Vulnerability Details : CVE-2014-4618
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to gain privileges via a user-created system object.
Products affected by CVE-2014-4618
- cpe:2.3:a:emc:documentum_content_server:*:sp2:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:sp3:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:sp2:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.6:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.7:-:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-4618
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-4618
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST |
CWE ids for CVE-2014-4618
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-4618
-
http://www.securityfocus.com/bid/69273
EMC Documentum Content Server CVE-2014-4618 Remote Code Execution Vulnerability
-
http://www.securityfocus.com/archive/1/533162/30/0/threaded
SecurityFocus
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/95368
EMC Documentum Content Server user-created system objects code execution CVE-2014-4618 Vulnerability Report
-
http://www.securitytracker.com/id/1030743
EMC Documentum Content Server Bug Lets Remote Authenticated Users Inject DQL Commands, Execute Arbitrary Code, and Obtain Potentially Sensitive Information - SecurityTracker
Jump to