Details

Category: Vulnerabilities

Publisher: trickest-mhmdiaa

Created Date: 11/23/2023

Container: quay.io/trickest/searchsploit:d66aada8-patch-1

Source URL: https://gitlab.com/exploit-database/exploitdb

Parameters

id
boolean
Command: --id - Display the EDB-ID value rather than local path
cve
boolean
Command: --cve - Search for Common Vulnerabilities and Exposures (CVE) value
www
boolean
Command: --www - Show URLs to Exploit-DB.com rather than the local path
case
boolean
Command: --case - Perform a case-sensitive search (Default is inSEnsITiVe)
json
boolean
Command: --json - Show result in JSON format
nmap
file
Command: --nmap - Checks all results in Nmap's XML output with service version
path
boolean
Command: --path - Show the full path to an exploit (and also copies the path to the clipboard if possible)
term
string
required
Command: - Search term
exact
boolean
Command: --exact - Perform an EXACT & order match on exploit title (Default is an AND match on each term) [Implies --title] (e.g. WordPress 4.1 would not be detect WordPress Core 4.1)
title
boolean
Command: --title - Search JUST the exploit title (Default is title AND the file's path)
strict
boolean
Command: --strict - Perform a strict search, so input values must exist, disabling fuzzy search for version range (e.g. 1.1 would not be detected in 1.0 < 1.3)
exclude
string
Command: --exclude - Remove values from results. By using | to separate, you can chain multiple values (e.g. term1|term2|term3)
verbose
boolean
Command: --verbose - Display more information in output
overflow
boolean
Command: --overflow - Exploit titles are allowed to overflow their columns
disable-colour
boolean
Command: --disable-colour - Disable colour highlighting in search results