Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
phpbb Vendor: phpbb_group

About This Product

phpbb is a software product offered by phpbb_group. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 82 known vulnerabilities affecting phpbb_group phpbb. This includes 31 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2001 to 2007, indicating a sustained research interest and ongoing security attention. 49 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-1472 2001-08-03 2025-04-03 - 4.6 Unknown
CVE-2001-1482 2001-12-31 2025-04-03 - 7.5 Likely
CVE-2002-0473 2002-08-12 2025-04-03 - 10.0 Likely
CVE-2002-0475 2002-08-12 2025-04-03 - 5.1 Unknown
CVE-2002-0533 2002-08-12 2025-04-03 - 5.0 Likely
CVE-2002-0902 2002-10-04 2025-04-03 - 7.5 Likely
CVE-2002-1707 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2002-1894 2002-12-31 2025-04-03 - 4.3 Likely
CVE-2002-2176 2002-12-31 2025-04-03 - 10.0 Likely
CVE-2002-1537 2003-03-31 2025-04-03 - 10.0 Likely
CVE-2003-0484 2003-08-07 2025-04-03 - 6.8 Likely
CVE-2003-0486 2003-08-07 2025-04-03 - 5.0 Likely
CVE-2003-1216 2003-11-27 2025-04-03 - 7.5 Likely
CVE-2003-1215 2003-12-29 2025-04-03 - 4.6 Unknown
CVE-2003-1244 2003-12-31 2025-04-03 - 7.5 Likely
CVE-2003-1373 2003-12-31 2025-04-03 - 6.8 Likely
CVE-2004-1943 2004-04-19 2025-04-03 - 7.5 Likely
CVE-2004-1950 2004-04-19 2025-04-03 - 5.0 Likely
CVE-2004-2055 2004-07-19 2025-04-03 - 4.3 Likely
CVE-2004-0729 2004-07-27 2025-04-03 - 5.0 Likely
CVE-2004-0730 2004-07-27 2025-04-03 - 6.8 Likely
CVE-2004-1315 2004-11-12 2025-04-03 - 7.5 Likely
CVE-2004-0339 2004-11-23 2025-04-03 - 6.8 Likely
CVE-2004-2130 2004-12-23 2025-04-03 - 4.3 Likely
CVE-2004-1535 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-1809 2004-12-31 2025-04-03 - 4.3 Likely
CVE-2004-2054 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-2350 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-2358 2004-12-31 2025-04-03 - 4.3 Likely
CVE-2005-0603 2005-02-28 2025-04-03 - 5.0 Likely
CVE-2005-0258 2005-03-14 2025-04-03 - 5.0 Likely
CVE-2005-0259 2005-03-14 2025-04-03 - 6.4 Likely
CVE-2005-1047 2005-04-07 2025-04-03 - 7.5 Likely
CVE-2005-0614 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-0659 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0673 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-0871 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0872 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1114 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-1115 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1116 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1196 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-1290 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1193 2005-05-16 2025-04-03 - 7.5 Likely
CVE-2005-2086 2005-07-05 2025-04-03 - 7.5 Likely
CVE-2005-2161 2005-07-06 2025-04-03 - 4.3 Likely
CVE-2005-3310 2005-10-26 2025-04-03 - 3.5 Unknown
CVE-2005-3415 2005-11-01 2025-04-03 - 7.5 Likely
CVE-2005-3416 2005-11-01 2025-04-03 - 7.5 Likely
CVE-2005-3417 2005-11-01 2025-04-03 - 7.5 Likely
CVE-2005-3418 2005-11-01 2025-04-03 - 4.3 Likely
CVE-2005-3419 2005-11-01 2025-04-03 - 7.5 Likely
CVE-2005-3420 2005-11-01 2025-04-03 - 7.5 Likely
CVE-2005-3799 2005-11-24 2025-04-03 - 5.0 Likely
CVE-2005-4357 2005-12-20 2025-04-03 - 2.6 Unknown
CVE-2005-4358 2005-12-20 2025-04-03 - 5.0 Likely
CVE-2005-3536 2005-12-22 2025-04-03 - 7.5 Likely
CVE-2005-3537 2005-12-22 2025-04-03 - 5.0 Likely
CVE-2006-0063 2006-01-05 2025-04-03 - 4.3 Likely
CVE-2006-0450 2006-01-27 2025-04-03 - 5.0 Likely
CVE-2006-0437 2006-02-06 2025-04-03 - 4.3 Likely
CVE-2006-0438 2006-02-06 2025-04-03 - 5.0 Likely
CVE-2006-0632 2006-02-10 2025-04-03 - 6.4 Likely
CVE-2006-1603 2006-04-04 2025-04-03 - 4.3 Likely
CVE-2006-1775 2006-04-13 2025-04-03 - 4.3 Likely
CVE-2006-1895 2006-04-20 2025-04-03 - 6.5 Likely
CVE-2006-1896 2006-04-20 2025-04-03 - 6.0 Unknown
CVE-2006-2134 2006-05-02 2025-04-03 - 5.1 Unknown
CVE-2006-2359 2006-05-15 2025-04-03 - 4.3 Likely
CVE-2006-2360 2006-05-15 2025-04-03 - 7.5 Likely
CVE-2006-2865 2006-06-06 2025-04-03 - 7.5 Likely
CVE-2006-4450 2006-08-30 2025-04-03 - 5.1 Unknown
CVE-2006-4758 2006-09-13 2025-04-03 - 4.6 Unknown
CVE-2006-5209 2006-10-10 2025-04-09 - 7.5 Likely
CVE-2006-5435 2006-10-20 2025-04-09 - 7.5 Likely
CVE-2006-6421 2006-12-10 2025-04-09 - 6.0 Unknown
CVE-2006-6508 2006-12-14 2025-04-09 - 6.0 Unknown
CVE-2006-6839 2006-12-31 2025-04-09 - 10.0 Likely
CVE-2006-6840 2006-12-31 2025-04-09 - 10.0 Likely
CVE-2006-6841 2006-12-31 2025-04-09 - 10.0 Likely
CVE-2006-2219 2007-02-08 2025-04-09 - 5.0 Likely
CVE-2007-1695 2007-03-27 2025-04-09 - 10.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for phpbb_group phpbb by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.