Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4626

EPSS 1.20% · P79
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-4626

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
EMC Documentum Content Server before 6.7 SP1 P29, 6.7 SP2 before P18, 7.0 before P16, and 7.1 before P09 allows remote authenticated users to gain privileges by (1) placing a command in a dm_job object and setting this object's owner to a privileged user or placing a rename action in a dm_job_request object and waiting for a (2) dm_UserRename or (3) dm_GroupRename service task, aka ESA-2014-105. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2515.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
EMC Documentum Content Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
EMC Documentum Content Server是美国易安信(EMC)公司的一套内容管理服务系统。该系统主要用于管理Documentum内容存储库,可对文档进行创建、修改和跟踪等操作。 EMC Documentum Content Server中存在安全漏洞。远程攻击者可借助带有任意命令的dm_job对象利用该漏洞获取权限。以下版本受到影响:EMC Documentum Content Server 6.7 SP1 P29之前版本,P18之前6.7 SP2版本,P16之前7.0版本,P09之前7
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-4626

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-4626

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-12-17 · 18 CVEs total

CVE-2014-5438ARRIS Touchstone TG862G/CT Telephony Gateway 跨站脚本漏洞
CVE-2014-8006Cisco ISB8320-E High-Definition IP-Only DVR 安全漏洞
CVE-2014-6182IBM Business Process Manager 目录遍历漏洞
CVE-2014-4844IBM Business Process Manager 安全漏洞
CVE-2014-8133Linux kernel 信息泄露漏洞
CVE-2014-9322Linux kernel 本地提权漏洞
CVE-2014-7880HP OpenVMS TCP/IP 安全漏洞
CVE-2014-7285Symantec Web Gateway 命令注入漏洞
CVE-2014-9253DokuWiki 跨站脚本漏洞
CVE-2013-7402c-icap Server 拒绝服务漏洞
CVE-2014-5437ARRIS Touchstone TG862G/CT Telephony Gateway 跨站请求伪造漏洞
CVE-2014-9388MantisBT 安全漏洞
CVE-2014-9387SAP BusinessObjects Edge 权限许可和访问控制漏洞
CVE-2014-8553MantisBT 信息泄露漏洞
CVE-2014-8117file 资源管理错误漏洞
CVE-2014-8116file 资源管理错误漏洞
CVE-2014-7170Puppet Server 竞争条件漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-4626

No comments yet


Leave a comment