Page 2 of 11 results (0.003 seconds)

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 0

The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors. El método de servicio D2DownloadService.getDownloadUrls en EMC Documentum D2 4.1 y 4.2 anterior a 4.2 P16 y 4.5 anterior a P03 permite a usuarios remotos autenticados realizar ataques de inyección Documentum Query Language (DQL) y evadir las restricciones de acceso a lectura a través de vectores no especificados. • http://seclists.org/bugtraq/2015/Jul/10 http://www.securitytracker.com/id/1032769 • CWE-20: Improper Input Validation •

CVSS: 3.5EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in EMC Documentum D2 before 4.5 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en EMC Documentum D2 anterior a 4.5 permite a usuarios remotos autenticados inyectar secuencias de comandos web arbitrarios o HTML a través de vectores no especificados. • http://seclists.org/bugtraq/2015/Jun/113 http://www.securitytracker.com/id/1032693 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.0EPSS: 0%CPEs: 5EXPL: 0

The D2-API component in EMC Documentum D2 3.1 through SP1, 4.0 and 4.1 before 4.1 P22, and 4.2 before P11 places the MD5 hash of an encryption passphrase in log files, which allows remote authenticated users to obtain sensitive information by reading a file. El componente D2-API en EMC Documentum D2 3.1 hasta SP1, 4.0 y 4.1 anterior a 4.1 P22, y 4.2 anterior a P11 coloca el hash MD5 una frase de contraseña de cifrado en ficheros de registros, lo que permite a usuarios remotos autenticados obtener información sensible mediante la lectura de un fichero. • http://archives.neohapsis.com/archives/bugtraq/2015-02/0031.html http://www.securityfocus.com/bid/72501 http://www.securitytracker.com/id/1031693 https://exchange.xforce.ibmcloud.com/vulnerabilities/100874 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

The Properties service in the D2FS web-service component in EMC Documentum D2 3.1 through SP1, 4.0 and 4.1 before 4.1 P22, and 4.2 before P11 allows remote authenticated users to obtain superuser privileges via an unspecified method call that modifies group permissions. El servicio Properties en el componente del servicio web D2FS en EMC Documentum D2 3.1 hasta SP1, 4.0 y 4.1 anterior a 4.1 P22, y 4.2 anterior a P11 permite a usuarios remotos autenticados obtener privilegios de superusuario a través de una llamada a un método no especificado que modifica los permisos de grupos. • http://archives.neohapsis.com/archives/bugtraq/2015-02/0031.html http://www.securityfocus.com/bid/72502 http://www.securitytracker.com/id/1031693 https://exchange.xforce.ibmcloud.com/vulnerabilities/100875 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.5EPSS: 0%CPEs: 5EXPL: 0

EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket. EMC Documentum D2 3.1 anterior a P24, 3.1SP1 anterior a P02, 4.0 anterior a P11, 4.1 anterior a P16, y 4.2 anterior a P05 no restringe debidamente los tickets proporcionados por D2GetAdminTicketMethod y D2RefreshCacheMethod, lo que permite a usuarios remotos autenticados ganar privilegios a través de una solicitud para un ticket de superusuario. • http://secunia.com/advisories/60565 http://www.securityfocus.com/archive/1/533161/30/0/threaded http://www.securityfocus.com/bid/69275 http://www.securitytracker.com/id/1030740 https://exchange.xforce.ibmcloud.com/vulnerabilities/95367 • CWE-264: Permissions, Privileges, and Access Controls •