Common Vulnerabilities and Exposures (CVE) ?

In this article, we are telling you about Common Vulnerabilities and Exposures CVE. You must have heard the name of CVE at some time while doing bug bounty but very little is talked about CVE.

But we want to tell you that Common Vulnerabilities and Exposures CVE can help you a lot in finding bugs, in such a way, if you have Common Vulnerabilities and Exposures CVE show in hints, do not ignore it.

Because if you do not find bugs using Common Vulnerabilities and Exposures CVE, then in your place, some other bug hunter can find bugs using CVE and later you find that you too had shown CVE.

Note – This article is only for educational purpose. Don’t miss use your knowledge and skills.

What is CVE ?

First of all here, you have to understand what is a CVE, the full name of CVE is Common Vulnerabilities and Exposures. You must have heard about your CVE many times as well as you have also been shown many times.

A new bug hunter ignores the CVE but advance bug hunters never ignore the CVE because that knows how much help the CVE for finding bugs.

Common Vulnerabilities and Exposures

In such a situation, if you also know about Common Vulnerabilities and Exposures, you also understand the importance of Common Vulnerabilities and Exposures and never ignore CVE.

If you say Common Vulnerabilities and Exposures in easy language, then you can also say that CVE is what bugs have already been found in here, bugs have been found in some other file.

Let us try to understand this with an example like suppose there is some kind of jquery file that has been used in a website, if it is a bug in the jquery file and it has been found earlier.

In such a case, if you get the same jquery file and the same version in a website, then you get a CVE show and you can find bugs in your targeted website through that file, you are also being told its practical.

Also Read

What is session fixation vulnerability

Clickjacking and phishing for facebook hacking

What is privilege escalation vulnerability

How to use Common Vulnerabilities and Exposures ?

Let us now tell you how you can use Common Vulnerabilities and Exposures, we are telling you all this through a lab of Common Vulnerabilities and Exposures.

https://application.security/free-application-security-training/owasp-top-10-components-with-known-vulnerabilities

Common Vulnerabilities and Exposures

First of all, you have to open the lab of Common Vulnerabilities and Exposures.On opening, this lab is opened in this way in front of you, here you have to go to the next step after this.

Common Vulnerabilities and Exposures

As you can see in the image, you get the product url in this way, after this you have to open this url as you can see in the image, you also have to do something similar.

Common Vulnerabilities and Exposures

After doing all this, when you open the url, after that you get the product open here in such a way as you can see in the image, you get all the hints with this lab.

Common Vulnerabilities and Exposures

After doing all this, when you go to the next step, you will be able to see that in the code you get a file of jquery, here it also shows the detail of Common Vulnerabilities and Exposures on the next step.

It is told to you that this bug has been found earlier in the version of jquery file, in such a way CVE gives you the hint that if this file is used, then there are chances that you also get bug.

Common Vulnerabilities and Exposures

After doing all this, you have to inject the script here. The payload of cross site scripting attack has been injected. You have told us about cross site scripting payloads earlier also.

After all this you can see the payload is loaded here, we want to tell you one thing that it does not happen that you can inject any payload of cross site scripting, here you have to inject different payloads and see.

After doing all this, you are given a command in such a way that as you can see in the image, after running the command, something is shown in this way in front of you, here you can also see how this command works.

After doing all this you get a malicious url as you can see in the image, as soon as you open the malicious url something like this, the mail gets opened in front of you.

Here you have to open the mail first as you can see here you can also see in the url the document cookie will be shown in front of you in a similar way, you have to open this link.

As soon as you open this url you will be able to see in the url you cookie show what is cookie, you have been told in the article about cookies hijacking attack, you can also read it.

After doing all this, you get the option of analysis code, if you want to do that, you can see the code in this way, after doing all this your lab is complete as you can see in the image.

The Conclusion

I hope that you have come to know about Common Vulnerabilities and Exposures We have told you here in detail about Common Vulnerabilities and Exposures.

In such a situation, you must also understand how the Common Vulnerabilities and Exposures CVE helps you find bugs, in such a way, you should never ignore Common Vulnerabilities and Exposures.

Here we want to tell you one thing, whenever you do automatic scan using activescan ++, in that way you have CVE show many times, you must have seen many times in your burp suite too, you can find bugs from that too.

If you like this article about our Common Vulnerabilities and Exposures, then you should definitely share it, if you have any kind of question, then you can ask us in the comment.

Subscribe to our blog for latest updates

Sharing is Caring

Thankyou

Be the first to comment

Leave a Reply

Your email address will not be published.


*