Vulnerabilities (CVE)

Filtered by vendor Vbulletin Subscribe
Filtered by product Vbulletin
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-17496 1 Vbulletin 1 Vbulletin 2022-07-10 7.5 HIGH 9.8 CRITICAL
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
CVE-2020-12720 1 Vbulletin 1 Vbulletin 2022-04-27 7.5 HIGH 9.8 CRITICAL
vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.
CVE-2019-17132 1 Vbulletin 1 Vbulletin 2021-07-21 6.8 MEDIUM 9.8 CRITICAL
vBulletin through 5.5.4 mishandles custom avatars.
CVE-2020-7373 1 Vbulletin 1 Vbulletin 2021-07-21 7.5 HIGH 9.8 CRITICAL
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability.
CVE-2019-16759 1 Vbulletin 1 Vbulletin 2021-07-21 7.5 HIGH 9.8 CRITICAL
vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
CVE-2017-17671 2 Microsoft, Vbulletin 2 Windows, Vbulletin 2020-08-14 7.5 HIGH 9.8 CRITICAL
vBulletin through 5.3.x on Windows allows remote PHP code execution because a require_once call is reachable with an unauthenticated request that can include directory traversal sequences to specify an arbitrary pathname, and because ../ traversal is blocked but ..\ traversal is not blocked. For example, an attacker can make an invalid HTTP request containing PHP code, and then make an index.php?routestring= request with enough instances of ".." to reach an Apache HTTP Server log file.
CVE-2017-17672 1 Vbulletin 1 Vbulletin 2018-01-02 7.5 HIGH 9.8 CRITICAL
In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates.
CVE-2016-6195 1 Vbulletin 1 Vbulletin 2017-08-21 7.5 HIGH 9.8 CRITICAL
SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.