Total vulnerabilities in the database
IceCast 2.20 allows remote attackers to bypass the XSL parser and obtain the source for XSL files via a request for a .xsl file with a trailing . (dot).
Software | From | Fixed in |
---|---|---|
icecast / icecast | 2.0.2 | 2.0.2.x |
icecast / icecast | 2.1.0 | 2.1.0.x |
icecast / icecast | 2.2 | 2.2.x |
icecast / icecast | 2.0 | 2.0.x |
icecast / icecast | 2.0.1 | 2.0.1.x |