{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T12:02:24.947","vulnerabilities":[{"cve":{"id":"CVE-2023-22900","sourceIdentifier":"twcert@cert.org.tw","published":"2023-01-31T08:15:08.323","lastModified":"2024-11-21T07:45:36.863","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Efence login function has insufficient validation for user input. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify or delete database."},{"lang":"es","value":"La función de inicio de sesión de Efence tiene una validación insuficiente para la entrada del usuario. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para inyectar comandos SQL arbitrarios para acceder, modificar o eliminar la base de datos."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:thinkingsoftware:efence:1.2.58:db28:*:*:*:*:*:*","matchCriteriaId":"D45AE7E2-CD09-4CCF-A83A-3F228D1EF166"}]}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-6885-d679e-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-6885-d679e-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}