{"id":36545,"date":"2020-08-10T21:16:00","date_gmt":"2020-08-10T21:16:00","guid":{"rendered":"http:\/\/b397050e-5ff8-43d1-9917-cbc48a79a6f0"},"modified":"2020-08-10T21:16:00","modified_gmt":"2020-08-10T21:16:00","slug":"security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/","title":{"rendered":"Security researcher publishes details and exploit code for a vBulletin zero-day"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/09\/24\/2b6903dc-3351-4dfa-98a5-6b2375b9eca9\/vbulletin.png\" class alt=\"vBulletin\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: ZDNet <\/span><\/figcaption><\/figure>\n<p>A security researcher has published details and proof-of-concept exploit code for a zero-day vulnerability in vBulletin, one of today&#8217;s most popular forum software.<\/p>\n<p>The zero-day is a bypass for a patch from a previous vBulletin zero-day \u2014 namely CVE-2019-16759, disclosed in September 2019.<\/p>\n<p>The previous zero-day allowed attackers to exploit a bug in the vBulletin template system to run malicious code and take over forums without needing to authenticate on the victim sites (a type of bug called a pre-auth RCE).<\/p>\n<p>CVE-2019-16759 was <a href=\"https:\/\/www.zdnet.com\/article\/anonymous-researcher-drops-vbulletin-zero-day-impacting-tens-of-thousands-of-sites\/\" target=\"_blank\" rel=\"noopener noreferrer\">disclosed on September 24, 2019<\/a>, and a patch was <a href=\"https:\/\/forum.vbulletin.com\/forum\/vbulletin-announcements\/vbulletin-announcements_aa\/4422707-vbulletin-security-patch-released-versions-5-5-2-5-5-3-and-5-5-4\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">provided the next day, on September 25<\/a>.<\/p>\n<h3>New zero-day bypasses CVE-2019-16759 patch<\/h3>\n<p>However, <a href=\"https:\/\/blog.exploitee.rs\/2020\/exploiting-vbulletin-a-tale-of-patch-fail\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">in a blog post published late Sunday night<\/a>, Austin-based security researcher Amir Etemadieh said the CVE-2019-16759 &#8220;was inadequate in blocking exploitation.&#8221;<\/p>\n<p>The researcher said he found a simple way to bypass the patch and continue to exploit the same CVE-2019-16759 vulnerability, and published three proof-of-concepts in Bash, Python, and Ruby, to prove his point.<\/p>\n<p>Etemadieh told ZDNet he did not contact and notify the vBulletin team before going public with his findings. MH Sub I, LLC, the company that commercializes the vBulletin forum software, has not returned a request for comment.<\/p>\n<h3>Forums are a common target for hackers<\/h3>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Either way, the new zero-day code is live and has been broadly shared on social media sites like Reddit and Twitter, and inside hacking communities hosted on private forums and Discord channels.<\/p>\n<figure class=\"media-source\">\n<div class=\"twitterContainer\" readability=\"6.4\">\n<blockquote class=\"twitter-tweet\" readability=\"7.2\">\n<p lang=\"en\" dir=\"ltr\">0day RCE exploit on vBulletin 5xx<\/p>\n<p>dork ; intext:&#8221;Powered by vBulletin&#8221;<br \/>POC<br \/>curl -s http:\/\/SITE\/ajax\/render\/widget_tabbedcontainer_tab_panel -d &#8216;subWidgets[0][template]=widget_php&amp;subWidgets[0][config][code]=echo shell_exec(&#8220;id&#8221;); exit;&#8217;<a href=\"https:\/\/twitter.com\/hashtag\/bugbounty?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">#bugbounty<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/bugbountytips?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">#bugbountytips<\/a> <a href=\"https:\/\/t.co\/DfqLivsskG\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">pic.twitter.com\/DfqLivsskG<\/a><\/p>\n<p>\u2014 h4x0r-dz (@h4x0r_dz) <a href=\"https:\/\/twitter.com\/h4x0r_dz\/status\/1292759555034828800?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">August 10, 2020<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>The publication of the September 2019 zero-day triggered a massive wave of vBulletin hacks last year, resulting in many companies disclosing security breaches over the following months.<\/p>\n<p>Forums, in general, are some of the most sought after web technologies to hack. The reason why hackers put a primer on forums has to do with their purpose and the data they can steal.<\/p>\n<p>Unlike most content management systems like WordPress, Drupal, or Joomla, online forums like vBulletin are built for the sole and primary purpose of managing online communities, and, as a result, hold large quantities of personal data.<\/p>\n<p>A WordPress site may be used to run a wedding planner&#8217;s or a lawyer&#8217;s office website, but even the lowliest and unimportant forums have thousands of registered user profiles holding sensitive user details, along with user posts, personal messages, and sometimes even financial information, if the forums have pay-to-access features.<\/p>\n<p>However, even if Etemadieh didn&#8217;t make it clear if he notified the vBulletin team about his plans to reveal a zero-day, the researcher says forum owners can prevent exploitation by making the following modifications to their discussion board settings.<\/p>\n<ol>\n<li><em>Go to the vBulletin administrator control panel.<\/em><\/li>\n<li><em>Click &#8220;Settings&#8221; in the menu on the left, then &#8220;Options&#8221; in the dropdown.<\/em><\/li>\n<li><em>Choose &#8220;General Settings&#8221; and then click &#8220;Edit Settings&#8221;<\/em><\/li>\n<li><em>Look for &#8220;Disable PHP, Static HTML, and Ad Module rendering&#8221;, Set to &#8220;Yes&#8221;<\/em><\/li>\n<li><em>Click &#8220;Save&#8221;<\/em><\/li>\n<\/ol>\n<p>At the time of writing, at least one forum was confirmed to have been hacked using this new zero-day, the forum of the DEF CON security conference, which just recently concluded over the weekend.<\/p>\n<figure class=\"media-source\"> <\/figure>\n<p><em>Updated at 19:30 ET to add that the vBulletin team has <\/em><a href=\"https:\/\/forum.vbulletin.com\/forum\/vbulletin-announcements\/vbulletin-announcements_aa\/4445227-vbulletin-5-6-0-5-6-1-5-6-2-security-patch\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"><em>released a patch<\/em><\/a><em>.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Proof-of-concept exploit code available in Bash, Python, and Ruby.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36546,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security researcher publishes details and exploit code for a vBulletin zero-day 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security researcher publishes details and exploit code for a vBulletin zero-day 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T21:16:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Security researcher publishes details and exploit code for a vBulletin zero-day\",\"datePublished\":\"2020-08-10T21:16:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/\",\"name\":\"Security researcher publishes details and exploit code for a vBulletin zero-day 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png\",\"datePublished\":\"2020-08-10T21:16:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png\",\"width\":1000,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security researcher publishes details and exploit code for a vBulletin zero-day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security researcher publishes details and exploit code for a vBulletin zero-day 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/","og_locale":"en_US","og_type":"article","og_title":"Security researcher publishes details and exploit code for a vBulletin zero-day 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-10T21:16:00+00:00","og_image":[{"width":1000,"height":480,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Security researcher publishes details and exploit code for a vBulletin zero-day","datePublished":"2020-08-10T21:16:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/"},"wordCount":580,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/","url":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/","name":"Security researcher publishes details and exploit code for a vBulletin zero-day 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png","datePublished":"2020-08-10T21:16:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day.png","width":1000,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Security researcher publishes details and exploit code for a vBulletin zero-day"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36545"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36545\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36546"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}