Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2011-3371

Multiple cross-site scripting (XSS) vulnerabilities in include/functions.php in PunBB before 1.3.6 allow remote attackers to inject arbitrary web script or HTML via the (1) id, (2) form_sent, (3) csrf_token, (4) req_confirm, or (5) delete parameter to delete.php, the (6) id, (7) form_sent, (8) csrf_token, (9) req_message, or (10) submit parameter to edit.php, the (11) action, (12) form_sent, (13) csrf_token, (14) req_email, or (15) request_pass parameter to login.php, the (16) email, (17) form_sent, (18) redirect_url, (19) csrf_token, (20) req_subject, (21) req_message, or (22) submit parameter to misc.php, the (23) action, (24) id, (25) form_sent, (26) csrf_token, (27) req_old_password, (28) req_new_password1, (29) req_new_password2, or (30) update parameter to profile.php, or the (31) action, (32) form_sent, (33) csrf_token, (34) req_username, (35) req_password1, (36) req_password2, (37) req_email1, (38) timezone, or (39) register parameter to register.php.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 66.8%
CVSS Severity
CVSS v2 Score 4.3
References
Products affected by CVE-2011-3371
  • Punbb » Punbb » Version: Any
    cpe:2.3:a:punbb:punbb:*
  • Punbb » Punbb » Version: 1.0
    cpe:2.3:a:punbb:punbb:1.0
  • Punbb » Punbb » Version: 1.0.1
    cpe:2.3:a:punbb:punbb:1.0.1
  • Punbb » Punbb » Version: 1.1
    cpe:2.3:a:punbb:punbb:1.1
  • Punbb » Punbb » Version: 1.1.1
    cpe:2.3:a:punbb:punbb:1.1.1
  • Punbb » Punbb » Version: 1.1.2
    cpe:2.3:a:punbb:punbb:1.1.2
  • Punbb » Punbb » Version: 1.1.3
    cpe:2.3:a:punbb:punbb:1.1.3
  • Punbb » Punbb » Version: 1.1.4
    cpe:2.3:a:punbb:punbb:1.1.4
  • Punbb » Punbb » Version: 1.1.5
    cpe:2.3:a:punbb:punbb:1.1.5
  • Punbb » Punbb » Version: 1.2
    cpe:2.3:a:punbb:punbb:1.2
  • Punbb » Punbb » Version: 1.2.1
    cpe:2.3:a:punbb:punbb:1.2.1
  • Punbb » Punbb » Version: 1.2.10
    cpe:2.3:a:punbb:punbb:1.2.10
  • Punbb » Punbb » Version: 1.2.11
    cpe:2.3:a:punbb:punbb:1.2.11
  • Punbb » Punbb » Version: 1.2.12
    cpe:2.3:a:punbb:punbb:1.2.12
  • Punbb » Punbb » Version: 1.2.13
    cpe:2.3:a:punbb:punbb:1.2.13
  • Punbb » Punbb » Version: 1.2.14
    cpe:2.3:a:punbb:punbb:1.2.14
  • Punbb » Punbb » Version: 1.2.15
    cpe:2.3:a:punbb:punbb:1.2.15
  • Punbb » Punbb » Version: 1.2.16
    cpe:2.3:a:punbb:punbb:1.2.16
  • Punbb » Punbb » Version: 1.2.17
    cpe:2.3:a:punbb:punbb:1.2.17
  • Punbb » Punbb » Version: 1.2.18
    cpe:2.3:a:punbb:punbb:1.2.18
  • Punbb » Punbb » Version: 1.2.19
    cpe:2.3:a:punbb:punbb:1.2.19
  • Punbb » Punbb » Version: 1.2.2
    cpe:2.3:a:punbb:punbb:1.2.2
  • Punbb » Punbb » Version: 1.2.20
    cpe:2.3:a:punbb:punbb:1.2.20
  • Punbb » Punbb » Version: 1.2.21
    cpe:2.3:a:punbb:punbb:1.2.21
  • Punbb » Punbb » Version: 1.2.22
    cpe:2.3:a:punbb:punbb:1.2.22
  • Punbb » Punbb » Version: 1.2.23
    cpe:2.3:a:punbb:punbb:1.2.23
  • Punbb » Punbb » Version: 1.2.3
    cpe:2.3:a:punbb:punbb:1.2.3
  • Punbb » Punbb » Version: 1.2.4
    cpe:2.3:a:punbb:punbb:1.2.4
  • Punbb » Punbb » Version: 1.2.5
    cpe:2.3:a:punbb:punbb:1.2.5
  • Punbb » Punbb » Version: 1.2.6
    cpe:2.3:a:punbb:punbb:1.2.6
  • Punbb » Punbb » Version: 1.2.7
    cpe:2.3:a:punbb:punbb:1.2.7
  • Punbb » Punbb » Version: 1.2.8
    cpe:2.3:a:punbb:punbb:1.2.8
  • Punbb » Punbb » Version: 1.2.9
    cpe:2.3:a:punbb:punbb:1.2.9
  • Punbb » Punbb » Version: 1.3
    cpe:2.3:a:punbb:punbb:1.3
  • Punbb » Punbb » Version: 1.3.1
    cpe:2.3:a:punbb:punbb:1.3.1
  • Punbb » Punbb » Version: 1.3.2
    cpe:2.3:a:punbb:punbb:1.3.2
  • Punbb » Punbb » Version: 1.3.3
    cpe:2.3:a:punbb:punbb:1.3.3
  • Punbb » Punbb » Version: 1.3.4
    cpe:2.3:a:punbb:punbb:1.3.4


Contact Us

Shodan ® - All rights reserved