7.5
CVSSv2

CVE-2002-1720

Published: 31/12/2002 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in Spooky Login 2.0 up to and including 2.5 allows remote malicious users to bypass authentication and gain privileges via the password field.

Vulnerable Product Search on Vulmon Subscribe to Product

outfront spooky login 2.0

outfront spooky login 2.1

outfront spooky login 2.2

outfront spooky login 2.3

outfront spooky login 2.4

outfront spooky login 2.5

Exploits

source: wwwsecurityfocuscom/bid/4661/info Spooky Login is a commerical web access control and account management software package It is distributed and maintained by Outfront, and is designed for Microsoft IIS Webservers Under some circumstances, it may be possible for a remote user to gain unauthorized access to pages protected by Spo ...