Page 6 of 43 results (0.012 seconds)

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

register.php in PunBB 1.2.10 allows remote attackers to cause an unspecified denial of service via a flood of new user registrations. • https://www.exploit-db.com/exploits/1517 http://www.punbb.org/changelogs/1.2.10_to_1.2.11.txt http://www.punbb.org/download/patch/punbb-1.2.10_to_1.2.11.patch http://www.vupen.com/english/advisories/2006/0773 https://exchange.xforce.ibmcloud.com/vulnerabilities/24837 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 2

PunBB 1.2.10 and earlier allows remote attackers to cause a denial of service (resource consumption) by registering many user accounts quickly. • https://www.exploit-db.com/exploits/1517 http://www.neosecurityteam.net/advisories/Advisory-15.txt http://www.securityfocus.com/archive/1/425630/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24837 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

PunBB 1.2.10 and earlier allows remote attackers to conduct brute force guessing attacks for an account's password, which may be as short as 4 characters. • http://www.neosecurityteam.net/advisories/Advisory-15.txt http://www.securityfocus.com/archive/1/425630/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24838 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

PunBB 1.2.9 does not require password entry when changing the e-mail address in an account's profile, which might allow an attacker to make an address change via a hijacked login session. • http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

PunBB 1.2.9, used alone or with F-ART BLOG:CMS, may trust a client's IP address as specified in the X-Forwarded-For HTTP header rather than the TCP/IP stack, which allows remote attackers to misrepresent their IP address by sending a modified header. • http://secunia.com/advisories/17425 http://secunia.com/advisories/17433 http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt http://www.securityfocus.com/bid/15326 •