Vulnerabilities > EMC > High

DATE CVE VULNERABILITY TITLE RISK
2014-09-17 CVE-2014-4622 Permissions, Privileges, and Access Controls vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP2 P17, 7.0 through P15, and 7.1 before P08 does not properly check authorization for subgroups of privileged groups, which allows remote authenticated sysadmins to gain super-user privileges, and bypass intended restrictions on data access and server actions, via unspecified vectors.
network
high complexity
emc CWE-264
7.1
2014-09-17 CVE-2014-4621 Permissions, Privileges, and Access Controls vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP2 P17, 7.0 through P15, and 7.1 before P08 does not properly check authorization for subtypes of protected system types, which allows remote authenticated users to obtain super-user privileges for system-object creation, and bypass intended restrictions on data access and server actions, via unspecified vectors.
network
emc CWE-264
8.5
2014-08-20 CVE-2014-4618 Permissions, Privileges, and Access Controls vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to gain privileges via a user-created system object.
network
emc CWE-264
8.5
2014-08-20 CVE-2014-2515 Permissions, Privileges, and Access Controls vulnerability in EMC Documentum D2
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.
network
emc CWE-264
8.5
2014-07-08 CVE-2014-2514 Improper Input Validation vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P15, 7.0 before P15, and 7.1 before P06 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors.
network
emc CWE-20
8.2
2014-07-08 CVE-2014-2513 Improper Input Validation vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P15, 7.0 before P15, and 7.1 before P06 does not properly check authorization after creation of an object, which allows remote authenticated users to execute arbitrary code with super-user privileges via a custom script.
network
emc CWE-20
8.2
2014-06-08 CVE-2014-2508 Improper Input Validation vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended restrictions on database actions via vectors involving DQL hints.
network
emc CWE-20
7.5
2014-06-08 CVE-2014-2507 OS Command Injection vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to execute arbitrary commands via shell metacharacters in arguments to unspecified methods.
network
emc CWE-78
8.5
2014-06-08 CVE-2014-2506 Permissions, Privileges, and Access Controls vulnerability in EMC Documentum Content Server
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to obtain super-user privileges for system-object creation, and bypass intended restrictions on data access and server actions, via unspecified vectors.
network
emc CWE-264
8.5
2014-06-06 CVE-2014-2503 Improper Input Validation vulnerability in EMC Documentum Digital Asset Manager 6.5
The thumbnail proxy server in EMC Documentum Digital Asset Manager (DAM) 6.5 SP3, 6.5 SP4, 6.5 SP5, and 6.5 SP6 before P13 allows remote attackers to conduct Documentum Query Language (DQL) injection attacks and bypass intended restrictions on querying objects via a crafted parameter in a query string.
network
low complexity
emc CWE-20
7.5