Security for everyone

CVE-2010-1653 Scanner

Detects 'Directory Traversal' vulnerability in Graphics component for Joomla! affects v. 1.0.6 and 1.5.0.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




The Graphics component is a tool used in Joomla! for creating graphics on web pages. It provides users with an easy and efficient method of adding graphics to their site. The component is widely used by website owners, administrators, and designers to create visually appealing and engaging content for their online audience. Its functionality allows users to create stunning visuals with ease, making it a must-have for any Joomla! website.

The CVE-2010-1653 vulnerability was discovered in the Graphics component, specifically in the graphics.php file. This vulnerability allows remote attackers to include and execute arbitrary local files by using a “..” (dot dot) in the controller parameter to index.php. The attacker can exploit this vulnerability to access sensitive information, modify or delete files, or even take over the website and cause irreparable damage. This vulnerability poses a potential threat and can compromise the security of the website.

Exploiting the vulnerability can lead to severe consequences for the website owner, including financial loss, damage to reputation, and loss of data. Attackers can easily gain access to sensitive information stored on the server and use it for malicious purposes. They can also exploit the vulnerability to execute ransomware attacks, steal login credentials, or even carry out DDoS attacks.

In conclusion, it is essential to prioritize website security. With pro features like vulnerability detection on, website owners can easily identify vulnerabilities in their digital assets and take the necessary steps to secure them. With the right tools and resources, website owners can protect their assets and prevent malicious attacks from harming their business.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture