CVE-2006-1090 – PunBB 2.0.10 - Register Multiple Users Denial of Service
https://notcve.org/view.php?id=CVE-2006-1090
register.php in PunBB 1.2.10 allows remote attackers to cause an unspecified denial of service via a flood of new user registrations. • https://www.exploit-db.com/exploits/1517 http://www.punbb.org/changelogs/1.2.10_to_1.2.11.txt http://www.punbb.org/download/patch/punbb-1.2.10_to_1.2.11.patch http://www.vupen.com/english/advisories/2006/0773 https://exchange.xforce.ibmcloud.com/vulnerabilities/24837 •
CVE-2006-0865 – PunBB 2.0.10 - Register Multiple Users Denial of Service
https://notcve.org/view.php?id=CVE-2006-0865
PunBB 1.2.10 and earlier allows remote attackers to cause a denial of service (resource consumption) by registering many user accounts quickly. • https://www.exploit-db.com/exploits/1517 http://www.neosecurityteam.net/advisories/Advisory-15.txt http://www.securityfocus.com/archive/1/425630/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24837 •
CVE-2006-0866
https://notcve.org/view.php?id=CVE-2006-0866
PunBB 1.2.10 and earlier allows remote attackers to conduct brute force guessing attacks for an account's password, which may be as short as 4 characters. • http://www.neosecurityteam.net/advisories/Advisory-15.txt http://www.securityfocus.com/archive/1/425630/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24838 •
CVE-2005-4688
https://notcve.org/view.php?id=CVE-2005-4688
PunBB 1.2.9 does not require password entry when changing the e-mail address in an account's profile, which might allow an attacker to make an address change via a hijacked login session. • http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt •
CVE-2005-4687
https://notcve.org/view.php?id=CVE-2005-4687
PunBB 1.2.9, used alone or with F-ART BLOG:CMS, may trust a client's IP address as specified in the X-Forwarded-For HTTP header rather than the TCP/IP stack, which allows remote attackers to misrepresent their IP address by sending a modified header. • http://secunia.com/advisories/17425 http://secunia.com/advisories/17433 http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt http://www.securityfocus.com/bid/15326 •