Authentication Bypass and Privilege Escalation via SQL Injection in Spooky Login 2.0 - 2.5

Authentication Bypass and Privilege Escalation via SQL Injection in Spooky Login 2.0 - 2.5

CVE-2002-1720 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.

Learn more about our Web Application Penetration Testing UK.