Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2019-15747

Disclosure Date: October 07, 2019 (last updated November 27, 2024)
SITOS six Build v6.2.1 allows a user with the user role of Seminar Coordinator to escalate their permission to the Systemadministrator role due to insufficient checks on the server side.
Attacker Value
Unknown

CVE-2019-15746

Disclosure Date: October 07, 2019 (last updated November 27, 2024)
SITOS six Build v6.2.1 allows an attacker to inject arbitrary PHP commands. As a result, an attacker can compromise the running server and execute system commands in the context of the web user.
Attacker Value
Unknown

CVE-2019-15749

Disclosure Date: October 07, 2019 (last updated November 27, 2024)
SITOS six Build v6.2.1 allows a user to change their password and recovery email address without requiring them to confirm the change with their old password. This would allow an attacker with access to the victim's account (e.g., via XSS or an unattended workstation) to change that password and address.
Attacker Value
Unknown

CVE-2019-15750

Disclosure Date: October 07, 2019 (last updated November 27, 2024)
A Cross-Site Scripting (XSS) vulnerability in the blog function in SITOS six Build v6.2.1 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
Attacker Value
Unknown

CVE-2019-15751

Disclosure Date: October 07, 2019 (last updated November 27, 2024)
An unrestricted file upload vulnerability in SITOS six Build v6.2.1 allows remote attackers to execute arbitrary code by uploading a SCORM file with an executable extension. This allows an unauthenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to the web root of the application.
Attacker Value
Unknown

CVE-2019-15748

Disclosure Date: October 07, 2019 (last updated November 27, 2024)
SITOS six Build v6.2.1 permits unauthorised users to upload and import a SCORM 2004 package by browsing directly to affected pages. An unauthenticated attacker could use the upload and import functionality to import a malicious SCORM package that includes a PHP file, which could execute arbitrary PHP code.