Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48280/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48280/42545/pandora-fms-70ng-net-toolsphp-remote-code-execution/download/",
        "exploit_id": "48280",
        "exploit_description": "\"Pandora FMS 7.0NG - 'net_tools.php' Remote Code Execution\"",
        "exploit_date": "2020-04-03",
        "exploit_author": "\"Basim Alabdullah\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48281/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48281/42544/aida64-engineer-6205300-report-file-filename-buffer-overflow-seh/download/",
        "exploit_id": "48281",
        "exploit_description": "\"AIDA64 Engineer 6.20.5300 - 'Report File' filename Buffer Overflow (SEH)\"",
        "exploit_date": "2020-04-03",
        "exploit_author": "Hodorsec",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48279/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48279/42543/diskboss-7714-input-directory-local-buffer-overflow-poc/download/",
        "exploit_id": "48279",
        "exploit_description": "\"DiskBoss 7.7.14 - 'Input Directory' Local Buffer Overflow (PoC)\"",
        "exploit_date": "2020-04-02",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48276/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48276/42535/diskboss-7714-denial-of-service-poc/download/",
        "exploit_id": "48276",
        "exploit_description": "\"DiskBoss 7.7.14 - Denial of Service (PoC)\"",
        "exploit_date": "2020-04-01",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48277/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48277/42536/10strike-lanstate-932-force-check-buffer-overflow-seh/download/",
        "exploit_id": "48277",
        "exploit_description": "\"10Strike LANState 9.32 - 'Force Check' Buffer Overflow (SEH)\"",
        "exploit_date": "2020-04-01",
        "exploit_author": "Hodorsec",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48274/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48274/42539/dlink-dwl-2600-authenticated-remote-command-injection-metasploit/download/",
        "exploit_id": "48274",
        "exploit_description": "\"DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit)\"",
        "exploit_date": "2020-03-31",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48269/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48269/42534/flashfxp-420-build-1730-denial-of-service-poc/download/",
        "exploit_id": "48269",
        "exploit_description": "\"FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)\"",
        "exploit_date": "2020-03-31",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48271/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48271/42542/grandstream-ucm6200-series-websocket-102020-user-password-sql-injection/download/",
        "exploit_id": "48271",
        "exploit_description": "\"Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection\"",
        "exploit_date": "2020-03-31",
        "exploit_author": "\"Jacob Baines\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48273/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48273/42538/ibm-tm1-planning-analytics-unauthenticated-remote-code-execution-metasploit/download/",
        "exploit_id": "48273",
        "exploit_description": "\"IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit)\"",
        "exploit_date": "2020-03-31",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48275/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48275/42540/sharepoint-workflows-xoml-injection-metasploit/download/",
        "exploit_id": "48275",
        "exploit_description": "\"SharePoint Workflows - XOML Injection (Metasploit)\"",
        "exploit_date": "2020-03-31",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48272/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48272/42537/redis-replication-code-execution-metasploit/download/",
        "exploit_id": "48272",
        "exploit_description": "\"Redis - Replication Code Execution (Metasploit)\"",
        "exploit_date": "2020-03-31",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48270/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48270/42541/grandstream-ucm6200-series-cti-interface-user-password-sql-injection/download/",
        "exploit_id": "48270",
        "exploit_description": "\"Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection\"",
        "exploit_date": "2020-03-31",
        "exploit_author": "\"Jacob Baines\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48267/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48267/42520/microsoft-windows-10-19031909-smbghost-smb311-smb2-compression-capabilities-local-privilege-escalation/download/",
        "exploit_id": "48267",
        "exploit_description": "\"Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Local Privilege Escalation\"",
        "exploit_date": "2020-03-30",
        "exploit_author": "\"Daniel García Gutiérrez\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48268/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48268/42521/multiple-draytek-products-pre-authentication-remote-root-code-execution/download/",
        "exploit_id": "48268",
        "exploit_description": "\"Multiple DrayTek Products - Pre-authentication Remote Root Code Execution\"",
        "exploit_date": "2020-03-30",
        "exploit_author": "0xsha",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48266/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48266/42533/zen-load-balancer-3101-remote-code-execution/download/",
        "exploit_id": "48266",
        "exploit_description": "\"Zen Load Balancer 3.10.1 - Remote Code Execution\"",
        "exploit_date": "2020-03-30",
        "exploit_author": "\"Cody Sixteen\"",
        "exploit_type": "webapps",
        "exploit_platform": "cgi",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48263/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48263/42532/joomla-com-fabrik-3911-directory-traversal/download/",
        "exploit_id": "48263",
        "exploit_description": "\"Joomla! com_fabrik 3.9.11 - Directory Traversal\"",
        "exploit_date": "2020-03-30",
        "exploit_author": "qw3rTyTy",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48264/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48264/42519/10-strike-network-inventory-explorer-903-read-from-file-buffer-overflow-sehrop/download/",
        "exploit_id": "48264",
        "exploit_description": "\"10-Strike Network Inventory Explorer 9.03 - 'Read from File' Buffer Overflow (SEH)(ROP)\"",
        "exploit_date": "2020-03-30",
        "exploit_author": "Hodorsec",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48262/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48262/42513/odin-secure-ftp-expert-763-site-info-denial-of-service-poc/download/",
        "exploit_id": "48262",
        "exploit_description": "\"Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC)\"",
        "exploit_date": "2020-03-30",
        "exploit_author": "\"Ivan Marmolejo\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48257/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48257/42518/easy-rm-to-mp3-converter-273700-input-local-buffer-overflow-seh/download/",
        "exploit_id": "48257",
        "exploit_description": "\"Easy RM to MP3 Converter 2.7.3.700 - 'Input' Local Buffer Overflow (SEH)\"",
        "exploit_date": "2020-03-27",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48259/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48259/42512/everest-5502100-open-file-denial-of-service-poc/download/",
        "exploit_id": "48259",
        "exploit_description": "\"Everest 5.50.2100 - 'Open File' Denial of Service (PoC)\"",
        "exploit_date": "2020-03-27",
        "exploit_author": "\"Ivan Marmolejo\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48258/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48258/42529/eck-hotel-10-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48258",
        "exploit_description": "\"ECK Hotel 1.0 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-03-27",
        "exploit_author": "\"Mustafa Emre Gül\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48261/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48261/42531/rconfig-394-searchfield-unauthenticated-root-remote-code-execution/download/",
        "exploit_id": "48261",
        "exploit_description": "\"rConfig 3.9.4 - 'searchField' Unauthenticated Root Remote Code Execution\"",
        "exploit_date": "2020-03-27",
        "exploit_author": "vikingfr",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48260/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48260/42530/jinfornet-jreport-156-unauthenticated-directory-traversal/download/",
        "exploit_id": "48260",
        "exploit_description": "\"Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal\"",
        "exploit_date": "2020-03-27",
        "exploit_author": "hongphukt",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48256/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48256/42528/centreo-19108-displayservicestatus-remote-code-execution/download/",
        "exploit_id": "48256",
        "exploit_description": "\"Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution\"",
        "exploit_date": "2020-03-26",
        "exploit_author": "\"Engin Demirbilek\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48255/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48255/42527/tp-link-archer-c50-3-denial-of-service-poc/download/",
        "exploit_id": "48255",
        "exploit_description": "\"TP-Link Archer C50 3 - Denial of Service (PoC)\"",
        "exploit_date": "2020-03-26",
        "exploit_author": "thewhiteh4t",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48248/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48248/42525/joomla-component-gmapfp-330-arbitrary-file-upload/download/",
        "exploit_id": "48248",
        "exploit_description": "\"Joomla! Component GMapFP 3.30 - Arbitrary File Upload\"",
        "exploit_date": "2020-03-25",
        "exploit_author": "ThelastVvV",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48249/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48249/42515/avast-secureline-555220-secureline-unquoted-service-path/download/",
        "exploit_id": "48249",
        "exploit_description": "\"AVAST SecureLine 5.5.522.0 - 'SecureLine' Unquoted Service Path\"",
        "exploit_date": "2020-03-25",
        "exploit_author": "\"Roberto Piña\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48250/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48250/42526/leptoncms-450-persistent-cross-site-scripting/download/",
        "exploit_id": "48250",
        "exploit_description": "\"LeptonCMS 4.5.0 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-03-25",
        "exploit_author": "SunCSR",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48251/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48251/42516/10-strike-network-inventory-explorer-srvinventorywebserver-unquoted-service-path/download/",
        "exploit_id": "48251",
        "exploit_description": "\"10-Strike Network Inventory Explorer - 'srvInventoryWebServer' Unquoted Service Path\"",
        "exploit_date": "2020-03-25",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48253/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48253/42517/10-strike-network-inventory-explorer-854-add-local-buffer-overflow-seh/download/",
        "exploit_id": "48253",
        "exploit_description": "\"10-Strike Network Inventory Explorer 8.54 - 'Add' Local Buffer Overflow (SEH)\"",
        "exploit_date": "2020-03-25",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48245/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48245/42523/wordpress-plugin-wpforms-1582-persistent-cross-site-scripting/download/",
        "exploit_id": "48245",
        "exploit_description": "\"Wordpress Plugin WPForms 1.5.8.2 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-03-24",
        "exploit_author": "\"Jinson Varghese Behanan\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48246/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48246/42514/veyon-434-veyonservice-unquoted-service-path/download/",
        "exploit_id": "48246",
        "exploit_description": "\"Veyon 4.3.4 - 'VeyonService' Unquoted Service Path\"",
        "exploit_date": "2020-03-24",
        "exploit_author": "\"Víctor García\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48247/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48247/42524/ucm6202-101813-remote-command-injection/download/",
        "exploit_id": "48247",
        "exploit_description": "\"UCM6202 1.0.18.13 - Remote Command Injection\"",
        "exploit_date": "2020-03-24",
        "exploit_author": "\"Jacob Baines\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48244/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48244/42522/ulicms-20201-persistent-cross-site-scripting/download/",
        "exploit_id": "48244",
        "exploit_description": "\"UliCMS 2020.1 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-03-24",
        "exploit_author": "SunCSR",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48242/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48242/42511/joomla-com-hdwplayer-42-searchphp-sql-injection/download/",
        "exploit_id": "48242",
        "exploit_description": "\"Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection\"",
        "exploit_date": "2020-03-23",
        "exploit_author": "qw3rTyTy",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48241/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48241/42510/rconfig-394-searchcrudphp-remote-command-injection/download/",
        "exploit_id": "48241",
        "exploit_description": "\"rConfig 3.9.4 - 'search.crud.php' Remote Command Injection\"",
        "exploit_date": "2020-03-23",
        "exploit_author": "\"Matthew Aberegg\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48236/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48236/42503/proficyscada-for-ios-5025920-password-denial-of-service-poc/download/",
        "exploit_id": "48236",
        "exploit_description": "\"ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC)\"",
        "exploit_date": "2020-03-23",
        "exploit_author": "\"Ivan Marmolejo\"",
        "exploit_type": "dos",
        "exploit_platform": "ios",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48237/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48237/42504/google-chrome-800398787-heap-corruption-remote-denial-of-service-poc/download/",
        "exploit_id": "48237",
        "exploit_description": "\"Google Chrome 80.0.3987.87 - Heap-Corruption Remote Denial of Service (PoC)\"",
        "exploit_date": "2020-03-23",
        "exploit_author": "\"Cem Onat Karagun\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48239/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48239/42507/cyberark-psmp-1091-policy-restriction-bypass/download/",
        "exploit_id": "48239",
        "exploit_description": "\"CyberArk PSMP 10.9.1 - Policy Restriction Bypass\"",
        "exploit_date": "2020-03-23",
        "exploit_author": "\"LAHBAL Said\"",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48240/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48240/42509/fibaro-system-home-center-5021-remote-file-include/download/",
        "exploit_id": "48240",
        "exploit_description": "\"FIBARO System Home Center 5.021 - Remote File Include\"",
        "exploit_date": "2020-03-23",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48234/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48234/42508/exagate-sysguard-6001-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48234",
        "exploit_description": "\"Exagate Sysguard 6001 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-03-20",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48235/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48235/42505/vmware-fusion-1152-privilege-escalation/download/",
        "exploit_id": "48235",
        "exploit_description": "\"VMware Fusion 11.5.2 - Privilege Escalation\"",
        "exploit_date": "2020-03-20",
        "exploit_author": "\"Rich Mirch\"",
        "exploit_type": "local",
        "exploit_platform": "macos",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48233/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48233/42506/broadcom-wi-fi-devices-kr00k-information-disclosure/download/",
        "exploit_id": "48233",
        "exploit_description": "\"Broadcom Wi-Fi Devices - 'KR00K Information Disclosure\"",
        "exploit_date": "2020-03-18",
        "exploit_author": "\"Maurizio S\"",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48225/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48225/42502/netlink-gpon-router-1011-remote-code-execution/download/",
        "exploit_id": "48225",
        "exploit_description": "\"Netlink GPON Router 1.0.11 - Remote Code Execution\"",
        "exploit_date": "2020-03-18",
        "exploit_author": "shellord",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48227/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48227/42491/netbackup-70-netbackup-inet-daemon-unquoted-service-path/download/",
        "exploit_id": "48227",
        "exploit_description": "\"NetBackup 7.0 - 'NetBackup INET Daemon' Unquoted Service Path\"",
        "exploit_date": "2020-03-18",
        "exploit_author": "\"El Masas\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48228/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48228/42496/microtik-ssh-daemon-6443-denial-of-service-poc/download/",
        "exploit_id": "48228",
        "exploit_description": "\"Microtik SSH Daemon 6.44.3 - Denial of Service (PoC)\"",
        "exploit_date": "2020-03-18",
        "exploit_author": "FarazPajohan",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48232/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48232/42493/vmware-fusion-local-privilege-escalation/download/",
        "exploit_id": "48232",
        "exploit_description": "\"VMWare Fusion - Local Privilege Escalation\"",
        "exploit_date": "2020-03-17",
        "exploit_author": "Grimm",
        "exploit_type": "local",
        "exploit_platform": "macos",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48231/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48231/42492/microsoft-vscode-python-extension-code-execution/download/",
        "exploit_id": "48231",
        "exploit_description": "\"Microsoft VSCode Python Extension - Code Execution\"",
        "exploit_date": "2020-03-17",
        "exploit_author": "Doyensec",
        "exploit_type": "local",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48224/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48224/42495/manageengine-desktop-central-java-deserialization-metasploit/download/",
        "exploit_id": "48224",
        "exploit_description": "\"ManageEngine Desktop Central - Java Deserialization (Metasploit)\"",
        "exploit_date": "2020-03-17",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48223/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48223/42494/rconfig-3x-chained-remote-code-execution-metasploit/download/",
        "exploit_id": "48223",
        "exploit_description": "\"Rconfig 3.x - Chained Remote Code Execution (Metasploit)\"",
        "exploit_date": "2020-03-17",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48218/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48218/42498/miladworkshop-vip-system-10-lang-sql-injection/download/",
        "exploit_id": "48218",
        "exploit_description": "\"MiladWorkShop VIP System 1.0 - 'lang' SQL Injection\"",
        "exploit_date": "2020-03-16",
        "exploit_author": "\"AYADI Mohamed\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48217/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48217/42497/enhanced-multimedia-router-30427-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48217",
        "exploit_description": "\"Enhanced Multimedia Router 3.0.4.27 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-03-16",
        "exploit_author": "\"Miguel Mendez Z\"",
        "exploit_type": "webapps",
        "exploit_platform": "asp",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48219/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48219/42499/phpkb-multi-language-9-authenticated-remote-code-execution/download/",
        "exploit_id": "48219",
        "exploit_description": "\"PHPKB Multi-Language 9 - Authenticated Remote Code Execution\"",
        "exploit_date": "2020-03-16",
        "exploit_author": "\"Antonio Cannito\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48221/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48221/42501/phpkb-multi-language-9-image-uploadphp-authenticated-remote-code-execution/download/",
        "exploit_id": "48221",
        "exploit_description": "\"PHPKB Multi-Language 9 - 'image-upload.php' Authenticated Remote Code Execution\"",
        "exploit_date": "2020-03-16",
        "exploit_author": "\"Antonio Cannito\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48220/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48220/42500/phpkb-multi-language-9-authenticated-directory-traversal/download/",
        "exploit_id": "48220",
        "exploit_description": "\"PHPKB Multi-Language 9 - Authenticated Directory Traversal\"",
        "exploit_date": "2020-03-16",
        "exploit_author": "\"Antonio Cannito\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48216/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48216/42489/microsoft-windows-10-19031909-smbghost-smb311-smb2-compression-capabilities-buffer-overflow-poc/download/",
        "exploit_id": "48216",
        "exploit_description": "\"Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Buffer Overflow (PoC)\"",
        "exploit_date": "2020-03-14",
        "exploit_author": "eerykitty",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48212/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48212/42488/centos-webpanel-7-term-sql-injection/download/",
        "exploit_id": "48212",
        "exploit_description": "\"Centos WebPanel 7 - 'term' SQL Injection\"",
        "exploit_date": "2020-03-13",
        "exploit_author": "\"Berke YILMAZ\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48214/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48214/42478/drobo-5n2-411-remote-command-injection/download/",
        "exploit_id": "48214",
        "exploit_description": "\"Drobo 5N2 4.1.1 - Remote Command Injection\"",
        "exploit_date": "2020-03-13",
        "exploit_author": "\"Ian Sindermann\"",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48211/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48211/42477/anyburn-48-buffer-overflow-seh/download/",
        "exploit_id": "48211",
        "exploit_description": "\"AnyBurn 4.8 - Buffer Overflow (SEH)\"",
        "exploit_date": "2020-03-13",
        "exploit_author": "\"Richard Davy\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48208/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48208/42485/rconfig-39-searchcolumn-sql-injection/download/",
        "exploit_id": "48208",
        "exploit_description": "\"rConfig 3.9 - 'searchColumn' SQL Injection\"",
        "exploit_date": "2020-03-12",
        "exploit_author": "vikingfr",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48207/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48207/42484/rconfig-393-ajaxaddtemplatephp-authenticated-remote-code-execution/download/",
        "exploit_id": "48207",
        "exploit_description": "\"rConfig 3.93 - 'ajaxAddTemplate.php' Authenticated Remote Code Execution\"",
        "exploit_date": "2020-03-12",
        "exploit_author": "\"Engin Demirbilek\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48205/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48205/42483/hrsale-118-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48205",
        "exploit_description": "\"HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-03-12",
        "exploit_author": "\"Ismail Akıcı\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48204/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48204/42482/wordpress-plugin-appointment-booking-calendar-1334-csv-injection/download/",
        "exploit_id": "48204",
        "exploit_description": "\"Wordpress Plugin Appointment Booking Calendar 1.3.34 - CSV Injection\"",
        "exploit_date": "2020-03-12",
        "exploit_author": "\"Daniel Monzón\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48202/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48202/42480/joomla-component-com-newsfeeds-10-feedid-sql-injection/download/",
        "exploit_id": "48202",
        "exploit_description": "\"Joomla! Component com_newsfeeds 1.0 - 'feedid' SQL Injection\"",
        "exploit_date": "2020-03-12",
        "exploit_author": "\"Milad karimi\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48203/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48203/42481/watchguard-fireware-ad-helper-component-58510317-credential-disclosure/download/",
        "exploit_id": "48203",
        "exploit_description": "\"WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure\"",
        "exploit_date": "2020-03-12",
        "exploit_author": "\"RedTeam Pentesting GmbH\"",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48206/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48206/42476/asus-aahm-10022-ashmcomsvc-unquoted-service-path/download/",
        "exploit_id": "48206",
        "exploit_description": "\"ASUS AAHM 1.00.22 - 'asHmComSvc' Unquoted Service Path\"",
        "exploit_date": "2020-03-12",
        "exploit_author": "\"Roberto Piña\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48209/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48209/42486/horde-groupware-webmail-edition-5222-php-file-inclusion/download/",
        "exploit_id": "48209",
        "exploit_description": "\"Horde Groupware Webmail Edition 5.2.22 - PHP File Inclusion\"",
        "exploit_date": "2020-03-11",
        "exploit_author": "\"Andrea Cardaci\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48210/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48210/42487/horde-groupware-webmail-edition-5222-phar-loading/download/",
        "exploit_id": "48210",
        "exploit_description": "\"Horde Groupware Webmail Edition 5.2.22 - PHAR Loading\"",
        "exploit_date": "2020-03-11",
        "exploit_author": "\"Andrea Cardaci\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48197/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48197/42479/wordpress-plugin-search-meter-2132-csv-injection/download/",
        "exploit_id": "48197",
        "exploit_description": "\"Wordpress Plugin Search Meter 2.13.2 - CSV injection\"",
        "exploit_date": "2020-03-11",
        "exploit_author": "\"Daniel Monzón\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48193/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48193/42475/asus-axsp-10200-ascomsvc-unquoted-service-path/download/",
        "exploit_id": "48193",
        "exploit_description": "\"ASUS AXSP 1.02.00 - 'asComSvc' Unquoted Service Path\"",
        "exploit_date": "2020-03-11",
        "exploit_author": "\"Roberto Piña\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48192/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48192/42471/phpstudy-backdoor-remote-code-execution-metasploit/download/",
        "exploit_id": "48192",
        "exploit_description": "\"PHPStudy - Backdoor Remote Code execution (Metasploit)\"",
        "exploit_date": "2020-03-10",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48188/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48188/42472/sysaid-20111-b26-remote-command-execution/download/",
        "exploit_id": "48188",
        "exploit_description": "\"Sysaid 20.1.11 b26 - Remote Command Execution\"",
        "exploit_date": "2020-03-10",
        "exploit_author": "\"Ahmed Sherif\"",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48189/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48189/42473/yzmcms-55-url-persistent-cross-site-scripting/download/",
        "exploit_id": "48189",
        "exploit_description": "\"YzmCMS 5.5 - 'url' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-03-10",
        "exploit_author": "En_dust",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48191/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48191/42470/nagios-xi-authenticated-remote-command-execution-metasploit/download/",
        "exploit_id": "48191",
        "exploit_description": "\"Nagios XI - Authenticated Remote Command Execution (Metasploit)\"",
        "exploit_date": "2020-03-10",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48190/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48190/42474/persian-vip-download-script-10-active-sql-injection/download/",
        "exploit_id": "48190",
        "exploit_description": "\"Persian VIP Download Script 1.0 - 'active' SQL Injection\"",
        "exploit_date": "2020-03-10",
        "exploit_author": "S3FFR",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48215/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48215/42490/horde-groupware-webmail-edition-5222-remote-code-execution/download/",
        "exploit_id": "48215",
        "exploit_description": "\"Horde Groupware Webmail Edition 5.2.22 - Remote Code Execution\"",
        "exploit_date": "2020-03-10",
        "exploit_author": "\"Andrea Cardaci\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48177/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48177/42467/60cyclecms-newsphp-sql-injection/download/",
        "exploit_id": "48177",
        "exploit_description": "\"60CycleCMS  - 'news.php' SQL Injection\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "Unkn0wn",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48186/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48186/42466/google-chrome-80-jscreate-side-effect-type-confusion-metasploit/download/",
        "exploit_id": "48186",
        "exploit_description": "\"Google Chrome 80 - JSCreate Side-effect Type Confusion (Metasploit)\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48179/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48179/42468/sentrifugo-hrms-32-id-sql-injection/download/",
        "exploit_id": "48179",
        "exploit_description": "\"Sentrifugo HRMS 3.2 - 'id' SQL Injection\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "minhnb",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48182/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48182/42463/php-fpm-underflow-remote-code-execution-metasploit/download/",
        "exploit_id": "48182",
        "exploit_description": "\"PHP-FPM - Underflow Remote Code Execution (Metasploit)\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48181/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48181/42462/apache-activemq-5x-5111-directory-traversal-shell-upload-metasploit/download/",
        "exploit_id": "48181",
        "exploit_description": "\"Apache ActiveMQ 5.x-5.11.1 - Directory Traversal Shell Upload (Metasploit)\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48187/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48187/42469/counter-strike-go-bsp-memory-control-poc/download/",
        "exploit_id": "48187",
        "exploit_description": "\"Counter Strike: GO - '.bsp' Memory Control (PoC)\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "\"0day enthusiast\"",
        "exploit_type": "local",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48183/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48183/42464/google-chrome-72-and-73-arraymap-out-of-bounds-write-metasploit/download/",
        "exploit_id": "48183",
        "exploit_description": "\"Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48184/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48184/42465/google-chrome-67--68-and-69-objectcreate-type-confusion-metasploit/download/",
        "exploit_id": "48184",
        "exploit_description": "\"Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit)\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48185/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48185/42461/opensmtpd-oob-read-local-privilege-escalation-metasploit/download/",
        "exploit_id": "48185",
        "exploit_description": "\"OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)\"",
        "exploit_date": "2020-03-09",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48174/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48174/42455/deep-instinct-windows-agent-12290-deepmgmtservice-unquoted-service-path/download/",
        "exploit_id": "48174",
        "exploit_description": "\"Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path\"",
        "exploit_date": "2020-03-06",
        "exploit_author": "\"Oscar Flores\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48173/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48173/42454/asus-giftbox-desktop-111127-asusgiftboxdesktop-unquoted-service-path/download/",
        "exploit_id": "48173",
        "exploit_description": "\"ASUS GiftBox Desktop 1.1.1.127 - 'ASUSGiftBoxDesktop' Unquoted Service Path\"",
        "exploit_date": "2020-03-06",
        "exploit_author": "\"Oscar Flores\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48171/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48171/42452/iskysoft-application-framework-service-243241-isappservice-unquoted-service-path/download/",
        "exploit_id": "48171",
        "exploit_description": "\"Iskysoft Application Framework Service 2.4.3.241 - 'IsAppService' Unquoted Service Path\"",
        "exploit_date": "2020-03-06",
        "exploit_author": "\"Alejandro Reyes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48172/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48172/42453/spyhunter-4-spyhunter-4-service-unquoted-service-path/download/",
        "exploit_id": "48172",
        "exploit_description": "\"SpyHunter 4 - 'SpyHunter 4 Service' Unquoted Service Path\"",
        "exploit_date": "2020-03-06",
        "exploit_author": "\"Alejandro Reyes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48169/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48169/42457/eyesofnetwork-autodiscovery-target-command-execution-metasploit/download/",
        "exploit_id": "48169",
        "exploit_description": "\"EyesOfNetwork - AutoDiscovery Target Command Execution (Metasploit)\"",
        "exploit_date": "2020-03-05",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48168/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48168/42456/exchange-control-panel-viewstate-deserialization-metasploit/download/",
        "exploit_id": "48168",
        "exploit_description": "\"Exchange Control Panel - Viewstate Deserialization (Metasploit)\"",
        "exploit_date": "2020-03-05",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48166/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48166/42451/unisharp-laravel-file-manager-200-arbitrary-file-read/download/",
        "exploit_id": "48166",
        "exploit_description": "\"UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read\"",
        "exploit_date": "2020-03-04",
        "exploit_author": "NgoAnhDuc",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48180/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48180/42460/microsoft-windows-wizardopium-local-privilege-escalation/download/",
        "exploit_id": "48180",
        "exploit_description": "\"Microsoft Windows - 'WizardOpium' Local Privilege Escalation\"",
        "exploit_date": "2020-03-03",
        "exploit_author": "piotrflorczyk",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48164/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48164/42450/ricoh-aficio-sp-5210sf-printer-entrynamein-html-injection/download/",
        "exploit_id": "48164",
        "exploit_description": "\"RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection\"",
        "exploit_date": "2020-03-03",
        "exploit_author": "\"Olga Villagran\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48161/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48161/42447/ricoh-aficio-sp-5200s-printer-entrynamein-html-injection/download/",
        "exploit_id": "48161",
        "exploit_description": "\"RICOH Aficio SP 5200S Printer - 'entryNameIn' HTML Injection\"",
        "exploit_date": "2020-03-03",
        "exploit_author": "\"Paulina Girón\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48162/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48162/42448/alfresco-524-persistent-cross-site-scripting/download/",
        "exploit_id": "48162",
        "exploit_description": "\"Alfresco 5.2.4 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-03-03",
        "exploit_author": "\"Alexandre ZANNI\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48163/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48163/42449/gunet-openeclass-173-e-learning-platform-month-sql-injection/download/",
        "exploit_id": "48163",
        "exploit_description": "\"GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection\"",
        "exploit_date": "2020-03-03",
        "exploit_author": "emaragkos",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48170/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48170/42458/netkit-telnet-017-telnetd-fedora-31-bravestarr-remote-code-execution/download/",
        "exploit_id": "48170",
        "exploit_description": "\"netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution\"",
        "exploit_date": "2020-03-02",
        "exploit_author": "Immunity",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48158/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48158/42445/intelbras-wireless-n-150mbps-wrn240-authentication-bypass-config-upload/download/",
        "exploit_id": "48158",
        "exploit_description": "\"Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)\"",
        "exploit_date": "2020-03-02",
        "exploit_author": "\"Elber Tavares\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48159/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48159/42446/cacti-v128-unauthenticated-remote-code-execution-metasploit/download/",
        "exploit_id": "48159",
        "exploit_description": "\"Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)\"",
        "exploit_date": "2020-03-02",
        "exploit_author": "\"Lucas Amorim\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    }
]