1 results (0.003 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 1

LightNEasy/lightneasy.php in LightNEasy No database version 1.2 allows remote attackers to obtain the hash of the administrator password via the setup "do" action to LightNEasy.php, which is cleared from $_GET but later accessed using $_REQUEST. LightNEasy/lightneasy.php en LightNEasy No database v1.2 permite a atacantes remotos conseguir el hash del password del administrador a través de la acción de configuración "do" a LightNEasy.php, que es eliminada desde $_GET pero posteriormente accedida usando $_REQUEST. • https://www.exploit-db.com/exploits/5425 http://osvdb.org/44397 http://secunia.com/advisories/29757 https://exchange.xforce.ibmcloud.com/vulnerabilities/41768 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •