Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-36523: WordPress Email download link plugin <= 3.7 - Sensitive Data Exposure - Patchstack

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Gopi Ramasamy Email download link.This issue affects Email download link: from n/a through 3.7.

CVE
#vulnerability#wordpress#auth

Solution

No fix available

vPatch available

No patched version is available.

Found this useful? Thank Rafshanzani Suhada for reporting this vulnerability. Buy a coffee ☕

Rafshanzani Suhada discovered and reported this Sensitive Data Exposure vulnerability in WordPress Email download link Plugin. This vulnerability has not been known to be fixed yet.

No other known vulnerabilities for this pluginReport

WordPress plugin developer?

Start a free security program for your WordPress plugins or request an audit.

Apply for MVDP

Security researcher?

Report to Patchstack Alliance bounty platform and earn monthly cash prizes.

Learn more

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907