First published: Wed Feb 22 2017(Updated: )
OpenText Documentum D2 (formerly EMC Documentum D2) 4.x allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the BeanShell (bsh) and Apache Commons Collections (ACC) libraries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenText Documentum D2 | =4.0 | |
OpenText Documentum D2 | =4.1 | |
OpenText Documentum D2 | =4.2 | |
OpenText Documentum D2 | =4.3 | |
OpenText Documentum D2 | =4.4 | |
OpenText Documentum D2 | =4.5 | |
OpenText Documentum D2 | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.