nmap-vulners v1.4 beta releases: NSE script based on API


NSE script using some well-known service to provide info on vulnerabilities

The only thing you should always keep in mind is that the script depends on having software versions at hand, so it only works with -sV flag. For each available CPE the script prints out known vulns (links to the correspondent info) and correspondent CVSS scores.

Its work is pretty simple:

+ take all the known CPEs for that software (from the standard nmap -sV output)
+ make a request to a remote server ( API) to learn whether any known vulns exist for that CPE
+ if no info is found this way – try to get it using the software name alone
+ print the obtained info out
+Since the size of the DB with all the vulns is more than 250GB there is no way to use a local db.
+So we do make requests to a remote service. Still, all the requests contain just two fields – the
+software name and its version (or CPE), so one can still have the desired privacy.

Changelog v1.4 beta

  • – make use of http-regex script to run with additional CPEs
  • — take CPEs from separate registry as well as from port.version



nmap libraries:

  • http
  • json
  • string


Clone the repo:

git clone

locate, where your nmap scripts are located in your system

  • for *nix system it might be ~/.nmap/scripts/ or $NMAPDIR
  • for Mac it might be /usr/local/Cellar/nmap/<version>/share/nmap/scripts/
  • for Windows, you have to find it yourself

copy the provided script (vulners.nse) into that directory

nmap -sV –script vulners <target>

Copyright (C) 2017 vulnersCom


Anastasis Vasileiadis

PC Technical || Penetration Tester || Ethical Hacker || Cyber Security Expert || Cyber Security Analyst || Information Security Researcher || Malware analyst || Malware Investigator || Reverse Engineering