$ ./network-scanner --target 10.0.0.0/24
[*] Scanning 256 hosts...
[+] 10.0.0.1 gateway 5 ports open
[+] 10.0.0.10 web-server 3 ports open
[+] 10.0.0.42 database 2 ports open
[+] 10.0.0.77 dev-box 4 ports open
[*] OS fingerprint: Linux 5.15 (3 hosts)
[*] Scan complete: 4 hosts found in 2.1s
[CRITICAL] CVE-2024-1234 — nginx 1.24 remote code execution (CVSS: 9.8)
[CRITICAL] CVE-2024-2081 — Log4Shell variant in logging framework (CVSS: 10)
[HIGH] CVE-2024-3390 — kernel privilege escalation via eBPF (CVSS: 8.4)
[MEDIUM] CVE-2024-5678 — OpenSSH 8.9 privilege escalation (CVSS: 6.1)
[MEDIUM] CVE-2024-6012 — PostgreSQL SQL injection in json_path (CVSS: 5.9)
[MEDIUM] CVE-2024-7744 — Node.js HTTP request smuggling (CVSS: 5.3)
[LOW] CVE-2024-8001 — curl verbose mode info disclosure (CVSS: 3.7)
[LOW] CVE-2024-8899 — OpenSSL timing side-channel leak (CVSS: 2.6)
[LOW] CVE-2024-9100 — redis ACL bypass in debug mode (CVSS: 3.1)
[CRITICAL] CVE-2024-0042 — glibc buffer overflow in DNS resolver (CVSS: 9.1)
Next Project
Image Gallery