Vulnerabilities > Opentext

DATE CVE VULNERABILITY TITLE RISK
2019-05-21 CVE-2019-12270 Incorrect Permission Assignment FOR Critical Resource vulnerability in Opentext Brava! 16.3/16.4/7.5
OpenText Brava! Enterprise and Brava! Server 7.5 through 16.4 configure excessive permissions by default on Windows.
6.8
2019-03-22 CVE-2018-20165 Cross-Site Scripting vulnerability in Opentext Portal 7.4.4
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
network
opentext CWE-79
4.3
2019-03-21 CVE-2019-7416 Cross-Site Scripting vulnerability in Opentext Documentum Webtop 5.3
XSS and/or a Client Side URL Redirect exists in OpenText Documentum Webtop 5.3 SP2.
network
opentext CWE-79
4.3
2018-04-11 CVE-2018-7660 Cross-Site Scripting vulnerability in Opentext Documentum D2 4.6.0030
In OpenText Documentum D2 Webtop v4.6.0030 build 059, a Reflected Cross-Site Scripting Vulnerability could potentially be exploited by malicious users to compromise the affected system via the servlet/Download _docbase or _username parameter.
network
opentext CWE-79
3.5
2018-04-11 CVE-2018-7659 Cross-Site Scripting vulnerability in Opentext Documentum D2 4.6.0030
In OpenText Documentum D2 Webtop v4.6.0030 build 059, a Stored Cross-Site Scripting Vulnerability could potentially be exploited by malicious users to compromise the affected system via a filename of an uploaded image file.
network
opentext CWE-79
3.5
2018-01-04 CVE-2017-14960 SQL Injection vulnerability in Opentext Document Sciences Xpression 4.5
xDashboard in OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 has SQL Injection.
network
low complexity
opentext CWE-89
5.0
2017-10-13 CVE-2017-15276 Path Traversal vulnerability in Opentext Documentum Content Server
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives).
network
low complexity
opentext CWE-22
6.5
2017-10-13 CVE-2017-15014 Improper Privilege Management vulnerability in Opentext Documentum Content Server
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows authenticated users to download arbitrary content files regardless of the attacker's repository permissions: When an authenticated user uploads content to the repository, he performs the following steps: (1) calls the START_PUSH RPC-command; (2) uploads the file to the content server; (3) calls the END_PUSH_V2 RPC-command (here, Content Server returns a DATA_TICKET integer, intended to identify the location of the uploaded file on the Content Server filesystem); (4) creates a dmr_content object in the repository, which has a value of data_ticket equal to the value of DATA_TICKET returned at the end of END_PUSH_V2 call.
network
low complexity
opentext CWE-269
4.0
2017-10-13 CVE-2017-15013 Improper Privilege Management vulnerability in Opentext Documentum Content Server
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server stores information about uploaded files in dmr_content objects, which are queryable and "editable" (before release 7.2P02, any authenticated user was able to edit dmr_content objects; now any authenticated user may delete a dmr_content object and then create a new one with the old identifier) by authenticated users; this allows any authenticated user to replace the content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges.
network
low complexity
opentext CWE-269
6.5
2017-10-13 CVE-2017-15012 Improper Input Validation vulnerability in Opentext Documentum Content Server
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 does not properly validate the input of the PUT_FILE RPC-command, which allows any authenticated user to hijack an arbitrary file from the Content Server filesystem; because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
network
low complexity
opentext CWE-20
6.5