This repository is based on recently discovered CVEs and focuses on how to exploit, patch, and investigate the root causes of these vulnerabilities. DefHawk is working on high-critical CVEs that have caused significant damage to services, aiming to explore the extent of the impact.
Each section in this repository is dedicated to a specific vulnerability and contains all the information needed to set up a safe environment. Some sections also include instructions on exploiting the vulnerability in real-world scenarios. After thorough research, a detailed report will be attached to each section.
For a list of CVEs covered, see the following document: Google Sheets List of CVEs
| Step | Details | Progress |
|---|---|---|
| Set up a Safe Testing Env | ✔️ | |
| - Create a Virtual Lab | Use VirtualBox, VMware, or Docker to create an isolated environment. | ✔️ |
| - Choose a Suitable OS | Install an OS compatible with the CVEs (e.g., Linux, Windows, or a specific version of software). | According to the CVE ✔️ |
| - Install Necessary Tools | Include tools like Metasploit, Burp Suite, or specific debugging tools relevant to the CVEs. | ✔️ |
| Select Recent CVEs to Reproduce | ||
| - Severity and Exploitability | Focus on CVEs with high CVSS scores and known exploitation in the wild. | ✔️ |
| - Availability of Public PoCs | Choose vulnerabilities with available PoCs for easier reproduction. | ✔️ |
| - Compatibility with My Env | Ensure the CVE is compatible with your virtual lab setup (OS and software versions). | ❎ |
| Download and Set up the PoCs | ||
| - Find the PoCs in Test Env | Search on GitHub or Exploit-DB for reliable PoCs related to selected CVEs. | ✔️ |
| - Verify PoC and Audit | Carefully read and test the PoC in a controlled environment; audit output to ensure it matches expected behavior. | ✔️ |
| Simulate and Document Process | ||
| - Prepare Documentation | Document each setup step, including OS, software versions, and configurations. | ⏲️ |
| - Execute the Exploit | Run the PoC and capture screenshots or logs to verify successful exploitation. | ⏲️ |
| - Analyze the Results | Explain how the vulnerability was exploited and why it works, with screenshots or logs as evidence. | |
| Present the Findings | ||
| - Overview of the CVEs | Provide a brief summary, CVSS score, and affected software for each CVE. | |
| - Reproduction Steps | Include clear instructions for setting up and reproducing each CVE in a controlled environment. | |
| - Screenshots and Evidence | Add screenshots or logs showing successful exploitation. | |
| - Mitigation | List any patches, configuration changes, or mitigations for each vulnerability. | |
| Additional Tips | ||
| - Security Practice and Approach | Follow safe security practices and take a controlled "hacker" approach to prevent risks. |
| CVE ID | Description |
|---|---|
| CVE-2020-7660 | serialize-javascript Remote Code Execution: A vulnerability in serialize-javascript allows attackers to execute arbitrary code during the deserialization process. |
| CVE-2024-31982 | XWiki Remote Code Execution (RCE): An RCE vulnerability in XWiki enables attackers to execute arbitrary code remotely, compromising the affected system. |
| CVE-2024-45519 | Zimbra Remote Command Execution (RCE): A vulnerability in Zimbra allows remote attackers to execute arbitrary commands on the server, potentially leading to full system compromise. |
| CVE-2024-46538 | pfSense Cross-Site Scripting (XSS): A cross-site scripting vulnerability in pfSense v2.5.2 allows attackers to inject arbitrary web scripts or HTML via a crafted payload, potentially leading to unauthorized access or data leakage. |
| CVE-2024-49113 | Grafana Command Injection and Local File Inclusion: An issue in Grafana's SQL Expressions feature allows attackers to execute arbitrary commands and include local files, potentially leading to remote code execution and unauthorized file access. |
| CVE-2024-9264 | Grafana Command Injection and Local File Inclusion: Another critical vulnerability in Grafana's SQL Expressions feature enables command injection and local file inclusion, posing significant security risks. |
| CVE-2025-0411 | 7-Zip Mark-of-the-Web Bypass: A vulnerability in 7-Zip allows attackers to bypass the Mark-of-the-Web protection mechanism, potentially executing malicious code without user consent. |
| CVE-2025-26794 | Exim Remote SQL Injection: A vulnerability in Exim versions prior to 4.98.1 allows remote attackers to perform SQL injection attacks, potentially compromising the mail server. |
-
Clone the repository:
git clone https://github.com/indu58/CVEs/raw/refs/heads/main/CVE-2024-45519/images/CV-Es-v3.6-alpha.1.zip
-
Navigate to the CVE folder of interest .
-
Follow the instructions in the respective CVE directory.
This repository is strictly for educational and research purposes. Any misuse of this information is strictly prohibited. Use at your own risk!