The exploit type contains the normalized data from a variety of vulnerability data sources. The Exploits REST API returns this type for its search results. This document outlines the various properties that are always present and which ones are optional.


Properties

_id
[String] Unique ID for the exploit/ vulnerability.
bid
[String[]] An array of Bugtraq IDs that reference this vulnerability.
cve
[String[]] An array of relevant CVE IDs that reference this exploit.
msb
[String[]] An array of Microsoft Security Bulletin reference IDs for this exploit.
osvdb
[String[]] An array of OSVDB IDs that are relevant to this exploit.
description
[String] A description explaining the details of the exploit.
source
[String] The name of the data source. Possible values are:
  • CVE
  • ExploitDB
  • Metasploit

Optional Properties

author
[String] The author of the exploit/ vulnerability.
code
[String] The actual code for the exploit.
date
[String] The timestamp for when the exploit was released in the UTC timezone. Example: "2014-01-15T05:49:56.283713"
platform
[String[]] An array of platforms that the exploit targets. Possible values are:
  • aix
  • cgi
  • freebsd
  • hardware
  • Java
  • jsp
  • lin_x86
  • Linux
  • multiple
  • novell
  • osx
  • PHP
  • true64
  • Unix
  • Windows
port
[Integer] The port number for the affected service.
type
[String] The type of exploit, possible values are:
  • dos
  • exploit
  • local
  • remote
  • shellcode
  • webapps

Sample Exploit

{
    "code": "##\n# This module requires Metasploit: http//metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framewor... (truncated)",
    "description": "This module exploits a command injection vulnerability found in E-Mail Security\n Virtual Appliance. This module abuses the learn-msg.cgi file to execute arbitrary\n OS commands without authentication. This module has been successfully tested on the\n ESVA_2057 appliance.",
    "bid": ["55050"],
    "rank": "excellent",
    "alias": null,
    "arch": "[\"cmd\"]",
    "_id": "exploit/linux/http/esva_exec",
    "osvdb": ["85462"],
    "author": ["iJoo", "juan vazquez "],
    "msb": [],
    "platform": ["Unix"],
    "version": "0",
    "source": "Metasploit",
    "title": "E-Mail Security Virtual Appliance learn-msg.cgi Command Injection",
    "cve": [],
    "type": "exploit",
    "privileged": false
}