Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1059 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list. |
Github GHSA |
GHSA-m8wf-wmwh-jw2m | SQL Injection in Funadmin |
| Link | Providers |
|---|---|
| https://github.com/funadmin/funadmin/issues/4 |
|
Wed, 05 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-05T18:46:11.194Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2023-24773
Updated: 2024-08-02T11:03:19.040Z
Status : Modified
Published: 2023-03-08T16:15:09.403
Modified: 2025-03-05T19:15:29.460
Link: CVE-2023-24773
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA