CVE-2014-2521
https://notcve.org/view.php?id=CVE-2014-2521
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to read sensitive object metadata via an RPC command. EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07 permite a usuarios remotos autenticados leer metadatos sensibles de objetos a través de un comando RPC. • http://secunia.com/advisories/60571 http://www.securityfocus.com/archive/1/533162/30/0/threaded http://www.securityfocus.com/bid/69276 http://www.securitytracker.com/id/1030743 https://exchange.xforce.ibmcloud.com/vulnerabilities/95370 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2014-4618
https://notcve.org/view.php?id=CVE-2014-4618
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to gain privileges via a user-created system object. EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07 permite a usuarios remotos autenticados ganar privilegios a través de un objeto de sistema creado por un usuario. • http://secunia.com/advisories/60571 http://www.securityfocus.com/archive/1/533162/30/0/threaded http://www.securityfocus.com/bid/69273 http://www.securitytracker.com/id/1030743 https://exchange.xforce.ibmcloud.com/vulnerabilities/95368 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-2520 – OpenText Documentum Content Server 7.3 SQL Injection
https://notcve.org/view.php?id=CVE-2014-2520
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07, when Oracle Database is used, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and read sensitive database content via a crafted request. EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07, cuando Oracle Database está utilizada, no restringe debidamente los hints DQL, lo que permite a usuarios remotos autenticados realizar ataques de inyección DQL y leer contenido sensible de la base de datos a través de una solicitud manipulada. OpenText Documentum Content Server version 7.3 suffers from a remote SQL injection vulnerability due to a previously announced fix being incomplete. • http://secunia.com/advisories/60571 http://www.securityfocus.com/archive/1/533162/30/0/threaded http://www.securityfocus.com/bid/69274 http://www.securitytracker.com/id/1030743 https://exchange.xforce.ibmcloud.com/vulnerabilities/95369 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-2513 – OpenText Documentum Content Server SQL Injection
https://notcve.org/view.php?id=CVE-2014-2513
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P15, 7.0 before P15, and 7.1 before P06 does not properly check authorization after creation of an object, which allows remote authenticated users to execute arbitrary code with super-user privileges via a custom script. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P15, 7.0 anterior a P15 y 7.1 anterior a P06 no comprueba debidamente la autorización después de la creación de un objeto, lo que permite a usuarios remotos autenticados ejecutar código arbitrario con privilegios de superusuario a través de una secuencia de comandos personalizada. • http://archives.neohapsis.com/archives/bugtraq/2014-07/0024.html http://secunia.com/advisories/59757 http://www.securityfocus.com/bid/68435 http://www.securitytracker.com/id/1030529 • CWE-20: Improper Input Validation •
CVE-2014-2514
https://notcve.org/view.php?id=CVE-2014-2514
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P15, 7.0 before P15, and 7.1 before P06 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P15, 7.0 anterior a P15 y 7.1 anterior a P06 no comprueba debidamente la autorización y no restringe debidamente los tipos de objetos, lo que permite a usuarios remotos autenticados ejecutar comandos RPC de guardar con privilegios de superusuario, y como consecuencia ejecutar código arbitrario, a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2014-07/0024.html http://secunia.com/advisories/59757 http://www.securityfocus.com/bid/68436 http://www.securitytracker.com/id/1030529 • CWE-20: Improper Input Validation •