### [CVE-2018-8032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8032) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Axis&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-site%20Scripting&color=brighgreen) ### Description Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuApr2021.html - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpuapr2022.html - https://www.oracle.com/security-alerts/cpujan2020.html - https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/security-alerts/cpujul2022.html - https://www.oracle.com/security-alerts/cpuoct2021.html - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/cairuojin/CVE-2018-8032 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hinat0y/Dataset1 - https://github.com/hinat0y/Dataset10 - https://github.com/hinat0y/Dataset11 - https://github.com/hinat0y/Dataset12 - https://github.com/hinat0y/Dataset2 - https://github.com/hinat0y/Dataset3 - https://github.com/hinat0y/Dataset4 - https://github.com/hinat0y/Dataset5 - https://github.com/hinat0y/Dataset6 - https://github.com/hinat0y/Dataset7 - https://github.com/hinat0y/Dataset8 - https://github.com/hinat0y/Dataset9