Security for everyone

CVE-2010-0696 Scanner

Detects 'Directory Traversal' vulnerability in JoomlaWorks AllVideos component for Joomla! affects v. 3.0 through 3.2.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2010-0696 Scanner Detail

JoomlaWorks AllVideos is a plugin designed for Joomla!, a popular Content Management System (CMS). This plugin allows users to easily embed videos from various sources into their Joomla! website. With its simple and intuitive interface, JoomlaWorks AllVideos allows website owners to display videos without any technical knowledge. The plugin supports various video formats such as Youtube, Vimeo, and DailyMotion.

However, the use of JoomlaWorks AllVideos plugin comes with a risk. A vulnerability, identified as CVE-2010-0696, was discovered in the plugin. This vulnerability allows remote attackers to read any arbitrary file via a directory traversal attack. The attack is performed by adding "../" to the file parameter, which alters the path and allows the attacker to access files outside the intended directory.

This vulnerability can have serious consequences if exploited. It can allow attackers to access sensitive files, including user credentials, financial records, and other confidential information. Furthermore, it can also provide a backdoor entrance to the server, allowing attackers to gain complete control over the website and its data.

In conclusion, it is crucial for website owners to take cybersecurity seriously and stay informed about potential vulnerabilities in their digital assets. Thanks to the pro features of the platform, users can identify and mitigate vulnerabilities in their websites quickly and efficiently. Don’t wait until it’s too late, take precautions now to safeguard your digital assets.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture