Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47132/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47132/41518/oracle-siebel-crm-190-persistent-cross-site-scripting/download/",
        "exploit_id": "47132",
        "exploit_description": "\"Oracle Siebel CRM 19.0 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-07-17",
        "exploit_author": "\"Sarath Nair\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47130/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47130/41517/maple-computer-wbt-snmp-administrator-2019515-remote-buffer-overflow/download/",
        "exploit_id": "47130",
        "exploit_description": "\"MAPLE Computer WBT SNMP Administrator 2.0.195.15 - Remote Buffer Overflow\"",
        "exploit_date": "2019-07-17",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47134/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47134/41516/windows-ntusersetwindowfnid-win32k-user-callback-privilege-escalation-metasploit/download/",
        "exploit_id": "47134",
        "exploit_description": "\"Windows - NtUserSetWindowFNID Win32k User Callback Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-07-17",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47133/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47133/41515/linux-broken-permission-and-object-lifetime-handling-for-ptrace-traceme/download/",
        "exploit_id": "47133",
        "exploit_description": "\"Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME\"",
        "exploit_date": "2019-07-17",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47131/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47131/41514/winmpg-ipod-convert-30-register-denial-of-service/download/",
        "exploit_id": "47131",
        "exploit_description": "\"WinMPG iPod Convert 3.0 - 'Register' Denial of Service\"",
        "exploit_date": "2019-07-17",
        "exploit_author": "stresser",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47125/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47125/41513/centos-control-web-panel-098838-user-enumeration/download/",
        "exploit_id": "47125",
        "exploit_description": "\"CentOS Control Web Panel 0.9.8.838 - User Enumeration\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "\"Pongtorn Angsuchotmetee_ Nissana Sirijirakal_ Narin Boonwasanarak\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47124/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47124/41512/centos-control-web-panel-098836-privilege-escalation/download/",
        "exploit_id": "47124",
        "exploit_description": "\"CentOS Control Web Panel 0.9.8.836 - Privilege Escalation\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "\"Pongtorn Angsuchotmetee_ Nissana Sirijirakal_ Narin Boonwasanarak\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47123/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47123/41511/centos-control-web-panel-098836-authentication-bypass/download/",
        "exploit_id": "47123",
        "exploit_description": "\"CentOS Control Web Panel 0.9.8.836 - Authentication Bypass\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "\"Pongtorn Angsuchotmetee\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47129/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47129/41510/php-laravel-framework-5540-56x-5630-token-unserialize-remote-command-execution-metasploit/download/",
        "exploit_id": "47129",
        "exploit_description": "\"PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Command Execution (Metasploit)\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47128/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47128/41509/microsoft-windows-10-build-17763-appxsvc-hard-link-privilege-escalation-metasploit/download/",
        "exploit_id": "47128",
        "exploit_description": "\"Microsoft Windows 10 < build 17763 - AppXSvc Hard Link Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47126/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47126/41508/dameware-remote-support-1200509-host-buffer-overflow-seh/download/",
        "exploit_id": "47126",
        "exploit_description": "\"DameWare Remote Support 12.0.0.509 - 'Host' Buffer Overflow (SEH)\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "\"Xavi Beltran\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47122/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47122/41507/r-344-windows-10-x64-buffer-overflow-seh-depaslr-bypass/download/",
        "exploit_id": "47122",
        "exploit_description": "\"R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass)\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "blackleitus",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47127/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47127/41506/microsoft-compiled-html-help-uncompiled-chm-file-xml-external-entity-injection/download/",
        "exploit_id": "47127",
        "exploit_description": "\"Microsoft Compiled HTML Help / Uncompiled .chm File - XML External Entity Injection\"",
        "exploit_date": "2019-07-16",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47121/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47121/41505/flightpath-482-50-rc2-local-file-inclusion/download/",
        "exploit_id": "47121",
        "exploit_description": "\"FlightPath < 4.8.2 / < 5.0-rc2 - Local File Inclusion\"",
        "exploit_date": "2019-07-15",
        "exploit_author": "\"Mohammed Althibyani\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47118/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47118/41504/cisco-small-business-200-300-500-switches-multiple-vulnerabilities/download/",
        "exploit_id": "47118",
        "exploit_description": "\"CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities\"",
        "exploit_date": "2019-07-15",
        "exploit_author": "Ramikan",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47117/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47117/41503/netgear-wifi-router-jwnr2010v5-r6080-authentication-bypass/download/",
        "exploit_id": "47117",
        "exploit_description": "\"NETGEAR WiFi Router JWNR2010v5 / R6080 - Authentication Bypass\"",
        "exploit_date": "2019-07-15",
        "exploit_author": "Wadeek",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47116/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47116/41502/streamripper-26-song-pattern-buffer-overflow/download/",
        "exploit_id": "47116",
        "exploit_description": "\"Streamripper 2.6 - 'Song Pattern' Buffer Overflow\"",
        "exploit_date": "2019-07-15",
        "exploit_author": "\"Andrey Stoykov\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47120/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47120/41501/microsoft-windows-remote-desktop-bluekeep-denial-of-service-metasploit/download/",
        "exploit_id": "47120",
        "exploit_description": "\"Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)\"",
        "exploit_date": "2019-07-15",
        "exploit_author": "\"RAMELLA Sebastien\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47119/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47119/41500/android-7-9-videoplayer-ihevcd-parse-pps-out-of-bounds-write/download/",
        "exploit_id": "47119",
        "exploit_description": "\"Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write\"",
        "exploit_date": "2019-07-15",
        "exploit_author": "\"Marcin Kozlowski\"",
        "exploit_type": "dos",
        "exploit_platform": "android",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47112/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47112/41499/citrix-sd-wan-appliance-1022-authentication-bypass-remote-command-execution/download/",
        "exploit_id": "47112",
        "exploit_description": "\"Citrix SD-WAN Appliance 10.2.2 - Authentication Bypass / Remote Command Execution\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "\"Chris Lyne\"",
        "exploit_type": "webapps",
        "exploit_platform": "cgi",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47111/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47111/41498/jenkins-dependency-graph-view-plugin-013-persistent-cross-site-scripting/download/",
        "exploit_id": "47111",
        "exploit_description": "\"Jenkins Dependency Graph View Plugin 0.13 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "\"Ishaq Mohammed\"",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47110/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47110/41497/sahi-pro-800-remote-command-execution/download/",
        "exploit_id": "47110",
        "exploit_description": "\"Sahi Pro 8.0.0 - Remote Command Execution\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "AkkuS",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47109/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47109/41496/myt-project-management-151-userusername-persistent-cross-site-scripting/download/",
        "exploit_id": "47109",
        "exploit_description": "\"MyT Project Management 1.5.1 - User[username] Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47107/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47107/41495/tenda-d301-v2-modem-router-persistent-cross-site-scripting/download/",
        "exploit_id": "47107",
        "exploit_description": "\"Tenda D301 v2 Modem Router - Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "ABDO10",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47106/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47106/41494/sitecore-90-rev-171002-persistent-cross-site-scripting/download/",
        "exploit_id": "47106",
        "exploit_description": "\"Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2019-07-11",
        "exploit_author": "\"Owais Mehtab\"",
        "exploit_type": "webapps",
        "exploit_platform": "aspx",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47114/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47114/41493/xymon-4325-useradm-command-execution-metasploit/download/",
        "exploit_id": "47114",
        "exploit_description": "\"Xymon 4.3.25 - useradm Command Execution (Metasploit)\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47115/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47115/41492/microsoft-windows-10017134648-http-smb-ntlm-reflection-leads-to-privilege-elevation/download/",
        "exploit_id": "47115",
        "exploit_description": "\"Microsoft Windows 10.0.17134.648 - HTTP -> SMB NTLM Reflection Leads to Privilege Elevation\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47105/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47105/41491/snmpc-enterprise-edition-910-mapping-filename-buffer-overflow/download/",
        "exploit_id": "47105",
        "exploit_description": "\"SNMPc Enterprise Edition 9/10 - Mapping Filename Buffer Overflow\"",
        "exploit_date": "2019-07-11",
        "exploit_author": "xerubus",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47113/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47113/41490/microsoft-font-subsetting-dll-heap-corruption-in-computeformat4cmapdata/download/",
        "exploit_id": "47113",
        "exploit_description": "\"Microsoft Font Subsetting - DLL Heap Corruption in ComputeFormat4CmapData\"",
        "exploit_date": "2019-07-12",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47080/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47080/41489/apache-mod-ssl-287-openssl-openfuckv2c-remote-buffer-overflow-2/download/",
        "exploit_id": "47080",
        "exploit_description": "\"Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Buffer Overflow (2)\"",
        "exploit_date": "2019-07-07",
        "exploit_author": "\"Brian Peters\"",
        "exploit_type": "remote",
        "exploit_platform": "unix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47103/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47103/41488/microsoft-directwrite-afdko-heap-based-out-of-bounds-readwrite-in-opentype-font-handling-due-to-empty-ros-strings/download/",
        "exploit_id": "47103",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType Font Handling Due to Empty ROS Strings\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47102/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47102/41487/microsoft-directwrite-afdko-null-pointer-dereferences-in-opentype-font-handling-while-accessing-empty-dynarrays/download/",
        "exploit_id": "47102",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - NULL Pointer Dereferences in OpenType Font Handling While Accessing Empty dynarrays\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47101/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47101/41486/microsoft-directwrite-afdko-multiple-bugs-in-opentype-font-handling-related-to-the--post--table/download/",
        "exploit_id": "47101",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Multiple Bugs in OpenType Font Handling Related to the _post_ Table\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47100/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47100/41485/microsoft-directwrite-afdko-out-of-bounds-read-in-opentype-font-handling-due-to-undefined-fontname-index/download/",
        "exploit_id": "47100",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Out-of-Bounds Read in OpenType Font Handling Due to Undefined FontName Index\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47099/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47099/41484/microsoft-directwrite-afdko-stack-corruption-in-opentype-font-handling-while-processing-cff-blend-dict-operator/download/",
        "exploit_id": "47099",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling While Processing CFF Blend DICT Operator\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47098/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47098/41483/microsoft-directwrite-afdko-heap-based-buffer-overflow-in-opentype-font-handling-in-readstrings/download/",
        "exploit_id": "47098",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readStrings\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47097/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47097/41482/microsoft-directwrite-afdko-heap-based-out-of-bounds-readwrite-in-opentype-font-handling-due-to-unbounded-ifd/download/",
        "exploit_id": "47097",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType Font Handling Due to Unbounded iFD\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47096/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47096/41481/microsoft-directwrite-afdko-heap-based-buffer-overflow-due-to-integer-overflow-in-readttcdirectory/download/",
        "exploit_id": "47096",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow Due to Integer Overflow in readTTCDirectory\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47095/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47095/41480/microsoft-directwrite-afdko-heap-based-buffer-overflow-in-opentype-font-handling-in-readcharset/download/",
        "exploit_id": "47095",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readCharset\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47094/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47094/41479/microsoft-directwrite-afdko-heap-based-buffer-overflow-in-opentype-font-handling-in-readfdselect/download/",
        "exploit_id": "47094",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readFDSelect\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47093/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47093/41478/microsoft-directwrite-afdko-heap-based-buffer-overflow-in-opentype-font-handling-in-readencoding/download/",
        "exploit_id": "47093",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readEncoding\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47092/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47092/41477/microsoft-directwrite-afdko-stack-corruption-in-opentype-font-handling-due-to-incorrect-handling-of-blendarray/download/",
        "exploit_id": "47092",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due to Incorrect Handling of blendArray\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47091/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47091/41476/microsoft-directwrite-afdko-interpreter-stack-underflow-in-opentype-font-handling-due-to-missing-chkuflow/download/",
        "exploit_id": "47091",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Interpreter Stack Underflow in OpenType Font Handling Due to Missing CHKUFLOW\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47090/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47090/41475/microsoft-directwrite-afdko-use-of-uninitialized-memory-while-freeing-resources-in-var-loadavar/download/",
        "exploit_id": "47090",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Use of Uninitialized Memory While Freeing Resources in var_loadavar\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47089/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47089/41474/microsoft-directwrite-afdko-stack-based-buffer-overflow-in-do-set-weight-vector-cube-for-large-naxes/download/",
        "exploit_id": "47089",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Stack-Based Buffer Overflow in do_set_weight_vector_cube for Large nAxes\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47088/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47088/41473/microsoft-directwrite-afdko-stack-corruption-in-opentype-font-handling-due-to-negative-naxes/download/",
        "exploit_id": "47088",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due to Negative nAxes\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47087/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47087/41472/microsoft-directwrite-afdko-stack-corruption-in-opentype-font-handling-due-to-negative-cubestackdepth/download/",
        "exploit_id": "47087",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due to Negative cubeStackDepth\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47086/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47086/41471/microsoft-directwrite-afdko-stack-corruption-in-opentype-font-handling-due-to-out-of-bounds-cubestackdepth/download/",
        "exploit_id": "47086",
        "exploit_description": "\"Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling due to Out-of-Bounds cubeStackDepth\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47085/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47085/41470/mozilla-spidermonkey-unboxed-objects-uninitialized-memory-access/download/",
        "exploit_id": "47085",
        "exploit_description": "\"Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47084/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47084/41469/microsoft-windows-font-subsetting-dll-heap-based-out-of-bounds-read-in-mergefonts/download/",
        "exploit_id": "47084",
        "exploit_description": "\"Microsoft Windows - Font Subsetting DLL Heap-Based Out-of-Bounds Read in MergeFonts\"",
        "exploit_date": "2019-07-10",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47079/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47079/41468/firefox-6704-denial-of-service/download/",
        "exploit_id": "47079",
        "exploit_description": "\"Firefox 67.0.4 - Denial of Service\"",
        "exploit_date": "2019-07-09",
        "exploit_author": "\"Tejas Ajay Naik\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47078/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47078/41467/wordpress-plugin-like-button-160-authentication-bypass/download/",
        "exploit_id": "47078",
        "exploit_description": "\"WordPress Plugin Like Button 1.6.0 - Authentication Bypass\"",
        "exploit_date": "2019-07-08",
        "exploit_author": "\"Benjamin Lim\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47077/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47077/41466/karenderia-multiple-restaurant-system-53-sql-injection/download/",
        "exploit_id": "47077",
        "exploit_description": "\"Karenderia Multiple Restaurant System 5.3 - SQL Injection\"",
        "exploit_date": "2019-07-08",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47075/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47075/41465/karenderia-multiple-restaurant-system-53-local-file-inclusion/download/",
        "exploit_id": "47075",
        "exploit_description": "\"Karenderia Multiple Restaurant System 5.3 - Local File Inclusion\"",
        "exploit_date": "2019-07-05",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47076/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47076/41464/microsoft-exchange-2003-base64-mime-remote-code-execution/download/",
        "exploit_id": "47076",
        "exploit_description": "\"Microsoft Exchange 2003 - base64-MIME Remote Code Execution\"",
        "exploit_date": "2019-07-05",
        "exploit_author": "\"Charles Truscott\"",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47071/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47071/41463/symantec-dlp-155-mp1-cross-site-scripting/download/",
        "exploit_id": "47071",
        "exploit_description": "\"Symantec DLP 15.5 MP1 - Cross-Site Scripting\"",
        "exploit_date": "2019-07-03",
        "exploit_author": "\"Chapman Schleiss\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47069/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47069/41462/centreon-1904-remote-code-execution/download/",
        "exploit_id": "47069",
        "exploit_description": "\"Centreon 19.04  - Remote Code Execution\"",
        "exploit_date": "2019-07-02",
        "exploit_author": "Askar",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47073/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47073/41461/apache-tomcat-cgiservlet-enablecmdlinearguments-remote-code-execution-metasploit/download/",
        "exploit_id": "47073",
        "exploit_description": "\"Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (Metasploit)\"",
        "exploit_date": "2019-07-03",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47072/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47072/41460/serv-u-ftp-server-prepareinstallation-privilege-escalation-metasploit/download/",
        "exploit_id": "47072",
        "exploit_description": "\"Serv-U FTP Server - prepareinstallation Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-07-03",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47070/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47070/41459/mac-os-x-timemachine-tmdiagnose-command-injection-privilege-escalation-metasploit/download/",
        "exploit_id": "47070",
        "exploit_description": "\"Mac OS X TimeMachine - 'tmdiagnose' Command Injection Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-07-02",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "macos",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47066/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47066/41458/facesentry-access-control-system-648-remote-root-exploit/download/",
        "exploit_id": "47066",
        "exploit_description": "\"FaceSentry Access Control System 6.4.8 - Remote Root Exploit\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47065/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47065/41457/facesentry-access-control-system-648-cross-site-request-forgery/download/",
        "exploit_id": "47065",
        "exploit_description": "\"FaceSentry Access Control System 6.4.8 - Cross-Site Request Forgery\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47064/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47064/41456/facesentry-access-control-system-648-remote-command-injection/download/",
        "exploit_id": "47064",
        "exploit_description": "\"FaceSentry Access Control System 6.4.8 - Remote Command Injection\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47063/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47063/41455/cyberpanel-184-cross-site-request-forgery/download/",
        "exploit_id": "47063",
        "exploit_description": "\"CyberPanel 1.8.4 - Cross-Site Request Forgery\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Bilgi Birikim Sistemleri\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47062/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47062/41454/sahi-pro-8x-directory-traversal/download/",
        "exploit_id": "47062",
        "exploit_description": "\"Sahi pro 8.x - Directory Traversal\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Alexander Bluestein\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47061/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47061/41453/sap-crystal-reports-information-disclosure/download/",
        "exploit_id": "47061",
        "exploit_description": "\"SAP Crystal Reports - Information Disclosure\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Mohamed M.Fouad\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47060/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47060/41452/zoneminder-1323-cross-site-scripting/download/",
        "exploit_id": "47060",
        "exploit_description": "\"ZoneMinder 1.32.3 - Cross-Site Scripting\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Joey Lane\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47059/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47059/41451/powerpanel-business-edition-cross-site-scripting/download/",
        "exploit_id": "47059",
        "exploit_description": "\"PowerPanel Business Edition - Cross-Site Scripting\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Joey Lane\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47058/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47058/41450/varient-161-sql-injection/download/",
        "exploit_id": "47058",
        "exploit_description": "\"Varient 1.6.1 - SQL Injection\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47046/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47046/41449/ciuiscrm-16-eventtype-sql-injection/download/",
        "exploit_id": "47046",
        "exploit_description": "\"CiuisCRM 1.6 - 'eventType' SQL Injection\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47045/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47045/41448/worksuite-prm-24-password-sql-injection/download/",
        "exploit_id": "47045",
        "exploit_description": "\"WorkSuite PRM 2.4 - 'password' SQL Injection\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47067/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47067/41447/facesentry-access-control-system-648-remote-ssh-root/download/",
        "exploit_id": "47067",
        "exploit_description": "\"FaceSentry Access Control System 6.4.8 - Remote SSH Root\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "LiquidWorm",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47047/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47047/41446/linux-mint-183-191-yelp-command-injection/download/",
        "exploit_id": "47047",
        "exploit_description": "\"Linux Mint 18.3-19.1 - 'yelp' Command Injection\"",
        "exploit_date": "2019-07-01",
        "exploit_author": "b1ack0wl",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47044/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47044/41445/librenms-146-addhost-remote-code-execution/download/",
        "exploit_id": "47044",
        "exploit_description": "\"LibreNMS 1.46 - 'addhost' Remote Code Execution\"",
        "exploit_date": "2019-06-28",
        "exploit_author": "Askar",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47039/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47039/41444/nagios-xi-556-magpie-debugphp-root-remote-code-execution-metasploit/download/",
        "exploit_id": "47039",
        "exploit_description": "\"Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit)\"",
        "exploit_date": "2019-06-26",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47038/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47038/41443/mozilla-spidermonkey-ionmonkey-arrayprototypepop-type-confusion/download/",
        "exploit_id": "47038",
        "exploit_description": "\"Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion\"",
        "exploit_date": "2019-06-26",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47037/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47037/41442/wordpress-plugin-live-chat-unlimited-283-cross-site-scripting/download/",
        "exploit_id": "47037",
        "exploit_description": "\"WordPress Plugin Live Chat Unlimited  2.8.3 - Cross-Site Scripting\"",
        "exploit_date": "2019-06-25",
        "exploit_author": "m0ze",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47036/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47036/41441/wordpress-plugin-ilive-104-cross-site-scripting/download/",
        "exploit_id": "47036",
        "exploit_description": "\"WordPress Plugin iLive 1.0.4 - Cross-Site Scripting\"",
        "exploit_date": "2019-06-25",
        "exploit_author": "m0ze",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47035/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47035/41440/blogenginenet-336337-path-directory-traversal/download/",
        "exploit_id": "47035",
        "exploit_description": "\"BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal\"",
        "exploit_date": "2019-06-25",
        "exploit_author": "\"Aaron Bishop\"",
        "exploit_type": "webapps",
        "exploit_platform": "aspx",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47034/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47034/41439/azadmin-cms-10-sql-injection/download/",
        "exploit_id": "47034",
        "exploit_description": "\"AZADMIN CMS 1.0 - SQL Injection\"",
        "exploit_date": "2019-06-25",
        "exploit_author": "\"felipe andrian\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47033/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47033/41438/fortinet-fcm-mb40-cross-site-request-forgery-remote-command-execution/download/",
        "exploit_id": "47033",
        "exploit_description": "\"Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution\"",
        "exploit_date": "2019-06-25",
        "exploit_author": "XORcat",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47027/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47027/41437/grandnode-440-path-traversal-arbitrary-file-download/download/",
        "exploit_id": "47027",
        "exploit_description": "\"GrandNode 4.40 - Path Traversal / Arbitrary File Download\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "\"Corey Robinson\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47022/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47022/41436/seeddms-versions-5111-remote-command-execution/download/",
        "exploit_id": "47022",
        "exploit_description": "\"SeedDMS versions < 5.1.11 - Remote Command Execution\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "\"Nimit Jain\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47024/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47024/41435/seeddms-5111-outgroupmgrphp-cross-site-scripting/download/",
        "exploit_id": "47024",
        "exploit_description": "\"SeedDMS < 5.1.11 - 'out.GroupMgr.php' Cross-Site Scripting\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "\"Nimit Jain\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47023/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47023/41434/seeddms-5111-outusrmgrphp-cross-site-scripting/download/",
        "exploit_id": "47023",
        "exploit_description": "\"SeedDMS < 5.1.11 - 'out.UsrMgr.php' Cross-Site Scripting\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "\"Nimit Jain\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47021/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47021/41433/dotproject-219-sql-injection/download/",
        "exploit_id": "47021",
        "exploit_description": "\"dotProject 2.1.9 - SQL Injection\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47031/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47031/41432/sapido-rb-1732-remote-command-execution/download/",
        "exploit_id": "47031",
        "exploit_description": "\"SAPIDO RB-1732 - Remote Command Execution\"",
        "exploit_date": "2019-06-25",
        "exploit_author": "k1nm3n.aotoi",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47030/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47030/41431/superdoctor5-nrpe-remote-code-execution/download/",
        "exploit_id": "47030",
        "exploit_description": "\"SuperDoctor5 - 'NRPE' Remote Code Execution\"",
        "exploit_date": "2019-06-25",
        "exploit_author": "\"Simon Gurney\"",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47029/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47029/41430/microsoft-windows-font-cache-service-insecure-sections-privilege-escalation/download/",
        "exploit_id": "47029",
        "exploit_description": "\"Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47028/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47028/41429/microsoft-windows-cmpaddremovecontainertoclfslog-arbitrary-filedirectory-creation/download/",
        "exploit_id": "47028",
        "exploit_description": "\"Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory Creation\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47026/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47026/41428/gsearch-1010-denial-of-service-poc/download/",
        "exploit_id": "47026",
        "exploit_description": "\"GSearch 1.0.1.0 - Denial of Service (PoC)\"",
        "exploit_date": "2019-06-24",
        "exploit_author": "0xB9",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47014/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47014/41427/blogenginenet-336337-xml-external-entity-injection/download/",
        "exploit_id": "47014",
        "exploit_description": "\"BlogEngine.NET 3.3.6/3.3.7 - XML External Entity Injection\"",
        "exploit_date": "2019-06-20",
        "exploit_author": "\"Aaron Bishop\"",
        "exploit_type": "webapps",
        "exploit_platform": "aspx",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47013/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47013/41426/weberp-415-sql-injection/download/",
        "exploit_id": "47013",
        "exploit_description": "\"WebERP 4.15 - SQL injection\"",
        "exploit_date": "2019-06-20",
        "exploit_author": "\"Semen Alexandrovich Lyhin\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47019/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47019/41425/ea-origin-10538-remote-code-execution/download/",
        "exploit_id": "47019",
        "exploit_description": "\"EA Origin < 10.5.38 - Remote Code Execution\"",
        "exploit_date": "2019-06-21",
        "exploit_author": "\"Dominik Penner\"",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47016/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47016/41424/cisco-prime-infrastructure-health-monitor-tararchive-directory-traversal-metasploit/download/",
        "exploit_id": "47016",
        "exploit_description": "\"Cisco Prime Infrastructure Health Monitor - TarArchive Directory Traversal (Metasploit)\"",
        "exploit_date": "2019-06-20",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47017/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47017/41423/cisco-prime-infrastructure-runrshell-privilege-escalation-metasploit/download/",
        "exploit_id": "47017",
        "exploit_description": "\"Cisco Prime Infrastructure - Runrshell Privilege Escalation (Metasploit)\"",
        "exploit_date": "2019-06-20",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47012/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47012/41422/tuneclone-220-local-seh-buffer-overflow/download/",
        "exploit_id": "47012",
        "exploit_description": "\"Tuneclone 2.20 - Local SEH Buffer Overflow\"",
        "exploit_date": "2019-06-20",
        "exploit_author": "Achilles",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47015/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47015/41421/linux-use-after-free-via-race-between-modify-ldt-and-br-exception/download/",
        "exploit_id": "47015",
        "exploit_description": "\"Linux - Use-After-Free via race Between modify_ldt() and #BR Exception\"",
        "exploit_date": "2019-06-20",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47011/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47011/41420/blogenginenet-336337-theme-cookie-directory-traversal-remote-code-execution/download/",
        "exploit_id": "47011",
        "exploit_description": "\"BlogEngine.NET 3.3.6/3.3.7 - 'theme Cookie' Directory Traversal / Remote Code Execution\"",
        "exploit_date": "2019-06-19",
        "exploit_author": "\"Aaron Bishop\"",
        "exploit_type": "webapps",
        "exploit_platform": "aspx",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/47010/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/47010/41419/blogenginenet-336337-dirpath-directory-traversal-remote-code-execution/download/",
        "exploit_id": "47010",
        "exploit_description": "\"BlogEngine.NET 3.3.6/3.3.7 - 'dirPath' Directory Traversal / Remote Code Execution\"",
        "exploit_date": "2019-06-19",
        "exploit_author": "\"Aaron Bishop\"",
        "exploit_type": "webapps",
        "exploit_platform": "aspx",
        "exploit_port": null
    }
]