← Voltar para CVEs
CVE-2008-6537
N/ADescricao
LightNEasy/lightneasy.php in LightNEasy No database version 1.2 allows remote attackers to obtain the hash of the administrator password via the setup "do" action to LightNEasy.php, which is cleared from $_GET but later accessed using $_REQUEST.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado3/30/2009
Ultima modificacao4/9/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
lightneasy:lightneasy
Fraquezas (CWE)
CWE-200
Referencias
http://osvdb.org/44397(cve@mitre.org)
http://secunia.com/advisories/29757(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41768(cve@mitre.org)
https://www.exploit-db.com/exploits/5425(cve@mitre.org)
http://osvdb.org/44397(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29757(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41768(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/5425(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.