Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
-
Updated
Mar 8, 2023 - Ruby
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Joomla! < 4.2.8 - Unauthenticated information disclosure
CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.
Unofficial api for cve.mitre.org
iTop < 2.7.6 - (Authenticated) Remote command execution
Easy!Appointments < 1.4.3 - Unauthenticated PII (events) disclosure
These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.
VulDB Ruby code to fetch data via API
Metasploit modules for the PAM Environment and Udisks PE exploits.
Garrison Agent that provides CVE details security checks
BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability
These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.
CERT/CC's fork of Metasploit Framework in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.
A cybersecurity related blog
SHIFU is a command-line tool for fetching Common Vulnerabilities and Exposures (CVE) information.