High severityNVD Advisory· Published Jan 15, 2010· Updated Apr 23, 2026
CVE-2010-0329
CVE-2010-0329
Description
SQL injection vulnerability in the powermail extension 1.5.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors related to the "SQL selection field" and "typoscript."
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
in2code/powermailPackagist | < 1.5.2 | 1.5.2 |
Affected products
64cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*+ 63 more
- cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*range: <=1.5.1
- cpe:2.3:a:alex_kellner:powermail:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.5.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- secunia.com/advisories/38167nvdVendor Advisory
- typo3.org/teams/security/security-bulletins/typo3-sa-2009-021/nvdVendor Advisory
- github.com/advisories/GHSA-mgw4-gv3f-g57jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2010-0329ghsaADVISORY
- typo3.org/extensions/repository/view/powermail/1.5.2ghsaWEB
- typo3.org/extensions/repository/view/powermail/1.5.2/info/changelog.txtghsaWEB
- web.archive.org/web/20100123124044/http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-021ghsaWEB
- typo3.org/extensions/repository/view/powermail/1.5.2/nvd
- typo3.org/extensions/repository/view/powermail/1.5.2/info/changelog.txt/nvd
News mentions
0No linked articles in our index yet.