Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48634/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48634/42898/ocs-inventory-ng-27-remote-code-execution/download/",
        "exploit_id": "48634",
        "exploit_description": "\"OCS Inventory NG 2.7 - Remote Code Execution\"",
        "exploit_date": "2020-07-02",
        "exploit_author": "Askar",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48632/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48632/42896/whatsapp-remote-code-execution-paper/download/",
        "exploit_id": "48632",
        "exploit_description": "\"WhatsApp Remote Code Execution - Paper\"",
        "exploit_date": "2020-07-02",
        "exploit_author": "\"ashu Jaiswal\"",
        "exploit_type": "webapps",
        "exploit_platform": "android",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48633/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48633/42897/zentao-pro-882-command-injection/download/",
        "exploit_id": "48633",
        "exploit_description": "\"ZenTao Pro 8.8.2 - Command Injection\"",
        "exploit_date": "2020-07-02",
        "exploit_author": "\"Daniel Monzón\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48628/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48628/42892/rm-downloader-25060-20060623-load-local-buffer-overflow-egghunter-seh-poc/download/",
        "exploit_id": "48628",
        "exploit_description": "\"RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48629/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48629/42893/e-learning-php-script-010-search-sql-injection/download/",
        "exploit_id": "48629",
        "exploit_description": "\"e-learning Php Script 0.1.0 - 'search' SQL Injection\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "KeopssGroup0day_Inc",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48630/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48630/42894/php-fusion-90360-php-object-injection/download/",
        "exploit_id": "48630",
        "exploit_description": "\"PHP-Fusion 9.03.60 - PHP Object Injection\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "coiffeur",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48631/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48631/42895/online-shopping-portal-31-authentication-bypass/download/",
        "exploit_id": "48631",
        "exploit_description": "\"Online Shopping Portal 3.1 - Authentication Bypass\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "\"Ümit Yalçın\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48627/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48627/42891/reside-property-management-30-profile-sql-injection/download/",
        "exploit_id": "48627",
        "exploit_description": "\"Reside Property Management 3.0 - 'profile' SQL Injection\"",
        "exploit_date": "2020-06-30",
        "exploit_author": "\"Behzad Khalifeh\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48626/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48626/42890/victor-cms-10-user-firstname-persistent-cross-site-scripting/download/",
        "exploit_id": "48626",
        "exploit_description": "\"Victor CMS 1.0 - 'user_firstname' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-06-30",
        "exploit_author": "\"Anushree Priyadarshini\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48625/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48625/42885/kiteservice-120206180-unquoted-service-path/download/",
        "exploit_id": "48625",
        "exploit_description": "\"KiteService 1.2020.618.0 - Unquoted Service Path\"",
        "exploit_date": "2020-06-26",
        "exploit_author": "\"Marcos Antonio León\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48624/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48624/42884/windscribe-183-windscribeservice-unquoted-service-path/download/",
        "exploit_id": "48624",
        "exploit_description": "\"Windscribe 1.83 - 'WindscribeService' Unquoted Service Path\"",
        "exploit_date": "2020-06-26",
        "exploit_author": "\"Ethan Seow\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48623/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48623/42889/openemr-501-controller-remote-code-execution/download/",
        "exploit_id": "48623",
        "exploit_description": "\"OpenEMR 5.0.1 - 'controller' Remote Code Execution\"",
        "exploit_date": "2020-06-26",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48620/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48620/42886/myscada-mypro-7-hardcoded-credentials/download/",
        "exploit_id": "48620",
        "exploit_description": "\"mySCADA myPRO 7 - Hardcoded Credentials\"",
        "exploit_date": "2020-06-25",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48621/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48621/42888/fhem-60-local-file-inclusion/download/",
        "exploit_id": "48621",
        "exploit_description": "\"FHEM 6.0 - Local File Inclusion\"",
        "exploit_date": "2020-06-25",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48619/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48619/42887/bsa-radar-16723424750-persistent-cross-site-scripting/download/",
        "exploit_id": "48619",
        "exploit_description": "\"BSA Radar 1.6.7234.24750 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-06-24",
        "exploit_author": "\"William Summerhill\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48618/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48618/42881/lansweeper-72-incorrect-access-control/download/",
        "exploit_id": "48618",
        "exploit_description": "\"Lansweeper 7.2 - Incorrect Access Control\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "\"Amel BOUZIANE-LEBLOND\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48617/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48617/42880/code-blocks-2003-denial-of-service-poc/download/",
        "exploit_id": "48617",
        "exploit_description": "\"Code Blocks 20.03 - Denial Of Service (PoC)\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48616/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48616/42883/online-student-enrollment-system-10-cross-site-request-forgery-add-student/download/",
        "exploit_id": "48616",
        "exploit_description": "\"Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48615/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48615/42882/responsive-online-blog-10-id-sql-injection/download/",
        "exploit_id": "48615",
        "exploit_description": "\"Responsive Online Blog 1.0 - 'id' SQL Injection\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "\"Eren Şimşek\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48610/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48610/42877/online-student-enrollment-system-10-unauthenticated-arbitrary-file-upload/download/",
        "exploit_id": "48610",
        "exploit_description": "\"Online Student Enrollment System 1.0 - Unauthenticated Arbitrary File Upload\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48608/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48608/42875/student-enrollment-10-unauthenticated-remote-code-execution/download/",
        "exploit_id": "48608",
        "exploit_description": "\"Student Enrollment 1.0 - Unauthenticated Remote Code Execution\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "Enesdex",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48609/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48609/42876/odoo-120-local-file-inclusion/download/",
        "exploit_id": "48609",
        "exploit_description": "\"Odoo 12.0 - Local File Inclusion\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48611/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48611/42878/webport-1191-reflected-cross-site-scripting/download/",
        "exploit_id": "48611",
        "exploit_description": "\"WebPort 1.19.1 - Reflected Cross-Site Scripting\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48612/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48612/42879/webport-1191-setup-reflected-cross-site-scripting/download/",
        "exploit_id": "48612",
        "exploit_description": "\"WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48607/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48607/42874/filerun-20190521-reflected-cross-site-scripting/download/",
        "exploit_id": "48607",
        "exploit_description": "\"FileRun 2019.05.21 -  Reflected Cross-Site Scripting\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48613/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48613/42873/frigate-202-denial-of-service-poc/download/",
        "exploit_id": "48613",
        "exploit_description": "\"Frigate 2.02 - Denial Of Service (PoC)\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48605/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48605/42872/beauty-parlour-management-system-10-authentication-bypass/download/",
        "exploit_id": "48605",
        "exploit_description": "\"Beauty Parlour Management System 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-06-18",
        "exploit_author": "\"Prof. Kailas PATIL\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48595/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48595/42833/opencti-331-directory-traversal/download/",
        "exploit_id": "48595",
        "exploit_description": "\"OpenCTI 3.3.1 - Directory Traversal\"",
        "exploit_date": "2020-06-17",
        "exploit_author": "\"Raif Berkay Dincel\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48594/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48594/42831/code-blocks-1712-file-name-local-buffer-overflow-unicode-seh-poc/download/",
        "exploit_id": "48594",
        "exploit_description": "\"Code Blocks 17.12 - 'File Name' Local Buffer Overflow (Unicode) (SEH) (PoC)\"",
        "exploit_date": "2020-06-17",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48593/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48593/42832/college-management-system-php-10-authentication-bypass/download/",
        "exploit_id": "48593",
        "exploit_description": "\"College-Management-System-Php 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-06-17",
        "exploit_author": "\"BLAY ABU SAFIAN\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48590/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48590/42830/gila-cms-1118-query-sql-injection/download/",
        "exploit_id": "48590",
        "exploit_description": "\"Gila CMS 1.11.8 - 'query' SQL Injection\"",
        "exploit_date": "2020-06-16",
        "exploit_author": "BillyV4",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48591/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48591/42828/bandwidth-monitor-39-svc10strikebandmontitor-unquoted-service-path/download/",
        "exploit_id": "48591",
        "exploit_description": "\"Bandwidth Monitor 3.9 - 'Svc10StrikeBandMontitor' Unquoted Service Path\"",
        "exploit_date": "2020-06-16",
        "exploit_author": "boku",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48587/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48587/42827/sos-jobscheduler-1133-stored-password-decryption/download/",
        "exploit_id": "48587",
        "exploit_description": "\"SOS JobScheduler 1.13.3 - Stored Password Decryption\"",
        "exploit_date": "2020-06-15",
        "exploit_author": "\"Sander Ubink\"",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48588/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48588/42829/netgear-r7000-router-remote-code-execution/download/",
        "exploit_id": "48588",
        "exploit_description": "\"Netgear R7000 Router - Remote Code Execution\"",
        "exploit_date": "2020-06-15",
        "exploit_author": "grimm-co",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48580/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48580/42824/smartermail-16-arbitrary-file-upload/download/",
        "exploit_id": "48580",
        "exploit_description": "\"SmarterMail 16 - Arbitrary File Upload\"",
        "exploit_date": "2020-06-12",
        "exploit_author": "vvhack.org",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48581/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48581/42825/avaya-ip-office-11-password-disclosure/download/",
        "exploit_id": "48581",
        "exploit_description": "\"Avaya IP Office 11 - Password Disclosure\"",
        "exploit_date": "2020-06-12",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48582/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48582/42826/sysax-multiserver-690-reflected-cross-site-scripting/download/",
        "exploit_id": "48582",
        "exploit_description": "\"Sysax MultiServer 6.90 - Reflected Cross Site Scripting\"",
        "exploit_date": "2020-06-12",
        "exploit_author": "\"Luca Epifanio\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48579/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48579/42823/frigate-professional-33609-find-computer-local-buffer-overflow-seh-poc/download/",
        "exploit_id": "48579",
        "exploit_description": "\"Frigate Professional 3.36.0.9 - 'Find Computer' Local Buffer Overflow (SEH) (PoC)\"",
        "exploit_date": "2020-06-11",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48571/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48571/42820/sistem-informasi-pengumuman-kelulusan-online-10-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48571",
        "exploit_description": "\"Sistem Informasi Pengumuman Kelulusan Online 1.0 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-06-10",
        "exploit_author": "Extinction",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48573/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48573/42818/wingate-9415998-insecure-folder-permissions/download/",
        "exploit_id": "48573",
        "exploit_description": "\"WinGate 9.4.1.5998 - Insecure Folder Permissions\"",
        "exploit_date": "2020-06-10",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48574/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48574/42822/virtual-airlines-manager-262-id-sql-injection/download/",
        "exploit_id": "48574",
        "exploit_description": "\"Virtual Airlines Manager 2.6.2 - 'id' SQL Injection\"",
        "exploit_date": "2020-06-10",
        "exploit_author": "Mosaaed",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48572/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48572/42821/joomla-j2-store-3311-filter-order-dir-sql-injection-authenticated/download/",
        "exploit_id": "48572",
        "exploit_description": "\"Joomla J2 Store 3.3.11 - 'filter_order_Dir'  SQL Injection (Authenticated)\"",
        "exploit_date": "2020-06-10",
        "exploit_author": "\"Mehmet Kelepçe\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48569/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48569/42819/hfs-http-file-server-23m-build-300-buffer-overflow-poc/download/",
        "exploit_id": "48569",
        "exploit_description": "\"HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC)\"",
        "exploit_date": "2020-06-10",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48570/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48570/42817/10-strike-bandwidth-monitor-39-buffer-overflow-seh-dep-aslr/download/",
        "exploit_id": "48570",
        "exploit_description": "\"10-Strike Bandwidth Monitor 3.9 - Buffer Overflow (SEH_DEP_ASLR)\"",
        "exploit_date": "2020-06-10",
        "exploit_author": "boku",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48567/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48567/42811/virtual-airlines-manager-262-airport-sql-injection/download/",
        "exploit_id": "48567",
        "exploit_description": "\"Virtual Airlines Manager 2.6.2 - 'airport' SQL Injection\"",
        "exploit_date": "2020-06-09",
        "exploit_author": "\"Kostadin Tonev\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48568/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48568/42812/bludit-3912-directory-traversal/download/",
        "exploit_id": "48568",
        "exploit_description": "\"Bludit 3.9.12 - Directory Traversal\"",
        "exploit_date": "2020-06-09",
        "exploit_author": "\"Luis Vacacas\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48564/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48564/42808/quick-player-13-m3l-buffer-overflow-unicode-seh/download/",
        "exploit_id": "48564",
        "exploit_description": "\"Quick Player 1.3 - '.m3l' Buffer Overflow (Unicode & SEH)\"",
        "exploit_date": "2020-06-08",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48563/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48563/42807/frigate-33609-command-line-local-buffer-overflow-seh-poc/download/",
        "exploit_id": "48563",
        "exploit_description": "\"Frigate 3.36.0.9 - 'Command Line' Local Buffer Overflow (SEH) (PoC)\"",
        "exploit_date": "2020-06-08",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48562/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48562/42810/virtual-airlines-manager-262-notam-sql-injection/download/",
        "exploit_id": "48562",
        "exploit_description": "\"Virtual Airlines Manager 2.6.2 - 'notam' SQL Injection\"",
        "exploit_date": "2020-06-08",
        "exploit_author": "\"Pankaj Kumar Thakur\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48561/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48561/42809/kyocera-printer-d-copia253mf-directory-traversal-poc/download/",
        "exploit_id": "48561",
        "exploit_description": "\"Kyocera Printer d-COPIA253MF - Directory Traversal (PoC)\"",
        "exploit_date": "2020-06-08",
        "exploit_author": "\"Hakan Eren ŞAN\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48560/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48560/42806/online-exam-system-2015-feedback-sql-injection/download/",
        "exploit_id": "48560",
        "exploit_description": "\"Online-Exam-System 2015 - 'feedback' SQL Injection\"",
        "exploit_date": "2020-06-05",
        "exploit_author": "\"Gus Ralph\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48559/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48559/42805/online-course-registration-10-authentication-bypass/download/",
        "exploit_id": "48559",
        "exploit_description": "\"Online Course Registration 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-06-05",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48543/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48543/42788/iobit-uninstaller-95015-iobit-uninstaller-service-unquoted-service-path/download/",
        "exploit_id": "48543",
        "exploit_description": "\"IObit Uninstaller 9.5.0.15 - 'IObit Uninstaller Service' Unquoted Service Path\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "Gobinathan",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48541/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48541/42789/aircontrol-142-preauth-remote-code-execution/download/",
        "exploit_id": "48541",
        "exploit_description": "\"AirControl 1.4.2 - PreAuth Remote Code Execution\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "0xd0ff9",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48545/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48545/42792/navigate-cms-287-sidx-sql-injection-authenticated/download/",
        "exploit_id": "48545",
        "exploit_description": "\"Navigate CMS 2.8.7 - ''sidx' SQL Injection (Authenticated)\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "\"Gus Ralph\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48542/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48542/42790/hostel-management-system-20-id-sql-injection-unauthenticated/download/",
        "exploit_id": "48542",
        "exploit_description": "\"Hostel Management System 2.0 - 'id' SQL Injection (Unauthenticated)\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "Enesdex",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48546/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48546/42793/oriol-espinal-cms-10-id-sql-injection/download/",
        "exploit_id": "48546",
        "exploit_description": "\"Oriol Espinal CMS 1.0 - 'id' SQL Injection\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "TSAR",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48544/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48544/42791/clinic-management-system-10-unauthenticated-remote-code-execution/download/",
        "exploit_id": "48544",
        "exploit_description": "\"Clinic Management System 1.0 - Unauthenticated Remote Code Execution\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48558/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48558/42804/cayin-digital-signage-system-xpost-25-remote-command-injection/download/",
        "exploit_id": "48558",
        "exploit_description": "\"Cayin Digital Signage System xPost 2.5 - Remote Command Injection\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48552/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48552/42799/online-marriage-registration-system-10-remote-code-execution/download/",
        "exploit_id": "48552",
        "exploit_description": "\"Online Marriage Registration System 1.0 - Remote Code Execution\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "Enesdex",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48557/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48557/42803/cayin-signage-media-player-30-remote-command-injection-root/download/",
        "exploit_id": "48557",
        "exploit_description": "\"Cayin Signage Media Player 3.0 - Remote Command Injection (root)\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48550/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48550/42797/navigate-cms-287-authenticated-directory-traversal/download/",
        "exploit_id": "48550",
        "exploit_description": "\"Navigate CMS 2.8.7 - Authenticated Directory Traversal\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "\"Gus Ralph\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48553/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48553/42800/cayin-content-management-server-110-remote-command-injection-root/download/",
        "exploit_id": "48553",
        "exploit_description": "\"Cayin Content Management Server 11.0 - Remote Command Injection (root)\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48551/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48551/42798/d-link-dir-615-t1-2010-captcha-bypass/download/",
        "exploit_id": "48551",
        "exploit_description": "\"D-Link DIR-615 T1 20.10 - CAPTCHA Bypass\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "\"huzaifa hussain\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48554/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48554/42801/snapgear-management-console-sg560-315-cross-site-request-forgery-add-super-user/download/",
        "exploit_id": "48554",
        "exploit_description": "\"SnapGear Management Console SG560 3.1.5 - Cross-Site Request Forgery (Add Super User)\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48549/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48549/42796/vmware-vcloud-director-97015498291-remote-code-execution/download/",
        "exploit_id": "48549",
        "exploit_description": "\"VMWAre vCloud Director 9.7.0.15498291 - Remote Code Execution\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "\"Tomas Melicher\"",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48556/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48556/42802/secure-computing-snapgear-management-console-sg560-315-arbitrary-file-read/download/",
        "exploit_id": "48556",
        "exploit_description": "\"Secure Computing SnapGear Management Console SG560 3.1.5 - Arbitrary File Read\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48547/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48547/42794/clinic-management-system-10-authenticated-arbitrary-file-upload/download/",
        "exploit_id": "48547",
        "exploit_description": "\"Clinic Management System 1.0 - Authenticated Arbitrary File Upload\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48548/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48548/42795/navigate-cms-287-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48548",
        "exploit_description": "\"Navigate CMS 2.8.7 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-06-04",
        "exploit_author": "\"Gus Ralph\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48540/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48540/42785/vcloud-director-97015498291-remote-code-execution/download/",
        "exploit_id": "48540",
        "exploit_description": "\"vCloud Director 9.7.0.15498291 - Remote Code Execution\"",
        "exploit_date": "2020-06-02",
        "exploit_author": "aaronsvk",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48539/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48539/42787/opencart-3032-stored-cross-site-scripting-authenticated/download/",
        "exploit_id": "48539",
        "exploit_description": "\"OpenCart 3.0.3.2 - Stored Cross Site Scripting (Authenticated)\"",
        "exploit_date": "2020-06-02",
        "exploit_author": "\"Kailash Bohara\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48538/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48538/42786/clinic-management-system-10-authentication-bypass/download/",
        "exploit_id": "48538",
        "exploit_description": "\"Clinic Management System 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-06-02",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48537/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48537/42784/microsoft-windows-smbghost-remote-code-execution/download/",
        "exploit_id": "48537",
        "exploit_description": "\"Microsoft Windows - 'SMBGhost' Remote Code Execution\"",
        "exploit_date": "2020-06-02",
        "exploit_author": "chompie1337",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48534/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48534/42781/wordpress-plugin-bbpress-25-unauthenticated-privilege-escalation/download/",
        "exploit_id": "48534",
        "exploit_description": "\"Wordpress Plugin BBPress 2.5 - Unauthenticated Privilege Escalation\"",
        "exploit_date": "2020-06-01",
        "exploit_author": "\"Raphael Karger\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48535/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48535/42782/vmware-vcenter-server-67-authentication-bypass/download/",
        "exploit_id": "48535",
        "exploit_description": "\"VMware vCenter Server 6.7 - Authentication Bypass\"",
        "exploit_date": "2020-06-01",
        "exploit_author": "Photubias",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48536/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48536/42783/quickbox-pro-218-authenticated-remote-code-execution/download/",
        "exploit_id": "48536",
        "exploit_description": "\"QuickBox Pro 2.1.8 - Authenticated Remote Code Execution\"",
        "exploit_date": "2020-06-01",
        "exploit_author": "s1gh",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48533/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48533/42780/crystal-shard-http-protection-020-ip-spoofing-bypass/download/",
        "exploit_id": "48533",
        "exploit_description": "\"Crystal Shard http-protection 0.2.0 - IP Spoofing Bypass\"",
        "exploit_date": "2020-05-29",
        "exploit_author": "\"Halis Duraki\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48532/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48532/42779/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user/download/",
        "exploit_id": "48532",
        "exploit_description": "\"WordPress Plugin Multi-Scheduler 1.0.0 - Cross-Site Request Forgery (Delete User)\"",
        "exploit_date": "2020-05-29",
        "exploit_author": "UnD3sc0n0c1d0",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48528/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48528/42775/nokia-vitalsuite-spm-2020-username-sql-injection/download/",
        "exploit_id": "48528",
        "exploit_description": "\"NOKIA VitalSuite SPM 2020 - 'UserName' SQL Injection\"",
        "exploit_date": "2020-05-28",
        "exploit_author": "\"Berk Dusunur\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48531/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48531/42778/qnap-qts-and-photo-station-603-remote-command-execution/download/",
        "exploit_id": "48531",
        "exploit_description": "\"QNAP QTS and Photo Station 6.0.3 - Remote Command Execution\"",
        "exploit_date": "2020-05-28",
        "exploit_author": "Th3GundY",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48529/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48529/42776/online-exam-system-2015-fid-sql-injection/download/",
        "exploit_id": "48529",
        "exploit_description": "\"Online-Exam-System 2015 - 'fid' SQL Injection\"",
        "exploit_date": "2020-05-28",
        "exploit_author": "\"Berk Dusunur\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48530/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48530/42777/eyoucms-146-persistent-cross-site-scripting/download/",
        "exploit_id": "48530",
        "exploit_description": "\"EyouCMS 1.4.6 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-05-28",
        "exploit_author": "\"China Banking and Insurance Information Technology Management Co.\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48524/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48524/42771/osticket-1141-ticket-queue-persistent-cross-site-scripting/download/",
        "exploit_id": "48524",
        "exploit_description": "\"osTicket 1.14.1 - 'Ticket Queue' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-05-27",
        "exploit_author": "\"Matthew Aberegg\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48525/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48525/42772/osticket-1141-saved-search-persistent-cross-site-scripting/download/",
        "exploit_id": "48525",
        "exploit_description": "\"osTicket 1.14.1 - 'Saved Search' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-05-27",
        "exploit_author": "\"Matthew Aberegg\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48526/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48526/42773/kuicms-php-ee-20-persistent-cross-site-scripting/download/",
        "exploit_id": "48526",
        "exploit_description": "\"Kuicms PHP EE 2.0 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-05-27",
        "exploit_author": "\"China Banking and Insurance Information Technology Management Co.\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48522/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48522/42769/online-marriage-registration-system-10-persistent-cross-site-scripting/download/",
        "exploit_id": "48522",
        "exploit_description": "\"Online Marriage Registration System 1.0 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-05-27",
        "exploit_author": "\"that faceless coder\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48527/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48527/42774/oxid-eshop-634-sorting-sql-injection/download/",
        "exploit_id": "48527",
        "exploit_description": "\"OXID eShop 6.3.4 - 'sorting' SQL Injection\"",
        "exploit_date": "2020-05-27",
        "exploit_author": "VulnSpy",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48523/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48523/42770/limesurvey-4111-permission-roles-persistent-cross-site-scripting/download/",
        "exploit_id": "48523",
        "exploit_description": "\"LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-05-27",
        "exploit_author": "\"Matthew Aberegg\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48519/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48519/42767/pi-hole-440-remote-code-execution-authenticated/download/",
        "exploit_id": "48519",
        "exploit_description": "\"Pi-hole 4.4.0 - Remote Code Execution (Authenticated)\"",
        "exploit_date": "2020-05-26",
        "exploit_author": "Photubias",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48518/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48518/42766/joomla-plugin-xcloner-backup-353-local-file-inclusion-authenticated/download/",
        "exploit_id": "48518",
        "exploit_description": "\"Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated)\"",
        "exploit_date": "2020-05-26",
        "exploit_author": "\"Mehmet Kelepçe\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48517/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48517/42763/streamripper32-26-buffer-overflow-poc/download/",
        "exploit_id": "48517",
        "exploit_description": "\"StreamRipper32 2.6 - Buffer Overflow (PoC)\"",
        "exploit_date": "2020-05-26",
        "exploit_author": "\"Andy Bowden\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48520/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48520/42768/wordpress-plugin-drag-and-drop-file-upload-contact-form-1332-remote-code-execution/download/",
        "exploit_id": "48520",
        "exploit_description": "\"WordPress Plugin Drag and Drop File Upload Contact Form 1.3.3.2 - Remote Code Execution\"",
        "exploit_date": "2020-05-26",
        "exploit_author": "\"Austin Martin\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48515/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48515/42764/openemr-501-remote-code-execution/download/",
        "exploit_id": "48515",
        "exploit_description": "\"OpenEMR 5.0.1 - Remote Code Execution\"",
        "exploit_date": "2020-05-26",
        "exploit_author": "\"Musyoka Ian\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48516/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48516/42765/open-audit-330-reflective-cross-site-scripting-authenticated/download/",
        "exploit_id": "48516",
        "exploit_description": "\"Open-AudIT 3.3.0 - Reflective Cross-Site Scripting (Authenticated)\"",
        "exploit_date": "2020-05-26",
        "exploit_author": "\"Kamaljeet Kumar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48510/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48510/42756/goldwave-buffer-overflow-seh-unicode/download/",
        "exploit_id": "48510",
        "exploit_description": "\"GoldWave - Buffer Overflow (SEH Unicode)\"",
        "exploit_date": "2020-05-25",
        "exploit_author": "\"Andy Bowden\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48513/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48513/42757/pleskmylittleadmin-viewstate-net-deserialization-metasploit/download/",
        "exploit_id": "48513",
        "exploit_description": "\"Plesk/myLittleAdmin - ViewState .NET Deserialization (Metasploit)\"",
        "exploit_date": "2020-05-25",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48514/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48514/42758/synology-diskstation-manager-smartcgi-remote-command-execution-metasploit/download/",
        "exploit_id": "48514",
        "exploit_description": "\"Synology DiskStation Manager - smart.cgi Remote Command Execution (Metasploit)\"",
        "exploit_date": "2020-05-25",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48509/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48509/42759/wordpress-plugin-form-maker-541-s-sql-injection-authenticated/download/",
        "exploit_id": "48509",
        "exploit_description": "\"Wordpress Plugin Form Maker 5.4.1 - 's' SQL Injection (Authenticated)\"",
        "exploit_date": "2020-05-25",
        "exploit_author": "SunCSR",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48511/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48511/42760/victor-cms-10-add-user-persistent-cross-site-scripting/download/",
        "exploit_id": "48511",
        "exploit_description": "\"Victor CMS 1.0 - 'add_user' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-05-25",
        "exploit_author": "\"Nitya Nand\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48512/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48512/42761/online-discussion-forum-site-10-remote-code-execution/download/",
        "exploit_id": "48512",
        "exploit_description": "\"Online Discussion Forum Site 1.0 - Remote Code Execution\"",
        "exploit_date": "2020-05-25",
        "exploit_author": "Enesdex",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    }
]