Description
Multiple SQL injection vulnerabilities in vBulletin before 3.0.9 allow remote attackers to execute arbitrary SQL commands via the (1) request parameter to joinrequests.php, (2) limitnumber or (3) limitstart to user.php, (4) usertitle.php, or (5) usertools.php.
Exploits (4)
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26273
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26276
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26275
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26274
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22323
Exploit, Patch, Vendor Advisory x_refsource_misc
http://morph3us.org/advisories/20050917-vbulletin-3.0.8.txt
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14872
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112715150320677&w=2
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/16873/
Scores
EPSS
0.0142
EPSS Percentile
80.8%
Details
Status
published
Products (34)
jelsoft/vbulletin
1.0.1
jelsoft/vbulletin
2.0.3
jelsoft/vbulletin
2.0_rc2
jelsoft/vbulletin
2.0_rc3
jelsoft/vbulletin
2.2.0
jelsoft/vbulletin
2.2.1
jelsoft/vbulletin
2.2.2
jelsoft/vbulletin
2.2.3
jelsoft/vbulletin
2.2.4
jelsoft/vbulletin
2.2.5
... and 24 more
Published
Sep 21, 2005
Tracked Since
Feb 18, 2026