Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42069 | Magento Open Source allows SQL Injection |
Github GHSA |
GHSA-rq36-9f5f-2gw7 | Magento Open Source allows SQL Injection |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Sep 2024 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Time-based blind SQL injection via customer segment rule configuration at POST /admin/customersegment/index/save/key/{key}/back/edit default address | Adobe Commerce | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89) |
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2025-02-27T20:41:21.849Z
Reserved: 2023-07-13T16:21:52.617Z
Link: CVE-2023-38249
Updated: 2024-08-02T17:39:11.968Z
Status : Modified
Published: 2023-10-13T07:15:41.037
Modified: 2024-11-21T08:13:10.773
Link: CVE-2023-38249
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA