Marcin Woloszyn

4 exploits Active since Oct 2017
EIP-2026-103062 EXPLOITDB python WORKING POC
Apache James Server 2.3.2 - Remote Command Execution
EIP-2026-103063 EXPLOITDB python WORKING POC
Apache James Server 2.3.2 - Remote Command Execution (RCE) (Authenticated) (2)
CVE-2017-14758 EXPLOITDB HIGH text WRITEUP
OpenText Document Sciences xPression v4.5SP1 Patch 13 - SQL Injection
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to SQL Injection: /xAdmin/html/cm_doclist_view_uc.jsp, parameter: documentId. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.
CVSS 8.8
CVE-2017-14757 EXPLOITDB HIGH text WRITEUP
OpenText Document Sciences xPression <4.5SP1 Patch 13 - SQL Injection
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to SQL Injection: /xDashboard/html/jobhistory/downloadSupportFile.action, parameter: jobRunId. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.
CVSS 8.8