CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
75.4%
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
Vendor | Product | Version | CPE |
---|---|---|---|
outfront | spooky_login | 2.0 | cpe:2.3:a:outfront:spooky_login:2.0:*:*:*:*:*:*:* |
outfront | spooky_login | 2.1 | cpe:2.3:a:outfront:spooky_login:2.1:*:*:*:*:*:*:* |
outfront | spooky_login | 2.2 | cpe:2.3:a:outfront:spooky_login:2.2:*:*:*:*:*:*:* |
outfront | spooky_login | 2.3 | cpe:2.3:a:outfront:spooky_login:2.3:*:*:*:*:*:*:* |
outfront | spooky_login | 2.4 | cpe:2.3:a:outfront:spooky_login:2.4:*:*:*:*:*:*:* |
outfront | spooky_login | 2.5 | cpe:2.3:a:outfront:spooky_login:2.5:*:*:*:*:*:*:* |