Security for everyone

CVE-2010-1979 Scanner

Detects 'Directory Traversal' vulnerability in Affiliate Datafeeds component of Joomla affects v. build 880.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




The Affiliate Datafeeds component is a popular feature of Joomla! software used for the purpose of managing affiliates and their data feeds. This component allows users to import product data and create customized product feeds so that affiliates can promote products with relevant information. The use of Affiliate Datafeeds component saves significant time and effort for online businesses, allowing them to automate the process of promoting affiliate products and making money.

CVE-2010-1979 vulnerability is a security flaw that was detected in the Affiliate Datafeeds component build 880 for Joomla!. This vulnerability allows remote attackers to read arbitrary files by inserting a ".." (dot dot) in the controller parameter of the index.php file. The attackers can use this vulnerability to gain unauthorized access to sensitive information, such as user data, financial information, and other confidential data.

This vulnerability can lead to significant damage when exploited, exposing user data and information to malicious attackers. Attackers can access sensitive information without proper authentication or authorization, causing reputational damage to businesses and financial losses to users. In serious cases, the integrity of the entire system can be compromised, and the attackers can gain complete control over the website, causing irreversible damage.

With the pro features of platform, businesses can easily and quickly learn about vulnerabilities in their digital assets. They can scan their websites for any vulnerabilities, identify and fix any security gaps, and monitor their systems for suspicious activity. Protecting digital assets is crucial for businesses to maintain their reputation, ensure trust in their customers, and stay ahead of malicious attackers.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture