Exploit the possiblities
Showing 1 - 7 of 7 RSS Feed

Files from Mariusz Woloszyn

Email addressemsi at gts.pl
First Active2004-02-24
Last Active2017-09-29
OpenText Document Sciences xPression 4.5SP1 Patch 13 XML Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from an XML external entity injection vulnerability.

tags | exploit
advisories | CVE-2017-14759
MD5 | cc7bbb9dac8735511fb665bdf6292a89
OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the Deployment functionality.

tags | exploit, xss
advisories | CVE-2017-14756
MD5 | 6e5c04b08d1a5f0eda27f3fc765d7b41
OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the XPressoDoc functionality.

tags | exploit, xss
advisories | CVE-2017-14755
MD5 | ef1cd5e7bbf0733e6110c04b5e7bcc3e
OpenText Document Sciences xPression 4.5SP1 Patch 13 SQL Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the xDashboard functionality.

tags | exploit, remote, sql injection
MD5 | 68bba5c75fbe035e1c156af28421746f
OpenText Document Sciences xPression 4.5SP1 Patch 13 SQL Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the doclist functionality.

tags | exploit, remote, sql injection
MD5 | fdcf9c74d3dbd22ea1adf62118b0332d
OpenText Document Sciences xPression 4.5SP1 Patch 13 Arbitrary File Read
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from an arbitrary file read vulnerability.

tags | exploit, arbitrary
advisories | CVE-2017-14754
MD5 | ccde9b0619c01a56988bfe3396b12065
Lam3rZ-032004.txt
Posted Feb 24, 2004
Authored by Mariusz Woloszyn

Lam3rZ Security Advisory #3/2004 - Confirm versions 0.62 and below allow for forged email headers to execute arbitrary code as the uid the script runs under for procmail.

tags | advisory, arbitrary
MD5 | af6a46460589f4b374f74859982daf70
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    14 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close