漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server stores information about uploaded files in dmr_content objects, which are queryable and "editable" (before release 7.2P02, any authenticated user was able to edit dmr_content objects; now any authenticated user may delete a dmr_content object and then create a new one with the old identifier) by authenticated users; this allows any authenticated user to replace the content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges.
漏洞信息
N/A
漏洞
N/A
漏洞
OpenText Documentum Content Server 安全漏洞
漏洞信息
OpenText Documentum Content Server(前称EMC Documentum Content Server)是加拿大OpenText公司的一套内容管理服务系统。该系统主要用于管理Documentum内容存储库,可对文档进行创建、修改和跟踪等操作。 OpenText Documentum Content Server 7.3及之前的版本中存在安全漏洞。攻击者可利用该漏洞获取超级用户权限。
漏洞信息
N/A
漏洞
N/A