Lucene search

K
cve[email protected]CVE-2024-35781
HistoryJun 21, 2024 - 4:15 p.m.

CVE-2024-35781

2024-06-2116:15:12
CWE-22
web.nvd.nist.gov
23
cve-2024-35781
yahman word balloon
path traversal
php
local file inclusion
security vulnerability
software version 4.21.1

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.2%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in YAHMAN Word Balloon allows PHP Local File Inclusion.This issue affects Word Balloon: from n/a through 4.21.1.

Affected configurations

Vulners
NVD
Node
yahmanword_balloonRange4.21.1

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "word-balloon",
    "product": "Word Balloon",
    "vendor": "YAHMAN",
    "versions": [
      {
        "lessThanOrEqual": "4.21.1",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.2%

Related for CVE-2024-35781