Skip to content

Exploit Database (ExploitDB) is an archive of exploits for the purpose of public security, and by finding exploit scripts based on CVE IDs it becomes a very useful resource for identifying possible weaknesses in your network and for staying up to date on current attacks occurring in other networks.

License

Notifications You must be signed in to change notification settings

ndouglas-cloudsmith/ExploitPwned

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

ExploitPwned

Exploit Database (ExploitDB) is an archive of exploits for the purpose of public security, and by finding exploit scripts based on CVE IDs it becomes a very useful resource for identifying possible weaknesses in your network and for staying up to date on current attacks occurring in other networks.

I recommend creating a local directory for the scanner and associated datasets:

mkdir ExploitdPwned
cd ExploitdPwned

Download the scanner and convert it to executable:

wget https://raw.githubusercontent.com/ndouglas-cloudsmith/ExploitPwned/refs/heads/main/exploitPwned.sh
chmod +x exploitPwned.sh
./exploitPwned.sh update

Use the scanner to look-up the vulnerability - CVE-2016-5195

./exploitPwned.sh CVE-2016-5195

Shows the short output of the exploit script for a specific vulnerability - CVE-2016-5195

./exploitPwned.sh CVE-2016-5195 --details

Ingress-NGINX Exploits

To prioritise the safety and security of the ecosystem, Kubernetes SIG Network and the Security Response Committee are announcing the upcoming retirement of Ingress NGINX. Best-effort maintenance will continue until March 2026. Afterward, there will be no further releases, no bugfixes, and no updates to resolve any security vulnerabilities that may be discovered. Existing deployments of Ingress NGINX will continue to function and installation artifacts will remain available.

./exploitPwned.sh CVE-2025-24514 --details
./exploitPwned.sh CVE-2025-1974 --details
./exploitPwned.sh CVE-2025-1098 --details
./exploitPwned.sh CVE-2025-1097 --details

Other Test Scenarios

CISA and its partners, through the Joint Cyber Defense Collaborative, responded to active, widespread exploitation of a critical remote code execution (RCE) vulnerability (CVE-2021-44228) in the Apache Log4j software library, versions 2.0-beta9 to 2.14.1, known as "Log4Shell." Log4j is very broadly used in a variety of consumer and enterprise services, websites, and apps (as well as in operational technology products) to log security and performance information. An unauthenticated remote actor could exploit this vulnerability to take control of an affected system.

./exploitPwned.sh CVE-2021-44228 --details

Apache Struts is a free and open-source framework used to build Java web applications. We looked into past several Remote Code Execution (RCE) vulnerabilities reported in Apache Struts, and observed that in most of them, attackers have used Object Graph Navigation Language (OGNL) expressions. The use of OGNL makes it easy to execute arbitrary code remotely because Apache Struts uses it for most of its processes.

./exploitPwned.sh CVE-2017-5638 --details

EternalBlue is a computer exploit software developed by the US National Security Agency (NSA) based on a zero-day vulnerability in Microsoft Windows SMB Remote Code Execution. In 2017, a computer worm in the form of ransomware, nicknamed "WannaCry", used the EternalBlue exploit to attack computers using Windows that had not received the latest system updates removing the vulnerability.

./exploitPwned.sh CVE-2017-0144 --details

OpenSSL contained a flaw in its implementation of the TLS/DTLS heartbeat functionality, known as "Heartbleed". This flaw allows an attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time. Note that an attacker can repeatedly leverage the vulnerability to retrieve as many 64k chunks of memory as are necessary to retrieve the intended secrets.

./exploitPwned.sh CVE-2014-0160 --details

Cleanup

You can manually cleanup the datasets from your current directory:

rm epss_scores.csv exploitdb.csv kev.json

About

Exploit Database (ExploitDB) is an archive of exploits for the purpose of public security, and by finding exploit scripts based on CVE IDs it becomes a very useful resource for identifying possible weaknesses in your network and for staying up to date on current attacks occurring in other networks.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages