SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Spooky_login | Outfront | 2.0 (including) | 2.0 (including) |
Spooky_login | Outfront | 2.1 (including) | 2.1 (including) |
Spooky_login | Outfront | 2.2 (including) | 2.2 (including) |
Spooky_login | Outfront | 2.3 (including) | 2.3 (including) |
Spooky_login | Outfront | 2.4 (including) | 2.4 (including) |
Spooky_login | Outfront | 2.5 (including) | 2.5 (including) |