Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-1352

EPSS 4.97% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2010-1352

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
JOOFORGE Jutebox组件目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Joomla!是一款开放源码的内容管理系统(CMS)。 Joomla!的JOOFORGE Jutebox (com_jukebox)组件1.0和1.7中存在目录遍历漏洞。远程攻击者可以通过index.php控制器参数中的“..”(点点)符读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2010-1352

#POC DescriptionSource LinkShenlong Link
1A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2010/CVE-2010-1352.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2010-1352

Please Login to view more intelligence information

Same Patch Batch · n/a · 2010-04-12 · 21 CVEs total

CVE-2010-1149Freedesktop udisks 'probers/udisks-dm-export.c' 本地信息泄露漏洞
CVE-2010-1348IBM WebSphere Portal登录程序未明漏洞
CVE-2010-1347IBM Systems Director Agent 不安全文件权限管理漏洞
CVE-2010-1148Linux Kernel cifs_create()函数空指针引用漏洞
CVE-2010-1354Joomla! 'VJDEO'组件目录遍历漏洞
CVE-2010-1353JWowjoomla 'LoginBox Pro'组件目录遍历漏洞
CVE-2010-1351Nodesform多个PHP远程文件包含漏洞
CVE-2010-1350Joomla! 'com_jp_jobs'组件'id'参数SQL注入漏洞
CVE-2010-1349Opera Web浏览器Content-Length堆溢出漏洞
CVE-2010-1152memcached 输入验证错误漏洞
CVE-2009-1564VMware VMnc编解码器HexTile编码视频块解析堆溢出漏洞
CVE-2010-1146Linux Kernel ReiserFS文件系统实现绕过安全限制漏洞
CVE-2010-1142VMware VMnc编解码器HexTile编码视频块解析堆溢出漏洞
CVE-2010-1141VMware VMnc编解码器HexTile编码视频块解析堆溢出漏洞
CVE-2010-1140VMware USB服务 特洛伊木马权限获取漏洞
CVE-2010-1139VMware vmrun格式化字符串漏洞
CVE-2010-1138VMware 虚拟网络堆栈远程攻击敏感信息泄露漏洞
CVE-2010-0741Linux kernel 输入验证错误漏洞
CVE-2009-3732VMware Remote Console vmware-vmrc.exe 格式化字符串漏洞
CVE-2009-1565VMware VMnc HexTile编码视频块多个堆溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2010-1352

No comments yet


Leave a comment