Page 2 of 18 results (0.005 seconds)

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P29, 6.7 SP2 before P18, 7.0 before P16, and 7.1 before P09 allows remote authenticated users to gain privileges by (1) placing a command in a dm_job object and setting this object's owner to a privileged user or placing a rename action in a dm_job_request object and waiting for a (2) dm_UserRename or (3) dm_GroupRename service task, aka ESA-2014-105. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2515. EMC Documentum Content Server anterior a 6.7 SP1 P29, 6.7 SP2 anterior a P18, 7.0 anterior a P16, y 7.1 anterior a P09 permite a usuarios remotos autenticados ganar privilegios mediante (1) lla colocación de un comando en un objeto dm_job y la configutación del dueño de este objeto a un usuario privilegiado o la colocación de una acción de renombrar en un objeto dm_job_request y la espera a una tarea de servicio (2) dm_UserRename o (3) dm_GroupRename, también conocido como ESA-2014-105. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2014-2515. A vulnerability exists in the EMC Documentum Content Server which allows an authenticated user to elevate privileges, hijack Content Server filesystem, or execute arbitrary commands by creating malicious dm_job objects. • http://www.kb.cert.org/vuls/id/315340 http://www.kb.cert.org/vuls/id/386056 http://www.kb.cert.org/vuls/id/874632 https://docs.google.com/spreadsheets/d/1DiiUPCPvmaliWcfwPSc36y2mDvuidkDKQBWqaIuJi0A/edit?usp=sharing • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.5EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP2 P17, 7.0 through P15, and 7.1 before P08 does not properly check authorization for subtypes of protected system types, which allows remote authenticated users to obtain super-user privileges for system-object creation, and bypass intended restrictions on data access and server actions, via unspecified vectors. EMC Documentum Content Server anterior a 6.7 SP2 P17, 7.0 hasta P15 y 7.1 anterior a P08 no comprueba debidamente la autorización para subtipos de los tipos de sistemas protegidos, lo que permite a usuarios remotos autenticados obtener privilegios de super usuario para la creación de objetos de sistema, y evadir restricciones de acceso a datos y acciones de servidor, a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2014-09/0093.html http://secunia.com/advisories/61251 http://www.securityfocus.com/bid/69817 http://www.securitytracker.com/id/1030855 https://exchange.xforce.ibmcloud.com/vulnerabilities/95989 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.1EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP2 P17, 7.0 through P15, and 7.1 before P08 does not properly check authorization for subgroups of privileged groups, which allows remote authenticated sysadmins to gain super-user privileges, and bypass intended restrictions on data access and server actions, via unspecified vectors. EMC Documentum Content Server anterior a 6.7 SP2 P17, 7.0 hasta P15 y 7.1 anterior a P08 no comprueba debidamente la autorización para subgrupos de grupos privilegiados, lo que permite a administradores de sistemas remotos autenticados ganar privilegios de super usuario, y evadir restricciones de acceso a datos y acciones de servidor, a través de vectores no especificados. EMC Documentum Content Server suffers from a privilege escalation vulnerability. • http://archives.neohapsis.com/archives/bugtraq/2014-09/0093.html http://secunia.com/advisories/61251 http://www.securityfocus.com/bid/69819 http://www.securitytracker.com/id/1030855 https://exchange.xforce.ibmcloud.com/vulnerabilities/95990 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.3EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07, when Oracle Database is used, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and read sensitive database content via a crafted request. EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07, cuando Oracle Database está utilizada, no restringe debidamente los hints DQL, lo que permite a usuarios remotos autenticados realizar ataques de inyección DQL y leer contenido sensible de la base de datos a través de una solicitud manipulada. OpenText Documentum Content Server version 7.3 suffers from a remote SQL injection vulnerability due to a previously announced fix being incomplete. • http://secunia.com/advisories/60571 http://www.securityfocus.com/archive/1/533162/30/0/threaded http://www.securityfocus.com/bid/69274 http://www.securitytracker.com/id/1030743 https://exchange.xforce.ibmcloud.com/vulnerabilities/95369 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.3EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to read sensitive object metadata via an RPC command. EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07 permite a usuarios remotos autenticados leer metadatos sensibles de objetos a través de un comando RPC. • http://secunia.com/advisories/60571 http://www.securityfocus.com/archive/1/533162/30/0/threaded http://www.securityfocus.com/bid/69276 http://www.securitytracker.com/id/1030743 https://exchange.xforce.ibmcloud.com/vulnerabilities/95370 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •