Page 4 of 23 results (0.007 seconds)

CVSS: 6.3EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to read sensitive object metadata via an RPC command. EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07 permite a usuarios remotos autenticados leer metadatos sensibles de objetos a través de un comando RPC. • http://secunia.com/advisories/60571 http://www.securityfocus.com/archive/1/533162/30/0/threaded http://www.securityfocus.com/bid/69276 http://www.securitytracker.com/id/1030743 https://exchange.xforce.ibmcloud.com/vulnerabilities/95370 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.5EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to gain privileges via a user-created system object. EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07 permite a usuarios remotos autenticados ganar privilegios a través de un objeto de sistema creado por un usuario. • http://secunia.com/advisories/60571 http://www.securityfocus.com/archive/1/533162/30/0/threaded http://www.securityfocus.com/bid/69273 http://www.securitytracker.com/id/1030743 https://exchange.xforce.ibmcloud.com/vulnerabilities/95368 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.2EPSS: 0%CPEs: 5EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P15, 7.0 before P15, and 7.1 before P06 does not properly check authorization after creation of an object, which allows remote authenticated users to execute arbitrary code with super-user privileges via a custom script. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P15, 7.0 anterior a P15 y 7.1 anterior a P06 no comprueba debidamente la autorización después de la creación de un objeto, lo que permite a usuarios remotos autenticados ejecutar código arbitrario con privilegios de superusuario a través de una secuencia de comandos personalizada. • http://archives.neohapsis.com/archives/bugtraq/2014-07/0024.html http://secunia.com/advisories/59757 http://www.securityfocus.com/bid/68435 http://www.securitytracker.com/id/1030529 • CWE-20: Improper Input Validation •

CVSS: 8.2EPSS: 0%CPEs: 5EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P15, 7.0 before P15, and 7.1 before P06 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P15, 7.0 anterior a P15 y 7.1 anterior a P06 no comprueba debidamente la autorización y no restringe debidamente los tipos de objetos, lo que permite a usuarios remotos autenticados ejecutar comandos RPC de guardar con privilegios de superusuario, y como consecuencia ejecutar código arbitrario, a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2014-07/0024.html http://secunia.com/advisories/59757 http://www.securityfocus.com/bid/68436 http://www.securitytracker.com/id/1030529 • CWE-20: Improper Input Validation •

CVSS: 8.5EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to obtain super-user privileges for system-object creation, and bypass intended restrictions on data access and server actions, via unspecified vectors. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P14, 7.0 anterior a P15 y 7.1 anterior a P05 permite a usuarios remotos autenticados obtener privilegios de super usuario para la creación de objetos de sistema, y evadir restricciones de acceso a datos y acciones de servidor, a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2014-06/0051.html http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html http://secunia.com/advisories/58954 http://www.securityfocus.com/archive/1/532596/100/0/threaded http://www.securityfocus.com/bid/67917 http://www.securitytracker.com/id/1030339 • CWE-264: Permissions, Privileges, and Access Controls •