CVE-2016-0886
low-risk
Published 2016-03-09
EMC Documentum xCP 2.1 before patch 24 and 2.2 before patch 12 allows remote authenticated users to obtain sensitive user-account metadata via a members/xcp_member API call.
Do I need to act?
-
0.20% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (2)
Documentum Xcp
Documentum Xcp
Affected Vendors
References (6)
Third Party Advisory
http://seclists.org/bugtraq/2016/Mar/44
Third Party Advisory
http://www.securityfocus.com/bid/84210
Third Party Advisory
http://www.securitytracker.com/id/1035197
Third Party Advisory
http://seclists.org/bugtraq/2016/Mar/44
Third Party Advisory
http://www.securityfocus.com/bid/84210
Third Party Advisory
http://www.securitytracker.com/id/1035197
26
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
7/34 · Low