High
CVSS 7.5
Overview
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attack...
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
This vulnerability is rated 🟠 HIGH.
Recommended actions: