The password reset feature in PunBB 1.2.16 and previous versions uses predictable random numbers based on the system time, which allows remote authenticated users to determine the new password via a brute force attack on a seed that is based on the approximate creation time of the targeted account. NOTE: this issue might be related to CVE-2006-5737.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
punbb punbb 1.0_alpha |
||
punbb punbb 1.0_beta1 |
||
punbb punbb 1.1.3 |
||
punbb punbb 1.1.4 |
||
punbb punbb 1.0_beta2 |
||
punbb punbb 1.0_beta3 |
||
punbb punbb 1.0_rc1 |
||
punbb punbb 1.1.5 |
||
punbb punbb 1.0 |
||
punbb punbb 1.0.1 |
||
punbb punbb 1.1.1 |
||
punbb punbb 1.1.2 |
||
punbb punbb 1.2.11 |
||
punbb punbb 1.2.12 |
||
punbb punbb 1.2.4 |
||
punbb punbb 1.2.5 |
||
punbb punbb 1.2 |
||
punbb punbb 1.2.15 |
||
punbb punbb 1.2.16 |
||
punbb punbb 1.2.8 |
||
punbb punbb 1.2.9 |
||
punbb punbb 1.2.13 |
||
punbb punbb 1.2.14 |
||
punbb punbb 1.2.6 |
||
punbb punbb 1.2.7 |
||
punbb punbb 1.0_rc2 |
||
punbb punbb 1.1 |
||
punbb punbb 1.2.1 |
||
punbb punbb 1.2.10 |
||
punbb punbb 1.2.2 |
||
punbb punbb 1.2.3 |