Page 4 of 24 results (0.001 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in include/common.php in PunBB before 1.2.14 allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the language parameter, related to register.php storing a language value in the users table. Vulnerabilidad de escalado de directorio en include/common.php en PunBB anterior a 1.2.14 permite a usuarios autenticados remotamente incluir y ejecutar archivos locales de su elección mediante un .. (punto punto) en el parámetro language, relacionado con que register.php almacena un valor de idioma en la tabla de usuarios. • http://secunia.com/advisories/22622 http://securityreason.com/securityalert/1824 http://securitytracker.com/id?1017131 http://www.osvdb.org/30132 http://www.punbb.org/changelogs/1.2.13_to_1.2.14.txt http://www.securityfocus.com/archive/1/450055/100/0/threaded http://www.vupen.com/english/advisories/2006/4256 http://www.wargan.org/index.php/2006/10/29/4-punbb-1213-multiple-vulnerabilities •

CVSS: 4.3EPSS: 0%CPEs: 26EXPL: 0

Cross-site scripting (XSS) vulnerability in header.php in PunBB 1.2.10 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly handled when the PHP_SELF variable is used to handle a pun_page tag. • http://secunia.com/advisories/19039 http://www.punbb.org/changelogs/1.2.10_to_1.2.11.txt http://www.punbb.org/download/patch/punbb-1.2.10_to_1.2.11.patch http://www.securityfocus.com/bid/16891 http://www.vupen.com/english/advisories/2006/0773 https://exchange.xforce.ibmcloud.com/vulnerabilities/24982 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 2

PunBB 1.2.10 and earlier allows remote attackers to cause a denial of service (resource consumption) by registering many user accounts quickly. • https://www.exploit-db.com/exploits/1517 http://www.neosecurityteam.net/advisories/Advisory-15.txt http://www.securityfocus.com/archive/1/425630/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24837 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

PunBB 1.2.10 and earlier allows remote attackers to conduct brute force guessing attacks for an account's password, which may be as short as 4 characters. • http://www.neosecurityteam.net/advisories/Advisory-15.txt http://www.securityfocus.com/archive/1/425630/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24838 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

PunBB 1.2.9, used alone or with F-ART BLOG:CMS, may trust a client's IP address as specified in the X-Forwarded-For HTTP header rather than the TCP/IP stack, which allows remote attackers to misrepresent their IP address by sending a modified header. • http://secunia.com/advisories/17425 http://secunia.com/advisories/17433 http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt http://www.securityfocus.com/bid/15326 •