You are reading 1 threads
  • Author
    Messages
    • #26848
      Nicholas Coolman
      Key Master

      The aftermath of the vBulletin Zero-Day flaw.

      In September 2019, an unknown security researcher published a 0day flaw affecting vBulletin, one of the most popular CMS on the web for hosting discussion forums.

      The flaw allowed PHP code and shell commands to be executed without requiring authentication from the attacker, exposing many forums to potentially destructive attacks. (Read more)

      vBulletin is a commercial discussion forum software developed by Jelsoft Enterprises Ltd. Written in PHP and using the MySQL database, it is comparable to other forum systems such as Invision Power Board, phpBB or Simple Machines Forum. Wikipedia


      Zero-day vulnerabilities represent one of the most serious threats in IT. These flaws, still unknown to developers and users, are exploited by cybercriminals before a patch can be developed. The impact can be devastating, allowing attackers to access sensitive data, take control of computer systems or spread malware.

      Zero-day attacks are difficult to anticipate and counter, highlighting the importance of constantly monitoring systems, applying patches quickly, and implementing robust security measures to mitigate risks.

      Zero-Day flaws, often called "Exploits" are generally not used in cyberattacks. The attackers' objective is to take advantage of these critical vulnerabilities by monetizing their possible use. It is large companies like Microsoft or Adobe or even CES like WordPress but also data storage in the cloud that are the target of cyber threats from these exploits. Discovering a critical flaw is as profitable for hackers as exploiting ransomware.

      Free support forum
      Nicholas Coolman

    • #26878
      Nicholas Coolman
      Key Master

      LMIPatch for vBulletin remains vulnerable

      With a severity score of 9.8 on the CVSS 3.x scale, the CVE-2019-16759 flaw found in September 2019 in the vBulletin forum software had been corrected. Not enough, points out a security researcher who has carried out three PoCs to show this. (Read more)

      Free support forum
      Nicholas Coolman

You are reading 1 threads
  • You must be logged in to reply to this topic.
Back to top