Page 5 of 24 results (0.006 seconds)

CVSS: 8.5EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to obtain super-user privileges for system-object creation, and bypass intended restrictions on data access and server actions, via unspecified vectors. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P14, 7.0 anterior a P15 y 7.1 anterior a P05 permite a usuarios remotos autenticados obtener privilegios de super usuario para la creación de objetos de sistema, y evadir restricciones de acceso a datos y acciones de servidor, a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2014-06/0051.html http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html http://secunia.com/advisories/58954 http://www.securityfocus.com/archive/1/532596/100/0/threaded http://www.securityfocus.com/bid/67917 http://www.securitytracker.com/id/1030339 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.5EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to execute arbitrary commands via shell metacharacters in arguments to unspecified methods. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P14, 7.0 anterior a P15 y 7.1 anterior a P05 permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través de metacaracteres de shell en argumentos en métodos no especificados. • http://archives.neohapsis.com/archives/bugtraq/2014-06/0051.html http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html http://secunia.com/advisories/58954 http://www.securityfocus.com/archive/1/532596/100/0/threaded http://www.securityfocus.com/bid/67916 http://www.securitytracker.com/id/1030339 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended restrictions on database actions via vectors involving DQL hints. EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P14, 7.0 anterior a P15 y 7.1 anterior a P05 permite a usuarios remotos autenticados realizar ataques de inyección DQL (Documentum Query Language) y evadir las restricciones de acciones de base de datos a través de vectores que implican hints DQL. • http://archives.neohapsis.com/archives/bugtraq/2014-06/0051.html http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html http://secunia.com/advisories/58954 http://www.securityfocus.com/archive/1/532596/100/0/threaded http://www.securityfocus.com/bid/67918 http://www.securitytracker.com/id/1030339 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 11EXPL: 0

EMC Documentum Content Server before 6.7 SP1 P26, 6.7 SP2 before P13, 7.0 before P13, and 7.1 before P02 allows remote authenticated users to bypass intended access restrictions and read metadata from certain folders via unspecified vectors. EMC Documentum Content Server anterior a 6.7 SP1 P26, 6.7 SP2 anterior a P13, 7.0 anterior a P13 y 7.1 anterior a P02 permite a usuarios remotos autenticados evadir restricciones de acceso y leer metadatos de ciertos ficheros a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2014-04/0072.html http://twitter.com/artika4biz/statuses/455358950116823040 • CWE-264: Permissions, Privileges, and Access Controls •