Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-1952

EPSS 2.86% · P86
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2010-1952

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cmstactics BeeHeard Lite目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Joomla!是一款开放源码的内容管理系统(CMS)。 Joomla!的BeeHeard (com_beeheard)及BeeHeard Lite (com_beeheardlite)组件存在目录遍历漏洞,远程攻击者可通过index.php的controller参数的".."符读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2010-1952

#POC DescriptionSource LinkShenlong Link
1A directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2010/CVE-2010-1952.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2010-1952

Please Login to view more intelligence information

Same Patch Batch · n/a · 2010-05-18 · 20 CVEs total

CVE-2010-1945openMairie Openfoncier多个PHP远程文件包含漏洞
CVE-2010-1584Drupal Context模块跨站脚本攻击漏洞
CVE-2010-0404phpGroupWare 多个SQL注入漏洞
CVE-2010-0403phpGroupWare 'app' 参数本地文件包含漏洞
CVE-2010-1943NEC CapsSuite Small Edition PatchMeister 远程拒绝服务漏洞
CVE-2010-1942Fujitsu Interstage Application Server Servlet 组件安全漏洞
CVE-2010-1941Nec WebSAM DeploymentManager拒绝服务漏洞
CVE-2010-1948openMairie Openfoncier 'scr/soustab.php'目录遍历漏洞
CVE-2010-1947openMairie openRegistreCIL 远程文件包含漏洞
CVE-2010-1946openMairie openRegistreCIL 远程文件包含漏洞
CVE-2010-1949Emultisoft Online News Paper Manager SQL注入漏洞
CVE-2010-1944openMairie openCimetiere 'path_om' 参数多个远程文件包含漏洞
CVE-2010-1957Thefactory Love Factory目录遍历漏洞
CVE-2010-1956Thefactory Gadget Factory 'controller'参数本地文件包含漏洞
CVE-2010-1955Thefactory Deluxe Blog Factory 'controller'参数本地文件包含漏洞
CVE-2010-1954Joomlacomponent.Inetlanka iNetLanka Multiple root 'controller'参数本地文件包含漏洞
CVE-2010-1953Joomlacomponent.Inetlanka iNetLanka Multiple Map 'controller'参数本地文件包含漏洞
CVE-2010-195160cycleCMS多个目录遍历漏洞
CVE-2010-1950Emultisoft Online News Paper Manager SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2010-1952

No comments yet


Leave a comment