Return a list of all the existing exploits.

GET /api/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 41041,
    "next": "http://www.nmmapper.com/api/exploits/?page=2",
    "previous": null,
    "results": [
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46593/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46593/41041/inout-article-base-cms-sql-injection/download/",
            "exploit_id": "46593",
            "exploit_description": "\"Inout Article Base CMS - SQL Injection\"",
            "exploit_date": "2019-03-22",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46592/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46592/41040/meeplace-business-review-script-id-sql-injection/download/",
            "exploit_id": "46592",
            "exploit_description": "\"Meeplace Business Review Script - 'id' SQL Injection\"",
            "exploit_date": "2019-03-22",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46591/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46591/41039/matri4web-matrimony-website-script-multiple-sql-injection/download/",
            "exploit_id": "46591",
            "exploit_description": "\"Matri4Web Matrimony Website Script - Multiple SQL Injection\"",
            "exploit_date": "2019-03-22",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46594/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46594/41038/snap-seccomp-bblacklist-for-tiocsti-can-be-circumvented/download/",
            "exploit_id": "46594",
            "exploit_description": "\"snap - seccomp BBlacklist for TIOCSTI can be Circumvented\"",
            "exploit_date": "2019-03-22",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46590/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46590/41037/bootstrapy-cms-multiple-sql-injection/download/",
            "exploit_id": "46590",
            "exploit_description": "\"Bootstrapy CMS - Multiple SQL Injection\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46588/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46588/41036/placeto-cms-alpha-v4-page-sql-injection/download/",
            "exploit_id": "46588",
            "exploit_description": "\"Placeto CMS Alpha v4 - 'page' SQL Injection\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "\"Abdullah Çelebi\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46587/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46587/41035/uhotelbooking-system-system_page-sql-injection/download/",
            "exploit_id": "46587",
            "exploit_description": "\"uHotelBooking System - 'system_page' SQL Injection\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46586/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46586/41034/the-company-business-website-cms-multiple-vulnerabilities/download/",
            "exploit_id": "46586",
            "exploit_description": "\"The Company Business Website CMS - Multiple Vulnerabilities\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46585/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46585/41033/rails-521-arbitrary-file-content-disclosure/download/",
            "exploit_id": "46585",
            "exploit_description": "\"Rails 5.2.1 - Arbitrary File Content Disclosure\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "NotoriousRebel",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46583/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46583/41032/netartmedia-vlog-system-email-sql-injection/download/",
            "exploit_id": "46583",
            "exploit_description": "\"Netartmedia Vlog System - 'email' SQL Injection\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46584/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46584/41031/dvd-x-player-553-plf-buffer-overflow/download/",
            "exploit_id": "46584",
            "exploit_description": "\"DVD X Player 5.5.3 - '.plf' Buffer Overflow\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "\"Paolo Perego\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46589/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46589/41030/canarytokens-2019-03-01-detection-bypass/download/",
            "exploit_id": "46589",
            "exploit_description": "\"Canarytokens 2019-03-01 - Detection Bypass\"",
            "exploit_date": "2019-03-21",
            "exploit_author": "\"Gionathan Reale\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46582/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46582/41029/netartmedia-deals-portal-email-sql-injection/download/",
            "exploit_id": "46582",
            "exploit_description": "\"Netartmedia Deals Portal - 'Email' SQL Injection\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46581/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46581/41028/plc-wireless-router-gpn24p21-c-cn-cross-site-request-forgery/download/",
            "exploit_id": "46581",
            "exploit_description": "\"PLC Wireless Router GPN2.4P21-C-CN - Cross-Site Request Forgery\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Kumar Saurav\"",
            "exploit_type": "webapps",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46580/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46580/41027/plc-wireless-router-gpn24p21-c-cn-incorrect-access-control/download/",
            "exploit_id": "46580",
            "exploit_description": "\"PLC Wireless Router GPN2.4P21-C-CN - Incorrect Access Control\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Kumar Saurav\"",
            "exploit_type": "webapps",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46579/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46579/41026/202cms-v10beta-multiple-sql-injection/download/",
            "exploit_id": "46579",
            "exploit_description": "\"202CMS v10beta - Multiple SQL Injection\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46577/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46577/41025/netartmedia-php-business-directory-42-sql-injection/download/",
            "exploit_id": "46577",
            "exploit_description": "\"Netartmedia PHP Business Directory 4.2 - SQL Injection\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46576/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46576/41024/netartmedia-php-dating-site-sql-injection/download/",
            "exploit_id": "46576",
            "exploit_description": "\"Netartmedia PHP Dating Site - SQL Injection\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46575/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46575/41023/netartmedia-jobs-portal-61-sql-injection/download/",
            "exploit_id": "46575",
            "exploit_description": "\"Netartmedia Jobs Portal 6.1 - SQL Injection\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46574/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46574/41022/netartmedia-php-real-estate-agency-40-sql-injection/download/",
            "exploit_id": "46574",
            "exploit_description": "\"Netartmedia PHP Real Estate Agency 4.0 - SQL Injection\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46573/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46573/41021/netartmedia-php-car-dealer-sql-injection/download/",
            "exploit_id": "46573",
            "exploit_description": "\"Netartmedia PHP Car Dealer - SQL Injection\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46578/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46578/41020/netsharewatcher-1580-local-seh-buffer-overflow/download/",
            "exploit_id": "46578",
            "exploit_description": "\"NetShareWatcher 1.5.8.0 - Local SEH Buffer Overflow\"",
            "exploit_date": "2019-03-20",
            "exploit_author": "\"Peyman Forouzan\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46563/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46563/41019/netartmedia-real-estate-portal-50-sql-injection/download/",
            "exploit_id": "46563",
            "exploit_description": "\"Netartmedia Real Estate Portal 5.0 - SQL Injection\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46562/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46562/41018/netartmedia-php-mall-41-sql-injection/download/",
            "exploit_id": "46562",
            "exploit_description": "\"Netartmedia PHP Mall 4.1 - SQL Injection\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46560/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46560/41017/netartmedia-event-portal-20-email-sql-injection/download/",
            "exploit_id": "46560",
            "exploit_description": "\"Netartmedia Event Portal 2.0 - 'Email' SQL Injection\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46559/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46559/41016/endonesia-portal-87-multiple-vulnerabilities/download/",
            "exploit_id": "46559",
            "exploit_description": "\"eNdonesia Portal 8.7 - Multiple Vulnerabilities\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46558/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46558/41015/mybb-upcoming-events-plugin-132-cross-site-scripting/download/",
            "exploit_id": "46558",
            "exploit_description": "\"MyBB Upcoming Events Plugin 1.32 - Cross-Site Scripting\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "0xB9",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46557/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46557/41014/gila-cms-191-cross-site-scripting/download/",
            "exploit_id": "46557",
            "exploit_description": "\"Gila CMS 1.9.1 - Cross-Site Scripting\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Ahmet Ümit BAYRAM\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46572/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46572/41013/jenkins-2137-and-pipeline-groovy-plugin-261-acl-bypass-and-metaprogramming-rce-metasploit/download/",
            "exploit_id": "46572",
            "exploit_description": "\"Jenkins 2.137 and Pipeline Groovy Plugin 2.61 - ACL Bypass and Metaprogramming RCE (Metasploit)\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "Metasploit",
            "exploit_type": "remote",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46561/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46561/41012/advanced-host-monitor-1192-beta-local-buffer-overflow/download/",
            "exploit_id": "46561",
            "exploit_description": "\"Advanced Host Monitor 11.92 beta - Local Buffer Overflow\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Peyman Forouzan\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46571/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46571/41011/google-chrome-m73-filesystemoperationrunner-use-after-free/download/",
            "exploit_id": "46571",
            "exploit_description": "\"Google Chrome < M73 - FileSystemOperationRunner Use-After-Free\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46570/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46570/41010/google-chrome-m73-midimanagerwin-use-after-free/download/",
            "exploit_id": "46570",
            "exploit_description": "\"Google Chrome < M73 - MidiManagerWin Use-After-Free\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46569/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46569/41009/microsoft-edge-flash-click2play-bypass-with-cobjectelementfinalcreateobject/download/",
            "exploit_id": "46569",
            "exploit_description": "\"Microsoft Edge - Flash click2play Bypass with CObjectElement::FinalCreateObject\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46568/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46568/41008/microsoft-vbscript-vbserase-memory-corruption/download/",
            "exploit_id": "46568",
            "exploit_description": "\"Microsoft VBScript - VbsErase Memory Corruption\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46567/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46567/41007/microsoft-internet-explorer-11-vbscript-execution-policy-bypass-in-mshtml/download/",
            "exploit_id": "46567",
            "exploit_description": "\"Microsoft Internet Explorer 11 - VBScript Execution Policy Bypass in MSHTML\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46566/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46566/41006/google-chrome-m73-data-race-in-extensionsguestviewmessagefilter/download/",
            "exploit_id": "46566",
            "exploit_description": "\"Google Chrome < M73 - Data Race in ExtensionsGuestViewMessageFilter\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46565/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46565/41005/google-chrome-m73-double-destruction-race-in-storagepartitionservice/download/",
            "exploit_id": "46565",
            "exploit_description": "\"Google Chrome < M73 - Double-Destruction Race in StoragePartitionService\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46564/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46564/41004/libseccomp-240-incorrect-compilation-of-arithmetic-comparisons/download/",
            "exploit_id": "46564",
            "exploit_description": "\"libseccomp < 2.4.0 - Incorrect Compilation of Arithmetic Comparisons\"",
            "exploit_date": "2019-03-19",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46555/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46555/41003/thecarproject-v2-multiple-sql-injection/download/",
            "exploit_id": "46555",
            "exploit_description": "\"TheCarProject v2 - Multiple SQL Injection\"",
            "exploit_date": "2019-03-18",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46556/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46556/41002/bmc-patrol-agent-privilege-escalation-code-execution-execution-metasploit/download/",
            "exploit_id": "46556",
            "exploit_description": "\"BMC Patrol Agent - Privilege Escalation Code Execution Execution (Metasploit)\"",
            "exploit_date": "2019-03-18",
            "exploit_author": "Metasploit",
            "exploit_type": "remote",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46554/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46554/41001/winavi-ipod3gpmp4psp-converter-442-denial-of-service/download/",
            "exploit_id": "46554",
            "exploit_description": "\"WinAVI iPod/3GP/MP4/PSP Converter 4.4.2 - Denial of Service\"",
            "exploit_date": "2019-03-18",
            "exploit_author": "Achilles",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46553/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46553/41000/winmpg-video-convert-935-denial-of-service/download/",
            "exploit_id": "46553",
            "exploit_description": "\"WinMPG Video Convert 9.3.5 - Denial of Service\"",
            "exploit_date": "2019-03-18",
            "exploit_author": "Achilles",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46551/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46551/40999/moodle-341-remote-code-execution/download/",
            "exploit_id": "46551",
            "exploit_description": "\"Moodle 3.4.1 - Remote Code Execution\"",
            "exploit_date": "2019-03-15",
            "exploit_author": "\"Darryn Ten\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46550/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46550/40998/laundry-cms-multiple-vulnerabilities/download/",
            "exploit_id": "46550",
            "exploit_description": "\"Laundry CMS - Multiple Vulnerabilities\"",
            "exploit_date": "2019-03-15",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46549/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46549/40997/vembu-storegrid-web-interface-440-multiple-vulnerabilities/download/",
            "exploit_id": "46549",
            "exploit_description": "\"Vembu Storegrid Web Interface 4.4.0 - Multiple Vulnerabilities\"",
            "exploit_date": "2019-03-15",
            "exploit_author": "\"Gionathan Reale\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46548/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46548/40996/ice-hrm-230-multiple-vulnerabilities/download/",
            "exploit_id": "46548",
            "exploit_description": "\"ICE HRM 23.0 - Multiple Vulnerabilities\"",
            "exploit_date": "2019-03-15",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46546/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46546/40995/cms-made-simple-showtime2-module-362-authenticated-arbitrary-file-upload/download/",
            "exploit_id": "46546",
            "exploit_description": "\"CMS Made Simple Showtime2 Module 3.6.2 - (Authenticated) Arbitrary File Upload\"",
            "exploit_date": "2019-03-15",
            "exploit_author": "\"Daniele Scanu\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46545/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46545/40994/netdata-1130-html-injection/download/",
            "exploit_id": "46545",
            "exploit_description": "\"NetData 1.13.0 - HTML Injection\"",
            "exploit_date": "2019-03-15",
            "exploit_author": "s4vitar",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46547/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46547/40993/mail-carrier-251-mail-from-buffer-overflow/download/",
            "exploit_id": "46547",
            "exploit_description": "\"Mail Carrier 2.5.1 - 'MAIL FROM' Buffer Overflow\"",
            "exploit_date": "2019-03-15",
            "exploit_author": "\"Joseph McDonagh\"",
            "exploit_type": "remote",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46552/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46552/40992/winrar-561-path-traversal/download/",
            "exploit_id": "46552",
            "exploit_description": "\"WinRAR 5.61 - Path Traversal\"",
            "exploit_date": "2019-02-22",
            "exploit_author": "WyAtu",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46542/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46542/40991/pegasus-cms-10-extra_fieldsphp-plugin-remote-code-execution/download/",
            "exploit_id": "46542",
            "exploit_description": "\"Pegasus CMS 1.0 - 'extra_fields.php' Plugin Remote Code Execution\"",
            "exploit_date": "2019-03-14",
            "exploit_author": "R3zk0n",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46541/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46541/40990/intel-modular-server-system-1018-cross-site-request-forgery-change-admin-password/download/",
            "exploit_id": "46541",
            "exploit_description": "\"Intel Modular Server System 10.18 - Cross-Site Request Forgery (Change Admin Password)\"",
            "exploit_date": "2019-03-14",
            "exploit_author": "LiquidWorm",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46544/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46544/40989/apache-uno-libreoffice-version-612-openoffice-416-api-remote-code-execution/download/",
            "exploit_id": "46544",
            "exploit_description": "\"Apache UNO / LibreOffice Version: 6.1.2 / OpenOffice 4.1.6 API - Remote Code Execution\"",
            "exploit_date": "2019-03-14",
            "exploit_author": "sud0woodo",
            "exploit_type": "remote",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46543/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46543/40988/ftpgetter-standard-5970177-remote-code-execution/download/",
            "exploit_id": "46543",
            "exploit_description": "\"FTPGetter Standard 5.97.0.177 - Remote Code Execution\"",
            "exploit_date": "2019-03-14",
            "exploit_author": "w4fz5uck5",
            "exploit_type": "remote",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46538/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46538/40987/pfsense-244-p1-haproxy-package-059_14-persistent-cross-site-scripting/download/",
            "exploit_id": "46538",
            "exploit_description": "\"pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "\"Gionathan Reale\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46537/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46537/40986/wordpress-plugin-gracemedia-media-player-10-local-file-inclusion/download/",
            "exploit_id": "46537",
            "exploit_description": "\"WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "\"Manuel García Cárdenas\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46540/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46540/40985/apache-tika-server-118-command-injection/download/",
            "exploit_id": "46540",
            "exploit_description": "\"Apache Tika-server < 1.18 - Command Injection\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "\"Rhino Security Labs\"",
            "exploit_type": "remote",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46539/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46539/40984/elfinder-php-connector-2148-exiftran-command-injection-metasploit/download/",
            "exploit_id": "46539",
            "exploit_description": "\"elFinder PHP Connector < 2.1.48 - exiftran Command Injection (Metasploit)\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "Metasploit",
            "exploit_type": "remote",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46536/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46536/40983/microsoft-windows-mshtml-engine-_edit_-remote-code-execution/download/",
            "exploit_id": "46536",
            "exploit_description": "\"Microsoft Windows MSHTML Engine - _Edit_ Remote Code Execution\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "\"Eduardo Braun Prado\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46535/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46535/40982/core-ftp-server-ftp-sftp-server-v2-build-674-size-directory-traversal/download/",
            "exploit_id": "46535",
            "exploit_description": "\"Core FTP Server FTP / SFTP Server v2 Build 674 - 'SIZE' Directory Traversal\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "\"Kevin Randall\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46534/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46534/40981/core-ftp-server-ftp-sftp-server-v2-build-674-mdtm-directory-traversal/download/",
            "exploit_id": "46534",
            "exploit_description": "\"Core FTP Server FTP / SFTP Server v2 Build 674 - 'MDTM' Directory Traversal\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "\"Kevin Randall\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46533/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46533/40980/microsoft-windows-reg-file-dialog-box-message-spoofing/download/",
            "exploit_id": "46533",
            "exploit_description": "\"Microsoft Windows - .reg File / Dialog Box Message Spoofing\"",
            "exploit_date": "2019-03-13",
            "exploit_author": "hyp3rlinx",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46531/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46531/40979/piluscart-141-cross-site-request-forgery-add-admin/download/",
            "exploit_id": "46531",
            "exploit_description": "\"PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)\"",
            "exploit_date": "2019-03-12",
            "exploit_author": "\"Gionathan Reale\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46528/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46528/40978/flexpaper-php-publish-service-236-remote-code-execution/download/",
            "exploit_id": "46528",
            "exploit_description": "\"Flexpaper PHP Publish Service 2.3.6 - Remote Code Execution\"",
            "exploit_date": "2019-03-11",
            "exploit_author": "redtimmysec",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46527/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46527/40977/prtg-network-monitor-18238-authenticated-remote-code-execution/download/",
            "exploit_id": "46527",
            "exploit_description": "\"PRTG Network Monitor 18.2.38 - Authenticated Remote Code Execution\"",
            "exploit_date": "2019-03-11",
            "exploit_author": "M4LV0",
            "exploit_type": "webapps",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46526/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46526/40976/openkm-632-637-remote-command-execution-metasploit/download/",
            "exploit_id": "46526",
            "exploit_description": "\"OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit)\"",
            "exploit_date": "2019-03-11",
            "exploit_author": "AkkuS",
            "exploit_type": "webapps",
            "exploit_platform": "jsp",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46525/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46525/40975/liferay-ce-portal-712-ga3-remote-command-execution-metasploit/download/",
            "exploit_id": "46525",
            "exploit_description": "\"Liferay CE Portal < 7.1.2 ga3 - Remote Command Execution (Metasploit)\"",
            "exploit_date": "2019-03-11",
            "exploit_author": "AkkuS",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46530/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46530/40974/netsetman-471-local-buffer-overflow-seh-unicode/download/",
            "exploit_id": "46530",
            "exploit_description": "\"NetSetMan 4.7.1 - Local Buffer Overflow (SEH Unicode)\"",
            "exploit_date": "2019-03-11",
            "exploit_author": "\"Devin Casadey\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46522/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46522/40973/sony-playstation-4-ps4-620-webkit-code-execution-poc/download/",
            "exploit_id": "46522",
            "exploit_description": "\"Sony Playstation 4 (PS4) < 6.20 - WebKit Code Execution (PoC)\"",
            "exploit_date": "2019-03-08",
            "exploit_author": "Specter",
            "exploit_type": "local",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46532/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46532/40972/core-ftp-20-build-653-pbsz-denial-of-service-poc/download/",
            "exploit_id": "46532",
            "exploit_description": "\"Core FTP 2.0 build 653 - 'PBSZ' Denial of Service (PoC)\"",
            "exploit_date": "2019-03-12",
            "exploit_author": "Hodorsec",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46529/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46529/40971/linux-kernel-44-ubuntu-1604-snd_timer_user_ccallback-kernel-pointer-leak/download/",
            "exploit_id": "46529",
            "exploit_description": "\"Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak\"",
            "exploit_date": "2019-03-11",
            "exploit_author": "wally0813",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46520/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46520/40970/directadmin-155-cmd_account_admin-cross-site-request-forgery/download/",
            "exploit_id": "46520",
            "exploit_description": "\"DirectAdmin 1.55 - 'CMD_ACCOUNT_ADMIN' Cross-Site Request Forgery\"",
            "exploit_date": "2019-03-08",
            "exploit_author": "ManhNho",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46518/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46518/40969/mcafee-epo-591-registered-executable-local-access-bypass/download/",
            "exploit_id": "46518",
            "exploit_description": "\"McAfee ePO 5.9.1 - Registered Executable Local Access Bypass\"",
            "exploit_date": "2019-03-08",
            "exploit_author": "leonjza",
            "exploit_type": "webapps",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46517/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46517/40968/orientdb-3017-ga-community-edition-cross-site-request-forgery-cross-site-scripting/download/",
            "exploit_id": "46517",
            "exploit_description": "\"OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting\"",
            "exploit_date": "2019-03-08",
            "exploit_author": "\"Ozer Goker\"",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46512/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46512/40967/phpbb-323-remote-code-execution/download/",
            "exploit_id": "46512",
            "exploit_description": "\"phpBB 3.2.3  - Remote Code Execution\"",
            "exploit_date": "2019-12-12",
            "exploit_author": "allyshka",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46511/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46511/40966/wordpress-core-50-remote-code-execution/download/",
            "exploit_id": "46511",
            "exploit_description": "\"WordPress Core 5.0 - Remote Code Execution\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "allyshka",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46505/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46505/40965/kados-r10-greenbee-multiple-sql-injection/download/",
            "exploit_id": "46505",
            "exploit_description": "\"Kados R10 GreenBee - Multiple SQL Injection\"",
            "exploit_date": "2019-03-07",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46500/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46500/40964/opendocman-134-searchphp-where-sql-injection/download/",
            "exploit_id": "46500",
            "exploit_description": "\"OpenDocMan 1.3.4 - 'search.php where' SQL Injection\"",
            "exploit_date": "2019-03-05",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46516/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46516/40963/openssh-scp-client-write-arbitrary-files/download/",
            "exploit_id": "46516",
            "exploit_description": "\"OpenSSH SCP Client - Write Arbitrary Files\"",
            "exploit_date": "2019-01-11",
            "exploit_author": "\"Harry Sintonen\"",
            "exploit_type": "remote",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46514/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46514/40962/teamcity-902-disabled-registration-bypass/download/",
            "exploit_id": "46514",
            "exploit_description": "\"TeamCity < 9.0.2 - Disabled Registration Bypass\"",
            "exploit_date": "2018-03-28",
            "exploit_author": "allyshka",
            "exploit_type": "remote",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46513/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46513/40961/oracle-weblogic-server-deserialization-remote-command-execution-patch-bypass/download/",
            "exploit_id": "46513",
            "exploit_description": "\"Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)\"",
            "exploit_date": "2019-10-25",
            "exploit_author": "allyshka",
            "exploit_type": "remote",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46510/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46510/40960/drupal-8511-8610-restful-web-services-unserialize-remote-command-execution-metasploit/download/",
            "exploit_id": "46510",
            "exploit_description": "\"Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)\"",
            "exploit_date": "2019-03-07",
            "exploit_author": "Metasploit",
            "exploit_type": "remote",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46509/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46509/40959/imperva-securesphere-13x-pws-command-injection-metasploit/download/",
            "exploit_id": "46509",
            "exploit_description": "\"Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit)\"",
            "exploit_date": "2019-03-07",
            "exploit_author": "Metasploit",
            "exploit_type": "remote",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46506/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46506/40958/qnap-ts-431-qts-422-remote-command-execution-metasploit/download/",
            "exploit_id": "46506",
            "exploit_description": "\"QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)\"",
            "exploit_date": "2019-03-07",
            "exploit_author": "AkkuS",
            "exploit_type": "remote",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46501/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46501/40957/java-debug-wire-protocol-jdwp-remote-code-execution/download/",
            "exploit_id": "46501",
            "exploit_description": "\"Java Debug Wire Protocol (JDWP) - Remote Code Execution\"",
            "exploit_date": "2016-12-20",
            "exploit_author": "IOactive",
            "exploit_type": "remote",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46508/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46508/40956/freebsd-intel-sysret-privilege-escalation-metasploit/download/",
            "exploit_id": "46508",
            "exploit_description": "\"FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)\"",
            "exploit_date": "2019-03-07",
            "exploit_author": "Metasploit",
            "exploit_type": "local",
            "exploit_platform": "freebsd_x86-64",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46507/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46507/40955/anyburn-43-x86-copy-disc-to-image-file-buffer-overflow-unicode-seh/download/",
            "exploit_id": "46507",
            "exploit_description": "\"Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH)\"",
            "exploit_date": "2019-03-07",
            "exploit_author": "Hodorsec",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46504/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46504/40954/android-getpidcon-usage-in-hardware-binder-servicemanager-permits-acl-bypass/download/",
            "exploit_id": "46504",
            "exploit_description": "\"Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass\"",
            "exploit_date": "2019-03-06",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "android",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46503/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46503/40953/android-binder-use-after-free-via-racy-initialization-of-allow_user_free/download/",
            "exploit_id": "46503",
            "exploit_description": "\"Android - binder Use-After-Free via racy Initialization of ->allow_user_free\"",
            "exploit_date": "2019-03-06",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "android",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46502/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46502/40952/linux-42014-virtual-address-0-is-mappable-via-privileged-write-to-procmem/download/",
            "exploit_id": "46502",
            "exploit_description": "\"Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem\"",
            "exploit_date": "2019-03-06",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46498/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46498/40951/fiberhome-an5506-04-f-rp2669-persistent-cross-site-scripting/download/",
            "exploit_id": "46498",
            "exploit_description": "\"Fiberhome AN5506-04-F RP2669 - Persistent Cross-Site Scripting\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "Tauco",
            "exploit_type": "webapps",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46497/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46497/40950/wordpress-plugin-cerber-security_-antispam-malware-scan-80-multiple-bypass-vulnerabilities/download/",
            "exploit_id": "46497",
            "exploit_description": "\"WordPress Plugin Cerber Security_ Antispam & Malware Scan 8.0 - Multiple Bypass Vulnerabilities\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "ed0x21son",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46496/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46496/40949/craft-cms-3112-pro-cross-site-scripting/download/",
            "exploit_id": "46496",
            "exploit_description": "\"Craft CMS 3.1.12 Pro - Cross-Site Scripting\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Ismail Tasdelen\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46495/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46495/40948/bolt-cms-364-cross-site-scripting/download/",
            "exploit_id": "46495",
            "exploit_description": "\"Bolt CMS 3.6.4 - Cross-Site Scripting\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Ismail Tasdelen\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46494/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46494/40947/marcomcentral-fusionpro-vdp-creator-100-directory-traversal/download/",
            "exploit_id": "46494",
            "exploit_description": "\"MarcomCentral FusionPro VDP Creator < 10.0 - Directory Traversal\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "0v3rride",
            "exploit_type": "webapps",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46481/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46481/40946/elfinder-2147-command-injection-vulnerability-in-the-php-connector/download/",
            "exploit_id": "46481",
            "exploit_description": "\"elFinder 2.1.47 - Command Injection vulnerability in the PHP connector\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "q3rv0",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46480/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46480/40945/cmssite-10-multiple-cross-site-request-forgery/download/",
            "exploit_id": "46480",
            "exploit_description": "\"CMSsite 1.0 - Multiple Cross-Site Request Forgery\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46483/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46483/40944/oop-cms-blog-10-multiple-cross-site-request-forgery/download/",
            "exploit_id": "46483",
            "exploit_description": "\"OOP CMS BLOG 1.0 - Multiple Cross-Site Request Forgery\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46482/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46482/40943/oop-cms-blog-10-multiple-sql-injection/download/",
            "exploit_id": "46482",
            "exploit_description": "\"OOP CMS BLOG 1.0 - Multiple SQL Injection\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46486/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46486/40942/booked-scheduler-275-remote-command-execution-metasploit/download/",
            "exploit_id": "46486",
            "exploit_description": "\"Booked Scheduler 2.7.5 - Remote Command Execution (Metasploit)\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "AkkuS",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46487/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46487/40941/splunk-enterprise-724-custom-app-rce-persistent-backdoor-custom-binary-payload/download/",
            "exploit_id": "46487",
            "exploit_description": "\"Splunk Enterprise 7.2.4 - Custom App RCE (Persistent Backdoor - Custom Binary Payload)\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Matteo Malvica\"",
            "exploit_type": "webapps",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46488/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46488/40940/zzzphp-cms-161-cross-site-request-forgery/download/",
            "exploit_id": "46488",
            "exploit_description": "\"zzzphp CMS 1.6.1 - Cross-Site Request Forgery\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Yang Chenglong\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46489/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46489/40939/raisecom-xpon-iscomht803g-u_200_140521_r4147002-remote-code-execution/download/",
            "exploit_id": "46489",
            "exploit_description": "\"Raisecom  XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 - Remote Code Execution\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "JameelNabbo",
            "exploit_type": "webapps",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/45496/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/45496/40938/stopzilla-antimalware-65259-privilege-escalation-2/download/",
            "exploit_id": "45496",
            "exploit_description": "\"STOPzilla AntiMalware 6.5.2.59 - Privilege Escalation (2)\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Ivan Ivanovic\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46469/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46469/40937/alcatel-lucent-nokia-gpon-i-240w-q-buffer-overflow/download/",
            "exploit_id": "46469",
            "exploit_description": "\"Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "\"Artem Metla\"",
            "exploit_type": "dos",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46484/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46484/40936/filezilla-3400-local-search-local-site-denial-of-service-poc/download/",
            "exploit_id": "46484",
            "exploit_description": "\"FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC)\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46485/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46485/40935/microsoft-edge-chakra-1114-read-permission-via-type-confusion/download/",
            "exploit_id": "46485",
            "exploit_description": "\"Microsoft Edge Chakra 1.11.4 - Read Permission via Type Confusion\"",
            "exploit_date": "2019-03-04",
            "exploit_author": "\"Fahad Aid Alharbi\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46479/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46479/40934/cisco-webex-meetings-3366-3391-privilege-escalation/download/",
            "exploit_id": "46479",
            "exploit_description": "\"Cisco WebEx Meetings < 33.6.6 / < 33.9.1 - Privilege Escalation\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "SecureAuth",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46478/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46478/40933/macos-xnu-copy-on-write-behavior-bypass-via-mount-of-user-owned-filesystem-image/download/",
            "exploit_id": "46478",
            "exploit_description": "\"macOS XNU - Copy-on-Write Behavior Bypass via Mount of User-Owned Filesystem Image\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "macos",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46477/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46477/40932/linux-414103-41925-out-of-bounds-read-and-write-in-snmp-nat-module/download/",
            "exploit_id": "46477",
            "exploit_description": "\"Linux < 4.14.103 / < 4.19.25 - Out-of-Bounds Read and Write in SNMP NAT Module\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46476/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46476/40931/tcpdump-493-multiple-heap-based-out-of-bounds-reads/download/",
            "exploit_id": "46476",
            "exploit_description": "\"tcpdump < 4.9.3 - Multiple Heap-Based Out-of-Bounds Reads\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46475/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46475/40930/google-chrome-m72-filewriterimpl-use-after-free/download/",
            "exploit_id": "46475",
            "exploit_description": "\"Google Chrome < M72 - FileWriterImpl Use-After-Free\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46474/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46474/40929/google-chrome-m72-use-after-free-in-renderprocesshostimpl-binding-for-p2psocketdispatcherhost/download/",
            "exploit_id": "46474",
            "exploit_description": "\"Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46473/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46473/40928/google-chrome-m72-renderframehostimplcreatemediastreamdispatcherhost-use-after-free/download/",
            "exploit_id": "46473",
            "exploit_description": "\"Google Chrome < M72 - RenderFrameHostImpl::CreateMediaStreamDispatcherHost Use-After-Free\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46472/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46472/40927/google-chrome-m72-paymentrequest-service-use-after-free/download/",
            "exploit_id": "46472",
            "exploit_description": "\"Google Chrome < M72 - PaymentRequest Service Use-After-Free\"",
            "exploit_date": "2019-03-01",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46471/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46471/40926/feng-office-3705-remote-command-execution-metasploit/download/",
            "exploit_id": "46471",
            "exploit_description": "\"Feng Office 3.7.0.5 - Remote Command Execution (Metasploit)\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "AkkuS",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46468/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46468/40925/usermin-1750-remote-command-execution-metasploit/download/",
            "exploit_id": "46468",
            "exploit_description": "\"Usermin 1.750 - Remote Command Execution (Metasploit)\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "AkkuS",
            "exploit_type": "webapps",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46467/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46467/40924/joomla-component-j2store-337-sql-injection/download/",
            "exploit_id": "46467",
            "exploit_description": "\"Joomla! Component J2Store < 3.3.7 - SQL Injection\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "\"Andrei Conache\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46463/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46463/40923/simple-online-hotel-reservation-system-cross-site-request-forgery-delete-admin/download/",
            "exploit_id": "46463",
            "exploit_description": "\"Simple Online Hotel Reservation System  - Cross-Site Request Forgery (Delete Admin)\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46462/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46462/40922/simple-online-hotel-reservation-system-cross-site-request-forgery-add-admin/download/",
            "exploit_id": "46462",
            "exploit_description": "\"Simple Online Hotel Reservation System  - Cross-Site Request Forgery (Add Admin)\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46461/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46461/40921/simple-online-hotel-reservation-system-sql-injection/download/",
            "exploit_id": "46461",
            "exploit_description": "\"Simple Online Hotel Reservation System  - SQL Injection\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46470/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46470/40920/transmac-123-denial-of-service-poc/download/",
            "exploit_id": "46470",
            "exploit_description": "\"TransMac 12.3 - Denial of Service (PoC)\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "\"Alejandra Sánchez\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46465/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46465/40919/webkitgtk-22390-webkitgtk-2226-denial-of-service/download/",
            "exploit_id": "46465",
            "exploit_description": "\"WebKitGTK 2.23.90 / WebKitGTK+ 2.22.6 - Denial of Service\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "\"Dhiraj Mishra\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46464/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46464/40918/ftp-server-132-denial-of-service/download/",
            "exploit_id": "46464",
            "exploit_description": "\"FTP Server 1.32 - Denial of Service\"",
            "exploit_date": "2019-02-28",
            "exploit_author": "s4vitar",
            "exploit_type": "dos",
            "exploit_platform": "android",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46459/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46459/40917/drupal-869-rest-module-remote-code-execution/download/",
            "exploit_id": "46459",
            "exploit_description": "\"Drupal < 8.6.9 - REST Module Remote Code Execution\"",
            "exploit_date": "2019-02-25",
            "exploit_author": "leonjza",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46457/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46457/40916/advance-gift-shop-pro-script-203-sql-injection/download/",
            "exploit_id": "46457",
            "exploit_description": "\"Advance Gift Shop Pro Script 2.0.3 - SQL Injection\"",
            "exploit_date": "2019-02-25",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46456/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46456/40915/news-website-script-205-sql-injection/download/",
            "exploit_id": "46456",
            "exploit_description": "\"News Website Script 2.0.5 - SQL Injection\"",
            "exploit_date": "2019-02-25",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46455/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46455/40914/php-ecommerce-script-206-cross-site-scripting-sql-injection/download/",
            "exploit_id": "46455",
            "exploit_description": "\"PHP Ecommerce Script 2.0.6 - Cross-Site Scripting / SQL Injection\"",
            "exploit_date": "2019-02-25",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46454/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46454/40913/zzzphp-cms-161-remote-code-execution/download/",
            "exploit_id": "46454",
            "exploit_description": "\"zzzphp CMS 1.6.1 - Remote Code Execution\"",
            "exploit_date": "2019-02-25",
            "exploit_author": "\"Yang Chenglong\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46453/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46453/40912/jenkins-plugin-script-security-149declarative-134groovy-260-remote-code-execution/download/",
            "exploit_id": "46453",
            "exploit_description": "\"Jenkins Plugin Script Security 1.49/Declarative 1.3.4/Groovy 2.60 - Remote Code Execution\"",
            "exploit_date": "2019-02-25",
            "exploit_author": "wetw0rk",
            "exploit_type": "webapps",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46458/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46458/40911/xlight-ftp-server-391-buffer-overflow-poc/download/",
            "exploit_id": "46458",
            "exploit_description": "\"Xlight FTP Server 3.9.1 - Buffer Overflow (PoC)\"",
            "exploit_date": "2019-02-25",
            "exploit_author": "\"Logan Whitmire\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46452/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46452/40910/drupal-8610-8511-rest-module-remote-code-execution/download/",
            "exploit_id": "46452",
            "exploit_description": "\"Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution\"",
            "exploit_date": "2019-02-23",
            "exploit_author": "\"Charles Fol\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46451/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46451/40909/teracue-enc-400-command-injection-missing-authentication/download/",
            "exploit_id": "46451",
            "exploit_description": "\"Teracue ENC-400 - Command Injection / Missing Authentication\"",
            "exploit_date": "2019-02-22",
            "exploit_author": "\"Stephen Shkardoon\"",
            "exploit_type": "webapps",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46450/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46450/40908/micro-focus-filr-340217-path-traversal-local-privilege-escalation/download/",
            "exploit_id": "46450",
            "exploit_description": "\"Micro Focus Filr 3.4.0.217 - Path Traversal / Local Privilege Escalation\"",
            "exploit_date": "2019-02-22",
            "exploit_author": "SecureAuth",
            "exploit_type": "webapps",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46446/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46446/40907/quest-netvault-backup-server-1145-process-manager-service-sql-injection-remote-code-execution/download/",
            "exploit_id": "46446",
            "exploit_description": "\"Quest NetVault Backup Server < 11.4.5 - Process Manager Service SQL Injection / Remote Code Execution\"",
            "exploit_date": "2019-02-22",
            "exploit_author": "\"Chris Anastasio\"",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46449/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46449/40906/nuuo-central-management-authenticated-sql-server-sql-injection-metasploit/download/",
            "exploit_id": "46449",
            "exploit_description": "\"Nuuo Central Management - Authenticated SQL Server SQL Injection (Metasploit)\"",
            "exploit_date": "2019-02-22",
            "exploit_author": "Metasploit",
            "exploit_type": "remote",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46448/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46448/40905/webkit-jsc-reifystaticproperty-needs-to-set-the-propertyattributecustomaccessor-flag-for-customgettersetter/download/",
            "exploit_id": "46448",
            "exploit_description": "\"WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter\"",
            "exploit_date": "2019-02-22",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46429/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46429/40904/hoteldruid-23-cross-site-scripting/download/",
            "exploit_id": "46429",
            "exploit_description": "\"HotelDruid 2.3 - Cross-Site Scripting\"",
            "exploit_date": "2019-02-20",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46440/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46440/40903/ei-tube-3-sql-injection/download/",
            "exploit_id": "46440",
            "exploit_description": "\"EI-Tube 3 - SQL Injection\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "\"Meisam Monsef\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46438/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46438/40902/c4g-basic-laboratory-information-system-blis-34-sql-injection/download/",
            "exploit_id": "46438",
            "exploit_description": "\"C4G Basic Laboratory Information System (BLIS) 3.4 - SQL Injection\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "\"Carlos Avila\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46444/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46444/40901/mikrotik-routeros-64312-stable-64212-long-term-firewall-and-nat-bypass/download/",
            "exploit_id": "46444",
            "exploit_description": "\"MikroTik RouterOS < 6.43.12 (stable) / < 6.42.12 (long-term) - Firewall and NAT Bypass\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "\"Jacob Baines\"",
            "exploit_type": "remote",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46436/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46436/40900/belkin-wemo-upnp-remote-code-execution-metasploit/download/",
            "exploit_id": "46436",
            "exploit_description": "\"Belkin Wemo UPnP - Remote Code Execution (Metasploit)\"",
            "exploit_date": "2019-02-20",
            "exploit_author": "Metasploit",
            "exploit_type": "remote",
            "exploit_platform": "hardware",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46437/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46437/40899/memu-play-607-privilege-escalation/download/",
            "exploit_id": "46437",
            "exploit_description": "\"Memu Play 6.0.7 - Privilege Escalation\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "\"Alejandra Sánchez\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46428/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46428/40898/apple-macos-10135-local-privilege-escalation/download/",
            "exploit_id": "46428",
            "exploit_description": "\"Apple macOS 10.13.5 - Local Privilege Escalation\"",
            "exploit_date": "2019-02-13",
            "exploit_author": "Synacktiv",
            "exploit_type": "local",
            "exploit_platform": "macos",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46441/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46441/40897/realterm-serial-terminal-20070-echo-port-buffer-overflow-seh/download/",
            "exploit_id": "46441",
            "exploit_description": "\"RealTerm Serial Terminal 2.0.0.70 - 'Echo Port' Buffer Overflow (SEH)\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "\"Matteo Malvica\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46445/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46445/40896/airdrop-20-denial-of-service-dos/download/",
            "exploit_id": "46445",
            "exploit_description": "\"AirDrop 2.0 - Denial of Service (DoS)\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "s4vitar",
            "exploit_type": "dos",
            "exploit_platform": "android",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46443/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46443/40895/screenstream-3015-denial-of-service/download/",
            "exploit_id": "46443",
            "exploit_description": "\"ScreenStream 3.0.15 - Denial of Service\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "s4vitar",
            "exploit_type": "dos",
            "exploit_platform": "android",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46442/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46442/40894/virtual-vcr-max-0a-vcr-buffer-overflow-poc/download/",
            "exploit_id": "46442",
            "exploit_description": "\"Virtual VCR Max .0a - '.vcr' Buffer Overflow (PoC)\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "\"Wade Guest\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46435/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46435/40893/matrixssl-402-stack-buffer-overflow-verifying-x509-certificates/download/",
            "exploit_id": "46435",
            "exploit_description": "\"MatrixSSL < 4.0.2 - Stack Buffer Overflow Verifying x.509 Certificates\"",
            "exploit_date": "2019-02-20",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46434/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46434/40892/android-kernel-48-ptrace-seccomp-filter-bypass/download/",
            "exploit_id": "46434",
            "exploit_description": "\"Android Kernel < 4.8 - ptrace seccomp Filter Bypass\"",
            "exploit_date": "2019-02-20",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "android",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46433/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46433/40891/facetime-texture-processing-memory-corruption/download/",
            "exploit_id": "46433",
            "exploit_description": "\"FaceTime - Texture Processing Memory Corruption\"",
            "exploit_date": "2019-02-20",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "macos",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46432/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46432/40890/winrar-561-lng-denial-of-service/download/",
            "exploit_id": "46432",
            "exploit_description": "\"WinRAR 5.61 - '.lng' Denial of Service\"",
            "exploit_date": "2019-02-20",
            "exploit_author": "\"Kağan Çapar\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46430/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46430/40889/ftpshell-server-683-account-name-to-ban-denial-of-service-poc/download/",
            "exploit_id": "46430",
            "exploit_description": "\"FTPShell Server 6.83 - 'Account name to ban' Denial of Service (PoC)\"",
            "exploit_date": "2019-02-20",
            "exploit_author": "\"Victor Mondragón\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46439/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46439/40888/valentina-studio-905-linux-host-buffer-overflow-poc/download/",
            "exploit_id": "46439",
            "exploit_description": "\"Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC)\"",
            "exploit_date": "2019-02-21",
            "exploit_author": "\"Alejandra Sánchez\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46427/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46427/40887/jenkins-remote-code-execution/download/",
            "exploit_id": "46427",
            "exploit_description": "\"Jenkins - Remote Code Execution\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "orange",
            "exploit_type": "webapps",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46426/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46426/40886/ask-expert-script-305-cross-site-scripting-sql-injection/download/",
            "exploit_id": "46426",
            "exploit_description": "\"Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46425/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46425/40885/zoho-manageengine-netflow-analyzer-professional-7002-path-traversal-cross-site-scripting/download/",
            "exploit_id": "46425",
            "exploit_description": "\"Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2 - Path Traversal / Cross-Site Scripting\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Rafael Pedrero\"",
            "exploit_type": "webapps",
            "exploit_platform": "jsp",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46424/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46424/40884/xampp-568-sql-injection-persistent-cross-site-scripting/download/",
            "exploit_id": "46424",
            "exploit_description": "\"XAMPP 5.6.8 - SQL Injection / Persistent Cross-Site Scripting\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Rafael Pedrero\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46423/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46423/40883/edirectory-sql-injection/download/",
            "exploit_id": "46423",
            "exploit_description": "\"eDirectory - SQL Injection\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Efrén Díaz\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46420/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46420/40882/zuz-music-21-zuzconsole___contact-persistent-cross-site-scripting/download/",
            "exploit_id": "46420",
            "exploit_description": "\"Zuz Music 2.1 - 'zuzconsole/___contact ' Persistent Cross-Site Scripting\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Deyaa Muhammad\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46419/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46419/40881/listing-hub-cms-10-pagesphp-id-sql-injection/download/",
            "exploit_id": "46419",
            "exploit_description": "\"Listing Hub CMS 1.0 - 'pages.php id' SQL Injection\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Deyaa Muhammad\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46418/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46418/40880/find-a-place-cms-directory-15-assetsexternaldata_2php-cate-sql-injection/download/",
            "exploit_id": "46418",
            "exploit_description": "\"Find a Place CMS Directory 1.5 - 'assets/external/data_2.php cate' SQL Injection\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Deyaa Muhammad\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46414/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46414/40879/wordpress-plugin-woocommerce-globee-cryptocurrency-payment-gateway-111-payment-bypass-unauthorized-order-status-spoofing/download/",
            "exploit_id": "46414",
            "exploit_description": "\"WordPress Plugin WooCommerce - GloBee (cryptocurrency) Payment Gateway 1.1.1 - Payment Bypass / Unauthorized Order Status Spoofing\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "GeekHack",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46413/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46413/40878/zoho-manageengine-servicedesk-plus-sdp-100-build-10012-arbitrary-file-upload/download/",
            "exploit_id": "46413",
            "exploit_description": "\"Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Dao Duy Hung\"",
            "exploit_type": "webapps",
            "exploit_platform": "jsp",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46408/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46408/40877/comodo-dome-firewall-270-cross-site-scripting/download/",
            "exploit_id": "46408",
            "exploit_description": "\"Comodo Dome Firewall 2.7.0 - Cross-Site Scripting\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Ozer Goker\"",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46407/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46407/40876/arangodb-community-edition-342-1-cross-site-scripting/download/",
            "exploit_id": "46407",
            "exploit_description": "\"ArangoDB Community Edition 3.4.2-1 - Cross-Site Scripting\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Ozer Goker\"",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46406/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46406/40875/apache-couchdb-230-cross-site-scripting/download/",
            "exploit_id": "46406",
            "exploit_description": "\"Apache CouchDB 2.3.0 - Cross-Site Scripting\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Ozer Goker\"",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46405/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46405/40874/webiness-inventory-23-productmodel-arbitrary-file-upload/download/",
            "exploit_id": "46405",
            "exploit_description": "\"Webiness Inventory 2.3 - 'ProductModel' Arbitrary File Upload\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46404/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46404/40873/mmonit-372-privilege-escalation/download/",
            "exploit_id": "46404",
            "exploit_description": "\"M/Monit 3.7.2 - Privilege Escalation\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Dolev Farhi\"",
            "exploit_type": "webapps",
            "exploit_platform": "multiple",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46402/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46402/40872/cmssite-10-post-sql-injection/download/",
            "exploit_id": "46402",
            "exploit_description": "\"CMSsite 1.0 - 'post' SQL Injection\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Mr Winst0n\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46401/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46401/40871/misp-2497-sql-command-execution-via-command-injection-in-stix-module/download/",
            "exploit_id": "46401",
            "exploit_description": "\"MISP 2.4.97 - SQL Command Execution via Command Injection in STIX Module\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "Tm9jdGlz",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46400/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46400/40870/master-ip-cam-01-3342103-remote-command-execution/download/",
            "exploit_id": "46400",
            "exploit_description": "\"Master IP CAM 01 3.3.4.2103 - Remote Command Execution\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Raffaele Sabato\"",
            "exploit_type": "webapps",
            "exploit_platform": "cgi",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46399/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46399/40869/qdpm-91-searchkeywords-cross-site-scripting/download/",
            "exploit_id": "46399",
            "exploit_description": "\"qdPM 9.1 - 'search[keywords]' Cross-Site Scripting\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46398/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46398/40868/qdpm-91-type-cross-site-scripting/download/",
            "exploit_id": "46398",
            "exploit_description": "\"qdPM 9.1 - 'type' Cross-Site Scripting\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46392/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46392/40867/mirc-755-remote-command-execution-using-argument-injection-through-custom-uri-protocol-handlers/download/",
            "exploit_id": "46392",
            "exploit_description": "\"mIRC < 7.55 - Remote Command Execution Using Argument Injection Through Custom URI Protocol Handlers\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "ProofOfCalc",
            "exploit_type": "remote",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46416/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46416/40866/maxxaudio-drivers-wavessyssvc64exe-1620-file-permissions-system-privilege-escalation/download/",
            "exploit_id": "46416",
            "exploit_description": "\"MaxxAudio Drivers WavesSysSvc64.exe 1.6.2.0 - File Permissions SYSTEM Privilege Escalation\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Mike Siegel\"",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46422/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46422/40865/bulletproof-ftp-server-20190050-smtp-server-denial-of-service-poc/download/",
            "exploit_id": "46422",
            "exploit_description": "\"BulletProof FTP Server 2019.0.0.50 - 'SMTP Server' Denial of Service (PoC)\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Victor Mondragón\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46421/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46421/40864/valentina-studio-904-host-denial-of-service-poc/download/",
            "exploit_id": "46421",
            "exploit_description": "\"Valentina Studio 9.0.4 - 'Host' Denial of Service (PoC)\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Victor Mondragón\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46417/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46417/40863/netsetman-471-workgroup-denial-of-service-poc/download/",
            "exploit_id": "46417",
            "exploit_description": "\"NetSetMan 4.7.1 - 'Workgroup' Denial of Service (PoC)\"",
            "exploit_date": "2019-02-19",
            "exploit_author": "\"Victor Mondragón\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46412/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46412/40862/oracle-java-runtime-environment-heap-out-of-bounds-read-during-ttf-font-rendering-in-alternatesubstitutionsubtableprocess/download/",
            "exploit_id": "46412",
            "exploit_description": "\"Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in AlternateSubstitutionSubtable::process\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46411/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46411/40861/oracle-java-runtime-environment-heap-out-of-bounds-read-during-ttf-font-rendering-in-extractbitmap_blocclass/download/",
            "exploit_id": "46411",
            "exploit_description": "\"Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in ExtractBitMap_blocClass\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46410/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46410/40860/oracle-java-runtime-environment-heap-out-of-bounds-read-during-ttf-font-rendering-in-opentypelayoutengineadjustglyphpositions/download/",
            "exploit_id": "46410",
            "exploit_description": "\"Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in OpenTypeLayoutEngine::adjustGlyphPositions\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46409/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46409/40859/oracle-java-runtime-environment-heap-out-of-bounds-read-during-otf-font-rendering-in-glyph_closecontour/download/",
            "exploit_id": "46409",
            "exploit_description": "\"Oracle Java Runtime Environment - Heap Out-of-Bounds Read During OTF Font Rendering in glyph_CloseContour\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "java",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46403/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46403/40858/nbmonitor-1650-key-denial-of-service-poc/download/",
            "exploit_id": "46403",
            "exploit_description": "\"NBMonitor 1.6.5.0 - 'Key' Denial of Service (PoC)\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Alejandra Sánchez\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46391/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46391/40857/realterm-serial-terminal-20070-local-buffer-overflow-seh/download/",
            "exploit_id": "46391",
            "exploit_description": "\"Realterm Serial Terminal 2.0.0.70 - Local Buffer Overflow (SEH)\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Alejandra Sánchez\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46390/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46390/40856/realterm-serial-terminal-20070-denial-of-service/download/",
            "exploit_id": "46390",
            "exploit_description": "\"Realterm Serial Terminal 2.0.0.70 - Denial of Service\"",
            "exploit_date": "2019-02-18",
            "exploit_author": "\"Alejandra Sánchez\"",
            "exploit_type": "dos",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46389/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46389/40855/unisharp-laravel-file-manager-200-alpha7-arbitrary-file-upload/download/",
            "exploit_id": "46389",
            "exploit_description": "\"UniSharp Laravel File Manager 2.0.0-alpha7 - Arbitrary File Upload\"",
            "exploit_date": "2019-02-15",
            "exploit_author": "\"Mohammad Danish\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46387/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46387/40854/qdpm-91-search_by_extrafields-sql-injection/download/",
            "exploit_id": "46387",
            "exploit_description": "\"qdPM 9.1 - 'search_by_extrafields[]' SQL Injection\"",
            "exploit_date": "2019-02-15",
            "exploit_author": "\"Mehmet EMIROGLU\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46386/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46386/40853/jinja2-210-from_string-server-side-template-injection/download/",
            "exploit_id": "46386",
            "exploit_description": "\"Jinja2 2.10 - 'from_string' Server Side Template Injection\"",
            "exploit_date": "2019-02-15",
            "exploit_author": "JameelNabbo",
            "exploit_type": "webapps",
            "exploit_platform": "python",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46384/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46384/40852/mybb-trash-bin-plugin-113-cross-site-scripting-cross-site-request-forgery/download/",
            "exploit_id": "46384",
            "exploit_description": "\"MyBB Trash Bin Plugin 1.1.3 - Cross-Site Scripting / Cross-Site Request Forgery\"",
            "exploit_date": "2019-02-15",
            "exploit_author": "0xB9",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46379/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46379/40851/layerbb-112-cross-site-request-forgery-add-admin/download/",
            "exploit_id": "46379",
            "exploit_description": "\"LayerBB 1.1.2 - Cross-Site Request Forgery (Add Admin)\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "0xB9",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46377/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46377/40850/wordpress-plugin-booking-calendar-843-authenticated-sql-injection/download/",
            "exploit_id": "46377",
            "exploit_description": "\"WordPress Plugin Booking Calendar 8.4.3 - Authenticated SQL Injection\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "B0UG",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46376/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46376/40849/domainmod-41101-assetsedithostphpwhid5-cross-site-scripting/download/",
            "exploit_id": "46376",
            "exploit_description": "\"DomainMOD 4.11.01 - 'assets/edit/host.php?whid=5' Cross-Site Scripting\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "\"Mohammed Abdul Kareem\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46375/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46375/40848/domainmod-41101-assetsadddnsphp-cross-site-scripting/download/",
            "exploit_id": "46375",
            "exploit_description": "\"DomainMOD 4.11.01 - 'assets/add/dns.php' Cross-Site Scripting\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "\"Mohammed Abdul Kareem\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46374/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46374/40847/domainmod-41101-categoryphp-catagoryname_-stakeholder-cross-site-scripting/download/",
            "exploit_id": "46374",
            "exploit_description": "\"DomainMOD 4.11.01 - 'category.php CatagoryName_ StakeHolder' Cross-Site Scripting\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "\"Mohammed Abdul Raheem\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46373/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46373/40846/domainmod-41101-ssl-accountsphp-username-cross-site-scripting/download/",
            "exploit_id": "46373",
            "exploit_description": "\"DomainMOD 4.11.01 - 'ssl-accounts.php username' Cross-Site Scripting\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "\"Mohammed Abdul Raheem\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46372/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46372/40845/domainmod-41101-ssl-provider-name-cross-site-scripting/download/",
            "exploit_id": "46372",
            "exploit_description": "\"DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "\"Mohammed Abdul Raheem\"",
            "exploit_type": "webapps",
            "exploit_platform": "php",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46369/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46369/40844/runc-10-rc6-docker-18092-container-breakout-2/download/",
            "exploit_id": "46369",
            "exploit_description": "\"runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (2)\"",
            "exploit_date": "2019-02-13",
            "exploit_author": "embargo",
            "exploit_type": "local",
            "exploit_platform": "linux",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46370/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46370/40843/exacqvision-esm-5122-privilege-escalation/download/",
            "exploit_id": "46370",
            "exploit_description": "\"exacqVision ESM 5.12.2 - Privilege Escalation\"",
            "exploit_date": "2019-02-14",
            "exploit_author": "bzyo",
            "exploit_type": "local",
            "exploit_platform": "windows",
            "exploit_port": null
        },
        {
            "url": "https://www.nmmapper.com/api/exploitdetails/46388/",
            "download_file": "https://www.nmmapper.com/st/exploitdetails/46388/40842/linux-kvm_ioctl_create_device-null-pointer-dereference/download/",
            "exploit_id": "46388",
            "exploit_description": "\"Linux - 'kvm_ioctl_create_device()' NULL Pointer Dereference\"",
            "exploit_date": "2019-02-15",
            "exploit_author": "\"Google Security Research\"",
            "exploit_type": "dos",
            "exploit_platform": "linux",
            "exploit_port": null
        }
    ]
}