CVE-2010-1478 – Joomla! Component Jfeedback 1.2 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1478
Directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Ternaria Informatica Jfeedback! • https://www.exploit-db.com/exploits/12145 http://packetstormsecurity.org/1004-exploits/joomlajfeedback-lfi.txt http://secunia.com/advisories/39262 http://www.exploit-db.com/exploits/12145 http://www.securityfocus.com/bid/39390 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1475 – Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1475
Directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Preventive & Reservation (com_preventive) v1.0.5 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección y posiblemente tener otros impactos al utilizar caracteres ".." • https://www.exploit-db.com/exploits/12147 http://packetstormsecurity.org/1004-exploits/joomlapr-lfi.txt http://secunia.com/advisories/39285 http://www.exploit-db.com/exploits/12147 http://www.securityfocus.com/bid/39387 https://exchange.xforce.ibmcloud.com/vulnerabilities/57652 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1473 – Joomla! Component Advertising 0.25 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1473
Directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Advertising (com_advertising) 0.25 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección y posiblemente otros efectos sin determinar al utilizar caracteres .. • https://www.exploit-db.com/exploits/12171 http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt http://secunia.com/advisories/39410 http://www.exploit-db.com/exploits/12171 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1471 – Joomla! Component Address Book 1.5.0 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1471
Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente AddressBook (com_addressbook) component 1.5.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección a través de los caracteres ".." • https://www.exploit-db.com/exploits/12170 http://packetstormsecurity.org/1004-exploits/joomlaaddressbook-lfi.txt http://secunia.com/advisories/39412 http://www.exploit-db.com/exploits/12170 http://www.vupen.com/english/advisories/2010/0862 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1476 – Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1476
Directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php. Vulnerabilidad de salto de directorio en el componente AlphaUserPoints (com_alphauserpoints) v1.5.5 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección y posiblemente tener otros impactos al utilizar caracteres ".." • https://www.exploit-db.com/exploits/12150 http://packetstormsecurity.org/1004-exploits/joomlaalphauserpoints-lfi.txt http://secunia.com/advisories/39250 http://www.alphaplug.com http://www.exploit-db.com/exploits/12150 http://www.securityfocus.com/bid/39393 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •