SQL injection vulnerability in Spooky Login 2.0 up to and including 2.5 allows remote malicious users to bypass authentication and gain privileges via the password field.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
outfront spooky login 2.0 |
||
outfront spooky login 2.1 |
||
outfront spooky login 2.2 |
||
outfront spooky login 2.3 |
||
outfront spooky login 2.4 |
||
outfront spooky login 2.5 |