Skip to content

NMAP CVE REPORT is a Python-based Nmap CVE scanner that detects vulnerabilities, extracts CVEs, and generates JSON reports. It fetches related PentesterLab pages for insights. Supports Windows & Linux, runs with or without sudo, and provides colorized CLI output.

Notifications You must be signed in to change notification settings

mrdodgerx/nmap-cve-report

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Nmap CVE Report

Overview

The Nmap CVE Report is a Python-based tool that utilizes Nmap to scan a target IP or domain for known vulnerabilities. It extracts CVE details and attempts to retrieve relevant information from PentesterLab. Results are saved in a structured JSON format, and any available CVE-related pages are downloaded for further analysis.

Features

  • Automated Nmap vulnerability scanning
  • Parses CVE vulnerabilities from scan results
  • Downloads related PentesterLab pages if available
  • Organized output per target
  • Supports Windows & Linux
  • Colorized console output for better readability
  • Option to disable sudo usage with --nosudo flag

Installation

Prerequisites

Ensure you have the following installed on your system:

  • Python 3.x
  • Nmap
  • Required Python libraries:
    pip install requests colorama

Installing Nmap

Linux (Debian-based)

sudo apt update && sudo apt install nmap -y

Linux (Arch-based)

sudo pacman -S nmap

MacOS (Homebrew)

brew install nmap

Windows

  1. Download Nmap from Nmap Official Site
  2. Install it and ensure nmap.exe is added to your system PATH

Downloading the Latest CVE Database

To ensure your Nmap vulnerability detection is up to date, update the CVE database:

sudo nmap --script-updatedb

This will fetch the latest vulnerability detection scripts for Nmap.

Cloning the Repository

git clone https://github.com/mrdodgerx/nmap-cve-report.git
cd nmap-cve-report

Usage

Running the Scanner

python nmap_cve_reporter.py --target <IP_or_Domain>

Example:

python nmap_cve_reporter.py --target 192.168.1.1

Running Without Sudo

If you don’t want the script to use sudo, add the --nosudo flag:

python nmap_cve_reporter.py --target 192.168.1.1 --nosudo

Output Structure

All results are saved in an organized output folder per target:

output/
└── 192.168.1.1/
    ├── 192.168.1.1_vulnerabilities.json  # JSON report of found vulnerabilities
    ├── pentesterlab/
    │   ├── CVE-XXXX-XXXX.html  # Downloaded CVE pages (if available)

Notes

  • Linux users may need to run with sudo for full scanning capabilities.
  • If PentesterLab does not have a page for a CVE, it will be skipped.
  • JSON files contain full vulnerability details, including CVE ID, CVSS score, and available exploit links.
  • The --nosudo flag allows running without sudo.

License

This project is open-source and licensed under the MIT License.

Contribution

Feel free to contribute by submitting pull requests or reporting issues.

About

NMAP CVE REPORT is a Python-based Nmap CVE scanner that detects vulnerabilities, extracts CVEs, and generates JSON reports. It fetches related PentesterLab pages for insights. Supports Windows & Linux, runs with or without sudo, and provides colorized CLI output.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages