Show plain JSON{"id": "CVE-2014-2520", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-08-20T11:17:13.953", "references": [{"url": "http://secunia.com/advisories/60571", "source": "security_alert@emc.com"}, {"url": "http://www.securityfocus.com/archive/1/533162/30/0/threaded", "source": "security_alert@emc.com"}, {"url": "http://www.securityfocus.com/bid/69274", "source": "security_alert@emc.com"}, {"url": "http://www.securitytracker.com/id/1030743", "source": "security_alert@emc.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95369", "source": "security_alert@emc.com"}, {"url": "http://secunia.com/advisories/60571", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/533162/30/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/69274", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1030743", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95369", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07, when Oracle Database is used, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and read sensitive database content via a crafted request."}, {"lang": "es", "value": "EMC Documentum Content Server anterior a 6.7 SP2 P16 y 7.x anterior a 7.1 P07, cuando Oracle Database est\u00e1 utilizada, no restringe debidamente los hints DQL, lo que permite a usuarios remotos autenticados realizar ataques de inyecci\u00f3n DQL y leer contenido sensible de la base de datos a trav\u00e9s de una solicitud manipulada."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:emc:documentum_content_server:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D76BC7EC-B77D-4C40-AC45-347EC6618C94", "versionEndIncluding": "6.7"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDBAEC8D-D945-48CA-84DD-EDBE8029F636"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "730510E9-1AE8-44BF-A1DE-5ED40F22D0B6"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.5:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC8840D2-5DE8-4EB6-A03F-BFF1C8A9BF1B"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.5:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AC51C95-97DC-44B4-9935-9423CE60289A"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.5:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ACB8EDE-C6AF-4B85-83ED-74097A206B49"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25CD1EE0-4E72-4C42-857B-AA45F0A17BBB"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.7:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49659818-958F-4B5E-8DA4-B592C67DD13F"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "414C33C7-CD76-49A4-9BE5-354860F2F635"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8335062A-5A8E-4076-B351-7DFA19CEC818"}, {"criteria": "cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B283F797-6DAA-40E1-9FAB-16FCAA5241B4"}], "operator": "OR"}]}], "sourceIdentifier": "security_alert@emc.com"}