Exploits Db Api Listing
Return a list of all the existing exploits.
get: Performs a get request to return all existing exploits
post: Create new exploits
GET /api/v1/exploits/
https://www.nmmapper.com/api/v1/exploitdetails/49174/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49174/43410/anuko-time-tracker-119235311-password-reset-leading-to-account-takeover/download/", "exploit_id": "49174", "exploit_description": "\"Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover\"", "exploit_date": "2020-12-02", "exploit_author": "\"Mufaddal Masalawala\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49168/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49168/43405/dotcms-2011-stored-cross-site-scripting/download/", "exploit_id": "49168", "exploit_description": "\"DotCMS 20.11 - Stored Cross-Site Scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Hardik Solanki\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49159/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49159/43397/online-voting-system-project-in-php-username-persistent-cross-site-scripting/download/", "exploit_id": "49159", "exploit_description": "\"Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Sagar Banwa\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49179/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49179/43344/microsoft-windows-win32k-elevation-of-privilege/download/", "exploit_id": "49179", "exploit_description": "\"Microsoft Windows - Win32k Elevation of Privilege\"", "exploit_date": "2020-12-02", "exploit_author": "nu11secur1ty", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49153/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49153/43393/egavilanmedia-user-registration-login-system-with-admin-panel-10-stored-cross-site-scripting/download/", "exploit_id": "49153", "exploit_description": "\"EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Soushikta Chowdhury\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49149/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49149/43389/pharmacy-store-management-system-10-id-sql-injection/download/", "exploit_id": "49149", "exploit_description": "\"Pharmacy Store Management System 1.0 - 'id' SQL Injection\"", "exploit_date": "2020-12-02", "exploit_author": "\"Aydın Baran Ertemir\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49171/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49171/43407/churchcrm-420-csvformula-injection/download/", "exploit_id": "49171", "exploit_description": "\"ChurchCRM 4.2.0 - CSV/Formula Injection\"", "exploit_date": "2020-12-02", "exploit_author": "\"Mufaddal Masalawala\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49160/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49160/43398/newslister-authenticated-persistent-cross-site-scripting/download/", "exploit_id": "49160", "exploit_description": "\"NewsLister - Authenticated Persistent Cross-Site Scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Emre Aslan\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49162/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49162/43400/online-news-portal-system-10-title-stored-cross-site-scripting/download/", "exploit_id": "49162", "exploit_description": "\"Online News Portal System 1.0 - 'Title' Stored Cross Site Scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Parshwa Bhavsar\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49146/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49146/43387/expense-management-system-description-stored-cross-site-scripting/download/", "exploit_id": "49146", "exploit_description": "\"Expense Management System - 'description' Stored Cross Site Scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Nikhil Kumar\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49151/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49151/43391/egavilanmedia-user-registration-login-system-with-admin-panel-10-csrf/download/", "exploit_id": "49151", "exploit_description": "\"EgavilanMedia User Registration & Login System with Admin Panel 1.0 - CSRF\"", "exploit_date": "2020-12-02", "exploit_author": "\"Hardik Solanki\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49173/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49173/43409/anuko-time-tracker-119235311-no-rate-limit-on-password-reset-functionality/download/", "exploit_id": "49173", "exploit_description": "\"Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality\"", "exploit_date": "2020-12-02", "exploit_author": "\"Mufaddal Masalawala\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49176/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49176/43348/mitel-mitel-cs018-call-data-information-disclosure/download/", "exploit_id": "49176", "exploit_description": "\"Mitel mitel-cs018 - Call Data Information Disclosure\"", "exploit_date": "2020-12-02", "exploit_author": "\"Andrea Intilangelo\"", "exploit_type": "remote", "exploit_platform": "linux", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49155/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49155/43395/wondercms-313-authenticated-remote-code-execution/download/", "exploit_id": "49155", "exploit_description": "\"WonderCMS 3.1.3 - Authenticated Remote Code Execution\"", "exploit_date": "2020-12-02", "exploit_author": "zetc0de", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49178/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49178/43413/wordpress-plugin-wp-filemanager-68-rce/download/", "exploit_id": "49178", "exploit_description": "\"WordPress Plugin Wp-FileManager 6.8 - RCE\"", "exploit_date": "2020-12-02", "exploit_author": "\"Mansoor R\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49169/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49169/43347/ksix-zigbee-devices-playback-protection-bypass-poc/download/", "exploit_id": "49169", "exploit_description": "\"Ksix Zigbee Devices - Playback Protection Bypass (PoC)\"", "exploit_date": "2020-12-02", "exploit_author": "\"Alejandro Vazquez Vazquez\"", "exploit_type": "remote", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49147/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49147/43342/asc-timetables-202162-denial-of-service-poc/download/", "exploit_id": "49147", "exploit_description": "\"aSc TimeTables 2021.6.2 - Denial of Service (PoC)\"", "exploit_date": "2020-12-02", "exploit_author": "\"Ismael Nava\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49170/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49170/43406/webdamn-user-registration-login-system-with-user-panel-sqli-auth-bypass/download/", "exploit_id": "49170", "exploit_description": "\"WebDamn User Registration & Login System with User Panel - SQLi Auth Bypass\"", "exploit_date": "2020-12-02", "exploit_author": "\"Aakash Madaan\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49167/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49167/43404/artworks-gallery-10-arbitrary-file-upload-rce-authenticated-via-edit-profile/download/", "exploit_id": "49167", "exploit_description": "\"Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile\"", "exploit_date": "2020-12-02", "exploit_author": "\"Shahrukh Iqbal Mirza\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49177/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49177/43412/car-rental-management-system-10-sql-injection-local-file-include/download/", "exploit_id": "49177", "exploit_description": "\"Car Rental Management System 1.0 - SQL Injection / Local File include\"", "exploit_date": "2020-12-02", "exploit_author": "Mosaaed", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49156/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49156/43396/prtg-network-monitor-204631412-maps-stored-xss/download/", "exploit_id": "49156", "exploit_description": "\"PRTG Network Monitor 20.4.63.1412 - 'maps' Stored XSS\"", "exploit_date": "2020-12-02", "exploit_author": "\"Amin Rawah\"", "exploit_type": "webapps", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49152/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49152/43392/student-result-management-system-10-authentication-bypass-sql-injection/download/", "exploit_id": "49152", "exploit_description": "\"Student Result Management System 1.0 - Authentication Bypass SQL Injection\"", "exploit_date": "2020-12-02", "exploit_author": "\"Ritesh Gohil\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49166/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49166/43403/artworks-gallery-10-arbitrary-file-upload-rce-authenticated-via-add-artwork/download/", "exploit_id": "49166", "exploit_description": "\"Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Add Artwork\"", "exploit_date": "2020-12-02", "exploit_author": "\"Shahrukh Iqbal Mirza\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49148/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49148/43388/ilias-learning-management-system-43-ssrf/download/", "exploit_id": "49148", "exploit_description": "\"ILIAS Learning Management System 4.3 - SSRF\"", "exploit_date": "2020-12-02", "exploit_author": "Dot", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49154/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49154/43394/wondercms-313-authenticated-ssrf-to-remote-remote-code-execution/download/", "exploit_id": "49154", "exploit_description": "\"WonderCMS 3.1.3 - Authenticated SSRF to Remote Remote Code Execution\"", "exploit_date": "2020-12-02", "exploit_author": "zetc0de", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49163/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49163/43401/local-service-search-engine-management-system-10-sqli-authentication-bypass/download/", "exploit_id": "49163", "exploit_description": "\"Local Service Search Engine Management System 1.0 - SQLi Authentication Bypass\"", "exploit_date": "2020-12-02", "exploit_author": "\"Aditya Wakhlu\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49161/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49161/43399/bakeshop-online-ordering-system-10-owner-persistent-cross-site-scripting/download/", "exploit_id": "49161", "exploit_description": "\"Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Parshwa Bhavsar\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49175/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49175/43411/simple-college-website-10-page-local-file-inclusion/download/", "exploit_id": "49175", "exploit_description": "\"Simple College Website 1.0 - 'page' Local File Inclusion\"", "exploit_date": "2020-12-02", "exploit_author": "Mosaaed", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49172/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49172/43408/churchcrm-421-persistent-cross-site-scripting-xss/download/", "exploit_id": "49172", "exploit_description": "\"ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)\"", "exploit_date": "2020-12-02", "exploit_author": "\"Mufaddal Masalawala\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49150/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49150/43390/under-construction-page-with-cpanel-10-sql-injection/download/", "exploit_id": "49150", "exploit_description": "\"Under Construction Page with CPanel 1.0 - SQL injection\"", "exploit_date": "2020-12-02", "exploit_author": "\"Mayur Parmar\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49164/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49164/43402/wondercms-313-menu-persistent-cross-site-scripting/download/", "exploit_id": "49164", "exploit_description": "\"WonderCMS 3.1.3 - 'Menu' Persistent Cross-Site Scripting\"", "exploit_date": "2020-12-02", "exploit_author": "\"Hemant Patidar\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49157/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49157/43343/idt-pc-audio-1064330-stacsv-unquoted-service-path/download/", "exploit_id": "49157", "exploit_description": "\"IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path\"", "exploit_date": "2020-12-02", "exploit_author": "\"Manuel Alvarez\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49129/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49129/43375/joomla-component-gmapfp-35-unauthenticated-arbitrary-file-upload/download/", "exploit_id": "49129", "exploit_description": "\"Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload\"", "exploit_date": "2020-12-01", "exploit_author": "ThelastVvV", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49142/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49142/43339/global-registration-service-1003-gregsvcexe-unquoted-service-path/download/", "exploit_id": "49142", "exploit_description": "\"Global Registration Service 1.0.0.3 - 'GREGsvc.exe' Unquoted Service Path\"", "exploit_date": "2020-12-01", "exploit_author": "\"Emmanuel Lujan\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49139/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49139/43384/pandora-fms-70-ng-749-multiple-persistent-cross-site-scripting-vulnerabilities-date-11-14-2020/download/", "exploit_id": "49139", "exploit_description": "\"Pandora FMS 7.0 NG 749 - Multiple Persistent Cross-Site Scripting Vulnerabilities # Date: 11-14-2020\"", "exploit_date": "2020-12-01", "exploit_author": "\"Matthew Aberegg\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49140/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49140/43385/social-networking-site-authentication-bypass-sqli/download/", "exploit_id": "49140", "exploit_description": "\"Social Networking Site - Authentication Bypass (SQli)\"", "exploit_date": "2020-12-01", "exploit_author": "gh1mau", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49135/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49135/43380/multi-restaurant-table-reservation-system-10-multiple-persistent-xss/download/", "exploit_id": "49135", "exploit_description": "\"Multi Restaurant Table Reservation System 1.0 - Multiple Persistent XSS\"", "exploit_date": "2020-12-01", "exploit_author": "yunaranyancat", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49138/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49138/43383/medical-center-portal-management-system-10-login-sql-injection/download/", "exploit_id": "49138", "exploit_description": "\"Medical Center Portal Management System 1.0 - 'login' SQL Injection\"", "exploit_date": "2020-12-01", "exploit_author": "\"Aydın Baran Ertemir\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49141/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49141/43338/epson-status-monitor-3-epson-pm-rpcv4-06-unquoted-service-path/download/", "exploit_id": "49141", "exploit_description": "\"EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path\"", "exploit_date": "2020-12-01", "exploit_author": "SamAlucard", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49143/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49143/43340/pearson-vue-vts-231911-installer-vueapplicationwrapper-unquoted-service-path/download/", "exploit_id": "49143", "exploit_description": "\"Pearson Vue VTS 2.3.1911 Installer - VUEApplicationWrapper Unquoted Service Path\"", "exploit_date": "2020-12-01", "exploit_author": "Jok3r", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49133/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49133/43379/setelsa-conacwin-3712-local-file-inclusion/download/", "exploit_id": "49133", "exploit_description": "\"Setelsa Conacwin 3.7.1.2 - Local File Inclusion\"", "exploit_date": "2020-12-01", "exploit_author": "\"Bryan Rodriguez Martin\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49128/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49128/43374/typesetter-51-csrf-change-admin-e-mail/download/", "exploit_id": "49128", "exploit_description": "\"TypeSetter 5.1 - CSRF (Change admin e-mail)\"", "exploit_date": "2020-12-01", "exploit_author": "\"Alperen Ergel\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49132/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49132/43378/pharmacymedical-store-sale-point-10-email-sql-injection/download/", "exploit_id": "49132", "exploit_description": "\"Pharmacy/Medical Store & Sale Point 1.0 - 'email' SQL Injection\"", "exploit_date": "2020-12-01", "exploit_author": "naivenom", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49136/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49136/43381/tailor-management-system-10-unrestricted-file-upload-to-remote-code-execution/download/", "exploit_id": "49136", "exploit_description": "\"Tailor Management System 1.0 - Unrestricted File Upload to Remote Code Execution\"", "exploit_date": "2020-12-01", "exploit_author": "\"Saeed Bala Ahmed\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49145/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49145/43386/tendenci-1231-csv-formula-injection/download/", "exploit_id": "49145", "exploit_description": "\"Tendenci 12.3.1 - CSV/ Formula Injection\"", "exploit_date": "2020-12-01", "exploit_author": "\"Mufaddal Masalawala\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49131/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49131/43377/online-shopping-alphaware-10-error-based-sql-injection/download/", "exploit_id": "49131", "exploit_description": "\"Online Shopping Alphaware 1.0 - Error Based SQL injection\"", "exploit_date": "2020-12-01", "exploit_author": "\"Moaaz Taha\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49144/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49144/43341/intelr-management-and-security-application-52-user-notification-service-unquoted-service-path/download/", "exploit_id": "49144", "exploit_description": "\"Intel(r) Management and Security Application 5.2 - User Notification Service Unquoted Service Path\"", "exploit_date": "2020-12-01", "exploit_author": "\"Metin Yunus Kandemir\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49134/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49134/43337/10-strike-network-inventory-explorer-865-buffer-overflow-seh/download/", "exploit_id": "49134", "exploit_description": "\"10-Strike Network Inventory Explorer 8.65 - Buffer Overflow (SEH)\"", "exploit_date": "2020-12-01", "exploit_author": "Sectechs", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49137/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49137/43382/lepton-cms-470-url-persistent-cross-site-scripting/download/", "exploit_id": "49137", "exploit_description": "\"LEPTON CMS 4.7.0 - 'URL' Persistent Cross-Site Scripting\"", "exploit_date": "2020-12-01", "exploit_author": "\"Sagar Banwa\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49130/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49130/43376/wordpress-plugin-eventon-calendar-305-reflected-cross-site-scripting/download/", "exploit_id": "49130", "exploit_description": "\"Wordpress Plugin EventON Calendar 3.0.5 - Reflected Cross-Site Scripting\"", "exploit_date": "2020-12-01", "exploit_author": "B3KC4T", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49124/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49124/43371/atx-minicmts200a-broadband-gateway-20-credential-disclosure/download/", "exploit_id": "49124", "exploit_description": "\"ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure\"", "exploit_date": "2020-11-30", "exploit_author": "\"Zagros Bingol\"", "exploit_type": "webapps", "exploit_platform": "hardware", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49127/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49127/43346/yatinywinftp-denial-of-service-poc/download/", "exploit_id": "49127", "exploit_description": "\"YATinyWinFTP - Denial of Service (PoC)\"", "exploit_date": "2020-11-30", "exploit_author": "strider", "exploit_type": "remote", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49125/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49125/43372/rejetto-httpfileserver-23x-remote-command-execution-3/download/", "exploit_id": "49125", "exploit_description": "\"Rejetto HttpFileServer 2.3.x - Remote Command Execution (3)\"", "exploit_date": "2020-11-30", "exploit_author": "\"Óscar Andreu\"", "exploit_type": "webapps", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49126/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49126/43373/intelbras-router-rf-301k-112-authentication-bypass/download/", "exploit_id": "49126", "exploit_description": "\"Intelbras Router RF 301K 1.1.2 - Authentication Bypass\"", "exploit_date": "2020-11-30", "exploit_author": "\"Kaio Amaral\"", "exploit_type": "webapps", "exploit_platform": "hardware", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49107/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49107/43361/wordpress-theme-wibar-118-brand-component-stored-cross-site-scripting/download/", "exploit_id": "49107", "exploit_description": "\"Wordpress Theme Wibar 1.1.8 - 'Brand Component' Stored Cross Site Scripting\"", "exploit_date": "2020-11-27", "exploit_author": "\"Ilca Lucian Florin\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49109/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49109/43362/wondercms-313-uploadfile-stored-cross-site-scripting/download/", "exploit_id": "49109", "exploit_description": "\"WonderCMS 3.1.3 - 'uploadFile' Stored Cross-Site Scripting\"", "exploit_date": "2020-11-27", "exploit_author": "\"Sun* Cyber Security Research Team\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49121/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49121/43369/elkarbackup-133-policyname-and-policydescription-stored-cross-site-scripting/download/", "exploit_id": "49121", "exploit_description": "\"ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting\"", "exploit_date": "2020-11-27", "exploit_author": "\"Vyshnav nk\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49108/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49108/43335/sap-lumira-131-stored-cross-site-scripting/download/", "exploit_id": "49108", "exploit_description": "\"SAP Lumira 1.31 - Stored Cross-Site Scripting\"", "exploit_date": "2020-11-27", "exploit_author": "\"Ilca Lucian Florin\"", "exploit_type": "local", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49122/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49122/43370/best-support-system-304-ticket-body-persistent-xss-authenticated/download/", "exploit_id": "49122", "exploit_description": "\"Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)\"", "exploit_date": "2020-11-27", "exploit_author": "Ex.Mi", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49117/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49117/43368/house-rental-10-keywords-sql-injection/download/", "exploit_id": "49117", "exploit_description": "\"House Rental 1.0 - 'keywords' SQL Injection\"", "exploit_date": "2020-11-27", "exploit_author": "boku", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49112/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49112/43364/laravel-administrator-4-unrestricted-file-upload-authenticated/download/", "exploit_id": "49112", "exploit_description": "\"Laravel Administrator 4 - Unrestricted File Upload (Authenticated)\"", "exploit_date": "2020-11-27", "exploit_author": "\"Xavi Beltran\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49113/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49113/43365/acronis-cyber-backup-125-build-16341-unauthenticated-ssrf/download/", "exploit_id": "49113", "exploit_description": "\"Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF\"", "exploit_date": "2020-11-27", "exploit_author": "\"Julien Ahrens\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49110/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49110/43363/ruckus-iot-controller-ruckus-vriot-151021-remote-code-execution/download/", "exploit_id": "49110", "exploit_description": "\"Ruckus IoT Controller (Ruckus vRIoT) 1.5.1.0.21 - Remote Code Execution\"", "exploit_date": "2020-11-27", "exploit_author": "\"Emre SUREN\"", "exploit_type": "webapps", "exploit_platform": "hardware", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49119/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49119/43331/libupnp-1618-stack-based-buffer-overflow-dos/download/", "exploit_id": "49119", "exploit_description": "\"libupnp 1.6.18 - Stack-based buffer overflow (DoS)\"", "exploit_date": "2020-11-27", "exploit_author": "\"Patrik Lantz\"", "exploit_type": "dos", "exploit_platform": "linux", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49114/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49114/43366/moodle-38-unrestricted-file-upload/download/", "exploit_id": "49114", "exploit_description": "\"Moodle 3.8 - Unrestricted File Upload\"", "exploit_date": "2020-11-27", "exploit_author": "\"Sirwan Veisi\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49115/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49115/43367/wordpress-theme-accesspress-social-icons-179-sql-injection-authenticated/download/", "exploit_id": "49115", "exploit_description": "\"Wordpress Theme Accesspress Social Icons 1.7.9 - SQL injection (Authenticated)\"", "exploit_date": "2020-11-27", "exploit_author": "SunCSR", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49116/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49116/43336/foxit-reader-9011049-arbitrary-code-execution/download/", "exploit_id": "49116", "exploit_description": "\"Foxit Reader 9.0.1.1049 - Arbitrary Code Execution\"", "exploit_date": "2020-11-27", "exploit_author": "CrossWire", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49106/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49106/43345/razer-chroma-sdk-server-31602-race-condition-remote-file-execution/download/", "exploit_id": "49106", "exploit_description": "\"Razer Chroma SDK Server 3.16.02 - Race Condition Remote File Execution\"", "exploit_date": "2020-11-26", "exploit_author": "\"Loke Hui Yi\"", "exploit_type": "remote", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49105/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49105/43330/pure-ftpd-1048-remote-denial-of-service/download/", "exploit_id": "49105", "exploit_description": "\"Pure-FTPd 1.0.48 - Remote Denial of Service\"", "exploit_date": "2020-11-26", "exploit_author": "xynmaps", "exploit_type": "dos", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49104/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49104/43360/syncbreeze-10028-password-remote-buffer-overflow/download/", "exploit_id": "49104", "exploit_description": "\"SyncBreeze 10.0.28 - 'password' Remote Buffer Overflow\"", "exploit_date": "2020-11-25", "exploit_author": "\"Abdessalam king\"", "exploit_type": "webapps", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49102/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49102/43358/wondercms-313-page-persistent-cross-site-scripting/download/", "exploit_id": "49102", "exploit_description": "\"WonderCMS 3.1.3 - 'page' Persistent Cross-Site Scripting\"", "exploit_date": "2020-11-25", "exploit_author": "\"Mayur Parmar\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49103/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49103/43359/oscommerce-2341-title-persistent-cross-site-scripting/download/", "exploit_id": "49103", "exploit_description": "\"osCommerce 2.3.4.1 - 'title' Persistent Cross-Site Scripting\"", "exploit_date": "2020-11-25", "exploit_author": "\"Emre Aslan\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49101/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49101/43334/wondershare-driver-install-service-help-1071321-elevationservice-unquote-service-path/download/", "exploit_id": "49101", "exploit_description": "\"Wondershare Driver Install Service help 10.7.1.321 - 'ElevationService' Unquote Service Path\"", "exploit_date": "2020-11-25", "exploit_author": "\"Luis Sandoval\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49097/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49097/43355/seowon-130-slc-router-1011-ipaddr-rce-authenticated/download/", "exploit_id": "49097", "exploit_description": "\"Seowon 130-SLC router 1.0.11 - 'ipAddr' RCE (Authenticated)\"", "exploit_date": "2020-11-24", "exploit_author": "maj0rmil4d", "exploit_type": "webapps", "exploit_platform": "hardware", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49096/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49096/43354/zeroshell-390-cgi-binkerbynet-remote-root-command-injection-metasploit/download/", "exploit_id": "49096", "exploit_description": "\"ZeroShell 3.9.0 - 'cgi-bin/kerbynet' Remote Root Command Injection (Metasploit)\"", "exploit_date": "2020-11-24", "exploit_author": "\"Giuseppe Fuggiano\"", "exploit_type": "webapps", "exploit_platform": "linux", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49098/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49098/43356/opencart-3036-profile-image-stored-cross-site-scripting-authenticated/download/", "exploit_id": "49098", "exploit_description": "\"OpenCart 3.0.3.6 - 'Profile Image' Stored Cross-Site Scripting (Authenticated)\"", "exploit_date": "2020-11-24", "exploit_author": "\"Hemant Patidar\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49094/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49094/43353/apache-openmeetings-500-hostname-denial-of-service/download/", "exploit_id": "49094", "exploit_description": "\"Apache OpenMeetings 5.0.0 - 'hostname' Denial of Service\"", "exploit_date": "2020-11-24", "exploit_author": "SunCSR", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49099/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49099/43357/opencart-3036-subject-stored-cross-site-scripting/download/", "exploit_id": "49099", "exploit_description": "\"OpenCart 3.0.3.6 - 'subject' Stored Cross-Site Scripting\"", "exploit_date": "2020-11-24", "exploit_author": "\"Hemant Patidar\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49100/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49100/43333/docprint-pro-80-add-url-buffer-overflow-seh-egghunter/download/", "exploit_id": "49100", "exploit_description": "\"docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter)\"", "exploit_date": "2020-11-24", "exploit_author": "MasterVlad", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49093/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49093/43352/nopcommerce-store-430-name-stored-cross-site-scripting/download/", "exploit_id": "49093", "exploit_description": "\"nopCommerce Store 4.30 - 'name' Stored Cross-Site Scripting\"", "exploit_date": "2020-11-24", "exploit_author": "\"Hemant Patidar\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49089/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49089/43332/boxoft-audio-converter-230-wav-buffer-overflow-seh/download/", "exploit_id": "49089", "exploit_description": "\"Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH)\"", "exploit_date": "2020-11-23", "exploit_author": "\"Luis Martínez\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49091/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49091/43351/liferay-721-ga2-stored-xss/download/", "exploit_id": "49091", "exploit_description": "\"LifeRay 7.2.1 GA2 - Stored XSS\"", "exploit_date": "2020-11-23", "exploit_author": "3ndG4me", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49092/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49092/43349/tp-link-tl-wa855re-v5-200415-device-reset-auth-bypass/download/", "exploit_id": "49092", "exploit_description": "\"TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass\"", "exploit_date": "2020-11-23", "exploit_author": "malwrforensics", "exploit_type": "webapps", "exploit_platform": "hardware", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49090/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49090/43350/vtiger-v70-crm-to-persistent-xss/download/", "exploit_id": "49090", "exploit_description": "\"VTiger v7.0 CRM - 'To' Persistent XSS\"", "exploit_date": "2020-11-23", "exploit_author": "Vulnerability-Lab", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49084/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49084/43290/zortam-mp3-media-studio-2760-remote-code-execution-seh/download/", "exploit_id": "49084", "exploit_description": "\"Zortam Mp3 Media Studio 27.60 - Remote Code Execution (SEH)\"", "exploit_date": "2020-11-20", "exploit_author": "\"Vincent Wolterman\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49087/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49087/43292/free-mp3-cd-ripper-28-multiple-file-buffer-overflow-metasploit/download/", "exploit_id": "49087", "exploit_description": "\"Free MP3 CD Ripper 2.8 - Multiple File Buffer Overflow (Metasploit)\"", "exploit_date": "2020-11-20", "exploit_author": "ZwX", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49085/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49085/43329/wondercms-313-content-persistent-cross-site-scripting/download/", "exploit_id": "49085", "exploit_description": "\"WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting\"", "exploit_date": "2020-11-20", "exploit_author": "\"Hemant Patidar\"", "exploit_type": "webapps", "exploit_platform": "php", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49086/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49086/43291/ibm-tivoli-storage-manager-command-line-administrative-interface-5201-id-field-stack-based-buffer-overflow/download/", "exploit_id": "49086", "exploit_description": "\"IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 - id' Field Stack Based Buffer Overflow\"", "exploit_date": "2020-11-20", "exploit_author": "\"Paolo Stagno\"", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49088/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49088/43293/boxoft-convert-master-130-wav-seh-local-exploit/download/", "exploit_id": "49088", "exploit_description": "\"Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit\"", "exploit_date": "2020-11-20", "exploit_author": "stresser", "exploit_type": "local", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49076/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49076/43322/gitlab-1290-arbitrary-file-read-authenticated/download/", "exploit_id": "49076", "exploit_description": "\"Gitlab 12.9.0 - Arbitrary File Read (Authenticated)\"", "exploit_date": "2020-11-19", "exploit_author": "\"Jasper Rasenberg\"", "exploit_type": "webapps", "exploit_platform": "ruby", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49083/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49083/43280/internet-download-manager-63812-scheduler-downloads-scheduler-buffer-overflow-poc/download/", "exploit_id": "49083", "exploit_description": "\"Internet Download Manager 6.38.12 - Scheduler Downloads Scheduler Buffer Overflow (PoC)\"", "exploit_date": "2020-11-19", "exploit_author": "\"Vincent Wolterman\"", "exploit_type": "dos", "exploit_platform": "windows", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49081/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49081/43327/mmonit-374-password-disclosure/download/", "exploit_id": "49081", "exploit_description": "\"M/Monit 3.7.4 - Password Disclosure\"", "exploit_date": "2020-11-19", "exploit_author": "\"Dolev Farhi\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49082/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49082/43328/nagios-log-server-217-persistent-cross-site-scripting/download/", "exploit_id": "49082", "exploit_description": "\"Nagios Log Server 2.1.7 - Persistent Cross-Site Scripting\"", "exploit_date": "2020-11-19", "exploit_author": "\"Emre ÖVÜNÇ\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49075/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49075/43298/genexis-platinum-4410-router-21-upnp-credential-exposure/download/", "exploit_id": "49075", "exploit_description": "\"Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure\"", "exploit_date": "2020-11-19", "exploit_author": "\"Nitesh Surana\"", "exploit_type": "remote", "exploit_platform": "hardware", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49072/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49072/43319/pescms-team-232-multiple-reflected-xss/download/", "exploit_id": "49072", "exploit_description": "\"PESCMS TEAM 2.3.2 - Multiple Reflected XSS\"", "exploit_date": "2020-11-19", "exploit_author": "icekam", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49074/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49074/43320/fortinet-fortios-604-unauthenticated-ssl-vpn-user-password-modification/download/", "exploit_id": "49074", "exploit_description": "\"Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification\"", "exploit_date": "2020-11-19", "exploit_author": "\"Ricardo Longatto\"", "exploit_type": "webapps", "exploit_platform": "hardware", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49080/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49080/43326/mmonit-374-privilege-escalation/download/", "exploit_id": "49080", "exploit_description": "\"M/Monit 3.7.4 - Privilege Escalation\"", "exploit_date": "2020-11-19", "exploit_author": "\"Dolev Farhi\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49078/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49078/43324/testbox-cfml-test-framework-410-directory-traversal/download/", "exploit_id": "49078", "exploit_description": "\"TestBox CFML Test Framework 4.1.0 - Directory Traversal\"", "exploit_date": "2020-11-19", "exploit_author": "\"Darren King\"", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49079/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49079/43325/gemtek-wvrtm-127acn-010102141-authenticated-arbitrary-command-injection/download/", "exploit_id": "49079", "exploit_description": "\"Gemtek WVRTM-127ACN 01.01.02.141 - Authenticated Arbitrary Command Injection\"", "exploit_date": "2020-11-19", "exploit_author": "\"Gabriele Zuddas\"", "exploit_type": "webapps", "exploit_platform": "cgi", "exploit_port": null }, { "url": "https://www.nmmapper.com/api/v1/exploitdetails/49073/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/49073/43321/xuucms-3-keywords-sql-injection/download/", "exploit_id": "49073", "exploit_description": "\"xuucms 3 - 'keywords' SQL Injection\"", "exploit_date": "2020-11-19", "exploit_author": "icekam", "exploit_type": "webapps", "exploit_platform": "multiple", "exploit_port": null } ][ { "url": "