The prompt is the main searchterm provided to the tool. This needs to be in a format required by the tool otherwise an error may be returned. For example some tools may require URLs while others may require IP addresses.
Some options may be required while others are optional. If there are no options, an empty object should be provided.
The default API key is provided as an example only. This will not work in your own applications. Register for a free account to get an API key.
The Vulnerability Search tool performs checks against SearchSploit, enabling users to quickly identify potential vulnerabilities and security issues.
Common Vulnerabilities and Exposures - A standardized method for identifying and naming security vulnerabilities in software and hardware.
Common Vulnerability Scoring System - A framework for rating the severity of security vulnerabilities in software and hardware.
Common Weakness Enumeration - A community-developed list of software and hardware weaknesses.
National Vulnerability Database - A US government repository of standards-based vulnerability management data.
Open Sourced Vulnerability Database - A community-driven, open-source database of software vulnerabilities.