Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in YAHMAN Word Balloon allows PHP Local File Inclusion.This issue affects Word Balloon: from n/a through 4.21.1.
References
Configurations
History
21 Nov 2024, 09:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://patchstack.com/database/vulnerability/word-balloon/wordpress-word-balloon-plugin-4-21-1-local-file-inclusion-vulnerability?_s_id=cve - Third Party Advisory |
24 Jun 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://patchstack.com/database/vulnerability/word-balloon/wordpress-word-balloon-plugin-4-21-1-local-file-inclusion-vulnerability?_s_id=cve - Third Party Advisory | |
CPE | cpe:2.3:a:back2nature:word_balloon:*:*:*:*:*:wordpress:*:* | |
First Time |
Back2nature
Back2nature word Balloon |
21 Jun 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 16:15
Updated : 2024-11-21 09:20
NVD link : CVE-2024-35781
Mitre link : CVE-2024-35781
CVE.ORG link : CVE-2024-35781
JSON object : View
Products Affected
back2nature
- word_balloon
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')