Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47395/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47395/41747/collegemanagementsystem-cms-13-batch-sql-injection/download/",
        "exploit_id": "47395",
        "exploit_description": "\"CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection\"",
        "exploit_date": "2019-09-16",
        "exploit_author": "cakes",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47392/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47392/41746/symantec-advanced-secure-gateway-asg-proxysg-unrestricted-file-upload/download/",
        "exploit_id": "47392",
        "exploit_description": "\"Symantec Advanced Secure Gateway (ASG) / ProxySG - Unrestricted File Upload\"",
        "exploit_date": "2019-09-16",
        "exploit_author": "\"Pankaj Kumar Thakur\"",
        "exploit_type": "webapps",
        "exploit_platform": "cfm",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47390/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47390/41745/inteno-iopsys-gateway-improper-access-restrictions/download/",
        "exploit_id": "47390",
        "exploit_description": "\"Inteno IOPSYS Gateway - Improper Access Restrictions\"",
        "exploit_date": "2019-09-16",
        "exploit_author": "\"Gerard Fuguet\"",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47394/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47394/41744/docprint-pro-80-seh-buffer-overflow/download/",
        "exploit_id": "47394",
        "exploit_description": "\"docPrint Pro 8.0 - SEH Buffer Overflow\"",
        "exploit_date": "2019-09-16",
        "exploit_author": "\"Connor McGarr\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47389/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47389/41743/appxsvc-privilege-escalation/download/",
        "exploit_id": "47389",
        "exploit_description": "\"AppXSvc - Privilege Escalation\"",
        "exploit_date": "2019-09-16",
        "exploit_author": "\"Gabor Seljan\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47357/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47357/41742/windows-ntfs-privileged-file-access-enumeration/download/",
        "exploit_id": "47357",
        "exploit_description": "\"Windows NTFS - Privileged File Access Enumeration\"",
        "exploit_date": "2019-09-06",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47388/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47388/41741/college-management-system-12-authentication-bypass/download/",
        "exploit_id": "47388",
        "exploit_description": "\"College-Management-System 1.2 - Authentication Bypass\"",
        "exploit_date": "2019-09-14",
        "exploit_author": "cakes",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47387/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47387/41740/ticket-booking-14-authentication-bypass/download/",
        "exploit_id": "47387",
        "exploit_description": "\"Ticket-Booking 1.4 - Authentication Bypass\"",
        "exploit_date": "2019-09-14",
        "exploit_author": "cakes",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47386/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47386/41739/limesurvey-31713-cross-site-scripting/download/",
        "exploit_id": "47386",
        "exploit_description": "\"LimeSurvey 3.17.13 - Cross-Site Scripting\"",
        "exploit_date": "2019-09-13",
        "exploit_author": "\"SEC Consult\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47385/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47385/41738/phpmyadmin-4901-cross-site-request-forgery/download/",
        "exploit_id": "47385",
        "exploit_description": "\"phpMyAdmin 4.9.0.1 - Cross-Site Request Forgery\"",
        "exploit_date": "2019-09-13",
        "exploit_author": "\"Manuel García Cárdenas\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47384/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47384/41737/dolibarr-erp-crm-1001-user-agent-cross-site-scripting/download/",
        "exploit_id": "47384",
        "exploit_description": "\"Dolibarr ERP-CRM 10.0.1 - 'User-Agent' Cross-Site Scripting\"",
        "exploit_date": "2019-09-13",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47383/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47383/41736/folder-lock-779-denial-of-service/download/",
        "exploit_id": "47383",
        "exploit_description": "\"Folder Lock 7.7.9 - Denial of Service\"",
        "exploit_date": "2019-09-13",
        "exploit_author": "Achilles",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47382/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47382/41735/microsoft-directwrite-out-of-bounds-read-in-sfac-getsbitbitmap-while-processing-ttf-fonts/download/",
        "exploit_id": "47382",
        "exploit_description": "\"Microsoft DirectWrite - Out-of-Bounds Read in sfac_GetSbitBitmap While Processing TTF Fonts\"",
        "exploit_date": "2019-09-12",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47381/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47381/41734/microsoft-directwrite-invalid-read-in-splicepixel-while-processing-otf-fonts/download/",
        "exploit_id": "47381",
        "exploit_description": "\"Microsoft DirectWrite - Invalid Read in SplicePixel While Processing OTF Fonts\"",
        "exploit_date": "2019-09-12",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47380/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47380/41733/ewon-flexy-authentication-bypass/download/",
        "exploit_id": "47380",
        "exploit_description": "\"eWON Flexy - Authentication Bypass\"",
        "exploit_date": "2019-09-11",
        "exploit_author": "Photubias",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47379/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47379/41732/avcon6-systems-management-platform-ognl-remote-command-execution/download/",
        "exploit_id": "47379",
        "exploit_description": "\"AVCON6 systems management platform - OGNL Remote Command Execution\"",
        "exploit_date": "2019-09-11",
        "exploit_author": "\"Nassim Asrir\"",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47373/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47373/41731/wordpress-plugin-photo-gallery-1534-cross-site-scripting-2/download/",
        "exploit_id": "47373",
        "exploit_description": "\"WordPress Plugin Photo Gallery 1.5.34 - Cross-Site Scripting (2)\"",
        "exploit_date": "2019-09-10",
        "exploit_author": "MTK",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47372/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47372/41730/wordpress-plugin-photo-gallery-1534-cross-site-scripting/download/",
        "exploit_id": "47372",
        "exploit_description": "\"WordPress Plugin Photo Gallery 1.5.34 - Cross-Site Scripting\"",
        "exploit_date": "2019-09-10",
        "exploit_author": "MTK",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47371/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47371/41729/wordpress-plugin-photo-gallery-1534-sql-injection/download/",
        "exploit_id": "47371",
        "exploit_description": "\"WordPress Plugin Photo Gallery 1.5.34 - SQL Injection\"",
        "exploit_date": "2019-09-10",
        "exploit_author": "MTK",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47376/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47376/41728/october-cms-upload-protection-bypass-code-execution-metasploit/download/",
        "exploit_id": "47376",
        "exploit_description": "\"October CMS - Upload Protection Bypass Code Execution (Metasploit)\"",
        "exploit_date": "2019-09-10",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47375/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47375/41727/librenms-collectd-command-injection-metasploit/download/",
        "exploit_id": "47375",
        "exploit_description": "\"LibreNMS - Collectd Command Injection (Metasploit)\"",
        "exploit_date": "2019-09-10",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47378/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47378/41726/windows-10-uac-protection-bypass-via-windows-store-wsresetexe-and-registry-metasploit/download/",
        "exploit_id": "47378",
        "exploit_description": "\"Windows 10 - UAC Protection Bypass Via Windows Store (WSReset.exe) and Registry (Metasploit)\"",
        "exploit_date": "2019-09-10",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47377/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47377/41725/windows-10-uac-protection-bypass-via-windows-store-wsresetexe-metasploit/download/",
        "exploit_id": "47377",
        "exploit_description": "\"Windows 10 - UAC Protection Bypass Via Windows Store (WSReset.exe) (Metasploit)\"",
        "exploit_date": "2019-09-10",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47370/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47370/41724/dolibarr-erp-crm-1001-sql-injection/download/",
        "exploit_id": "47370",
        "exploit_description": "\"Dolibarr ERP-CRM 10.0.1 - SQL Injection\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47369/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47369/41723/wordpress-plugin-sell-downloads-1086-cross-site-scripting/download/",
        "exploit_id": "47369",
        "exploit_description": "\"WordPress Plugin Sell Downloads 1.0.86 - Cross-Site Scripting\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "\"Mr Winst0n\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47368/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47368/41722/rifatron-intelligent-digital-security-system-animatecgi-stream-disclosure/download/",
        "exploit_id": "47368",
        "exploit_description": "\"Rifatron Intelligent Digital Security System - 'animate.cgi' Stream Disclosure\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "cgi",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47366/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47366/41721/online-appointment-sql-injection/download/",
        "exploit_id": "47366",
        "exploit_description": "\"Online Appointment - SQL Injection\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "\"mohammad zaheri\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47365/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47365/41720/enigma-nms-6500-sql-injection/download/",
        "exploit_id": "47365",
        "exploit_description": "\"Enigma NMS 65.0.0 - SQL Injection\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "mark",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47364/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47364/41719/enigma-nms-6500-os-command-injection/download/",
        "exploit_id": "47364",
        "exploit_description": "\"Enigma NMS 65.0.0 - OS Command Injection\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "mark",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47363/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47363/41718/enigma-nms-6500-cross-site-request-forgery/download/",
        "exploit_id": "47363",
        "exploit_description": "\"Enigma NMS 65.0.0 - Cross-Site Request Forgery\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "mark",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47362/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47362/41717/dolibarr-erp-crm-1001-elemid-sql-injection/download/",
        "exploit_id": "47362",
        "exploit_description": "\"Dolibarr ERP-CRM 10.0.1 - 'elemid' SQL Injection\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47361/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47361/41716/wordpress-523-cross-site-host-modification/download/",
        "exploit_id": "47361",
        "exploit_description": "\"WordPress 5.2.3 - Cross-Site Host Modification\"",
        "exploit_date": "2019-09-09",
        "exploit_author": "\"Todor Donev\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47356/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47356/41715/inventory-webapp-itemquery-sql-injection/download/",
        "exploit_id": "47356",
        "exploit_description": "\"Inventory Webapp - 'itemquery' SQL injection\"",
        "exploit_date": "2019-09-06",
        "exploit_author": "\"mohammad zaheri\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47358/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47358/41714/fusionpbx-448-remote-code-execution/download/",
        "exploit_id": "47358",
        "exploit_description": "\"FusionPBX 4.4.8 - Remote Code Execution\"",
        "exploit_date": "2019-09-06",
        "exploit_author": "Askar",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47354/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47354/41713/pulse-secure-81r151828390-ssl-vpn-remote-code-execution/download/",
        "exploit_id": "47354",
        "exploit_description": "\"Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Remote Code Execution\"",
        "exploit_date": "2019-09-06",
        "exploit_author": "\"Justin Wagner\"",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47353/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47353/41712/awindinc-snmp-service-command-injection-metasploit/download/",
        "exploit_id": "47353",
        "exploit_description": "\"AwindInc SNMP Service - Command Injection (Metasploit)\"",
        "exploit_date": "2019-09-05",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47351/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47351/41711/dasan-zhone-znid-gpon-2426a-eu-multiple-cross-site-scripting/download/",
        "exploit_id": "47351",
        "exploit_description": "\"DASAN Zhone ZNID GPON 2426A EU - Multiple Cross-Site Scripting\"",
        "exploit_date": "2019-09-04",
        "exploit_author": "\"Adam Ziaja\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47350/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47350/41710/wordpress-plugin-download-manager-2993-cross-site-scripting/download/",
        "exploit_id": "47350",
        "exploit_description": "\"WordPress Plugin Download Manager 2.9.93 - Cross-Site Scripting\"",
        "exploit_date": "2019-09-04",
        "exploit_author": "MgThuraMoeMyint",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47349/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47349/41709/filethingie-257-arbitrary-file-upload/download/",
        "exploit_id": "47349",
        "exploit_description": "\"FileThingie 2.5.7 - Arbitrary File Upload\"",
        "exploit_date": "2019-09-03",
        "exploit_author": "cakes",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47348/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47348/41708/cisco-rv110wrv130wrv215w-routers-management-interface-remote-command-execution-metasploit/download/",
        "exploit_id": "47348",
        "exploit_description": "\"Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit)\"",
        "exploit_date": "2019-09-03",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47347/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47347/41707/cisco-data-center-network-manager-unauthenticated-remote-code-execution-metasploit/download/",
        "exploit_id": "47347",
        "exploit_description": "\"Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit)\"",
        "exploit_date": "2019-09-03",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47346/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47346/41706/cisco-ucs-director-default-scpuser-password-metasploit/download/",
        "exploit_id": "47346",
        "exploit_description": "\"Cisco UCS Director - default scpuser password (Metasploit)\"",
        "exploit_date": "2019-09-03",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "unix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47345/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47345/41705/ptrace-sudo-token-privilege-escalation-metasploit/download/",
        "exploit_id": "47345",
        "exploit_description": "\"ptrace - Sudo Token Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-09-03",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47344/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47344/41704/ktsuss-14-suid-privilege-escalation-metasploit/download/",
        "exploit_id": "47344",
        "exploit_description": "\"ktsuss 1.4 - suid Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-09-03",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47343/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47343/41703/craft-cms-279325-information-disclosure/download/",
        "exploit_id": "47343",
        "exploit_description": "\"Craft CMS 2.7.9/3.2.5 - Information Disclosure\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "\"Mohammed Abdul Raheem\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47340/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47340/41702/alkacon-opencms-105x-local-file-inclusion/download/",
        "exploit_id": "47340",
        "exploit_description": "\"Alkacon OpenCMS 10.5.x - Local File inclusion\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "Aetsu",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47339/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47339/41701/alkacon-opencms-105x-cross-site-scripting-2/download/",
        "exploit_id": "47339",
        "exploit_description": "\"Alkacon OpenCMS 10.5.x - Cross-Site Scripting (2)\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "Aetsu",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47338/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47338/41700/alkacon-opencms-105x-cross-site-scripting/download/",
        "exploit_id": "47338",
        "exploit_description": "\"Alkacon OpenCMS 10.5.x - Cross-Site Scripting\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "Aetsu",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47335/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47335/41699/wordpress-plugin-event-tickets-41071-csv-injection/download/",
        "exploit_id": "47335",
        "exploit_description": "\"Wordpress Plugin Event Tickets 4.10.7.1 - CSV Injection\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "MTK",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47331/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47331/41698/opencart-3x-cross-site-scripting/download/",
        "exploit_id": "47331",
        "exploit_description": "\"Opencart 3.x - Cross-Site Scripting\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "\"Nipun Somani\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47337/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47337/41697/intelbras-telefone-ip-tip200200-lite-60617515-arbitrary-file-read/download/",
        "exploit_id": "47337",
        "exploit_description": "\"IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "\"Todor Donev\"",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47329/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47329/41696/cisco-email-security-appliance-ironport-c160-host-header-injection/download/",
        "exploit_id": "47329",
        "exploit_description": "\"Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "\"Todor Donev\"",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47341/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47341/41695/kaseya-vsa-agent-95-privilege-escalation/download/",
        "exploit_id": "47341",
        "exploit_description": "\"Kaseya VSA agent 9.5 - Privilege Escalation\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "NF",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47334/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47334/41694/chaospro-31-seh-buffer-overflow/download/",
        "exploit_id": "47334",
        "exploit_description": "\"ChaosPro 3.1 - SEH Buffer Overflow\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "\"Jonathan Crosby\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47333/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47333/41693/chaospro-21-seh-buffer-overflow/download/",
        "exploit_id": "47333",
        "exploit_description": "\"ChaosPro 2.1 - SEH Buffer Overflow\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "\"Jonathan Crosby\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47332/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47332/41692/chaospro-20-seh-buffer-overflow/download/",
        "exploit_id": "47332",
        "exploit_description": "\"ChaosPro 2.0 - SEH Buffer Overflow\"",
        "exploit_date": "2019-09-02",
        "exploit_author": "\"Jonathan Crosby\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47327/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47327/41691/wordpress-plugin-woocommerce-product-feed-2218-cross-site-scripting/download/",
        "exploit_id": "47327",
        "exploit_description": "\"WordPress Plugin WooCommerce Product Feed 2.2.18 - Cross-Site Scripting\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "\"Damian Ebelties\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47326/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47326/41690/youphptube-74-remote-code-execution/download/",
        "exploit_id": "47326",
        "exploit_description": "\"YouPHPTube 7.4 - Remote Code Execution\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "\"Damian Ebelties\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47325/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47325/41689/domainmod-413-cross-site-scripting/download/",
        "exploit_id": "47325",
        "exploit_description": "\"DomainMod 4.13 - Cross-Site Scripting\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "\"Damian Ebelties\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47324/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47324/41688/sentrifugo-32-persistent-cross-site-scripting/download/",
        "exploit_id": "47324",
        "exploit_description": "\"Sentrifugo 3.2 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "creosote",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47323/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47323/41687/sentrifugo-32-file-upload-restriction-bypass/download/",
        "exploit_id": "47323",
        "exploit_description": "\"Sentrifugo 3.2 - File Upload Restriction Bypass\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "creosote",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47320/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47320/41686/qemu-denial-of-service/download/",
        "exploit_id": "47320",
        "exploit_description": "\"QEMU - Denial of Service\"",
        "exploit_date": "2019-08-20",
        "exploit_author": "vishnudevtj",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47321/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47321/41685/canon-print-255-information-disclosure/download/",
        "exploit_id": "47321",
        "exploit_description": "\"Canon PRINT 2.5.5 - Information Disclosure\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "0x48piraj",
        "exploit_type": "local",
        "exploit_platform": "android",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47328/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47328/41684/vx-search-enterprise-10416-user-agent-denial-of-service/download/",
        "exploit_id": "47328",
        "exploit_description": "\"VX Search Enterprise 10.4.16 - 'User-Agent' Denial of Service\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "\"James Chamberlain\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47322/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47322/41683/asus-precision-touchpad-110025-denial-of-service/download/",
        "exploit_id": "47322",
        "exploit_description": "\"Asus Precision TouchPad 11.0.0.25 - Denial of Service\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "\"Athanasios Tserpelis\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47319/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47319/41682/easy-mp3-downloader-4788-unlock-code-denial-of-service/download/",
        "exploit_id": "47319",
        "exploit_description": "\"Easy MP3 Downloader 4.7.8.8 - 'Unlock Code' Denial of Service\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "\"Mohan Ravichandran_ Snazzy Sanoj\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47318/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47318/41681/sql-server-password-changer-190-denial-of-service/download/",
        "exploit_id": "47318",
        "exploit_description": "\"SQL Server Password Changer 1.90 - Denial of Service\"",
        "exploit_date": "2019-08-30",
        "exploit_author": "\"Velayutham Selvaraj_ Praveen Thiyagarayam\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47315/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47315/41680/piluscart-141-local-file-disclosure/download/",
        "exploit_id": "47315",
        "exploit_description": "\"PilusCart 1.4.1 - Local File Disclosure\"",
        "exploit_date": "2019-08-29",
        "exploit_author": "\"Damian Ebelties\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47314/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47314/41679/jobberbase-20-subscribe-sql-injection/download/",
        "exploit_id": "47314",
        "exploit_description": "\"Jobberbase 2.0 - 'subscribe' SQL Injection\"",
        "exploit_date": "2019-08-29",
        "exploit_author": "\"Damian Ebelties\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47316/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47316/41678/webkit-jsc-jit-uninitialized-variable-access-in-argumentseliminationphasetransform/download/",
        "exploit_id": "47316",
        "exploit_description": "\"Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform\"",
        "exploit_date": "2019-08-29",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47312/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47312/41677/wordpress-plugin-gourlio-1414-file-upload/download/",
        "exploit_id": "47312",
        "exploit_description": "\"WordPress Plugin GoURL.io < 1.4.14 - File Upload\"",
        "exploit_date": "2018-10-31",
        "exploit_author": "\"Pouya Darabi\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47311/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47311/41676/jobberbase-20-cms-jobs-in-sql-injection/download/",
        "exploit_id": "47311",
        "exploit_description": "\"Jobberbase 2.0 CMS - 'jobs-in' SQL Injection\"",
        "exploit_date": "2019-08-28",
        "exploit_author": "\"Naren Jangra\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47310/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47310/41675/sqlitemanager-120-124-blind-sql-injection/download/",
        "exploit_id": "47310",
        "exploit_description": "\"SQLiteManager 1.2.0 / 1.2.4 - Blind SQL Injection\"",
        "exploit_date": "2019-08-28",
        "exploit_author": "\"Rafael Pedrero\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47313/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47313/41674/cisco-ucs-director--cisco-integrated-management-controller-supervisor-and-cisco-ucs-director-express-for-big-data-multiple-vulnerabilities/download/",
        "exploit_id": "47313",
        "exploit_description": "\"Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities\"",
        "exploit_date": "2019-08-21",
        "exploit_author": "\"Pedro Ribeiro\"",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47309/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47309/41673/outlook-password-recovery-210-denial-of-service/download/",
        "exploit_id": "47309",
        "exploit_description": "\"Outlook Password Recovery 2.10 - Denial of Service\"",
        "exploit_date": "2019-08-28",
        "exploit_author": "\"Velayutham Selvaraj_ Praveen Thiyagarayam\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47308/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47308/41672/tableau-xml-external-entity/download/",
        "exploit_id": "47308",
        "exploit_description": "\"Tableau - XML External Entity\"",
        "exploit_date": "2019-08-27",
        "exploit_author": "\"Jarad Kopf\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47306/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47306/41671/windows-10-set-reparse-point-ex-mount-point-security-feature-bypass/download/",
        "exploit_id": "47306",
        "exploit_description": "\"Windows 10 - SET_REPARSE_POINT_EX Mount Point Security Feature Bypass\"",
        "exploit_date": "2019-08-26",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47305/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47305/41670/openitcockpit-361-2-cross-site-request-forgery/download/",
        "exploit_id": "47305",
        "exploit_description": "\"openITCOCKPIT 3.6.1-2 - Cross-Site Request Forgery\"",
        "exploit_date": "2019-08-26",
        "exploit_author": "\"Julian Rittweger\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47304/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47304/41669/wordpress-plugin-userpro-4932-cross-site-scripting/download/",
        "exploit_id": "47304",
        "exploit_description": "\"WordPress Plugin UserPro 4.9.32 - Cross-Site Scripting\"",
        "exploit_date": "2019-08-26",
        "exploit_author": "\"Damian Ebelties\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47303/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47303/41668/wordpress-plugin-import-export-wordpress-users-131-csv-injection/download/",
        "exploit_id": "47303",
        "exploit_description": "\"WordPress Plugin Import Export WordPress Users 1.3.1 - CSV Injection\"",
        "exploit_date": "2019-08-26",
        "exploit_author": "\"Javier Olmedo\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47302/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47302/41667/lsoft-listserv-165-2018a-cross-site-scripting/download/",
        "exploit_id": "47302",
        "exploit_description": "\"LSoft ListServ < 16.5-2018a - Cross-Site Scripting\"",
        "exploit_date": "2019-08-26",
        "exploit_author": "MTK",
        "exploit_type": "webapps",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47307/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47307/41666/exim-487-491-local-privilege-escalation-metasploit/download/",
        "exploit_id": "47307",
        "exploit_description": "\"Exim 4.87 / 4.91 - Local Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-08-26",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47301/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47301/41665/nimble-streamer-302-2-354-9-directory-traversal/download/",
        "exploit_id": "47301",
        "exploit_description": "\"Nimble Streamer 3.0.2-2 < 3.5.4-9 - Directory Traversal\"",
        "exploit_date": "2019-08-23",
        "exploit_author": "MaYaSeVeN",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47297/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47297/41664/pulse-secure-81r151828390-ssl-vpn-arbitrary-file-disclosure-metasploit/download/",
        "exploit_id": "47297",
        "exploit_description": "\"Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit)\"",
        "exploit_date": "2019-08-21",
        "exploit_author": "\"Alyssa Herrera\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47298/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47298/41663/libreoffice-626-macro-python-code-execution-metasploit/download/",
        "exploit_id": "47298",
        "exploit_description": "\"LibreOffice < 6.2.6 Macro - Python Code Execution (Metasploit)\"",
        "exploit_date": "2019-08-21",
        "exploit_author": "LoadLow",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47295/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47295/41662/wordpress-add-mime-types-plugin-221-cross-site-request-forgery/download/",
        "exploit_id": "47295",
        "exploit_description": "\"WordPress Add Mime Types Plugin 2.2.1 - Cross-Site Request Forgery\"",
        "exploit_date": "2019-08-20",
        "exploit_author": "\"Princy Edward\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47197/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47197/41661/silvershield-6x-local-privilege-escalation/download/",
        "exploit_id": "47197",
        "exploit_description": "\"SilverSHielD 6.x - Local Privilege Escalation\"",
        "exploit_date": "2019-08-01",
        "exploit_author": "\"Ian Bredemeyer\"",
        "exploit_type": "local",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47294/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47294/41660/youphptube-72-usercreatejsonphp-sql-injection/download/",
        "exploit_id": "47294",
        "exploit_description": "\"YouPHPTube 7.2 - 'userCreate.json.php' SQL Injection\"",
        "exploit_date": "2019-08-19",
        "exploit_author": "\"Fabian Mosch\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47293/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47293/41659/webmin-1920-remote-code-execution/download/",
        "exploit_id": "47293",
        "exploit_description": "\"Webmin 1.920 - Remote Code Execution\"",
        "exploit_date": "2019-08-19",
        "exploit_author": "\"Fernando A. Lagos B\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47289/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47289/41658/neo-billing-35-persistent-cross-site-scripting/download/",
        "exploit_id": "47289",
        "exploit_description": "\"Neo Billing 3.5 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-08-19",
        "exploit_author": "n1x_",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47288/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47288/41657/fortios-563-567-fortios-600-604-credentials-disclosure/download/",
        "exploit_id": "47288",
        "exploit_description": "\"FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure\"",
        "exploit_date": "2019-08-19",
        "exploit_author": "\"Carlos E. Vieira\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47287/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47287/41656/fortios-563-567-fortios-600-604-credentials-disclosure-metasploit/download/",
        "exploit_id": "47287",
        "exploit_description": "\"FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure (Metasploit)\"",
        "exploit_date": "2019-08-19",
        "exploit_author": "\"Carlos E. Vieira\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47286/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47286/41655/kimai-2-persistent-cross-site-scripting/download/",
        "exploit_id": "47286",
        "exploit_description": "\"Kimai 2 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-08-19",
        "exploit_author": "osamaalaa",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47285/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47285/41654/rar-password-recovery-180-user-name-and-registration-code-denial-of-service/download/",
        "exploit_id": "47285",
        "exploit_description": "\"RAR Password Recovery 1.80 - 'User Name and Registration Code' Denial of Service\"",
        "exploit_date": "2019-08-19",
        "exploit_author": "Achilles",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47284/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47284/41653/web-wiz-forums-1201-pf-sql-injection/download/",
        "exploit_id": "47284",
        "exploit_description": "\"Web Wiz Forums 12.01 - 'PF' SQL Injection\"",
        "exploit_date": "2019-08-16",
        "exploit_author": "n1x_",
        "exploit_type": "webapps",
        "exploit_platform": "asp",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47283/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47283/41652/integria-ims-5086-arbitrary-file-upload/download/",
        "exploit_id": "47283",
        "exploit_description": "\"Integria IMS 5.0.86 - Arbitrary File Upload\"",
        "exploit_date": "2019-08-16",
        "exploit_author": "Greg.Priest",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47281/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47281/41651/joomla-component-com-jsjobs-126-arbitrary-file-deletion/download/",
        "exploit_id": "47281",
        "exploit_description": "\"Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion\"",
        "exploit_date": "2019-08-16",
        "exploit_author": "qw3rTyTy",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47280/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47280/41650/eyesofnetwork-51-authenticated-remote-command-execution/download/",
        "exploit_id": "47280",
        "exploit_description": "\"EyesOfNetwork 5.1 - Authenticated Remote Command Execution\"",
        "exploit_date": "2019-08-16",
        "exploit_author": "\"Nassim Asrir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47282/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47282/41649/getgo-download-manager-6223300-denial-of-service/download/",
        "exploit_id": "47282",
        "exploit_description": "\"GetGo Download Manager 6.2.2.3300 - Denial of Service\"",
        "exploit_date": "2019-08-16",
        "exploit_author": "\"Malav Vyas\"",
        "exploit_type": "dos",
        "exploit_platform": "windows_x86-64",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47258/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47258/41648/microsoft-windows-text-services-framework-msctf-multiple-vulnerabilities/download/",
        "exploit_id": "47258",
        "exploit_description": "\"Microsoft Windows Text Services Framework MSCTF - Multiple Vulnerabilities\"",
        "exploit_date": "2019-08-15",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    }
]