An advanced Nmap script designed to detect potential vulnerabilities in network services. This article delves into the technical specifics, requirements, and operational details of the script, providing a comprehensive guide for enhancing your network’s security.
Learn how to effectively use CVEScannerV2 to identify vulnerabilities across various services and versions.
Nmap script that provides information about probable vulnerabilities based on discovered services.
The current implementation take care of the following cases:
cpe
AND version
: vulnerabilities affecting version
and vulnerabilities affecting a range of versions that include version
.cpe
AND version range
: vulnerabilities affecting versions between version range
(included).cpe
but NO version
: vulnerabilities that affect every version of the product.cpe
and version
returned from Nmap, HTTP detection is used.cpe
: HTTP detection is used.extra/http-paths-vulnerscom.json
, comparing the request headers/body with the regexes in extra/http-regex-vulnerscom.json
.Nmap library shortport is used to detect if port matches HTTP/SSL.
In order to run cvescannerv2 script, you need the following files present in your working directory
cve.db
extra/http-paths-vulnerscom.json
extra/http-regex-vulnerscom.json
extra/product-aliases.json
In addition, you must have installed lua-sql-sqlite3
(ubuntu) or lua5.4-sql-sqlite3
(alpine) packages
If you don’t have the database cve.db
, you can build it using the script extra/database.py
or download a (semiupdated) copy from CVEScannerV2DB using .sql
files or under Actions->Latest->Summary->Artifacts
This repository is updated every two weeks
pip install -r extra/requirements.txt
python extra/database.py
git clone https://github.com/scmanjarrez/CVEScannerV2DB
cd CVEScannerV2DB && sh build.sh
To run the script, use the following syntax
nmap -sV --script cvescannerv2 <TARGET>
nmap -sV --script cvescannerv2 --script-args log=logfile.log,json=logfile.json <TARGET>
It is possible to modify the behaviour to some extent using the following arguments: db, maxcve, http, maxredirect, log, json, path, regex, aliases, service and version.
For more information click here.
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…