The Hello World plugin for WordPress has Arbitrary File Reading vulnerability up to version 2.1.
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
GithubExploit | Exploit for Path Traversal in Kau-Boys Hello World | 11 Oct 202409:17 | โ | githubexploit |
Patchstack | WordPress Hello World Plugin <= 2.1.1 is vulnerable to Arbitrary File Download | 1 Oct 202400:00 | โ | patchstack |
Cvelist | CVE-2024-9224 Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read | 1 Oct 202408:30 | โ | cvelist |
CVE | CVE-2024-9224 | 1 Oct 202409:15 | โ | cve |
Vulnrichment | CVE-2024-9224 Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read | 1 Oct 202408:30 | โ | vulnrichment |
Wordfence Blog | Wordfence Intelligence Weekly WordPress Vulnerability Report (September 30, 2024 to October 6, 2024) | 10 Oct 202416:10 | โ | wordfence |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo