Skip to main content
Glama

shodan_exploits_search

Search the Shodan Exploits database to find known vulnerabilities and exploits for specific CVEs, software, or ICS/SCADA systems.

Instructions

Search for exploits in the Shodan Exploits database. Useful for finding known exploits for specific CVEs or software. Critical for ICS/SCADA security assessments.

ICS/SCADA Exploit Examples:

  • "Modbus" - Modbus protocol exploits

  • "SCADA" - General SCADA vulnerabilities

  • "Siemens" - Siemens PLC/SCADA exploits

  • "Schneider Electric" - Schneider vulnerabilities

  • "Allen-Bradley" - Rockwell exploits

  • "CVE-2019-6575" - Modbus simulator vulnerability

  • "CVE-2020-15782" - BACnet buffer overflow

  • "type:remote platform:hardware" - Hardware-specific

  • "ICS" - Industrial Control System exploits

Common ICS CVE Searches:

  • Modbus vulnerabilities: Often memory corruption, authentication bypass

  • SCADA exploits: Remote code execution, denial of service

  • PLC exploits: Ladder logic manipulation, configuration changes

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
queryYesSearch query. General: "microsoft", "CVE-2021-44228". ICS/SCADA: "Modbus", "SCADA", "Siemens", "Schneider", "ICS". Filters: "type:remote", "platform:hardware", "platform:linux"
facetsNoOptional facets for aggregation. Common: "type,platform,author". For ICS: "type,platform" to see exploit categories.
pageNoPage number (default: 1)

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/GangGreenTemperTatum/shodan-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server