Vulnerabilities (CVE)

Filtered by vendor Netopia Subscribe
Filtered by product Timbuktu Pro
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2008-1337 1 Netopia 1 Timbuktu Pro 2024-11-21 5.0 MEDIUM N/A
The instant message service in Timbuktu Pro 8.6.5 RC 229 and earlier for Windows allows remote attackers to cause (1) a denial of service (daemon crash) via an invalid Version field or (2) a denial of service (CPU consumption and daemon termination) via an invalid or partial message.
CVE-2008-1118 1 Netopia 1 Timbuktu Pro 2024-11-21 7.5 HIGH N/A
Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote attackers to generate crafted log entries, and possibly avoid detection of attacks, via modified (1) computer name, (2) user name, and (3) IP address fields.
CVE-2008-1117 1 Netopia 1 Timbuktu Pro 2024-11-21 10.0 HIGH N/A
Directory traversal vulnerability in the Notes (aka Flash Notes or instant messages) feature in tb2ftp.dll in Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, allows remote attackers to upload files to arbitrary locations via a destination filename with a \ (backslash) character followed by ../ (dot dot slash) sequences. NOTE: this can be leveraged for code execution by writing to a Startup folder. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4220.
CVE-2002-0135 1 Netopia 1 Timbuktu Pro 2024-11-20 5.0 MEDIUM N/A
Netopia Timbuktu Pro 6.0.1 and earlier allows remote attackers to cause a denial of service (crash) via a series of connections to one of the ports (1417 - 1420).
CVE-2000-0142 1 Netopia 1 Timbuktu Pro 2024-11-20 5.0 MEDIUM N/A
The authentication protocol in Timbuktu Pro 2.0b650 allows remote attackers to cause a denial of service via connections to port 407 and 1417.
CVE-2000-0086 1 Netopia 1 Timbuktu Pro 2024-11-20 5.0 MEDIUM N/A
Netopia Timbuktu Pro sends user IDs and passwords in cleartext, which allows remote attackers to obtain them via sniffing.