Vulnerabilities
Vulnerable Software
Outfront:  >> Spooky Login  >> 2.1  Security Vulnerabilities
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
CVSS Score
7.5
EPSS Score
0.013
Published
2002-12-31


Contact Us

Shodan ® - All rights reserved