Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
motorola timbuktu pro 8.6.5 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2008-1117
Directory traversal vulnerability in the Notes (aka Flash Notes or instant messages) feature in tb2ftp.dll in Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, allows remote malicious users to upload files to arbitrary locations via a destination filename with a \ (b...
Netopia Timbuktu Pro 8.6.5
3 EDB exploits
755
VMScore
CVE-2008-1118
Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote malicious users to generate crafted log entries, and possibly avoid detection of attacks, ...
Netopia Timbuktu Pro 8.6.5
1 EDB exploit
935
VMScore
CVE-2009-1394
Stack-based buffer overflow in Motorola Timbuktu Pro 8.6.5 on Windows allows remote malicious users to execute arbitrary code by sending a long malformed string over the PlughNTCommand named pipe.
Motorola Timbuktu Pro 8.6.5
1 EDB exploit
785
VMScore
CVE-2007-4220
Directory traversal vulnerability in Motorola Timbuktu Pro prior to 8.6.5 for Windows allows remote malicious users to create or delete arbitrary files via a .. (dot dot) in a Send request, probably related to the (1) Send and (2) Exchange services.
Motorola Timbuktu 8.6.3.1367
1 EDB exploit
890
VMScore
CVE-2007-4221
Multiple buffer overflows in Motorola Timbuktu Pro prior to 8.6.5 for Windows allow remote malicious users to cause a denial of service (daemon crash) or possibly execute arbitrary code via (1) a long user name and (2) certain malformed requests; and (3) allow remote Timbuktu ser...
Motorola Timbuktu 8.6.3.1367
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started