Thinking Software Efence login function has insufficient validation for user input. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify or delete database.Referenceshttps://www.twcert.org.tw/tw/cp-132-7161-3e7c9-1.html