Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/exploits/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48725/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48725/42978/online-shopping-alphaware-10-authentication-bypass/download/",
        "exploit_id": "48725",
        "exploit_description": "\"Online Shopping Alphaware 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-07-30",
        "exploit_author": "\"Ahmed Abbas\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48723/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48723/42976/cisco-adaptive-security-appliance-software-97-unauthenticated-arbitrary-file-deletion/download/",
        "exploit_id": "48723",
        "exploit_description": "\"Cisco Adaptive Security Appliance Software 9.7 - Unauthenticated Arbitrary File Deletion\"",
        "exploit_date": "2020-07-29",
        "exploit_author": "0xmmnbassel",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48724/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48724/42977/wordpress-plugin-maintenance-mode-by-seedprod-511-persistent-cross-site-scripting/download/",
        "exploit_id": "48724",
        "exploit_description": "\"Wordpress Plugin Maintenance Mode by SeedProd 5.1.1 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-29",
        "exploit_author": "\"Jinson Varghese Behanan\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48722/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48722/42975/cisco-adaptive-security-appliance-software-911-local-file-inclusion/download/",
        "exploit_id": "48722",
        "exploit_description": "\"Cisco Adaptive Security Appliance Software 9.11 - Local File Inclusion\"",
        "exploit_date": "2020-07-28",
        "exploit_author": "0xmmnbassel",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48720/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48720/42974/egroupware-114-spellcheckerphp-remote-command-execution/download/",
        "exploit_id": "48720",
        "exploit_description": "\"eGroupWare 1.14 - 'spellchecker.php' Remote Command Execution\"",
        "exploit_date": "2020-07-27",
        "exploit_author": "\"Berk KIRAS\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48701/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48701/42959/bludit-392-directory-traversal/download/",
        "exploit_id": "48701",
        "exploit_description": "\"Bludit 3.9.2 - Directory Traversal\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"James Green\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48704/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48704/42961/online-course-registration-10-unauthenticated-remote-code-execution/download/",
        "exploit_id": "48704",
        "exploit_description": "\"Online Course Registration 1.0 - Unauthenticated Remote Code Execution\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "boku",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48697/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48697/42945/calavera-uploader-35-ftp-logi-denial-of-service-poc-seh-overwrite/download/",
        "exploit_id": "48697",
        "exploit_description": "\"Calavera UpLoader 3.5 - 'FTP Logi' Denial of Service (PoC + SEH Overwrite)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48698/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48698/42957/wordpress-plugin-email-subscribers-newsletters-422-unauthenticated-file-download/download/",
        "exploit_id": "48698",
        "exploit_description": "\"WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "KBA@SOGETI_ESEC",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48690/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48690/42953/goautodial-40-persistent-cross-site-scripting-authenticated/download/",
        "exploit_id": "48690",
        "exploit_description": "\"GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "Balzabu",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48688/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48688/42947/frigate-professional-33609-pack-file-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "48688",
        "exploit_description": "\"Frigate Professional 3.36.0.9 - 'Pack File' Buffer Overflow (SEH Egghunter)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "MasterVlad",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48715/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48715/42971/virtual-airlines-manager-262-persistent-cross-site-scripting/download/",
        "exploit_id": "48715",
        "exploit_description": "\"Virtual Airlines Manager 2.6.2 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Peter Blue\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48702/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48702/42960/librehealth-200-authenticated-remote-code-execution/download/",
        "exploit_id": "48702",
        "exploit_description": "\"LibreHealth 2.0.0 - Authenticated Remote Code Execution\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "boku",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48705/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48705/42962/elaniin-cms-authentication-bypass/download/",
        "exploit_id": "48705",
        "exploit_description": "\"elaniin CMS - Authentication Bypass\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48696/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48696/42951/free-mp3-cd-ripper-28-stack-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "48696",
        "exploit_description": "\"Free MP3 CD Ripper 2.8 - Stack Buffer Overflow (SEH + Egghunter)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Eduard Palisek\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48694/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48694/42956/ubicod-medivision-digital-signage-151-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48694",
        "exploit_description": "\"UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48711/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48711/42967/f5-big-ip-1313-build-006-local-file-inclusion/download/",
        "exploit_id": "48711",
        "exploit_description": "\"F5 Big-IP 13.1.3 Build 0.0.6 - Local File Inclusion\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Carlos E. Vieira\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48713/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48713/42969/socketio-file-2031-arbitrary-file-upload/download/",
        "exploit_id": "48713",
        "exploit_description": "\"Socket.io-file 2.0.31 - Arbitrary File Upload\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "Cr0wTom",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48712/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48712/42968/sickbeard-01-cross-site-request-forgery-disable-authentication/download/",
        "exploit_id": "48712",
        "exploit_description": "\"Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "bdrake",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48691/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48691/42949/socusoft-photo-to-video-converter-professional-807-output-folder-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "48691",
        "exploit_description": "\"Socusoft Photo to Video Converter Professional 8.07 - 'Output Folder' Buffer Overflow (SEH Egghunter)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "MasterVlad",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48709/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48709/42966/webtareas-21p-arbitrary-file-upload-authenticated/download/",
        "exploit_id": "48709",
        "exploit_description": "\"Webtareas 2.1p - Arbitrary File Upload (Authenticated)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "AppleBois",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48707/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48707/42964/pandorafms-70-ng-746-persistent-cross-site-scripting/download/",
        "exploit_id": "48707",
        "exploit_description": "\"PandoraFMS 7.0 NG 746 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "AppleBois",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48687/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48687/42946/nidesoft-dvd-ripper-5218-local-buffer-overflow-seh/download/",
        "exploit_id": "48687",
        "exploit_description": "\"Nidesoft DVD Ripper 5.2.18 - Local Buffer Overflow (SEH)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48714/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48714/42970/pfsense-244-p3-cross-site-request-forgery/download/",
        "exploit_id": "48714",
        "exploit_description": "\"pfSense 2.4.4-p3 - Cross-Site Request Forgery\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "ghost_fh",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48708/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48708/42965/bio-star-282-local-file-inclusion/download/",
        "exploit_id": "48708",
        "exploit_description": "\"Bio Star 2.8.2 - Local File Inclusion\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"SITE Team\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48706/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48706/42963/koken-cms-02224-arbitrary-file-upload-authenticated/download/",
        "exploit_id": "48706",
        "exploit_description": "\"Koken CMS 0.22.24 - Arbitrary File Upload (Authenticated)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "V1n1v131r4",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48693/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48693/42955/inneo-startup-tools-2018-m040-130703804-remote-code-execution/download/",
        "exploit_id": "48693",
        "exploit_description": "\"INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Patrick Hener\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48719/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48719/42952/docprint-pro-80-add-url-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "48719",
        "exploit_description": "\"docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "MasterVlad",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48695/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48695/42950/port-forwarding-wizard-480-buffer-overflow-seh/download/",
        "exploit_id": "48695",
        "exploit_description": "\"Port Forwarding Wizard 4.8.0 - Buffer Overflow (SEH)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Sarang Tumne\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48716/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48716/42972/rails-501-remote-code-execution/download/",
        "exploit_id": "48716",
        "exploit_description": "\"Rails 5.0.1 - Remote Code Execution\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"Lucas Amorim\"",
        "exploit_type": "webapps",
        "exploit_platform": "ruby",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48692/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48692/42954/manageengine-applications-manager-13-menuhandlerservlet-sql-injection/download/",
        "exploit_id": "48692",
        "exploit_description": "\"ManageEngine Applications Manager 13 - 'MenuHandlerServlet' SQL Injection\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "aldorm",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48689/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48689/42948/diskboss-7714-reports-and-data-directory-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "48689",
        "exploit_description": "\"DiskBoss 7.7.14 - 'Reports and Data Directory' Buffer Overflow (SEH Egghunter)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "MasterVlad",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48699/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48699/42958/wordpress-plugin-email-subscribers-newsletters-422-hash-sql-injection-unauthenticated/download/",
        "exploit_id": "48699",
        "exploit_description": "\"WordPress Plugin Email Subscribers & Newsletters 4.2.2 - 'hash' SQL Injection (Unauthenticated)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "KBA@SOGETI_ESEC",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48685/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48685/42942/ftpdummy-480-local-buffer-overflow-seh/download/",
        "exploit_id": "48685",
        "exploit_description": "\"FTPDummy 4.80 - Local Buffer Overflow (SEH)\"",
        "exploit_date": "2020-07-23",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48686/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48686/42943/snes9k-009z-port-number-buffer-overflow-seh/download/",
        "exploit_id": "48686",
        "exploit_description": "\"Snes9K 0.09z - 'Port Number' Buffer Overflow (SEH)\"",
        "exploit_date": "2020-07-23",
        "exploit_author": "MasterVlad",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48684/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48684/42944/ubicod-medivision-digital-signage-151-authorization-bypass/download/",
        "exploit_id": "48684",
        "exploit_description": "\"UBICOD Medivision Digital Signage 1.5.1 - Authorization Bypass\"",
        "exploit_date": "2020-07-23",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48681/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48681/42939/docsifyjs-4114-reflective-cross-site-scripting/download/",
        "exploit_id": "48681",
        "exploit_description": "\"Docsify.js 4.11.4 - Reflective Cross-Site Scripting\"",
        "exploit_date": "2020-07-22",
        "exploit_author": "\"Amin Sharifi\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48682/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48682/42940/wordpress-theme-nexosreal-estate-17-search-order-sql-injection/download/",
        "exploit_id": "48682",
        "exploit_description": "\"WordPress Theme NexosReal Estate 1.7 - 'search_order' SQL Injection\"",
        "exploit_date": "2020-07-22",
        "exploit_author": "\"Vlad Vector\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48683/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48683/42941/sophos-vpn-web-panel-2020-denial-of-service-poc/download/",
        "exploit_id": "48683",
        "exploit_description": "\"Sophos VPN Web Panel 2020 - Denial of Service (Poc)\"",
        "exploit_date": "2020-07-22",
        "exploit_author": "\"Berk KIRAS\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48680/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48680/42938/netpclinker-1000-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "48680",
        "exploit_description": "\"NetPCLinker 1.0.0.0 - Buffer Overflow (SEH Egghunter)\"",
        "exploit_date": "2020-07-22",
        "exploit_author": "\"Saeed reza Zamanian\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48678/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48678/42936/simple-startup-manager-117-file-local-buffer-overflow-poc/download/",
        "exploit_id": "48678",
        "exploit_description": "\"Simple Startup Manager 1.17 - 'File' Local Buffer Overflow (PoC)\"",
        "exploit_date": "2020-07-17",
        "exploit_author": "PovlTekstTV",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48677/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48677/42935/sonar-qube-831-sonarqube-service-unquoted-service-path/download/",
        "exploit_id": "48677",
        "exploit_description": "\"Sonar Qube 8.3.1 - 'SonarQube Service' Unquoted Service Path\"",
        "exploit_date": "2020-07-17",
        "exploit_author": "\"Velayutham Selvaraj\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48679/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48679/42937/cmsuno-16-cross-site-request-forgery-change-admin-password/download/",
        "exploit_id": "48679",
        "exploit_description": "\"CMSUno 1.6 - Cross-Site Request Forgery (Change Admin Password)\"",
        "exploit_date": "2020-07-17",
        "exploit_author": "Noth",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48676/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48676/42934/wing-ftp-server-638-remote-code-execution-authenticated/download/",
        "exploit_id": "48676",
        "exploit_description": "\"Wing FTP Server 6.3.8 - Remote Code Execution (Authenticated)\"",
        "exploit_date": "2020-07-16",
        "exploit_author": "V1n1v131r4",
        "exploit_type": "webapps",
        "exploit_platform": "lua",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48675/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48675/42933/ritecms-221-remote-code-execution/download/",
        "exploit_id": "48675",
        "exploit_description": "\"RiteCMS 2.2.1 - Remote Code Execution\"",
        "exploit_date": "2020-07-16",
        "exploit_author": "\"Enes Özeser\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48674/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48674/42932/infor-storefront-b2b-10-usr-name-sql-injection/download/",
        "exploit_id": "48674",
        "exploit_description": "\"Infor Storefront B2B 1.0 - 'usr_name' SQL Injection\"",
        "exploit_date": "2020-07-15",
        "exploit_author": "ratboy",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48668/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48668/42926/supermicro-ipmi-webinterface-0340-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48668",
        "exploit_description": "\"SuperMicro IPMI WebInterface 03.40 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-07-15",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48671/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48671/42929/online-polling-system-10-authentication-bypass/download/",
        "exploit_id": "48671",
        "exploit_description": "\"Online Polling System 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-07-15",
        "exploit_author": "AppleBois",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48672/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48672/42930/web-based-online-hotel-booking-system-010-authentication-bypass/download/",
        "exploit_id": "48672",
        "exploit_description": "\"Web Based Online Hotel Booking System 0.1.0 - Authentication Bypass\"",
        "exploit_date": "2020-07-15",
        "exploit_author": "KeopssGroup0day_Inc",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48673/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48673/42931/online-farm-management-system-010-persistent-cross-site-scripting/download/",
        "exploit_id": "48673",
        "exploit_description": "\"Online Farm Management System 0.1.0 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-15",
        "exploit_author": "KeopssGroup0day_Inc",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48669/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48669/42927/zyxel-armor-x1-wap6806-directory-traversal/download/",
        "exploit_id": "48669",
        "exploit_description": "\"Zyxel Armor X1 WAP6806 - Directory Traversal\"",
        "exploit_date": "2020-07-15",
        "exploit_author": "\"Rajivarnan R\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48670/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48670/42928/joomla-j2-jobs-130-sortby-authenticated-sql-injection/download/",
        "exploit_id": "48670",
        "exploit_description": "\"Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection\"",
        "exploit_date": "2020-07-15",
        "exploit_author": "\"Mehmet Kelepçe\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48667/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48667/42925/trend-micro-web-security-virtual-appliance-65-sp2-patch-4-build-1901-remote-code-execution-metasploit/download/",
        "exploit_id": "48667",
        "exploit_description": "\"Trend Micro Web Security Virtual Appliance 6.5 SP2 Patch 4 Build 1901 - Remote Code Execution (Metasploit)\"",
        "exploit_date": "2020-07-14",
        "exploit_author": "\"Mehmet Ince\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48666/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48666/42924/bsa-radar-16723424750-local-file-inclusion/download/",
        "exploit_id": "48666",
        "exploit_description": "\"BSA Radar 1.6.7234.24750 - Local File Inclusion\"",
        "exploit_date": "2020-07-14",
        "exploit_author": "\"William Summerhill\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48662/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48662/42922/park-ticketing-management-system-10-viewid-sql-injection/download/",
        "exploit_id": "48662",
        "exploit_description": "\"Park Ticketing Management System 1.0  - 'viewid' SQL Injection\"",
        "exploit_date": "2020-07-13",
        "exploit_author": "gh1mau",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48663/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48663/42923/park-ticketing-management-system-10-authentication-bypass/download/",
        "exploit_id": "48663",
        "exploit_description": "\"Park Ticketing Management System 1.0  - Authentication Bypass\"",
        "exploit_date": "2020-07-13",
        "exploit_author": "gh1mau",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48660/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48660/42921/barangay-management-system-10-authentication-bypass/download/",
        "exploit_id": "48660",
        "exploit_description": "\"Barangay Management System 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-07-10",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48661/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48661/42919/aruba-clearpass-policy-manager-670-unauthenticated-remote-command-execution/download/",
        "exploit_id": "48661",
        "exploit_description": "\"Aruba ClearPass Policy Manager 6.7.0 - Unauthenticated Remote Command Execution\"",
        "exploit_date": "2020-07-10",
        "exploit_author": "SpicyItalian",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48659/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48659/42920/helloweb-20-arbitrary-file-download/download/",
        "exploit_id": "48659",
        "exploit_description": "\"HelloWeb 2.0 - Arbitrary File Download\"",
        "exploit_date": "2020-07-10",
        "exploit_author": "bRpsd",
        "exploit_type": "webapps",
        "exploit_platform": "asp",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48657/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48657/42913/frootvpn-48-frootvpn-unquoted-service-path/download/",
        "exploit_id": "48657",
        "exploit_description": "\"FrootVPN 4.8 - 'frootvpn' Unquoted Service Path\"",
        "exploit_date": "2020-07-09",
        "exploit_author": "v3n0m",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48658/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48658/42918/savsoft-quiz-5-persistent-cross-site-scripting/download/",
        "exploit_id": "48658",
        "exploit_description": "\"Savsoft Quiz 5 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-09",
        "exploit_author": "th3d1gger",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48656/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48656/42917/wordpress-plugin-powies-whois-domain-check-0931-persistent-cross-site-scripting/download/",
        "exploit_id": "48656",
        "exploit_description": "\"Wordpress Plugin Powie's WHOIS Domain Check 0.9.31 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-09",
        "exploit_author": "mqt",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48652/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48652/42914/supermicro-ipmi-0340-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48652",
        "exploit_description": "\"SuperMicro IPMI 03.40 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-07-08",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48653/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48653/42915/bsa-radar-16723424750-cross-site-request-forgery-change-password/download/",
        "exploit_id": "48653",
        "exploit_description": "\"BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password)\"",
        "exploit_date": "2020-07-08",
        "exploit_author": "\"William Summerhill\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48649/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48649/42912/bsa-radar-16723424750-authenticated-privilege-escalation/download/",
        "exploit_id": "48649",
        "exploit_description": "\"BSA Radar 1.6.7234.24750 - Authenticated Privilege Escalation\"",
        "exploit_date": "2020-07-07",
        "exploit_author": "\"William Summerhill\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48650/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48650/42906/microsoft-windows-mshtaexe-2019-xml-external-entity-injection/download/",
        "exploit_id": "48650",
        "exploit_description": "\"Microsoft Windows mshta.exe 2019 - XML External Entity Injection\"",
        "exploit_date": "2020-07-07",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "remote",
        "exploit_platform": "xml",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48647/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48647/42910/online-shopping-portal-31-email-sql-injection/download/",
        "exploit_id": "48647",
        "exploit_description": "\"Online Shopping Portal 3.1 - 'email' SQL Injection\"",
        "exploit_date": "2020-07-07",
        "exploit_author": "gh1mau",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48655/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48655/42916/php-74-ffi-disable-functions-bypass/download/",
        "exploit_id": "48655",
        "exploit_description": "\"PHP 7.4 FFI - 'disable_functions' Bypass\"",
        "exploit_date": "2020-07-07",
        "exploit_author": "\"hunter gregal\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48648/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48648/42911/joomla-j2-jobs-130-sortby-authenticated-sql-injection/download/",
        "exploit_id": "48648",
        "exploit_description": "\"Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection\"",
        "exploit_date": "2020-07-07",
        "exploit_author": "\"Mehmet Kelepçe\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48646/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48646/42909/sickbeard-01-remote-command-injection/download/",
        "exploit_id": "48646",
        "exploit_description": "\"Sickbeard 0.1 - Remote Command Injection\"",
        "exploit_date": "2020-07-07",
        "exploit_author": "bdrake",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48635/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48635/42901/file-management-system-11-persistent-cross-site-scripting/download/",
        "exploit_id": "48635",
        "exploit_description": "\"File Management System 1.1 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-06",
        "exploit_author": "KeopssGroup0day_Inc",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48640/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48640/42904/nagios-xi-5612-export-rrdphp-remote-code-execution/download/",
        "exploit_id": "48640",
        "exploit_description": "\"Nagios XI 5.6.12 - 'export-rrd.php' Remote Code Execution\"",
        "exploit_date": "2020-07-06",
        "exploit_author": "\"Basim Alabdullah\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48636/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48636/42902/ritecms-221-authenticated-remote-code-execution/download/",
        "exploit_id": "48636",
        "exploit_description": "\"RiteCMS 2.2.1 - Authenticated Remote Code Execution\"",
        "exploit_date": "2020-07-06",
        "exploit_author": "\"Enes Özeser\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48639/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48639/42903/rsa-igl-aveksa-711-remote-code-execution/download/",
        "exploit_id": "48639",
        "exploit_description": "\"RSA IG&L Aveksa 7.1.1 - Remote Code Execution\"",
        "exploit_date": "2020-07-06",
        "exploit_author": "\"Jakub Palaczynski\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48642/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48642/42907/big-ip-1500-15103-1410-14125-1310-13133-1210-12151-1161-11651-traffic-management-user-interface-tmui-remote-code-execution/download/",
        "exploit_id": "48642",
        "exploit_description": "\"BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI'  Remote Code Execution\"",
        "exploit_date": "2020-07-06",
        "exploit_author": "\"Critical Start\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48638/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48638/42900/grafana-701-denial-of-service-poc/download/",
        "exploit_id": "48638",
        "exploit_description": "\"Grafana 7.0.1 - Denial of Service (PoC)\"",
        "exploit_date": "2020-07-06",
        "exploit_author": "mostwanted002",
        "exploit_type": "dos",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48637/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48637/42899/fire-web-server-01-remote-denial-of-service-poc/download/",
        "exploit_id": "48637",
        "exploit_description": "\"Fire Web Server 0.1 - Remote Denial of Service (PoC)\"",
        "exploit_date": "2020-07-06",
        "exploit_author": "\"Saeed reza Zamanian\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48643/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48643/42908/big-ip-1500-15103-1410-14125-1310-13133-1210-12151-1161-11651-traffic-management-user-interface-tmui-remote-code-execution-poc/download/",
        "exploit_id": "48643",
        "exploit_description": "\"BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI'  Remote Code Execution (PoC)\"",
        "exploit_date": "2020-07-05",
        "exploit_author": "\"Budi Khoirudin\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48632/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48632/42896/whatsapp-remote-code-execution-paper/download/",
        "exploit_id": "48632",
        "exploit_description": "\"WhatsApp Remote Code Execution - Paper\"",
        "exploit_date": "2020-07-02",
        "exploit_author": "\"ashu Jaiswal\"",
        "exploit_type": "webapps",
        "exploit_platform": "android",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48633/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48633/42897/zentao-pro-882-command-injection/download/",
        "exploit_id": "48633",
        "exploit_description": "\"ZenTao Pro 8.8.2 - Command Injection\"",
        "exploit_date": "2020-07-02",
        "exploit_author": "\"Daniel Monzón\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48634/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48634/42898/ocs-inventory-ng-27-remote-code-execution/download/",
        "exploit_id": "48634",
        "exploit_description": "\"OCS Inventory NG 2.7 - Remote Code Execution\"",
        "exploit_date": "2020-07-02",
        "exploit_author": "Askar",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48628/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48628/42892/rm-downloader-25060-20060623-load-local-buffer-overflow-egghunter-seh-poc/download/",
        "exploit_id": "48628",
        "exploit_description": "\"RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48629/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48629/42893/e-learning-php-script-010-search-sql-injection/download/",
        "exploit_id": "48629",
        "exploit_description": "\"e-learning Php Script 0.1.0 - 'search' SQL Injection\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "KeopssGroup0day_Inc",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48631/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48631/42895/online-shopping-portal-31-authentication-bypass/download/",
        "exploit_id": "48631",
        "exploit_description": "\"Online Shopping Portal 3.1 - Authentication Bypass\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "\"Ümit Yalçın\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48630/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48630/42894/php-fusion-90360-php-object-injection/download/",
        "exploit_id": "48630",
        "exploit_description": "\"PHP-Fusion 9.03.60 - PHP Object Injection\"",
        "exploit_date": "2020-07-01",
        "exploit_author": "coiffeur",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48627/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48627/42891/reside-property-management-30-profile-sql-injection/download/",
        "exploit_id": "48627",
        "exploit_description": "\"Reside Property Management 3.0 - 'profile' SQL Injection\"",
        "exploit_date": "2020-06-30",
        "exploit_author": "\"Behzad Khalifeh\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48626/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48626/42890/victor-cms-10-user-firstname-persistent-cross-site-scripting/download/",
        "exploit_id": "48626",
        "exploit_description": "\"Victor CMS 1.0 - 'user_firstname' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-06-30",
        "exploit_author": "\"Anushree Priyadarshini\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48624/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48624/42884/windscribe-183-windscribeservice-unquoted-service-path/download/",
        "exploit_id": "48624",
        "exploit_description": "\"Windscribe 1.83 - 'WindscribeService' Unquoted Service Path\"",
        "exploit_date": "2020-06-26",
        "exploit_author": "\"Ethan Seow\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48623/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48623/42889/openemr-501-controller-remote-code-execution/download/",
        "exploit_id": "48623",
        "exploit_description": "\"OpenEMR 5.0.1 - 'controller' Remote Code Execution\"",
        "exploit_date": "2020-06-26",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48625/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48625/42885/kiteservice-120206180-unquoted-service-path/download/",
        "exploit_id": "48625",
        "exploit_description": "\"KiteService 1.2020.618.0 - Unquoted Service Path\"",
        "exploit_date": "2020-06-26",
        "exploit_author": "\"Marcos Antonio León\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48620/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48620/42886/myscada-mypro-7-hardcoded-credentials/download/",
        "exploit_id": "48620",
        "exploit_description": "\"mySCADA myPRO 7 - Hardcoded Credentials\"",
        "exploit_date": "2020-06-25",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48621/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48621/42888/fhem-60-local-file-inclusion/download/",
        "exploit_id": "48621",
        "exploit_description": "\"FHEM 6.0 - Local File Inclusion\"",
        "exploit_date": "2020-06-25",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48619/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48619/42887/bsa-radar-16723424750-persistent-cross-site-scripting/download/",
        "exploit_id": "48619",
        "exploit_description": "\"BSA Radar 1.6.7234.24750 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-06-24",
        "exploit_author": "\"William Summerhill\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48616/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48616/42883/online-student-enrollment-system-10-cross-site-request-forgery-add-student/download/",
        "exploit_id": "48616",
        "exploit_description": "\"Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48617/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48617/42880/code-blocks-2003-denial-of-service-poc/download/",
        "exploit_id": "48617",
        "exploit_description": "\"Code Blocks 20.03 - Denial Of Service (PoC)\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48615/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48615/42882/responsive-online-blog-10-id-sql-injection/download/",
        "exploit_id": "48615",
        "exploit_description": "\"Responsive Online Blog 1.0 - 'id' SQL Injection\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "\"Eren Şimşek\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48618/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48618/42881/lansweeper-72-incorrect-access-control/download/",
        "exploit_id": "48618",
        "exploit_description": "\"Lansweeper 7.2 - Incorrect Access Control\"",
        "exploit_date": "2020-06-23",
        "exploit_author": "\"Amel BOUZIANE-LEBLOND\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48611/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48611/42878/webport-1191-reflected-cross-site-scripting/download/",
        "exploit_id": "48611",
        "exploit_description": "\"WebPort 1.19.1 - Reflected Cross-Site Scripting\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48612/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48612/42879/webport-1191-setup-reflected-cross-site-scripting/download/",
        "exploit_id": "48612",
        "exploit_description": "\"WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/48609/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48609/42876/odoo-120-local-file-inclusion/download/",
        "exploit_id": "48609",
        "exploit_description": "\"Odoo 12.0 - Local File Inclusion\"",
        "exploit_date": "2020-06-22",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    }
]