 2017 — A potential Buffer Overflow Vulnerability (from a BB Code handling issue) has been identified in TeamSpeak Server version 3.0.13.6 (08/11/2016 09:48:33), it enables the users to Crash any WINDOWS Client that clicked into a Vulnerable Channel of a TeamSpeak Server. Se ha identificado una potencial vulnerabilidad de desbordamiento de búfer (de un problema de manejo de código BB) en TeamSpeak Server versión 3.0.13.6 (11/08/2016 09:48:33) , que habilita a los usuarios Bloquear a cualquier cliente de WINDOWS que... • https://packetstorm.news/files/id/143053 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2014-7221 – TeamSpeak Client 3.0.14 - Buffer Overflow
https://notcve.org/view.php?id=CVE-2014-7221
06 Oct 2014 — TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings. El cliente de TeamSpeak 3.0.14 y anteriores permite que los usuarios autenticados remotos provoquen una denegación de servicio (desbordamiento de búfer y cierre inesperado de la aplicación) conectándose a un canal con una inst... • https://packetstorm.news/files/id/128571 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2014-7222 – TeamSpeak Client 3.0.14 - Buffer Overflow
https://notcve.org/view.php?id=CVE-2014-7222
06 Oct 2014 — Buffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and "z" in a series of nested img BBCODE tags. Desbordamiento de búfer en el cliente de TeamSpeak 3.0.14 y anteriores permite que los usuarios autenticados remotos provoquen una denegación de s... • https://packetstorm.news/files/id/128571 • CWE-20: Improper Input Validation •

CVE-2010-3383
https://notcve.org/view.php?id=CVE-2010-3383
20 Oct 2010 — The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. Las secuencias de comandos (1) teamspeak y (2) teamspeak-server en TeamSpeak v2.0.32 colocan un nombre de directorio de longitud cero en LD_LIBRARY_PATH, permitiendo a usuarios locales conseguir privilegios a través de una biblioteca compartida (caballo de Troya) en el ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598304 •

CVE-2007-4529
https://notcve.org/view.php?id=CVE-2007-4529
25 Aug 2007 — The WebAdmin interface in TeamSpeak Server 2.0.20.1 allows remote authenticated users with the ServerAdmin flag to assign Registered users certain privileges, resulting in a privilege set that extends beyond that ServerAdmin's own servers, as demonstrated by the (1) AdminAddServer, (2) AdminDeleteServer, (3) AdminStartServer, and (4) AdminStopServer privileges; and administration of arbitrary virtual servers via a request to a .tscmd URI with a modified serverid parameter, as demonstrated by (a) add_server.... • http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html •

CVE-2007-4530
https://notcve.org/view.php?id=CVE-2007-4530
25 Aug 2007 — Multiple cross-site scripting (XSS) vulnerabilities in TeamSpeak Server 2.0.20.1 allow remote attackers to inject arbitrary web script or HTML via (1) the error_text parameter to error_box.html or (2) the ok_title parameter to ok_box.html. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en TeamSpeak Server 2.0.20.1 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante (1) el parámetro error_text en error_box.html ó (2) el parámetro ok_title en ok_box.h... • http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html •

CVE-2007-3956 – TeamSpeak 2.0 (Windows Release) - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-3956
24 Jul 2007 — TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534. TeamSpeak WebServer 2.0 para Windows no valida la longitud del valor del parámetro y no expiran las sesiones TCP, lo cual permite a atacantes remotos provocar denegación de servicio (consumo de CPU y memoria)a través de los... • https://www.exploit-db.com/exploits/4205 •