exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

EMC Documentum Content Server Escalation / Injection
Posted Jun 5, 2014
Site emc.com

EMC Documentum Content Server contains fixes for multiple security vulnerabilities that could be potentially exploited by malicious users to compromise the affected system. These include privilege escalation, shell injection, and DQL injection vulnerabilities.

tags | advisory, shell, vulnerability
advisories | CVE-2014-2506, CVE-2014-2507, CVE-2014-2508
SHA-256 | 7339b82212d868edf9b0568c445dd25b82f5c385257cb66109037e04fc9b02ad

Related Files

Opentext Documentum Content Server File Hijack / Privilege Escalation
Posted Oct 14, 2017
Authored by Andrey B. Panfilov

Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) does not properly validate input of the PUT_FILE RPC command which allows any authenticated user to hijack arbitrary file from the Content Server filesystem. Because some files on the Content Server filesystem are security-sensitive this security flaw leads to privilege escalation.

tags | exploit, arbitrary
advisories | CVE-2017-15012
SHA-256 | 782b07d542a51cfa91ec48aaeb81da9325c12c927c3fc47bd2cfa87f5e741c19
Opentext Documentum Content Server Privilege Escalation
Posted Oct 14, 2017
Authored by Andrey B. Panfilov

Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains a design gap that allows any authenticated user the ability to replace content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges.

tags | exploit
advisories | CVE-2017-15013
SHA-256 | ac7c57e364c48ad77e9244ef5c906a10bfe022c7af7f5697dd095c5d81ee4d9c
Opentext Documentum Content Server File Download
Posted Oct 14, 2017
Authored by Andrey B. Panfilov

Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains a design gap that allows authenticated user to download arbitrary content files regardless of the attacker's repository permissions.

tags | exploit, arbitrary
advisories | CVE-2017-15014
SHA-256 | 24c6a20d38acd4191fcc54a1c86e6f583c30b30ff4b31be01f81bdcfb2155a80
Opentext Documentum Content Server Privilege Escalation
Posted Oct 14, 2017
Authored by Andrey B. Panfilov

Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) allows for privilege escalation via traversal attacks leveraged through uploaded tar files.

tags | exploit
advisories | CVE-2017-15276
SHA-256 | 8f058be0fbb3dae75f3313418482761ee598bb48de892ffce1875c79cccba63d
EMC Documentum eRoom Unverified Password Change
Posted Jan 31, 2017
Site emc.com

EMC Documentum eRoom includes an unverified password change vulnerability that could potentially be exploited by malicious users to compromise the affected system. Versions affected include 7.4.4 and 7.4.4 SP. Versions prior to 7.4.5 P04 and 7.5.0 P01 are also affected.

tags | advisory
advisories | CVE-2017-2766
SHA-256 | e835023b15095c92be0207b2036c81225742f33b18d6c5ba2baf30034498536c
EMC Documentum D2 4.5 / 4.6 DQL Injection / Cross Site Scripting
Posted Jan 28, 2017
Site emc.com

EMC Documentum versions 4.5 and 4.6 suffer from DQL injection and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
advisories | CVE-2016-9872, CVE-2016-9873
SHA-256 | 1fa1935776c0450f0c6cdea2c7600f969b1b60558c23fe2f89c44e6ca37d23f4
EMC Documentum Webtop Cross Site Scripting
Posted Jan 18, 2017
Authored by Imran Khan | Site emc.com

EMC Documentum Webtop and its client products contain a stored cross site scripting vulnerability that could potentially be exploited by malicious users to compromise the affected system. Various products and versions are affected.

tags | advisory, xss
advisories | CVE-2016-8213
SHA-256 | 8fe6c3a197a6ce1a3ec8ba68fa6c8d6d61bb304157e50e8ae1c15ecc4202d5b0
EMC Documentum D2 Authentication Bypass
Posted Sep 13, 2016
Site emc.com

EMC Documentum D2 contains fix for authentication bypass that could potentially be exploited by malicious users to compromise the affected system. By exploiting this vulnerability, remote unauthenticated users could download any document from the Docbase by knowing only the r_object_id of that document. Affected includes EMC Documentum D2 versions 4.5 earlier than patch 15 and EMC Documentum D2 versions 4.6 earlier than patch 03.

tags | advisory, remote
advisories | CVE-2016-6644
SHA-256 | f8b711fb3cd37acdb19b7ded0e6ffaa24fa21db48de448f259119829f69c42cd
EMC Documentum WDK-Based Applications Code Execution / Traversal
Posted Jul 4, 2016
Authored by Andrey B. Panfilov

All EMC Documentum WDK-based applications (Taskspace, Webtop, Documentum Administrator, EPFM) contain an extremely dangerous web component – API Tester. It allows for path traversal, arbitrary code execution, and privilege escalation attacks.

tags | advisory, web, arbitrary, code execution, file inclusion
advisories | CVE-2014-0629, CVE-2016-0914
SHA-256 | 46663e14e60c2d3f94f374b2571e350b1e7744ac4f13a7cd8032e426b3ab94df
EMC Documentum WebTop Improper Authorization
Posted Jun 22, 2016
Site emc.com

Remote authenticated WebTop and WebTop Client users may gain access to the IAPI/IDQL interface in WebTop without proper authorization. Malicious users could exploit this vulnerability to run IAPI/IDQL commands on the affected systems using their own privilege. Affected products include EMC Documentum WebTop versions 6.8 and 6.8.1, Administrator versions 7.0, 7.1, 7.2, TaskSpace version 6.7 SP3, and Capital Projects versions 1.9 and 1.10.

tags | advisory, remote
advisories | CVE-2016-0914
SHA-256 | 922ee5b10d55ca104fdafbfbabd2f4263e941bd47bdcae7794773725a1ceb3d4
EMC Documentum D2 4.6 Configuration Object
Posted Apr 5, 2016
Site emc.com

EMC Documentum D2 4.6 contains a fix for a D2 Configuration Object vulnerability that could potentially be exploited by malicious users to perform unauthorized updates on any D2 configuration object.

tags | advisory
advisories | CVE-2016-0888
SHA-256 | e75b30e6ca17c7c79757436ea8578d98713bfcf2f9474747642ed22891a2a893
EMC Documentum xCP 2.1 / 2.2 Information Disclosure
Posted Mar 7, 2016
Site emc.com

EMC Documentum xCP allows authenticated non-admin users to view information about other users.

tags | advisory
advisories | CVE-2016-0886
SHA-256 | d204ecebd693cb7dc0af19bead0d1f1d091bff3be94a465a248c655202283b24
EMC Documentum xCP XXE Injection / DQL Injection
Posted Feb 11, 2016
Site emc.com

EMC Documentum xCP contains fixes for multiple security vulnerabilities that could potentially be exploited by malicious users to compromise the affected system. Versions 2.1 and 2.2 are affected.

tags | advisory, vulnerability
advisories | CVE-2016-0881, CVE-2016-0882
SHA-256 | 20de6bd9297ddd8a1fb42d72cb5fb400141a8b891a25ad8d400b3196582d67fb
EMC Documentum Content Server Privilege Escalation
Posted Sep 4, 2015
Site emc.com

EMC Documentum Content Server includes a privilege escalation vulnerability that could potentially be exploited by malicious, regular users to perform certain actions as the superuser. Unprivileged Content Server users may potentially escalate their privileges to become a superuser by creating and performing malicious operations on dm_job objects. This is due to improper authorization checks being performed on such objects and some of their attributes. The previous fix for CVE-2014-4626 was incomplete. Versions 7.2 and below are affected.

tags | advisory
advisories | CVE-2015-4544
SHA-256 | 2b6562f6e59b15b849389a486f037ec353fdd61e11c4152b636cd4aa6c942310
EMC Documentum D2 Fail Open
Posted Aug 22, 2015
Site emc.com

EMC Documentum D2 contains fail open vulnerability that could be exploited by malicious users to compromise D2. Versions 4.2 and below are affected.

tags | advisory
advisories | CVE-2015-4537
SHA-256 | 899364e37cd67e01c0b2c948e748dbe613d041f7c0075d1ef3d101ee28ab4074
EMC Documentum Content Server Privilege Escalation
Posted Aug 19, 2015
Authored by Andrey B. Panfilov

EMC Documentum Content Server failed to fully address privilege escalation vulnerabilities as noted in CVE-2015-4532.

tags | exploit, vulnerability
systems | linux
advisories | CVE-2015-4532
SHA-256 | 3e23749741e39d44281a4e37e4effeb870920b6c75bab3df444cee63831f8276
EMC Documentum Content Server Code Execution
Posted Aug 18, 2015
Authored by Andrey B. Panfilov

EMC Documentum Content Server suffers from an arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
advisories | CVE-2015-4532
SHA-256 | c2bedfbc57a00c51150a01873bae989bcc87b6d4e0f981bb7614f0a531896758
EMC Documentum Content Server Privilege Escalation
Posted Aug 18, 2015
Authored by Andrey B. Panfilov

