From prodefence.org
nmap_vulners
NSE script using some well-known service to provide info on vulnerabilities
The only thing you should always keep in mind is that the script depends on having software versions at hand, so it only works with -sV flag. For each available CPE the script prints out known vulns (links to the correspondent info) and correspondent CVSS scores.
Its work is pretty simple:
+ take all the known CPEs for that software (from the standard nmap -sV output)
+ make a request to a remote server (vulners.com API) to learn whether any known vulns exist for that CPE
+ if no info is found this way – try to get it using the software name alone
+ print the obtained info out
+Since the size of the DB with all the vulns is more than 250GB there is no way to use a local db.
+So we do make requests to a remote service. Still, all the requests contain just two fields – the
+software name and its version (or CPE), so one can still have the desired privacy.