turbot/shodan

steampipe plugin install shodansteampipe plugin install shodan

Table: shodan_exploit

Search Shodan for information about exploits and vulnerabilities. See the query filter reference for more details.

Note: A query must be provided in all queries to this table.

Examples

select
*
from
shodan_exploit
where
query = 'lodash'

Find exploits with Bugtraq ID

select
*
from
shodan_exploit
where
query = 'bid:91451'

Find exploits for a given port

select
*
from
shodan_exploit
where
query = 'port:5432'

.inspect shodan_exploit

List the exploits requested for this account.

NameTypeDescription
aliasjsonbAlias for the exploit.
archjsonbArchitecture for the exploit.
authortextThe author of the exploit/vulnerability.
bidjsonbThe Bugtraq ID for the exploit.
codetextThe actual code of the exploit.
cvejsonbThe Common Vulnerability and Exposures ID for the exploit.
datetextDate when the exploit was released.
descriptiontextThe description of the exploit, how it works and where it applies.
idtextUnique ID for the exploit/vulnerability.
msbjsonbThe Microsoft Security Bulletin ID for the exploit.
osvdbjsonbThe Open Source Vulnerability Database ID for the exploit.
platformjsonbThe operating system that the exploit targets.
portbigintThe port number for the affected service if the exploit is remote.
privilegedbooleanTrue if the exploit is privileged.
querytextQuery string for the exploit search.
ranktextRank for the exploit.
sourcetextThe name of the data source. Possible values are: CVE, ExploitDB, Metasploit.
titletextThe title or short description for the exploit if available.
typetextThe type of exploit.
versiontextVersion of the exploit.