First published: Sat Oct 21 2023(Updated: )
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Superwebmailer Superwebmailer | =9.00.0.01710 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-38190 is high with a CVSS score of 8.8.
CVE-2023-38190 affects SuperWebMailer version 9.00.0.01710.
CVE-2023-38190 is a SQL Injection vulnerability.
To fix CVE-2023-38190 in SuperWebMailer, it is recommended to update to a patched version provided by the vendor.
More information about CVE-2023-38190 can be found at the following references: [link1](https://herolab.usd.de/security-advisories/) and [link2](https://herolab.usd.de/security-advisories/usd-2023-0014/).