Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
teamspeak teamspeak vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-15502
The TeamSpeak client prior to 3.3.2 allows remote servers to trigger a crash via the 0xe2 0x81 0xa8 0xe2 0x81 0xa7 byte sequence, aka Unicode characters U+2068 (FIRST STRONG ISOLATE) and U+2067 (RIGHT-TO-LEFT ISOLATE).
Teamspeak Teamspeak
9.3
CVSSv2
CVE-2019-11351
TeamSpeak 3 Client prior to 3.2.5 allows remote code execution in the Qt framework.
Teamspeak Teamspeak
4
CVSSv2
CVE-2014-7221
TeamSpeak Client 3.0.14 and previous versions allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http...
Teamspeak Teamspeak3
1 EDB exploit
4
CVSSv2
CVE-2014-7222
Buffer overflow in TeamSpeak Client 3.0.14 and previous versions allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash)...
Teamspeak Teamspeak3
1 EDB exploit
5
CVSSv2
CVE-2017-8290
A potential Buffer Overflow Vulnerability (from a BB Code handling issue) has been identified in TeamSpeak Server version 3.0.13.6 (08/11/2016 09:48:33), it enables the users to Crash any WINDOWS Client that clicked into a Vulnerable Channel of a TeamSpeak Server.
Teamspeak Teamspeak Server 3.0.13.6
Teamspeak Teamspeak Client 3.1.4
5
CVSSv2
CVE-2017-9982
TeamSpeak Client 3.0.19 allows remote malicious users to cause a denial of service (application crash) via the ᗪ Unicode character followed by the ༿ Unicode character.
Teamspeak Teamspeak Client 3.0.19
6.9
CVSSv2
CVE-2010-3383
The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
Teamspeak Teamspeak 2.0.32
8.5
CVSSv2
CVE-2007-4529
The WebAdmin interface in TeamSpeak Server 2.0.20.1 allows remote authenticated users with the ServerAdmin flag to assign Registered users certain privileges, resulting in a privilege set that extends beyond that ServerAdmin's own servers, as demonstrated by the (1) AdminAdd...
Teamspeak Web Server 2.0.20.1
4.3
CVSSv2
CVE-2007-4530
Multiple cross-site scripting (XSS) vulnerabilities in TeamSpeak Server 2.0.20.1 allow remote malicious users to inject arbitrary web script or HTML via (1) the error_text parameter to error_box.html or (2) the ok_title parameter to ok_box.html.
Teamspeak Web Server 2.0.20.1
7.8
CVSSv2
CVE-2007-3956
TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote malicious users to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on T...
Teamspeak Web Server 2.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »