First published: Fri Mar 19 2010(Updated: )
SQL injection vulnerability in the SAV Filter Selectors (sav_filter_selectors) extension before 1.0.5 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
laurent foulloy SAV Filter Selectors | <=1.0.4 | |
laurent foulloy SAV Filter Selectors | =1.0.1 | |
laurent foulloy SAV Filter Selectors | =1.0.2 | |
laurent foulloy SAV Filter Selectors | =1.0.3 | |
TYPO3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1016 is classified as a high-severity vulnerability due to its potential to allow remote attackers to execute arbitrary SQL commands.
To fix CVE-2010-1016, upgrade the SAV Filter Selectors extension to version 1.0.5 or later.
CVE-2010-1016 affects all versions of the SAV Filter Selectors extension prior to 1.0.5.
CVE-2010-1016 is an SQL injection vulnerability that can be exploited to manipulate database queries.
Yes, CVE-2010-1016 can be exploited remotely without the need for authentication.