{"vulnerability": "CVE-2018-15805", "sightings": [{"uuid": "484536e6-1db2-4679-8a88-1a35a994087c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-15805", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/5924", "content": "Some of the major vulnerabilities and related POC\u2019s:\n\nSQLi\n\nXSS\n\nSSRF\n\nXXE\n\nPath Traversal\n\nOpen Redirection\n\nAccount Takeover\n\nRemote code execution\n\nIDOR\n\nCSRF\n\nSQLi POC\u2019s:\n\n1. https://medium.com/@mahitman1/hacking-a-crypto-debit-card-service-730f287aaee7\n\n2. https://krevetk0.medium.com/burpsuit-sqlmap-one-love-64451eb7b1e8\n\nXSS POC\u2019s:\n\n1. https://medium.com/@jonathanbouman/persistent-xss-at-ah-nl-198fe7b4c781\n\n2. https://medium.com/@jonathanbouman/reflected-client-xss-amazon-com-7b0d3cec787\n\n3. https://medium.com/@jonathanbouman/reflected-xss-at-philips-com-e48bf8f9cd3c\n\nSSRF POC\u2019s :\n\n1.\nhackerone.com/reports/115748\n\n2. https://medium.com/@zain.sabahat/exploiting-ssrf-like-a-boss-c090dc63d326\n\n3. https://medium.com/@alyssa.o.herrera/wappalyzer-ssrf-write-up-2dab4df064ae\n\nXXE POC\u2019s :\n\n1. https://medium.com/@jonathanbouman/xxe-at-bol-com-7d331186de54\n\n2. https://blog.niksthehacker.com/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c?gi=1bae6590481b\n\n3. https://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745\n\nPath Traversal POC\u2019s :\n\n1. https://infosecwriteups.com/bugbounty-api-keys-leakage-source-code-disclosure-in-indias-largest-e-commerce-health-care-c75967392c7e?gi=81e94cfd7e41\n\n2. https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f\n\nOpen Redirection POC\u2019s :\n\n1. https://infosecwriteups.com/bugbounty-linkedln-how-i-was-able-to-bypass-open-redirection-protection-2e143eb36941\n\n2. https://medium.com/@0xrishabh/open-redirect-to-account-takeover-e939006a9f24\n\nAccount Takeover POC\u2019s :\n\n1. https://saadahmedx.medium.com/account-takeover-worth-900-cacbe10de58e\n\n2. https://infosecwriteups.com/1-click-account-takeover-in-virgool-io-a-nice-case-study-6bfc3cb98ef2\n\nRemote code execution POC\u2019s :\n\n1. https://logicbomb.medium.com/bugbounty-how-i-was-able-to-bypass-firewall-to-get-rce-and-then-went-from-server-shell-to-get-783f71131b94\n\n2. https://infosecwriteups.com/bugbounty-journey-from-lfi-to-rce-how-a69afe5a0899\n\n3. https://parsiya.net/blog/2019-06-18-chaining-three-bugs-to-get-rce-in-microsoft-attacksurfaceanalyzer/\n\nIDOR POC\u2019s :\n\n1. https://logicbomb.medium.com/bugbounty-how-naaptol-indias-popular-home-shopping-company-kept-their-millions-of-user-data-e414cd4151c\n\n2. https://logicbomb.medium.com/bugbounty-paytm-customer-information-is-at-risk-indias-largest-digital-wallet-company-6f7116d4b2d5\n\n3. https://infosecwriteups.com/bugbounty-how-i-was-able-to-read-chat-of-users-in-an-online-travel-portal-c55a1787f999\n\nCSRF POC\u2019s :\n\n1. https://infosecwriteups.com/content-negotiation-with-csrf-969e639d6a1a\n\n2. https://shahmeeramir.com/methods-to-bypass-csrf-protection-on-a-web-application-3198093f6599?gi=8f7836073091\n\n3. https://infosecwriteups.com/account-take-over-vulnerability-in-google-acquisition-famebit-e93b1a0a7af9\n\n4. https://yasserali.com/hacking-paypal-accounts-with-one-click/\n\n\n\n#cybersec #infosec #hacking #hack #cybersecurity #hackers #grayhats", "creation_timestamp": "2024-05-12T12:35:21.000000Z"}, {"uuid": "138864f4-50d3-4021-923b-f4b2d22d60fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-15805", "type": "published-proof-of-concept", "source": "https://t.me/GhostPrincess/12197", "content": "Some of the major vulnerabilities and related POC\u2019s:\n\nSQLi\n\nXSS\n\nSSRF\n\nXXE\n\nPath Traversal\n\nOpen Redirection\n\nAccount Takeover\n\nRemote code execution\n\nIDOR\n\nCSRF\n\nSQLi POC\u2019s:\n\n1. https://medium.com/@mahitman1/hacking-a-crypto-debit-card-service-730f287aaee7\n\n2. https://krevetk0.medium.com/burpsuit-sqlmap-one-love-64451eb7b1e8\n\nXSS POC\u2019s:\n\n1. https://medium.com/@jonathanbouman/persistent-xss-at-ah-nl-198fe7b4c781\n\n2. https://medium.com/@jonathanbouman/reflected-client-xss-amazon-com-7b0d3cec787\n\n3. https://medium.com/@jonathanbouman/reflected-xss-at-philips-com-e48bf8f9cd3c\n\nSSRF POC\u2019s :\n\n1.\nhackerone.com/reports/115748\n\n2. https://medium.com/@zain.sabahat/exploiting-ssrf-like-a-boss-c090dc63d326\n\n3. https://medium.com/@alyssa.o.herrera/wappalyzer-ssrf-write-up-2dab4df064ae\n\nXXE POC\u2019s :\n\n1. https://medium.com/@jonathanbouman/xxe-at-bol-com-7d331186de54\n\n2. https://blog.niksthehacker.com/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c?gi=1bae6590481b\n\n3. https://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745\n\nPath Traversal POC\u2019s :\n\n1. https://infosecwriteups.com/bugbounty-api-keys-leakage-source-code-disclosure-in-indias-largest-e-commerce-health-care-c75967392c7e?gi=81e94cfd7e41\n\n2. https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f\n\nOpen Redirection POC\u2019s :\n\n1. https://infosecwriteups.com/bugbounty-linkedln-how-i-was-able-to-bypass-open-redirection-protection-2e143eb36941\n\n2. https://medium.com/@0xrishabh/open-redirect-to-account-takeover-e939006a9f24\n\nAccount Takeover POC\u2019s :\n\n1. https://saadahmedx.medium.com/account-takeover-worth-900-cacbe10de58e\n\n2. https://infosecwriteups.com/1-click-account-takeover-in-virgool-io-a-nice-case-study-6bfc3cb98ef2\n\nRemote code execution POC\u2019s :\n\n1. https://logicbomb.medium.com/bugbounty-how-i-was-able-to-bypass-firewall-to-get-rce-and-then-went-from-server-shell-to-get-783f71131b94\n\n2. https://infosecwriteups.com/bugbounty-journey-from-lfi-to-rce-how-a69afe5a0899\n\n3. https://parsiya.net/blog/2019-06-18-chaining-three-bugs-to-get-rce-in-microsoft-attacksurfaceanalyzer/\n\nIDOR POC\u2019s :\n\n1. https://logicbomb.medium.com/bugbounty-how-naaptol-indias-popular-home-shopping-company-kept-their-millions-of-user-data-e414cd4151c\n\n2. https://logicbomb.medium.com/bugbounty-paytm-customer-information-is-at-risk-indias-largest-digital-wallet-company-6f7116d4b2d5\n\n3. https://infosecwriteups.com/bugbounty-how-i-was-able-to-read-chat-of-users-in-an-online-travel-portal-c55a1787f999\n\nCSRF POC\u2019s :\n\n1. https://infosecwriteups.com/content-negotiation-with-csrf-969e639d6a1a\n\n2. https://shahmeeramir.com/methods-to-bypass-csrf-protection-on-a-web-application-3198093f6599?gi=8f7836073091\n\n3. https://infosecwriteups.com/account-take-over-vulnerability-in-google-acquisition-famebit-e93b1a0a7af9\n\n4. https://yasserali.com/hacking-paypal-accounts-with-one-click/\n\nAn Ghost Clan channel:\nhttps://t.me/TheGrayHats\n\n#cybersec #infosec #hacking #hack #cybersecurity #hackers #grayhats", "creation_timestamp": "2023-06-09T14:01:37.000000Z"}, {"uuid": "577a2d01-0e60-4f4c-8347-2408c58d25eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-15805", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/2023", "content": "OOB XXE in PrizmDoc (CVE-2018\u201315805)\nhttps://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c", "creation_timestamp": "2018-11-13T14:25:54.000000Z"}]}