Show filters
144 Total Results
Displaying 111-120 of 144
Sort by:
Attacker Value
Unknown
CVE-2018-20165
Disclosure Date: March 22, 2019 (last updated November 27, 2024)
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
0
Attacker Value
Unknown
CVE-2019-7416
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
XSS and/or a Client Side URL Redirect exists in OpenText Documentum Webtop 5.3 SP2. The parameter startat in "/webtop/help/en/default.htm" is vulnerable.
0
Attacker Value
Unknown
CVE-2018-7659
Disclosure Date: April 11, 2018 (last updated November 26, 2024)
In OpenText Documentum D2 Webtop v4.6.0030 build 059, a Stored Cross-Site Scripting Vulnerability could potentially be exploited by malicious users to compromise the affected system via a filename of an uploaded image file.
0
Attacker Value
Unknown
CVE-2018-7660
Disclosure Date: April 11, 2018 (last updated November 26, 2024)
In OpenText Documentum D2 Webtop v4.6.0030 build 059, a Reflected Cross-Site Scripting Vulnerability could potentially be exploited by malicious users to compromise the affected system via the servlet/Download _docbase or _username parameter.
0
Attacker Value
Unknown
CVE-2017-14960
Disclosure Date: January 04, 2018 (last updated November 26, 2024)
xDashboard in OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 has SQL Injection.
0
Attacker Value
Unknown
CVE-2017-15014
Disclosure Date: October 13, 2017 (last updated November 26, 2024)
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows authenticated users to download arbitrary content files regardless of the attacker's repository permissions: When an authenticated user uploads content to the repository, he performs the following steps: (1) calls the START_PUSH RPC-command; (2) uploads the file to the content server; (3) calls the END_PUSH_V2 RPC-command (here, Content Server returns a DATA_TICKET integer, intended to identify the location of the uploaded file on the Content Server filesystem); (4) creates a dmr_content object in the repository, which has a value of data_ticket equal to the value of DATA_TICKET returned at the end of END_PUSH_V2 call. As the result of this design, any authenticated user may create his own dmr_content object, pointing to already existing content in the Content Server filesystem.
0
Attacker Value
Unknown
CVE-2017-15012
Disclosure Date: October 13, 2017 (last updated November 26, 2024)
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 does not properly validate the input of the PUT_FILE RPC-command, which allows any authenticated user to hijack an arbitrary file from the Content Server filesystem; because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
0
Attacker Value
Unknown
CVE-2017-15276
Disclosure Date: October 13, 2017 (last updated November 26, 2024)
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives). When unpacking TAR archives, Content Server fails to verify the contents of an archive, which causes a path traversal vulnerability via symlinks. Because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
0
Attacker Value
Unknown
CVE-2017-15013
Disclosure Date: October 13, 2017 (last updated November 26, 2024)
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server stores information about uploaded files in dmr_content objects, which are queryable and "editable" (before release 7.2P02, any authenticated user was able to edit dmr_content objects; now any authenticated user may delete a dmr_content object and then create a new one with the old identifier) by authenticated users; this allows any authenticated user to replace the content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges.
0
Attacker Value
Unknown
CVE-2017-14756
Disclosure Date: October 03, 2017 (last updated November 26, 2024)
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to Cross-Site Scripting: /xAdmin/html/Deployment (cat_id).
0