CVE-2014-0642CVE-2014-0642

Affected configuration(s):

cpe:/a:emc:documentum_content_server:6.0
cpe:/a:emc:documentum_content_server:6.5
cpe:/a:emc:documentum_content_server:6.5:sp1
cpe:/a:emc:documentum_content_server:6.5:sp2
cpe:/a:emc:documentum_content_server:6.5:sp3
cpe:/a:emc:documentum_content_server:6.6
cpe:/a:emc:documentum_content_server:6.7:-
cpe:/a:emc:documentum_content_server:6.7:sp1
cpe:/a:emc:documentum_content_server:6.7:sp2
cpe:/a:emc:documentum_content_server:7.0
cpe:/a:emc:documentum_content_server:7.1

Date published: 2014-04-15T19:13:16.790-04:00

Date last modified: 2014-04-16T10:03:42.857-04:00

CVSS Score: 5.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://archives.neohapsis.com/archives/bugtraq/2014-04/0072.html

Summary: EMC Documentum Content Server before 6.7 SP1 P26, 6.7 SP2 before P13, 7.0 before P13, and 7.1 before P02 allows remote authenticated users to bypass intended access restrictions and read metadata from certain folders via unspecified vectors.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.