CVE-2010-1715 – Joomla! Component Online Exam 1.5.0 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1715
Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Online Examination (también conocido como Online Exam o com_onlineexam) v1.5.0 para Joomla! • https://www.exploit-db.com/exploits/12174 http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt http://secunia.com/advisories/39414 http://www.exploit-db.com/exploits/12174 http://www.osvdb.org/63659 https://exchange.xforce.ibmcloud.com/vulnerabilities/57677 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1653 – Joomla! Component Graphics 1.0.6 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1653
Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Una vulnerabilidad de salto de directorio en graphics.php del componente de Joomla! • https://www.exploit-db.com/exploits/12430 http://packetstormsecurity.org/1004-exploits/joomlagraphics-lfi.txt http://secunia.com/advisories/39585 http://www.exploit-db.com/exploits/12430 http://www.securityfocus.com/bid/39743 http://www.vupen.com/english/advisories/2010/1004 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1607 – Joomla! Component WMI 1.5.0 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1607
Directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en wmi.php en el componente Webmoney Web Merchant Interface (alias WMI o com_wmi) v1.5.0 para Joomla! permite a atacantes remotos incluir y ejecutar archivos locales a través de un .. • https://www.exploit-db.com/exploits/12316 http://osvdb.org/63979 http://secunia.com/advisories/39539 http://www.exploit-db.com/exploits/12316 http://www.securityfocus.com/bid/39608 https://exchange.xforce.ibmcloud.com/vulnerabilities/58032 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1471 – Joomla! Component Address Book 1.5.0 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1471
Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente AddressBook (com_addressbook) component 1.5.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección a través de los caracteres ".." • https://www.exploit-db.com/exploits/12170 http://packetstormsecurity.org/1004-exploits/joomlaaddressbook-lfi.txt http://secunia.com/advisories/39412 http://www.exploit-db.com/exploits/12170 http://www.vupen.com/english/advisories/2010/0862 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1472 – Joomla! Component Horoscope 1.5.0 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1472
Directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Daily Horoscope (com_horoscope) component 1.5.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección a través de los caracteres ".." • https://www.exploit-db.com/exploits/12167 http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt http://secunia.com/advisories/39406 http://www.exploit-db.com/exploits/12167 http://www.vupen.com/english/advisories/2010/0859 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •