Description
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
Products
- Outfront Spooky Login 2.0
- Outfront Spooky Login 2.1
- Outfront Spooky Login 2.2
- Outfront Spooky Login 2.3
- Outfront Spooky Login 2.4
- Outfront Spooky Login 2.5
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-1720, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-1720 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References