Hello World plugin for WordPress CVE-2024-9224, <= 2.1.1 - Authenticated Arbitrary File Read vulnerabilit
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
NVD | CVE-2024-9224 | 1 Oct 202409:15 | – | nvd |
GithubExploit | Exploit for Path Traversal in Kau-Boys Hello World | 11 Oct 202409:17 | – | githubexploit |
Patchstack | WordPress Hello World Plugin <= 2.1.1 is vulnerable to Arbitrary File Download | 1 Oct 202400:00 | – | patchstack |
CVE | CVE-2024-9224 | 1 Oct 202409:15 | – | cve |
Vulnrichment | CVE-2024-9224 Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read | 1 Oct 202408:30 | – | vulnrichment |
Wordfence Blog | Wordfence Intelligence Weekly WordPress Vulnerability Report (September 30, 2024 to October 6, 2024) | 10 Oct 202416:10 | – | wordfence |
[
{
"vendor": "kau-boy",
"product": "Hello World",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "2.1.1",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo