{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T23:56:01.422","vulnerabilities":[{"cve":{"id":"CVE-2023-32754","sourceIdentifier":"twcert@cert.org.tw","published":"2023-06-16T04:15:13.947","lastModified":"2024-11-21T08:03:58.823","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Thinking Software Efence login function has insufficient validation for user input. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify or delete database."},{"lang":"es","value":"La función de inicio de sesión de Thinking Software Efence tiene una validación insuficiente en la entrada de usuario. Un atacante remoto no autenticado podría explotar esta vulnerabilidad para inyectar comandos SQL arbitrarios para acceder, modificar o eliminar la base de datos."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:thinkingsoftware:efence:1.2.59:db_36:*:*:*:*:*:*","matchCriteriaId":"996FC2B5-7D64-4F11-9434-5DE9F3300694"}]}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}