Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-1478

EPSS 2.31% · P85
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2010-1478

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ternaria Informatica Jfeedback!目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Joomla!是一款开放源码的内容管理系统(CMS)。 Joomla!的Ternaria Informatica Jfeedback! (com_jfeedback)组件存在目录遍历漏洞,远程攻击者可通过index.php控件参数的“..”符(点点)读取任意文件,并有可能引起其它未明问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2010-1478

#POC DescriptionSource LinkShenlong Link
1A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2010/CVE-2010-1478.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2010-1478

登录查看更多情报信息。

Same Patch Batch · n/a · 2010-04-19 · 13 CVEs total

CVE-2010-1468Focusdev Multi-Venue Restaurant Menu Manager SQL注入漏洞
CVE-2010-1469Ternaria Informatica JProject Manager (com_jprojectmanager)目录遍历漏洞
CVE-2010-1470Dev.Pucit.Edu.Pk Web TV目录遍历漏洞
CVE-2010-1471Joomla!组件AddressBook (com_addressbook)目录遍历漏洞
CVE-2010-1472Kazulah Daily Horoscope (com_horoscope)目录遍历漏洞
CVE-2010-1473Johnmccollum Advertising (com_advertising)目录遍历漏洞
CVE-2010-1474Joomla!组件Sweety Keeper (com_sweetykeeper)目录遍历漏洞
CVE-2010-1475Ternaria Preventive & Reservation (com_preventive)目录遍历漏洞
CVE-2010-1476Alphaplug AlphaUserPoints (com_alphauserpoints)目录遍历漏洞
CVE-2010-1477Joomla!组件SermonSpeaker (com_sermonspeaker) SQL注入漏洞
CVE-2010-1479Rockettheme RokModule SQL注入漏洞
CVE-2010-1480Rockettheme RokModule SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2010-1478

No comments yet


Leave a comment