Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Vbulletin rce exploit CVE-2019-16759 | https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit | POC Details |
| 2 | Nmap NSE Script to Detect vBulletin pre-auth 5.x RCE CVE-2019-16759 | https://github.com/r00tpgp/http-vuln-CVE-2019-16759 | POC Details |
| 3 | vBulletin 5.x 未授权远程代码执行漏洞 | https://github.com/jas502n/CVE-2019-16759 | POC Details |
| 4 | CVE-2019-16759 vbulletin 5.0.0 till 5.5.4 pre-auth rce | https://github.com/theLSA/vbulletin5-rce | POC Details |
| 5 | Interactive-Like Command-Line Console for CVE-2019-16759 | https://github.com/FarjaalAhmad/CVE-2019-16759 | POC Details |
| 6 | Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759) | https://github.com/andripwn/pwn-vbulletin | POC Details |
| 7 | Mass Exploit CVE-2019-16759 | https://github.com/psychoxploit/vbull | POC Details |
| 8 | None | https://github.com/polar1s7/CVE-2019-16759-bypass | POC Details |
| 9 | Vbulletin RCE Exploit | https://github.com/nako48/CVE-2019-16759 | POC Details |
| 10 | This tools will extracts and dumps Email + SMTP from vBulletin database server | https://github.com/0xdims/CVE-2019-16759 | POC Details |
| 11 | None | https://github.com/sunian19/CVE-2019-16759 | POC Details |
| 12 | (CVE-2019-16759) vBulletin_Routestring-RCE | https://github.com/ludy-dev/vBulletin_Routestring-RCE | POC Details |
| 13 | Vbulletin RCE Exploits | https://github.com/fxp0-4tx/CVE-2019-16759 | POC Details |
| 14 | vBulletin 5.0.0 through 5.5.4 is susceptible to a remote command execution vulnerability via the widgetConfig parameter in an ajax/render/widget_php routestring request. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-16759.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet