CVE-2023-6381

Improper input validation vulnerability in Newsletter Software SuperMailer affecting version 11.20.0.2204. An attacker could exploit this vulnerability by sending a malicious configuration file (file with SMB extension) to a user via a link or email attachment and persuade the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to crash the application when attempting to load the malicious file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:supermailer:supermailer:11.20.0.2204:*:*:*:*:*:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 3.3
References () https://www.incibe.es/en/incibe-cert/notices/aviso/improper-input-validation-newsletter-software-supermailer - Third Party Advisory () https://www.incibe.es/en/incibe-cert/notices/aviso/improper-input-validation-newsletter-software-supermailer - Third Party Advisory

18 Dec 2023, 19:58

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo
CPE cpe:2.3:a:supermailer:supermailer:11.20.0.2204:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://www.incibe.es/en/incibe-cert/notices/aviso/improper-input-validation-newsletter-software-supermailer - () https://www.incibe.es/en/incibe-cert/notices/aviso/improper-input-validation-newsletter-software-supermailer - Third Party Advisory

13 Dec 2023, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 11:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6381

Mitre link : CVE-2023-6381

CVE.ORG link : CVE-2023-6381


JSON object : View

Products Affected

supermailer

  • supermailer
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo