CVE-2023-32754

Thinking Software Efence login function has insufficient validation for user input. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify or delete database.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thinkingsoftware:efence:1.2.59:db_36:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html - Third Party Advisory () https://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html - Third Party Advisory

30 Jun 2023, 07:38

Type Values Removed Values Added
References (CONFIRM) https://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html - (CONFIRM) https://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html - Third Party Advisory
CPE cpe:2.3:a:thinkingsoftware:efence:1.2.59:db_36:*:*:*:*:*:*

16 Jun 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-16 04:15

Updated : 2024-11-21 08:03


NVD link : CVE-2023-32754

Mitre link : CVE-2023-32754

CVE.ORG link : CVE-2023-32754


JSON object : View

Products Affected

thinkingsoftware

  • efence
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')