Page 27 of 145 results (0.008 seconds)

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 2

OpenText Documentum Content Server has an inadequate protection mechanism against SQL injection, which allows remote authenticated users to execute arbitrary code with super-user privileges by leveraging the availability of the dm_bp_transition docbase method with a user-created dm_procedure object, as demonstrated by use of a backspace character in an injected string. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2513. OpenText Documentum Content Server tiene un inadecuado mecanismo de protección contra inyección SQL, lo que permitiría a usuarios remotos autenticados ejecutar código arbitrario con privilegios de superusuario aprovechando la disponibilidad del método docbase dm_bp_transition con un objeto dm_procedure creado por el usuario, como se demuestra mediante el uso de un carácter de retroceso en una cadena inyectada. NOTA: esta vulnerabilidad existe debido a una corrección incompleta para la CVE-2014-2513. • https://www.exploit-db.com/exploits/41928 http://seclists.org/fulldisclosure/2017/Apr/97 http://www.securityfocus.com/bid/98038 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 3

OpenText Documentum Content Server allows superuser access via sys_obj_save or save of a crafted object, followed by an unauthorized "UPDATE dm_dbo.dm_user_s SET user_privileges=16" command, aka an "RPC save-commands" attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4532. OpenText Documentum Content Server permite el acceso de superusuario a través de sys_obj_save o guardar un objeto manipulado, seguido de un comando "UPDATE dm_dbo.dm_user_s SET user_privileges=16" no autorizado, vulnerabilidad también conocida como un ataque "RPC save-commands". NOTA: esta vulnerabilidad existe debido a una corrección incompleta para CVE-2015-4532. • http://seclists.org/bugtraq/2017/Apr/61 https://gist.github.com/andreybpanfilov/d8792484e13971982c0719ae59ab8c7c https://gist.github.com/andreybpanfilov/e0e60ae9d525a34cca04eb4c89a21e04 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

OpenText Documentum Content Server (formerly EMC Documentum Content Server) 7.3, when PostgreSQL Database is used and return_top_results_row_based config option is false, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and execute arbitrary DML or DDL commands via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2520. OpenText Documentum Content Server (anteriormente EMC Documentum Content Server) 7.3, cuando PostgreSQL Database es utilizado y la opción de configuración return_top_results_row_based es falsa, no restringe adecuadamente las sugerencias de DQL, lo que permite a usuarios remotos autenticados llevar a cabo ataques de inyección DQL y ejecutar comandos DML o DDL arbitrarios a través de una petición manipulada. NOTA: esta vulnerabilidad existe debido a una reparación incompleta para CVE-2014-2520. OpenText Documentum Content Server version 7.3 suffers from a remote SQL injection vulnerability due to a previously announced fix being incomplete. • http://packetstormsecurity.com/files/141124/OpenText-Documentum-Content-Server-7.3-SQL-Injection.html http://www.securityfocus.com/bid/96224 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 9.8EPSS: 8%CPEs: 7EXPL: 2

OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries. OpenText Documentum D2 (anteriormente EMC Documentum D2) 4.x permite a atacantes remotos ejecutar comandos arbitrarios a través de un objeto Java serializado manipulado, relacionado con las librerías BeanShell (bsh) y Apache Commons Collections (ACC). OpenText Documentum D2 version 4.x contains vulnerable BeanShell (bsh) and Apache Commons libraries and accepts serialized data from untrusted sources, which leads to remote code execution. • https://www.exploit-db.com/exploits/41366 http://packetstormsecurity.com/files/141105/OpenText-Documentum-D2-4.x-Remote-Code-Execution.html http://www.securityfocus.com/bid/96216 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 2

Cross-site scripting (XSS) vulnerability in OpenText Secure MFT 2013 before 2013 R3 P6 and 2014 before 2014 R2 P2 allows remote attackers to inject arbitrary web script or HTML via the querytext parameter to userdashboard.jsp. Múltiples vulnerabilidades de XSS en OpenText Secure MFT 2013 en versiones anteriores a 2013 R3 P6 y 2014 en versiones anteriores a 2014 R2 P2, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro querytext a userdashboard.jsp. • http://packetstormsecurity.com/files/133247/OpenText-Secure-MFT-2014-R2-SP4-Cross-Site-Scripting.html http://www.securityfocus.com/archive/1/536260/100/0/threaded https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-041.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •