Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/v1/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48819/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48819/43066/online-shop-project-10-p-sql-injection/download/",
        "exploit_id": "48819",
        "exploit_description": "\"Online Shop Project 1.0 - 'p' SQL Injection\"",
        "exploit_date": "2020-09-21",
        "exploit_author": "Augkim",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48820/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48820/43067/blackcat-cms-136-cross-site-request-forgery/download/",
        "exploit_id": "48820",
        "exploit_description": "\"BlackCat CMS 1.3.6 - Cross-Site Request Forgery\"",
        "exploit_date": "2020-09-21",
        "exploit_author": "Noth",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48823/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48823/43069/mida-eframework-290-back-door-access/download/",
        "exploit_id": "48823",
        "exploit_description": "\"Mida eFramework 2.9.0 - Back Door Access\"",
        "exploit_date": "2020-09-21",
        "exploit_author": "elbae",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48821/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48821/43065/forensitappxservice-2204-forensitappxserviceexe-unquoted-service-path/download/",
        "exploit_id": "48821",
        "exploit_description": "\"ForensiTAppxService 2.2.0.4 - 'ForensiTAppxService.exe' Unquoted Service Path\"",
        "exploit_date": "2020-09-21",
        "exploit_author": "\"Burhanettin Ozgenc\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48822/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48822/43068/seat-reservation-system-10-id-sql-injection/download/",
        "exploit_id": "48822",
        "exploit_description": "\"Seat Reservation System 1.0 - 'id' SQL Injection\"",
        "exploit_date": "2020-09-21",
        "exploit_author": "Augkim",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48824/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48824/43070/b-swiss-3-digital-signage-system-365-remote-code-execution/download/",
        "exploit_id": "48824",
        "exploit_description": "\"B-swiss 3 Digital Signage System 3.6.5 - Remote Code Execution\"",
        "exploit_date": "2020-09-21",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48818/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48818/43064/mantis-bug-tracker-230-remote-code-execution-unauthenticated/download/",
        "exploit_id": "48818",
        "exploit_description": "\"Mantis Bug Tracker 2.3.0 - Remote Code Execution (Unauthenticated)\"",
        "exploit_date": "2020-09-18",
        "exploit_author": "\"Nikolas Geiselman\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48817/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48817/43063/spamtitan-707-remote-code-execution-authenticated/download/",
        "exploit_id": "48817",
        "exploit_description": "\"SpamTitan 7.07 - Remote Code Execution (Authenticated)\"",
        "exploit_date": "2020-09-18",
        "exploit_author": "\"Felipe Molina\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48816/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48816/43062/microsoft-sql-server-reporting-services-2016-remote-code-execution/download/",
        "exploit_id": "48816",
        "exploit_description": "\"Microsoft SQL Server Reporting Services 2016 - Remote Code Execution\"",
        "exploit_date": "2020-09-17",
        "exploit_author": "\"West Shepherd\"",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48814/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48814/43061/piwigo-2101-cross-site-scripting/download/",
        "exploit_id": "48814",
        "exploit_description": "\"Piwigo 2.10.1 - Cross Site Scripting\"",
        "exploit_date": "2020-09-16",
        "exploit_author": "Iridium",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48815/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48815/43060/windows-tcpip-finger-command-c2-channel-and-bypassing-security-software/download/",
        "exploit_id": "48815",
        "exploit_description": "\"Windows TCPIP Finger Command - C2 Channel and Bypassing Security Software\"",
        "exploit_date": "2020-09-16",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48813/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48813/43059/tailor-ms-10-reflected-cross-site-scripting/download/",
        "exploit_id": "48813",
        "exploit_description": "\"Tailor MS 1.0 - Reflected Cross-Site Scripting\"",
        "exploit_date": "2020-09-15",
        "exploit_author": "boku",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48812/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48812/43058/thinkadmin-6-arbitrarily-file-read/download/",
        "exploit_id": "48812",
        "exploit_description": "\"ThinkAdmin 6 -  Arbitrarily File Read\"",
        "exploit_date": "2020-09-15",
        "exploit_author": "Hzllaga",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48810/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48810/43054/pearson-vue-vts-231911-installer-vueapplicationwrapper-unquoted-service-path/download/",
        "exploit_id": "48810",
        "exploit_description": "\"Pearson Vue VTS 2.3.1911 Installer - 'VUEApplicationWrapper' Unquoted Service Path\"",
        "exploit_date": "2020-09-14",
        "exploit_author": "Jok3r",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48808/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48808/43053/rapid7-nexpose-installer-6639-nexposeengine-unquoted-service-path/download/",
        "exploit_id": "48808",
        "exploit_description": "\"Rapid7 Nexpose Installer 6.6.39 - 'nexposeengine' Unquoted Service Path\"",
        "exploit_date": "2020-09-14",
        "exploit_author": "LiquidWorm",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48811/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48811/43057/joomla-pago-commerce-2590-sql-injection-authenticated/download/",
        "exploit_id": "48811",
        "exploit_description": "\"Joomla! paGO Commerce 2.5.9.0 - SQL Injection (Authenticated)\"",
        "exploit_date": "2020-09-14",
        "exploit_author": "\"Mehmet Kelepçe\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48809/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48809/43056/rad-secflow-1v-sf-0290-230126-cross-site-request-forgery-reboot/download/",
        "exploit_id": "48809",
        "exploit_description": "\"RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot)\"",
        "exploit_date": "2020-09-14",
        "exploit_author": "\"Jonatan Schor\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48807/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48807/43055/rad-secflow-1v-sf-0290-230126-persistent-cross-site-scripting/download/",
        "exploit_id": "48807",
        "exploit_description": "\"RAD SecFlow-1v SF_0290_2.3.01.26  - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-09-14",
        "exploit_author": "\"Jonatan Schor\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48804/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48804/43051/vtenext-19-ce-remote-code-execution/download/",
        "exploit_id": "48804",
        "exploit_description": "\"VTENEXT 19 CE - Remote Code Execution\"",
        "exploit_date": "2020-09-11",
        "exploit_author": "\"Marco Ruela\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48806/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48806/43047/internet-explorer-11-use-after-free/download/",
        "exploit_id": "48806",
        "exploit_description": "\"Internet Explorer 11 - Use-After-Free\"",
        "exploit_date": "2020-09-11",
        "exploit_author": "\"Simon Zuckerbraun\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48805/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48805/43052/tea-latex-10-remote-code-execution-unauthenticated/download/",
        "exploit_id": "48805",
        "exploit_description": "\"Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)\"",
        "exploit_date": "2020-09-11",
        "exploit_author": "nepska",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48803/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48803/43046/gnome-fonts-viewer-3340-heap-corruption/download/",
        "exploit_id": "48803",
        "exploit_description": "\"Gnome Fonts Viewer 3.34.0 - Heap Corruption\"",
        "exploit_date": "2020-09-11",
        "exploit_author": "\"Cody Winkler\"",
        "exploit_type": "local",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48800/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48800/43049/cutenews-212-remote-code-execution/download/",
        "exploit_id": "48800",
        "exploit_description": "\"CuteNews 2.1.2 - Remote Code Execution\"",
        "exploit_date": "2020-09-10",
        "exploit_author": "\"Musyoka Ian\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48801/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48801/43050/zte-router-f602w-captcha-bypass/download/",
        "exploit_id": "48801",
        "exploit_description": "\"ZTE Router F602W - Captcha Bypass\"",
        "exploit_date": "2020-09-10",
        "exploit_author": "\"Hritik Vijay\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48799/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48799/43048/tiandy-ipc-and-nvr-9127-credential-disclosure/download/",
        "exploit_id": "48799",
        "exploit_description": "\"Tiandy IPC and NVR 9.12.7 - Credential Disclosure\"",
        "exploit_date": "2020-09-10",
        "exploit_author": "zb3",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48798/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48798/43045/scopia-xt-desktop-839154-cross-site-request-forgery-change-admin-password/download/",
        "exploit_id": "48798",
        "exploit_description": "\"Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)\"",
        "exploit_date": "2020-09-09",
        "exploit_author": "V1n1v131r4",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48796/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48796/43043/audio-playback-recorder-322-local-buffer-overflow-seh/download/",
        "exploit_id": "48796",
        "exploit_description": "\"Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)\"",
        "exploit_date": "2020-09-09",
        "exploit_author": "\"Felipe Winsnes\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48795/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48795/43042/input-director-143-input-director-unquoted-service-path/download/",
        "exploit_id": "48795",
        "exploit_description": "\"Input Director 1.4.3 - 'Input Director' Unquoted Service Path\"",
        "exploit_date": "2020-09-09",
        "exploit_author": "\"TOUHAMI Kasbaoui\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48797/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48797/43044/tailor-management-system-id-sql-injection/download/",
        "exploit_id": "48797",
        "exploit_description": "\"Tailor Management System - 'id' SQL Injection\"",
        "exploit_date": "2020-09-09",
        "exploit_author": "Mosaaed",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48794/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48794/43041/sharemouse-5043-sharemouse-service-unquoted-service-path/download/",
        "exploit_id": "48794",
        "exploit_description": "\"ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path\"",
        "exploit_date": "2020-09-08",
        "exploit_author": "alacerda",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48791/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48791/43038/cabot-01112-persistent-cross-site-scripting/download/",
        "exploit_id": "48791",
        "exploit_description": "\"Cabot 0.11.12 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-09-07",
        "exploit_author": "\"Abhiram V\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48793/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48793/43040/manageengine-applications-manager-14700-remote-code-execution-authenticated/download/",
        "exploit_id": "48793",
        "exploit_description": "\"ManageEngine Applications Manager 14700 - Remote Code Execution (Authenticated)\"",
        "exploit_date": "2020-09-07",
        "exploit_author": "Hodorsec",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48792/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48792/43039/grocy-271-persistent-cross-site-scripting/download/",
