Unrated severityNVD Advisory· Published Sep 29, 2010· Updated Apr 29, 2026
CVE-2010-3687
CVE-2010-3687
Description
Unspecified vulnerability in the powermail extension 1.5.3 and earlier for TYPO3 allows remote attackers to bypass validation have an unspecified impact by "[injecting] arbitrary values into validated fields," as demonstrated using the (1) Email and (2) URL fields.
Affected products
66cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*+ 65 more
- cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*range: <=1.5.3
- cpe:2.3:a:alex_kellner:powermail:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:alex_kellner:powermail:1.5.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- typo3.org/teams/security/security-bulletins/typo3-sa-2010-019nvdPatchVendor Advisory
- secunia.com/advisories/41530nvdVendor Advisory
- typo3.org/extensions/repository/view/powermail/1.5.4nvd
News mentions
0No linked articles in our index yet.