View | Details | Raw Unified | Return to bug 211846
Collapse All | Expand All

(-)../../home/pi/myp/security/vuxml/vuln.xml (+28 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="f7dd2d09-625e-11e6-828b-fcaa14edc6a6">
62
    <topic>Several vulnerabilities found in Teamspeak3-server</topic>
63
    <affects>
64
      <package>
65
	<name>teamspeak3-server</name>
66
	<range><le>3.0.13_1,1</le></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Hanz Jenson audit report:</p>
72
	<blockquote cite="http://seclists.org/fulldisclosure/2016/Aug/61">
73
		<p>I found 10 vulnerabilities. Some of these are critical and allow remote code
74
		execution. For the average user, that means that these vulnerabilities can be
75
		exploited by a malicious attacker in order to take over any Teamspeak server,
76
		not only becoming serveradmin, but getting a shell on the affected machine.</p>
77
	</blockquote>
78
      </body>
79
    </description>
80
    <references>
81
    <url>http://seclists.org/fulldisclosure/2016/Aug/61</url>
82
    </references>
83
    <dates>
84
      <discovery>2016-08-12</discovery>
85
      <entry>2016-08-14</entry>
86
    </dates>
87
  </vuln>
88
61
  <vuln vid="df502a2f-61f6-11e6-a461-643150d3111d">
89
  <vuln vid="df502a2f-61f6-11e6-a461-643150d3111d">
62
    <topic>mcollective-puppet-agent -- Remote Code Execution in mcollective-puppet-agent plugin</topic>
90
    <topic>mcollective-puppet-agent -- Remote Code Execution in mcollective-puppet-agent plugin</topic>
63
    <affects>
91
    <affects>

Return to bug 211846