First published: Fri Apr 22 2011(Updated: )
Multiple SQL injection vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, as demonstrated by reading data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bestpractical Rt | =3.0.4 | |
Bestpractical Rt | =2.0.7 | |
Bestpractical Rt | =3.0.8 | |
Bestpractical Rt | =2.0.6 | |
Bestpractical Rt | =3.4.5 | |
Bestpractical Rt | =3.0.2 | |
Bestpractical Rt | =2.0.14 | |
Bestpractical Rt | =3.6.7 | |
Bestpractical Rt | =3.6.2 | |
Bestpractical Rt | =3.2.2 | |
Bestpractical Rt | =3.6.3 | |
Bestpractical Rt | =3.0.11 | |
Bestpractical Rt | =2.0.15 | |
Bestpractical Rt | =3.6.0 | |
Bestpractical Rt | =2.0.5.3 | |
Bestpractical Rt | =3.4.0 | |
Bestpractical Rt | =2.0.8.2 | |
Bestpractical Rt | =2.0.13 | |
Bestpractical Rt | =3.0.10 | |
Bestpractical Rt | =2.0.11 | |
Bestpractical Rt | =2.0.0 | |
Bestpractical Rt | =3.6.10 | |
Bestpractical Rt | =2.0.1 | |
Bestpractical Rt | =3.2.3 | |
Bestpractical Rt | =2.0.2 | |
Bestpractical Rt | =3.0.5 | |
Bestpractical Rt | =3.2.0 | |
Bestpractical Rt | =3.0.0 | |
Bestpractical Rt | =3.4.6 | |
Bestpractical Rt | =3.0.3 | |
Bestpractical Rt | =3.4.3 | |
Bestpractical Rt | =2.0.8 | |
Bestpractical Rt | =3.6.9 | |
Bestpractical Rt | =3.6.6 | |
Bestpractical Rt | =2.0.5 | |
Bestpractical Rt | =3.6.5 | |
Bestpractical Rt | =3.0.1 | |
Bestpractical Rt | =3.2.1 | |
Bestpractical Rt | =2.0.5.1 | |
Bestpractical Rt | =3.4.4 | |
Bestpractical Rt | =3.6.8 | |
Bestpractical Rt | =3.0.6 | |
Bestpractical Rt | =3.0.7 | |
Bestpractical Rt | =3.0.7.1 | |
Bestpractical Rt | =3.0.12 | |
Bestpractical Rt | =3.0.9 | |
Bestpractical Rt | =3.6.1 | |
Bestpractical Rt | =3.4.1 | |
Bestpractical Rt | =3.6.4 | |
Bestpractical Rt | =2.0.4 | |
Bestpractical Rt | =2.0.9 | |
Bestpractical Rt | =2.0.3 | |
Bestpractical Rt | =2.0.12 | |
Bestpractical Rt | =3.4.2 | |
Bestpractical Rt | =3.8.7 | |
Bestpractical Rt | =3.8.9-rc2 | |
Bestpractical Rt | =3.8.8-rc2 | |
Bestpractical Rt | =3.8.9-rc1 | |
Bestpractical Rt | =3.8.2 | |
Bestpractical Rt | =3.8.8-rc4 | |
Bestpractical Rt | =3.8.0 | |
Bestpractical Rt | =3.8.9 | |
Bestpractical Rt | =3.8.8-rc3 | |
Bestpractical Rt | =3.8.9-rc3 | |
Bestpractical Rt | =3.8.5 | |
Bestpractical Rt | =3.8.6-rc1 | |
Bestpractical Rt | =3.8.8 | |
Bestpractical Rt | =3.8.3 | |
Bestpractical Rt | =3.8.6 | |
Bestpractical Rt | =3.8.1 | |
Bestpractical Rt | =3.8.4 | |
Bestpractical Rt | =3.8.7-rc1 | |
Bestpractical Rt | =4.0.0-rc4 | |
Bestpractical Rt | =4.0.0-rc7 | |
Bestpractical Rt | =4.0.0-rc3 | |
Bestpractical Rt | =4.0.0-rc6 | |
Bestpractical Rt | =4.0.0-rc5 | |
Bestpractical Rt | =4.0.0-rc2 | |
Bestpractical Rt | =4.0.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.