EMC Documentum Content Server suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2011-4144, CVE-2014-4622, CVE-2015-4531
SHA-256 | 80285eb669610b3c918abc9181df00a398f6734029af4b07e148e171da2b1654
EMC Documentum WebTop Cross Site Request Forgery
Posted Aug 18, 2015
Site emc.com

EMC Documentum WebTop and WebTop-based clients are affected by a cross site request forgery vulnerability. An attacker can potentially exploit this vulnerability by tricking authenticated users of the application to click on links embedded within an email, web page, or another source, and perform Docbase operations with that user's privileges.

tags | advisory, web, csrf
advisories | CVE-2015-4530
SHA-256 | ad1a83f8c864d27f64af80a01849f2edf8a6a00ce286cec429b553b3059f4c4f
EMC Documentum Content Server Privilege Escalation / Code Execution
Posted Aug 17, 2015
Site emc.com

EMC Documentum Content Server contains multiple vulnerabilities that could be exploited by malicious users to compromise the Content Server in several ways.

tags | advisory, vulnerability
advisories | CVE-2015-4531, CVE-2015-4532, CVE-2015-4533, CVE-2015-4534, CVE-2015-4535, CVE-2015-4536
SHA-256 | 95830881705d0d2408b47ceb7001260e614677f1858c088afc5e0922d3a4aee9
EMC Documentum CenterStage Cross Site Scripting
Posted Jul 17, 2015
Site emc.com

EMC Documentum CenterStage is affected by a stored cross-site scripting vulnerability that could potentially be exploited by an attacker by injecting malicious HTML or script. This may lead to execution of injected HTML or script in the context of the authenticated user.

tags | advisory, xss
advisories | CVE-2015-4528
SHA-256 | 6735391574947f75e6be781bb6730919f081530e732a8c5060ab42e4c0a9926f
EMC Documentum WebTop Open Redirect
Posted Jul 17, 2015
Site emc.com

EMC Documentum WebTop and WebTop based client products contain an open redirected vulnerability. Attackers could potentially exploit this vulnerability by supplying crafted URLs to users of the affected application and causing a browser redirect to arbitrary and potentially malicious websites.

tags | advisory, arbitrary
advisories | CVE-2015-4529
SHA-256 | 2522c718c302be4a8ccf0d96166ebbc62243ca64ca2cd415fa3fec260890c15d
EMC Documentum Content Server CVE-2014-2513 Bad Fix
Posted Jul 9, 2015
Authored by Andrey B. Panfilov

The fix for the EMC Documentum Content Server vulnerability as highlighted in CVE-2014-2513 appears to be partial and still exploitable via slightly modified means.

tags | exploit
advisories | CVE-2014-2513
SHA-256 | e93c2829969b19c504cd3f1c57ed73580f7207de2859d1e952e49e3a60186fc8
EMC Documentum Content Server ESA-2014-105 Fail
Posted Jul 7, 2015
Authored by Andrey B. Panfilov

A vulnerability exists in the EMC Documentum Content Server which allows an authenticated user to elevate privileges, hijack Content Server filesystem, or execute arbitrary commands by creating malicious dm_job objects. Although ESA-2014-105 claimed to remediate this issue, it persists.

tags | exploit, arbitrary
systems | linux
advisories | CVE-2014-4626
SHA-256 | c2fab15b7849733e911e9d40873b3af36fa3fddd78061a30c82067805f9a0abd
EMC Documentum D2 DQL Injection
Posted Jul 2, 2015
Site emc.com

EMC Documentum D2 contains multiple DQL injection vulnerabilities that could potentially be exploited by malicious users to compromise the affected system.

tags | advisory, vulnerability
advisories | CVE-2015-0547, CVE-2015-0548
SHA-256 | 24b4310d0fb09b223011ef4c6224568f24fe7e4b80353ec8858ac4fca85642e7
Page 1 of 4
Back1234Next

File Archive:

November 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    1 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    219 Files
  • 14
    Nov 14th
    19 Files
  • 15
    Nov 15th
    66 Files
  • 16
    Nov 16th
    38 Files
  • 17
    Nov 17th
    9 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    11 Files
  • 22
    Nov 22nd
    56 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    36 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    14 Files
  • 28
    Nov 28th
    30 Files
  • 29
    Nov 29th
    35 Files
  • 30
    Nov 30th
    25 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close