Filtered by vendor Punbb
                         Subscriptions
                    
                    
                
                        Filtered by product Punbb
                         Subscriptions
                    
                    
                
                    Total
                    47 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v3.1 | 
|---|---|---|---|---|
| CVE-2005-3078 | 1 Punbb | 1 Punbb | 2025-04-03 | N/A | 
| Cross-site scripting (XSS) vulnerability in PunBB before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the "forgotten e-mail" feature. | ||||
| CVE-2006-0865 | 1 Punbb | 1 Punbb | 2025-04-03 | N/A | 
| PunBB 1.2.10 and earlier allows remote attackers to cause a denial of service (resource consumption) by registering many user accounts quickly. | ||||
| CVE-2005-0818 | 1 Punbb | 1 Punbb | 2025-04-03 | N/A | 
| Cross-site scripting (XSS) vulnerability in PunBB 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the (1) email or (2) Jabber parameters. | ||||
| CVE-2006-0866 | 1 Punbb | 1 Punbb | 2025-04-03 | N/A | 
| PunBB 1.2.10 and earlier allows remote attackers to conduct brute force guessing attacks for an account's password, which may be as short as 4 characters. | ||||
| CVE-2006-2227 | 1 Punbb | 1 Punbb | 2025-04-03 | N/A | 
| Cross-site scripting (XSS) vulnerability in misc.php in PunBB 1.2.11 allows remote attackers to inject arbitrary web script or HTML via the req_message parameter, because the value of the redirect_url parameter is not sanitized. | ||||
| CVE-2006-2724 | 1 Punbb | 1 Punbb | 2025-04-03 | N/A | 
| Cross-site scripting (XSS) vulnerability in PunBB 1.2.11 allows remote authenticated administrators to inject arbitrary HTML or web script to other administrators via the "Admin note" feature, a different vulnerability than CVE-2006-2227. | ||||
| CVE-2005-3079 | 1 Punbb | 1 Punbb | 2025-04-03 | N/A | 
| PunBB before 1.2.8 allows remote attackers to perform "code inclusion" via the user language selection. | ||||