Nmap NSE script that uses Vulners.com API to detect software vulnerabilities during network scans.
nmap-vulners is an Nmap Scripting Engine (NSE) script that enhances network security scans by detecting known vulnerabilities in discovered software versions. It queries the Vulners.com vulnerability database to provide CVE information directly within nmap output, helping identify security risks during penetration testing or security assessments.
Security professionals, penetration testers, and system administrators who use nmap for network reconnaissance and vulnerability assessment.
It provides free, real-time vulnerability intelligence directly within nmap scans, eliminating the need for separate vulnerability database lookups and integrating seamlessly with existing security workflows.
NSE script based on Vulners.com API
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Integrates directly into nmap's version detection (-sV), allowing vulnerability data to appear in standard scan outputs without external tools, as highlighted in the README's usage examples.
Supports filtering vulnerabilities by minimum CVSS score (v2 or v3) via script arguments, enabling prioritization of critical issues during security assessments.
Includes the http-vulners-regex companion script that scans HTTP responses to identify software, boosting detection rates for web applications, as shown in the example images.
Offers vulners_enterprise with API key support and CVSS v3 scoring, catering to professional teams with advanced needs, though it requires a paid Vulners Enterprise subscription.
Relies on real-time queries to the Vulners.com database, making it ineffective for air-gapped networks or offline scanning scenarios, as no local cache is mentioned.
Installation requires copying files to specific system directories and running nmap --script-updatedb, which can be error-prone and varies by OS, as detailed in the README's installation steps.
Effectiveness hinges on nmap's -sV flag; if version detection fails or is omitted, the script provides no vulnerability data, limiting its use in broader scan types.