SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.Referenceshttp://www.securityfocus.com/bid/4661https://exchange.xforce.ibmcloud.com/vulnerabilities/8991http://www.securiteam.com/windowsntfocus/5VP030K75G.html