Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:sitos:sitos_six:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "760C0CF6-2D14-4152-AA7E-CAA7667104AE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "SITOS six Build v6.2.1 allows a user to change their password and recovery email address without requiring them to confirm the change with their old password. This would allow an attacker with access to the victim's account (e.g., via XSS or an unattended workstation) to change that password and address."}, {"lang": "es", "value": "SITOS Build seis versi\u00f3n v6.2.1, permite al usuario cambiar su contrase\u00f1a y direcci\u00f3n de correo electr\u00f3nico de recuperaci\u00f3n sin requerir que confirme el cambio con su contrase\u00f1a anterior. Esto permitir\u00eda a un atacante con acceso a la cuenta de la v\u00edctima (por ejemplo, por medio de un ataque de tipo XSS o una estaci\u00f3n de trabajo desatendida) cambiar esa contrase\u00f1a y direcci\u00f3n."}], "id": "CVE-2019-15749", "lastModified": "2024-11-21T04:29:23.960", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-10-07T12:15:11.447", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.contextis.com/en/resources/advisories/cve-2019-15749"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.contextis.com/en/resources/advisories/cve-2019-15749"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-640"}], "source": "nvd@nist.gov", "type": "Primary"}]}