Public Vulnerabilities

Overview

Public CVEs and Exploits

Identification Process

  1. Identify Web Application Version

    • Check source code (e.g., version.php).
    • Look for the same in the deployed app.
  2. Search for Public Exploits

    Pasted image 20250925114844.png|450

  3. Prioritize

    • Look for:
      • CVSS score 8–10
      • Remote Code Execution (RCE) exploits
    • Also check plugins or external components used by the app.

Common Vulnerability Scoring System (CVSS)

Metrics

CVSS Versions

CVSS v2.0 Ratings

Severity Score Range
Low 0.0–3.9
Medium 4.0–6.9
High 7.0–10.0

CVSS v3.0 Ratings

Severity Score Range
None 0.0
Low 0.1–3.9
Medium 4.0–6.9
High 7.0–8.9
Critical 9.0–10.0

Back-End Server Vulnerabilities


Exercise

What is the CVSS v2.0 score of the public vulnerability CVE-2017-0144?

Description for CVE-2017-0144
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.

Metrics

flag: 9.3