Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46921/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46921/41355/opencart-3032-extensionfeedgoogle_base-denial-of-service-poc/download/",
        "exploit_id": "46921",
        "exploit_description": "\"Opencart 3.0.3.2 - 'extension/feed/google_base' Denial of Service PoC\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Todor Donev\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46910/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46910/41354/nagios-xi-561-sql-injection/download/",
        "exploit_id": "46910",
        "exploit_description": "\"Nagios XI 5.6.1 - SQL injection\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "JameelNabbo",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46903/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46903/41353/horde-webmail-5222-multiple-vulnerabilities/download/",
        "exploit_id": "46903",
        "exploit_description": "\"Horde Webmail 5.2.22 - Multiple Vulnerabilities\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "InfinitumIT",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46898/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46898/41352/carel-pcoweb-b121-credentials-disclosure/download/",
        "exploit_id": "46898",
        "exploit_description": "\"Carel pCOWeb < B1.2.1 - Credentials Disclosure\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "Luca.Chiou",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46897/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46897/41351/carel-pcoweb-b121-cross-site-scripting/download/",
        "exploit_id": "46897",
        "exploit_description": "\"Carel pCOWeb < B1.2.1 - Cross-Site Scripting\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "Luca.Chiou",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46896/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46896/41350/auo-solar-data-recorder-130-addr-cross-site-scripting/download/",
        "exploit_id": "46896",
        "exploit_description": "\"AUO Solar Data Recorder < 1.3.0 - 'addr' Cross-Site Scripting\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "Luca.Chiou",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46895/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46895/41349/zoho-manageengine-servicedesk-plus-93-cross-site-scripting/download/",
        "exploit_id": "46895",
        "exploit_description": "\"Zoho ManageEngine ServiceDesk Plus 9.3 - Cross-Site Scripting\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "Vingroup",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46894/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46894/41348/zoho-manageengine-servicedesk-plus-105-improper-access-restrictions/download/",
        "exploit_id": "46894",
        "exploit_description": "\"Zoho ManageEngine ServiceDesk Plus < 10.5 - Improper Access Restrictions\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "Vingroup",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46887/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46887/41347/brocade-network-advisor-1441-unauthenticated-remote-code-execution/download/",
        "exploit_id": "46887",
        "exploit_description": "\"Brocade Network Advisor 14.4.1 - Unauthenticated Remote Code Execution\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Jakub Palaczynski\"",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46886/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46886/41346/wordpress-plugin-wpgraphql-023-multiple-vulnerabilities/download/",
        "exploit_id": "46886",
        "exploit_description": "\"WordPress Plugin WPGraphQL 0.2.3 - Multiple Vulnerabilities\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Simone Quatrini\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46885/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46885/41345/oracle-cti-web-service-ebs_asset_history_operations-xml-entity-injection/download/",
        "exploit_id": "46885",
        "exploit_description": "\"Oracle CTI Web Service - 'EBS_ASSET_HISTORY_OPERATIONS' XML Entity Injection\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "omurugur",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46882/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46882/41344/tp-link-tl-wr840n-v5-00000005-cross-site-scripting/download/",
        "exploit_id": "46882",
        "exploit_description": "\"TP-LINK TL-WR840N v5 00000005 - Cross-Site Scripting\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"purnendu ghosh\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46881/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46881/41343/moodle-jmol-filter-61-directory-traversal-cross-site-scripting/download/",
        "exploit_id": "46881",
        "exploit_description": "\"Moodle Jmol Filter 6.1 - Directory Traversal / Cross-Site Scripting\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Dionach Ltd\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46928/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46928/41342/microsoft-internet-explorer-windows-10-1809-17763316-scripting-engine-memory-corruption/download/",
        "exploit_id": "46928",
        "exploit_description": "\"Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Simon Zuckerbraun\"",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46915/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46915/41341/shopware-createinstancefromnamedarguments-php-object-instantiation-remote-code-execution-metasploit/download/",
        "exploit_id": "46915",
        "exploit_description": "\"Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit)\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46922/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46922/41340/axessh-42-log-file-name-local-stack-based-buffer-overflow/download/",
        "exploit_id": "46922",
        "exploit_description": "\"Axessh 4.2 - 'Log file name' Local Stack-based Buffer Overflow\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Uday Mittal\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46920/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46920/41339/microsoft-windows-win32k-local-privilege-escalation/download/",
        "exploit_id": "46920",
        "exploit_description": "\"Microsoft Windows - 'Win32k' Local Privilege Escalation\"",
        "exploit_date": "2019-05-15",
        "exploit_author": "ExpLife0011",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46919/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46919/41338/microsoft-internet-explorer-11-sandbox-escape/download/",
        "exploit_id": "46919",
        "exploit_description": "\"Microsoft Internet Explorer 11 - Sandbox Escape\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "SandboxEscaper",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46918/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46918/41337/microsoft-windows-x84-task-scheduler-job-import-arbitrary-discretionary-access-control-list-write-local-privilege-escalation/download/",
        "exploit_id": "46918",
        "exploit_description": "\"Microsoft Windows (x84) - Task Scheduler' .job' Import Arbitrary Discretionary Access Control List Write / Local Privilege Escalation\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "SandboxEscaper",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46914/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46914/41336/apple-mac-os-x-feedback-assistant-race-condition-metasploit/download/",
        "exploit_id": "46914",
        "exploit_description": "\"Apple Mac OS X - Feedback Assistant Race Condition (Metasploit)\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "macos",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46912/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46912/41335/microsoft-windows-10-1809-cmkeybodyremaptovirtualforenum-arbitrary-key-enumeration-privilege-escalation/download/",
        "exploit_id": "46912",
        "exploit_description": "\"Microsoft Windows 10 1809 - 'CmKeyBodyRemapToVirtualForEnum' Arbitrary Key Enumeration Privilege Escalation\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46917/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46917/41334/microsoft-windows-x84x64-error-reporting-discretionary-access-control-list-local-privilege-escalation/download/",
        "exploit_id": "46917",
        "exploit_description": "\"Microsoft Windows (x84/x64) - 'Error Reporting' Discretionary Access Control List / Local Privilege Escalation\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "SandboxEscaper",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46916/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46916/41333/microsoft-windows-10-17763379-install-dll/download/",
        "exploit_id": "46916",
        "exploit_description": "\"Microsoft Windows 10 (17763.379) - Install DLL\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "SandboxEscaper",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46929/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46929/41332/fast-avi-mpeg-joiner-license-name-denial-of-service-poc/download/",
        "exploit_id": "46929",
        "exploit_description": "\"Fast AVI MPEG Joiner - 'License Name' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "Achilles",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46927/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46927/41331/cyberoam-general-authentication-client-2127-server-address-denial-of-service-poc/download/",
        "exploit_id": "46927",
        "exploit_description": "\"Cyberoam General Authentication Client 2.1.2.7 - 'Server Address' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46926/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46926/41330/cyberoam-transparent-authentication-suite-2125-netbios-name-denial-of-service-poc/download/",
        "exploit_id": "46926",
        "exploit_description": "\"Cyberoam Transparent Authentication Suite 2.1.2.5 - 'NetBIOS Name' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46925/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46925/41329/cyberoam-transparent-authentication-suite-2125-fully-qualified-domain-name-denial-of-service-poc/download/",
        "exploit_id": "46925",
        "exploit_description": "\"Cyberoam Transparent Authentication Suite 2.1.2.5 - 'Fully Qualified Domain Name' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46924/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46924/41328/cyberoam-sslvpn-client-13130-http-proxy-denial-of-service-poc/download/",
        "exploit_id": "46924",
        "exploit_description": "\"Cyberoam SSLVPN Client 1.3.1.30 - 'HTTP Proxy' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46923/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46923/41327/cyberoam-sslvpn-client-13130-connect-to-server-denial-of-service-poc/download/",
        "exploit_id": "46923",
        "exploit_description": "\"Cyberoam SSLVPN Client 1.3.1.30 - 'Connect To Server' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-24",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46913/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46913/41326/visual-voicemail-for-iphone-imap-namespace-processing-use-after-free/download/",
        "exploit_id": "46913",
        "exploit_description": "\"Visual Voicemail for iPhone - IMAP NAMESPACE Processing Use-After-Free\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "ios",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46911/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46911/41325/terminal-services-manager-321-denial-of-service/download/",
        "exploit_id": "46911",
        "exploit_description": "\"Terminal Services Manager 3.2.1 - Denial of Service\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46909/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46909/41324/netaware-120-share-name-denial-of-service-poc/download/",
        "exploit_id": "46909",
        "exploit_description": "\"NetAware 1.20 - 'Share Name' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46908/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46908/41323/netaware-120-add-block-denial-of-service-poc/download/",
        "exploit_id": "46908",
        "exploit_description": "\"NetAware 1.20 - 'Add Block' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-23",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46902/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46902/41322/tapinradio-2116-uername-denial-of-service-poc/download/",
        "exploit_id": "46902",
        "exploit_description": "\"TapinRadio 2.11.6 - 'Uername' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46901/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46901/41321/tapinradio-2116-address-denial-of-service-poc/download/",
        "exploit_id": "46901",
        "exploit_description": "\"TapinRadio 2.11.6 - 'Address' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46900/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46900/41320/rarmaradio-2723-username-denial-of-service-poc/download/",
        "exploit_id": "46900",
        "exploit_description": "\"RarmaRadio 2.72.3 - 'Username' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46899/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46899/41319/rarmaradio-2723-server-denial-of-service-poc/download/",
        "exploit_id": "46899",
        "exploit_description": "\"RarmaRadio 2.72.3 - 'Server' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46893/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46893/41318/bluestacks-48001060-denial-of-service-poc/download/",
        "exploit_id": "46893",
        "exploit_description": "\"BlueStacks 4.80.0.1060 - Denial of Service (PoC)\"",
        "exploit_date": "2019-05-22",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46892/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46892/41317/apple-macos-10145-ios-123-xnu-in6_pcbdetach-stale-pointer-use-after-free/download/",
        "exploit_id": "46892",
        "exploit_description": "\"Apple macOS < 10.14.5 / iOS < 12.3 XNU - 'in6_pcbdetach' Stale Pointer Use-After-Free\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46891/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46891/41316/apple-macos-10145-ios-123-xnu-wild-read-due-to-bad-cast-in-stf_ioctl/download/",
        "exploit_id": "46891",
        "exploit_description": "\"Apple macOS < 10.14.5 / iOS < 12.3 XNU - Wild-read due to bad cast in stf_ioctl\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46890/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46890/41315/apple-macos-10145-ios-123-javascriptcore-air-optimization-incorrectly-removes-assignment-to-register/download/",
        "exploit_id": "46890",
        "exploit_description": "\"Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - AIR Optimization Incorrectly Removes Assignment to Register\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46889/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46889/41314/apple-macos-10145-ios-123-javascriptcore-loop-invariant-code-motion-licm-in-dfg-jit-leaves-stack-variable-uninitialized/download/",
        "exploit_id": "46889",
        "exploit_description": "\"Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - Loop-Invariant Code Motion (LICM) in DFG JIT Leaves Stack Variable Uninitialized\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46888/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46888/41313/apple-macos-10145-ios-123-dfg-jit-compiler-hasindexedproperty-use-after-free/download/",
        "exploit_id": "46888",
        "exploit_description": "\"Apple macOS < 10.14.5 / iOS < 12.3 DFG JIT Compiler - 'HasIndexedProperty' Use-After-Free\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46884/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46884/41312/deluge-1315-webseeds-denial-of-service-poc/download/",
        "exploit_id": "46884",
        "exploit_description": "\"Deluge 1.3.15 - 'Webseeds' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46883/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46883/41311/deluge-1315-url-denial-of-service-poc/download/",
        "exploit_id": "46883",
        "exploit_description": "\"Deluge 1.3.15 - 'URL' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-21",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46869/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46869/41310/elabftw-185-arbitrary-file-upload-remote-code-execution/download/",
        "exploit_id": "46869",
        "exploit_description": "\"eLabFTW 1.8.5 - Arbitrary File Upload / Remote Code Execution\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "liquidsky",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46880/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46880/41309/getsimplecms-unauthenticated-remote-code-execution-metasploit/download/",
        "exploit_id": "46880",
        "exploit_description": "\"GetSimpleCMS - Unauthenticated Remote Code Execution (Metasploit)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46879/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46879/41308/solaris-789-sparc-dtprintinfo-local-privilege-escalation-2/download/",
        "exploit_id": "46879",
        "exploit_description": "\"Solaris 7/8/9 (SPARC) - 'dtprintinfo' Local Privilege Escalation (2)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Marco Ivaldi\"",
        "exploit_type": "local",
        "exploit_platform": "solaris",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46878/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46878/41307/solaris-789-sparc-dtprintinfo-local-privilege-escalation-1/download/",
        "exploit_id": "46878",
        "exploit_description": "\"Solaris 7/8/9 (SPARC) - 'dtprintinfo' Local Privilege Escalation (1)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Marco Ivaldi\"",
        "exploit_type": "local",
        "exploit_platform": "solaris",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46877/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46877/41306/solaris-10-113-intel-dtprintinfo-local-privilege-escalation/download/",
        "exploit_id": "46877",
        "exploit_description": "\"Solaris 10 1/13 (Intel) - 'dtprintinfo' Local Privilege Escalation\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Marco Ivaldi\"",
        "exploit_type": "local",
        "exploit_platform": "solaris",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46866/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46866/41305/huawei-espace-1111103-dll-hijacking/download/",
        "exploit_id": "46866",
        "exploit_description": "\"Huawei eSpace 1.1.11.103 - DLL Hijacking\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "LiquidWorm",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46876/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46876/41304/bulletproof-ftp-server-20190050-storage-path-denial-of-service-poc/download/",
        "exploit_id": "46876",
        "exploit_description": "\"BulletProof FTP Server 2019.0.0.50 - 'Storage-Path' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46875/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46875/41303/bulletproof-ftp-server-20190050-dns-address-denial-of-service-poc/download/",
        "exploit_id": "46875",
        "exploit_description": "\"BulletProof FTP Server 2019.0.0.50 - 'DNS Address' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46874/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46874/41302/absolutetelnet-1016-license-name-denial-of-service-poc/download/",
        "exploit_id": "46874",
        "exploit_description": "\"AbsoluteTelnet 10.16 - 'License name' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46873/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46873/41301/docprint-pro-80-denial-of-service-poc/download/",
        "exploit_id": "46873",
        "exploit_description": "\"docPrint Pro 8.0 - Denial of Service (PoC)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46872/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46872/41300/pcl-converter-27-denial-of-service-poc/download/",
        "exploit_id": "46872",
        "exploit_description": "\"PCL Converter 2.7 - Denial of Service (PoC)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46871/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46871/41299/encrypt-pdf-23-denial-of-service-poc/download/",
        "exploit_id": "46871",
        "exploit_description": "\"Encrypt PDF 2.3 - Denial of Service (PoC)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46868/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46868/41298/huawei-espace-1111103-contactsctrldll-espacestatusctrldll-activex-heap-overflow/download/",
        "exploit_id": "46868",
        "exploit_description": "\"Huawei eSpace 1.1.11.103 - 'ContactsCtrl.dll' / 'eSpaceStatusCtrl.dll' ActiveX Heap Overflow\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "LiquidWorm",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46867/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46867/41297/huawei-espace-1111103-image-file-format-handling-buffer-overflow/download/",
        "exploit_id": "46867",
        "exploit_description": "\"Huawei eSpace 1.1.11.103 - Image File Format Handling Buffer Overflow\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "LiquidWorm",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46865/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46865/41296/huawei-espace-meeting-1111103-cenwpolldll-seh-buffer-overflow-unicode/download/",
        "exploit_id": "46865",
        "exploit_description": "\"Huawei eSpace Meeting 1.1.11.103 - 'cenwpoll.dll' SEH Buffer Overflow (Unicode)\"",
        "exploit_date": "2019-05-20",
        "exploit_author": "LiquidWorm",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46864/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46864/41295/interspire-email-marketer-620-surveys_submitphp-remote-code-execution/download/",
        "exploit_id": "46864",
        "exploit_description": "\"Interspire Email Marketer 6.20 - 'surveys_submit.php' Remote Code Execution\"",
        "exploit_date": "2019-05-17",
        "exploit_author": "\"numan türle\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46852/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46852/41294/deepsound-104-sql-injection/download/",
        "exploit_id": "46852",
        "exploit_description": "\"DeepSound 1.0.4 - SQL Injection\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46850/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46850/41293/legrand-bticino-driver-manager-f454-1051-cross-site-request-forgery-cross-site-scripting/download/",
        "exploit_id": "46850",
        "exploit_description": "\"Legrand BTicino Driver Manager F454 1.0.51 - Cross-Site Request Forgery / Cross-Site Scripting\"",
        "exploit_date": "2019-05-15",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46849/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46849/41292/commsy-865-sql-injection/download/",
        "exploit_id": "46849",
        "exploit_description": "\"CommSy 8.6.5 - SQL injection\"",
        "exploit_date": "2019-05-15",
        "exploit_author": "\"Jens Regel_ Schneider_ Wulf\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46854/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46854/41291/jetaudio-jetcast-server-20-log-directory-local-seh-alphanumeric-encoded-buffer-overflow/download/",
        "exploit_id": "46854",
        "exploit_description": "\"JetAudio jetCast Server 2.0 - 'Log Directory' Local SEH Alphanumeric Encoded Buffer Overflow\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Connor McGarr\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46851/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46851/41290/vmware-workstation-1510-dll-hijacking/download/",
        "exploit_id": "46851",
        "exploit_description": "\"VMware Workstation 15.1.0 - DLL Hijacking\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Miguel Mendez Z. & Claudio Cortes C.\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46863/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46863/41289/iperius-backup-610-privilege-escalation/download/",
        "exploit_id": "46863",
        "exploit_description": "\"Iperius Backup 6.1.0 - Privilege Escalation\"",
        "exploit_date": "2019-05-17",
        "exploit_author": "bzyo",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46859/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46859/41288/sel-acselerator-architect-2224-cpu-exhaustion-denial-of-service/download/",
        "exploit_id": "46859",
        "exploit_description": "\"SEL AcSELerator Architect 2.2.24 - CPU Exhaustion Denial of Service\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "LiquidWorm",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46858/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46858/41287/axessh-42-log-file-name-denial-of-service-poc/download/",
        "exploit_id": "46858",
        "exploit_description": "\"Axessh 4.2 - 'Log file name' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46857/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46857/41286/zoc-terminal-v7234-shell-denial-of-service-poc/download/",
        "exploit_id": "46857",
        "exploit_description": "\"ZOC Terminal v7.23.4 - 'Shell' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46856/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46856/41285/zoc-terminal-v7234-private-key-file-denial-of-service-poc/download/",
        "exploit_id": "46856",
        "exploit_description": "\"ZOC Terminal v7.23.4 - 'Private key file' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46855/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46855/41284/zoc-terminal-7234-script-denial-of-service-poc/download/",
        "exploit_id": "46855",
        "exploit_description": "\"ZOC Terminal 7.23.4 - 'Script' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46853/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46853/41283/wechat-for-android-704-vcodec2_hls_filter-denial-of-service/download/",
        "exploit_id": "46853",
        "exploit_description": "\"WeChat for Android 7.0.4 - 'vcodec2_hls_filter' Denial of Service\"",
        "exploit_date": "2019-05-16",
        "exploit_author": "\"Hong Nhat Pham\"",
        "exploit_type": "dos",
        "exploit_platform": "android",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46848/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46848/41282/tomabo-mp4-converter-32522-denial-of-service-poc/download/",
        "exploit_id": "46848",
        "exploit_description": "\"Tomabo MP4 Converter 3.25.22 - Denial of Service (PoC)\"",
        "exploit_date": "2019-05-15",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46862/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46862/41281/cewe-photo-importer-643-jpg-denial-of-service-poc/download/",
        "exploit_id": "46862",
        "exploit_description": "\"CEWE Photo Importer 6.4.3 - '.jpg' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-17",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46861/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46861/41280/cewe-photoshow-643-password-denial-of-service-poc/download/",
        "exploit_id": "46861",
        "exploit_description": "\"CEWE Photoshow 6.4.3 - 'Password' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-17",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46860/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46860/41279/sandboxie-530-programs-alerts-denial-of-service-poc/download/",
        "exploit_id": "46860",
        "exploit_description": "\"Sandboxie 5.30 - 'Programs Alerts' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-17",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46847/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46847/41278/pasteshr-16-multiple-sql-injection/download/",
        "exploit_id": "46847",
        "exploit_description": "\"PasteShr 1.6 - Multiple SQL Injection\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46846/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46846/41277/schneider-electric-umotion-builder-134-track_import_exportphp-object_id-unauthenticated-command-injection/download/",
        "exploit_id": "46846",
        "exploit_description": "\"Schneider Electric U.Motion Builder 1.3.4 - 'track_import_export.php object_id' Unauthenticated Command Injection\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Julien Ahrens\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46841/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46841/41276/d-link-dwl-2600ap-multiple-os-command-injection/download/",
        "exploit_id": "46841",
        "exploit_description": "\"D-Link DWL-2600AP - Multiple OS Command Injection\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Raki Ben Hamouda\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46840/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46840/41275/sales-erp-81-multiple-sql-injection/download/",
        "exploit_id": "46840",
        "exploit_description": "\"Sales ERP 8.1 - Multiple SQL Injection\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Mehmet EMIROGLU\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46839/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46839/41274/php-fusion-90300-edit-profile-remote-code-execution-metasploit/download/",
        "exploit_id": "46839",
        "exploit_description": "\"PHP-Fusion 9.03.00 - 'Edit Profile' Remote Code Execution (Metasploit)\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "AkkuS",
        "exploit_type": "remote",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46845/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46845/41273/twistedbrush-pro-studio-2406-srp-denial-of-service-poc/download/",
        "exploit_id": "46845",
        "exploit_description": "\"TwistedBrush Pro Studio 24.06 - '.srp' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46844/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46844/41272/twistedbrush-pro-studio-2406-script-recorder-denial-of-service-poc/download/",
        "exploit_id": "46844",
        "exploit_description": "\"TwistedBrush Pro Studio 24.06 - 'Script Recorder' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46843/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46843/41271/twistedbrush-pro-studio-2406-resize-image-denial-of-service-poc/download/",
        "exploit_id": "46843",
        "exploit_description": "\"TwistedBrush Pro Studio 24.06 - 'Resize Image' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46842/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46842/41270/selfie-studio-217-resize-image-denial-of-service-poc/download/",
        "exploit_id": "46842",
        "exploit_description": "\"Selfie Studio 2.17 - 'Resize Image' Denial of Service (PoC)\"",
        "exploit_date": "2019-05-14",
        "exploit_author": "\"Alejandra Sánchez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46838/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46838/41269/openproject-500-831-sql-injection/download/",
        "exploit_id": "46838",
        "exploit_description": "\"OpenProject 5.0.0 - 8.3.1 - SQL Injection\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "\"SEC Consult\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46835/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46835/41268/xoops-259-sql-injection/download/",
        "exploit_id": "46835",
        "exploit_description": "\"XOOPS 2.5.9 - SQL Injection\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "\"felipe andrian\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46834/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46834/41267/soca-access-control-system-180612-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "46834",
        "exploit_description": "\"SOCA Access Control System 180612 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46833/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46833/41266/soca-access-control-system-180612-sql-injection/download/",
        "exploit_id": "46833",
        "exploit_description": "\"SOCA Access Control System 180612 - SQL Injection\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46832/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46832/41265/soca-access-control-system-180612-information-disclosure/download/",
        "exploit_id": "46832",
        "exploit_description": "\"SOCA Access Control System 180612 - Information Disclosure\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46837/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46837/41264/google-chrome-v8-turbofan-jscallreducerreducearrayindexofincludes-out-of-bounds-readwrite/download/",
        "exploit_id": "46837",
        "exploit_description": "\"Google Chrome V8 - Turbofan JSCallReducer::ReduceArrayIndexOfIncludes Out-of-Bounds Read/Write\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46831/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46831/41263/dnss-218-denial-of-service-poc/download/",
        "exploit_id": "46831",
        "exploit_description": "\"DNSS 2.1.8 - Denial of Service (PoC)\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46830/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46830/41262/spotmsn-246-denial-of-service-poc/download/",
        "exploit_id": "46830",
        "exploit_description": "\"SpotMSN 2.4.6 - Denial of Service (PoC)\"",
        "exploit_date": "2019-05-13",
        "exploit_author": "\"Victor Mondragón\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46828/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46828/41261/cyberark-enterprise-password-vault-107-xml-external-entity-injection/download/",
        "exploit_id": "46828",
        "exploit_description": "\"CyberArk Enterprise Password Vault 10.7 - XML External Entity Injection\"",
        "exploit_date": "2019-05-10",
        "exploit_author": "\"Marcelo Toran\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46827/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46827/41260/ricoh-sp-4520dn-printer-html-injection/download/",
        "exploit_id": "46827",
        "exploit_description": "\"RICOH SP 4520DN Printer - HTML Injection\"",
        "exploit_date": "2019-05-10",
        "exploit_author": "\"Ismail Tasdelen\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46826/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46826/41259/ricoh-sp-4510dn-printer-html-injection/download/",
        "exploit_id": "46826",
        "exploit_description": "\"RICOH SP 4510DN Printer - HTML Injection\"",
        "exploit_date": "2019-05-10",
        "exploit_author": "\"Ismail Tasdelen\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46825/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46825/41258/dotcms-511-html-injection/download/",
        "exploit_id": "46825",
        "exploit_description": "\"dotCMS 5.1.1 - HTML Injection\"",
        "exploit_date": "2019-05-10",
        "exploit_author": "\"Ismail Tasdelen\"",
        "exploit_type": "webapps",
        "exploit_platform": "jsp",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46820/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46820/41257/thehive-project-cortex-1152-server-side-request-forgery/download/",
        "exploit_id": "46820",
        "exploit_description": "\"TheHive Project Cortex < 1.15.2 - Server-Side Request Forgery\"",
        "exploit_date": "2019-05-10",
        "exploit_author": "\"Alexandre Basquin\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46815/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46815/41256/zoho-manageengine-adselfservice-plus-57-5702-build-cross-site-scripting/download/",
        "exploit_id": "46815",
        "exploit_description": "\"Zoho ManageEngine ADSelfService Plus 5.7 < 5702 build - Cross-Site Scripting\"",
        "exploit_date": "2019-05-09",
        "exploit_author": "\"Ibrahim Raafat\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    }
]