cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2017-14960,https://securityvulnerability.io/vulnerability/CVE-2017-14960,,xDashboard in OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 has SQL Injection.,Opentext,Document Sciences Xpression,7.5,HIGH,0.005760000087320805,false,,false,false,false,,,false,false,,2018-01-04T17:00:00.000Z,0 CVE-2017-14758,https://securityvulnerability.io/vulnerability/CVE-2017-14758,,"OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to SQL Injection: /xAdmin/html/cm_doclist_view_uc.jsp, parameter: documentId. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.",Opentext,Document Sciences Xpression,8.8,HIGH,0.00279000005684793,false,,false,false,false,,,false,false,,2017-10-03T01:29:00.000Z,0 CVE-2017-14759,https://securityvulnerability.io/vulnerability/CVE-2017-14759,,"OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to an XML External Entity vulnerability: /xFramework/services/QuickDoc.QuickDocHttpSoap11Endpoint/. An unauthenticated user is able to read directory listings or system files, or cause SSRF or Denial of Service.",Opentext,Document Sciences Xpression,9.8,CRITICAL,0.0022299999836832285,false,,false,false,false,,,false,false,,2017-10-03T01:29:00.000Z,0 CVE-2017-14754,https://securityvulnerability.io/vulnerability/CVE-2017-14754,,"OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to Arbitrary File Read: /xAdmin/html/cm_datasource_group_xsd.jsp, parameter: xsd_datasource_schema_file filename. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.",Opentext,Document Sciences Xpression,6.5,MEDIUM,0.0007200000109151006,false,,false,false,false,,,false,false,,2017-10-03T01:29:00.000Z,0 CVE-2017-14755,https://securityvulnerability.io/vulnerability/CVE-2017-14755,,"OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to Cross-Site Scripting: /xAdmin/html/XPressoDoc, parameter: categoryId.",Opentext,Document Sciences Xpression,6.1,MEDIUM,0.003470000112429261,false,,false,false,false,,,false,false,,2017-10-03T01:29:00.000Z,0 CVE-2017-14756,https://securityvulnerability.io/vulnerability/CVE-2017-14756,,OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to Cross-Site Scripting: /xAdmin/html/Deployment (cat_id).,Opentext,Document Sciences Xpression,6.1,MEDIUM,0.003470000112429261,false,,false,false,false,,,false,false,,2017-10-03T01:29:00.000Z,0 CVE-2017-14757,https://securityvulnerability.io/vulnerability/CVE-2017-14757,,"OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to SQL Injection: /xDashboard/html/jobhistory/downloadSupportFile.action, parameter: jobRunId. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.",Opentext,Document Sciences Xpression,8.8,HIGH,0.00279000005684793,false,,false,false,false,,,false,false,,2017-10-03T01:29:00.000Z,0