CVE-2013-4682
25.06.2013, 18:55
SQL injection vulnerability in the Multishop extension before 2.0.39 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Vendor | Product | Version |
---|---|---|
bas_van_beek | multishop | 𝑥 ≤ 2.0.38 |
bas_van_beek | multishop | 0.0.2 |
bas_van_beek | multishop | 0.0.3 |
bas_van_beek | multishop | 0.0.4 |
bas_van_beek | multishop | 0.0.5 |
bas_van_beek | multishop | 0.0.6 |
bas_van_beek | multishop | 0.0.7 |
bas_van_beek | multishop | 0.0.8 |
bas_van_beek | multishop | 0.0.9 |
bas_van_beek | multishop | 0.0.10 |
bas_van_beek | multishop | 0.0.11 |
bas_van_beek | multishop | 0.0.12 |
bas_van_beek | multishop | 0.0.13 |
bas_van_beek | multishop | 0.0.14 |
bas_van_beek | multishop | 0.0.15 |
bas_van_beek | multishop | 0.0.16 |
bas_van_beek | multishop | 0.0.17 |
bas_van_beek | multishop | 0.0.18 |
bas_van_beek | multishop | 0.0.19 |
bas_van_beek | multishop | 0.0.20 |
bas_van_beek | multishop | 1.0.0 |
bas_van_beek | multishop | 1.0.1 |
bas_van_beek | multishop | 1.0.2 |
bas_van_beek | multishop | 1.0.3 |
bas_van_beek | multishop | 1.0.4 |
bas_van_beek | multishop | 1.0.5 |
bas_van_beek | multishop | 1.0.6 |
bas_van_beek | multishop | 1.0.7 |
bas_van_beek | multishop | 1.0.8 |
bas_van_beek | multishop | 1.0.9 |
bas_van_beek | multishop | 1.0.10 |
bas_van_beek | multishop | 1.0.11 |
bas_van_beek | multishop | 1.0.12 |
bas_van_beek | multishop | 1.0.13 |
bas_van_beek | multishop | 1.0.14 |
bas_van_beek | multishop | 1.0.15 |
bas_van_beek | multishop | 1.0.16 |
bas_van_beek | multishop | 1.0.17 |
bas_van_beek | multishop | 1.0.18 |
bas_van_beek | multishop | 1.0.19 |
bas_van_beek | multishop | 1.0.20 |
bas_van_beek | multishop | 1.0.21 |
bas_van_beek | multishop | 1.0.22 |
bas_van_beek | multishop | 1.0.23 |
bas_van_beek | multishop | 1.0.24 |
bas_van_beek | multishop | 1.0.25 |
bas_van_beek | multishop | 1.0.26 |
bas_van_beek | multishop | 1.0.27 |
bas_van_beek | multishop | 1.0.28 |
bas_van_beek | multishop | 1.0.29 |
bas_van_beek | multishop | 1.0.30 |
bas_van_beek | multishop | 1.0.31 |
bas_van_beek | multishop | 1.0.32 |
bas_van_beek | multishop | 1.0.33 |
bas_van_beek | multishop | 1.0.34 |
bas_van_beek | multishop | 1.0.35 |
bas_van_beek | multishop | 1.0.36 |
bas_van_beek | multishop | 1.0.37 |
bas_van_beek | multishop | 1.0.38 |
bas_van_beek | multishop | 1.0.39 |
bas_van_beek | multishop | 2.0.0 |
bas_van_beek | multishop | 2.0.1 |
bas_van_beek | multishop | 2.0.2 |
bas_van_beek | multishop | 2.0.3 |
bas_van_beek | multishop | 2.0.4 |
bas_van_beek | multishop | 2.0.5 |
bas_van_beek | multishop | 2.0.6 |
bas_van_beek | multishop | 2.0.7 |
bas_van_beek | multishop | 2.0.8 |
bas_van_beek | multishop | 2.0.9 |
bas_van_beek | multishop | 2.0.10 |
bas_van_beek | multishop | 2.0.11 |
bas_van_beek | multishop | 2.0.12 |
bas_van_beek | multishop | 2.0.13 |
bas_van_beek | multishop | 2.0.14 |
bas_van_beek | multishop | 2.0.15 |
bas_van_beek | multishop | 2.0.16 |
bas_van_beek | multishop | 2.0.17 |
bas_van_beek | multishop | 2.0.18 |
bas_van_beek | multishop | 2.0.19 |
bas_van_beek | multishop | 2.0.20 |
bas_van_beek | multishop | 2.0.21 |
bas_van_beek | multishop | 2.0.22 |
bas_van_beek | multishop | 2.0.23 |
bas_van_beek | multishop | 2.0.24 |
bas_van_beek | multishop | 2.0.25 |
bas_van_beek | multishop | 2.0.26 |
bas_van_beek | multishop | 2.0.28 |
bas_van_beek | multishop | 2.0.29 |
bas_van_beek | multishop | 2.0.31 |
bas_van_beek | multishop | 2.0.32 |
bas_van_beek | multishop | 2.0.33 |
bas_van_beek | multishop | 2.0.34 |
bas_van_beek | multishop | 2.0.35 |
bas_van_beek | multishop | 2.0.36 |
bas_van_beek | multishop | 2.0.37 |
𝑥
= Vulnerable software versions
References