Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
-
Updated
Mar 8, 2023 - Ruby
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Joomla! < 4.2.8 - Unauthenticated information disclosure
Unofficial api for cve.mitre.org
CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.
Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).
CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.
iTop < 2.7.6 - (Authenticated) Remote command execution
Easy!Appointments < 1.4.3 - Unauthenticated PII (events) disclosure
CERT/CC's fork of Metasploit Framework in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
A Ruby library providing common classes for CVE data and loading it from JSON.
BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability
These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.
SHIFU is a command-line tool for fetching Common Vulnerabilities and Exposures (CVE) information.
These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.
A cybersecurity related blog