Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42041 | Magento Open Source allows SQL Injection |
Github GHSA |
GHSA-ggr8-3hwx-4f2m | Magento Open Source allows SQL Injection |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Sep 2024 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Time-based blind SQL injection via customer segment rule configuration at POST /admin/customersegment/index/save/key/{key}/back/edit product attribute | Adobe Commerce | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89) |
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2025-02-27T20:41:27.926Z
Reserved: 2023-07-13T16:21:52.614Z
Link: CVE-2023-38221
Updated: 2024-08-02T17:30:14.276Z
Status : Modified
Published: 2023-10-13T07:15:40.777
Modified: 2024-11-21T08:13:07.010
Link: CVE-2023-38221
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA