CVE-2016-6195
CRITICAL EXPLOITED IN THE WILD NUCLEIvBulletin <4.2.2 PL5 & <4.2.3 PL1 - SQL Injection
Title source: llmDescription
SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.
Exploits (3)
github
WORKING POC
1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2016-6195
github
WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2016-6195
exploitdb
WORKING POC
VERIFIED
by Manish Tanwar · textwebappsphp
https://www.exploit-db.com/exploits/40751
Nuclei Templates (1)
vBulletin <= 4.2.3 - SQL Injection
CRITICALVERIFIEDby MaStErChO
Shodan:
title:"Powered By vBulletin" || http.html:"powered by vbulletin" || http.component:"vbulletin" || http.title:"powered by vbulletin" || cpe:"cpe:2.3:a:vbulletin:vbulletin"
FOFA:
body="powered by vbulletin" || title="powered by vbulletin"
References (4)
Scores
CVSS v3
9.8
EPSS
0.8574
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2016-08-30
InTheWild.io
2017-08-21
Classification
CWE
CWE-89
Status
draft
Affected Products (2)
vbulletin/vbulletin
< 4.2.2
vbulletin/vbulletin
Timeline
Published
Aug 30, 2016
Tracked Since
Feb 18, 2026