Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
WordPress Download After Email plugin <= 2.1.9 - Broken Access Control vulnerability
Vulnerability Description
Missing Authorization vulnerability in mkscripts Download After Email download-after-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download After Email: from n/a through <= 2.1.9.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
授权机制缺失
Vulnerability Title
WordPress plugin Download After Email 安全漏洞
Vulnerability Description
ws等都是(WebSockets)开源的产品。ws是一个 Node.js WebSocket 库。FreeBSD ctl等都是(FreeBSD)基金会的产品。ctl是一个工具。R infrastructure gh等都是(R infrastructure)开源的产品。gh是一个GitHub的API库。 WordPress plugin Download After Email 2.1.9及之前版本存在安全漏洞,该漏洞源于缺少授权,可能导致利用错误配置的访问控制安全级别。
CVSS Information
N/A
Vulnerability Type
N/A