LightNEasy/lightneasy.php in LightNEasy No database version 1.2 allows remote attackers to obtain the hash of the administrator password via the setup "do" action to LightNEasy.php, which is cleared from $_GET but later accessed using $_REQUEST.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T11:34:46.920Z
Reserved: 2009-03-29T00:00:00
Link: CVE-2008-6537

No data.

Status : Modified
Published: 2009-03-30T01:30:00.280
Modified: 2024-11-21T00:56:47.417
Link: CVE-2008-6537

No data.