Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Gopi Ramasamy Email download link.This issue affects Email download link: from n/a through 3.7.
References
Configurations
History
21 Nov 2024, 08:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://patchstack.com/database/vulnerability/email-download-link/wordpress-email-download-link-plugin-3-7-sensitive-data-exposure?_s_id=cve - Third Party Advisory |
06 Dec 2023, 17:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gopiplus
Gopiplus email Download Link |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | NVD-CWE-noinfo | |
References | () https://patchstack.com/database/vulnerability/email-download-link/wordpress-email-download-link-plugin-3-7-sensitive-data-exposure?_s_id=cve - Third Party Advisory | |
CPE | cpe:2.3:a:gopiplus:email_download_link:*:*:*:*:*:wordpress:*:* |
30 Nov 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-30 16:15
Updated : 2024-11-21 08:09
NVD link : CVE-2023-36523
Mitre link : CVE-2023-36523
CVE.ORG link : CVE-2023-36523
JSON object : View
Products Affected
gopiplus
- email_download_link
CWE