The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading via the hello_world_lyric() functio
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
NVD | CVE-2024-9224 | 1 Oct 202409:15 | – | nvd |
GithubExploit | Exploit for Path Traversal in Kau-Boys Hello World | 11 Oct 202409:17 | – | githubexploit |
Patchstack | WordPress Hello World Plugin <= 2.1.1 is vulnerable to Arbitrary File Download | 1 Oct 202400:00 | – | patchstack |
Cvelist | CVE-2024-9224 Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read | 1 Oct 202408:30 | – | cvelist |
Vulnrichment | CVE-2024-9224 Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read | 1 Oct 202408:30 | – | vulnrichment |
Wordfence Blog | Wordfence Intelligence Weekly WordPress Vulnerability Report (September 30, 2024 to October 6, 2024) | 10 Oct 202416:10 | – | wordfence |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo