Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Gopi Ramasamy Email download link.This issue affects Email download link: from n/a through 3.7.
References
Configurations
History
21 Nov 2024, 08:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://patchstack.com/database/vulnerability/email-download-link/wordpress-email-download-link-plugin-3-7-sensitive-data-exposure?_s_id=cve - Third Party Advisory |
06 Dec 2023, 17:43
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gopiplus:email_download_link:*:*:*:*:*:wordpress:*:* | |
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| First Time |
Gopiplus
Gopiplus email Download Link |
|
| References | () https://patchstack.com/database/vulnerability/email-download-link/wordpress-email-download-link-plugin-3-7-sensitive-data-exposure?_s_id=cve - Third Party Advisory |
30 Nov 2023, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-11-30 16:15
Updated : 2024-11-21 08:09
NVD link : CVE-2023-36523
Mitre link : CVE-2023-36523
CVE.ORG link : CVE-2023-36523
JSON object : View
Products Affected
gopiplus
- email_download_link
CWE