        "exploit_id": "48792",
        "exploit_description": "\"grocy 2.7.1 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-09-07",
        "exploit_author": "\"Mufaddal Masalawala\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48790/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48790/43032/nord-vpn-631130-nordvpn-service-unquoted-service-path/download/",
        "exploit_id": "48790",
        "exploit_description": "\"Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path\"",
        "exploit_date": "2020-09-04",
        "exploit_author": "chipo",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48789/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48789/43033/barracudadrive-v65-insecure-folder-permissions/download/",
        "exploit_id": "48789",
        "exploit_description": "\"BarracudaDrive v6.5 - Insecure Folder Permissions\"",
        "exploit_date": "2020-09-03",
        "exploit_author": "boku",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48785/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48785/43034/savsoft-quiz-enterprise-version-55-persistent-cross-site-scripting/download/",
        "exploit_id": "48785",
        "exploit_description": "\"Savsoft Quiz Enterprise Version 5.5 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-09-03",
        "exploit_author": "\"Hemant Patidar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48786/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48786/43035/bloodx-cms-10-authentication-bypass/download/",
        "exploit_id": "48786",
        "exploit_description": "\"BloodX CMS 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-09-03",
        "exploit_author": "BKpatron",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48788/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48788/43037/sitemagic-cms-442-arbitrary-file-upload-authenticated/download/",
        "exploit_id": "48788",
        "exploit_description": "\"SiteMagic CMS 4.4.2 - Arbitrary File Upload (Authenticated)\"",
        "exploit_date": "2020-09-03",
        "exploit_author": "V1n1v131r4",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48787/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48787/43036/daily-tracker-system-10-authentication-bypass/download/",
        "exploit_id": "48787",
        "exploit_description": "\"Daily Tracker System 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-09-03",
        "exploit_author": "\"Adeeb Shah\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48783/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48783/43031/stock-management-system-10-cross-site-request-forgery-change-username/download/",
        "exploit_id": "48783",
        "exploit_description": "\"Stock Management System 1.0 - Cross-Site Request Forgery (Change Username)\"",
        "exploit_date": "2020-09-02",
        "exploit_author": "boku",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48781/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48781/43030/mozilocms-20-persistent-cross-site-scripting-authenticated/download/",
        "exploit_id": "48781",
        "exploit_description": "\"moziloCMS 2.0 - Persistent Cross-Site Scripting (Authenticated)\"",
        "exploit_date": "2020-09-01",
        "exploit_author": "\"Abdulkadir Kaya\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48780/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48780/43029/mara-cms-75-remote-code-execution-authenticated/download/",
        "exploit_id": "48780",
        "exploit_description": "\"Mara CMS 7.5 - Remote Code Execution (Authenticated)\"",
        "exploit_date": "2020-09-01",
        "exploit_author": "0blio_",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48779/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48779/43028/cms-made-simple-2214-arbitrary-file-upload-authenticated/download/",
        "exploit_id": "48779",
        "exploit_description": "\"CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated)\"",
        "exploit_date": "2020-08-31",
        "exploit_author": "\"Luis Noriega\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48778/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48778/43027/fuel-cms-148-fuel-replace-id-sql-injection-authenticated/download/",
        "exploit_id": "48778",
        "exploit_description": "\"Fuel CMS 1.4.8 - 'fuel_replace_id' SQL Injection (Authenticated)\"",
        "exploit_date": "2020-08-31",
        "exploit_author": "c0mpu7er",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48777/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48777/43026/mara-cms-75-reflective-cross-site-scripting/download/",
        "exploit_id": "48777",
        "exploit_description": "\"Mara CMS  7.5 - Reflective Cross-Site Scripting\"",
        "exploit_date": "2020-08-31",
        "exploit_author": "\"George Tsimpidas\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48776/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48776/43024/blazedvd-70-professional-plf-local-buffer-overflow-seh-aslr-dep/download/",
        "exploit_id": "48776",
        "exploit_description": "\"BlazeDVD 7.0 Professional - '.plf' Local Buffer Overflow (SEH_ASLR_DEP)\"",
        "exploit_date": "2020-08-31",
        "exploit_author": "emalp",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48775/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48775/43025/online-book-store-10-id-sql-injection/download/",
        "exploit_id": "48775",
        "exploit_description": "\"Online Book Store 1.0 - 'id' SQL Injection\"",
        "exploit_date": "2020-08-31",
        "exploit_author": "\"Moaaz Taha\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48771/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48771/43020/online-shopping-alphaware-10-id-sql-injection/download/",
        "exploit_id": "48771",
        "exploit_description": "\"Online Shopping Alphaware 1.0 - 'id' SQL Injection\"",
        "exploit_date": "2020-08-28",
        "exploit_author": "\"Moaaz Taha\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48772/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48772/43021/nagios-log-server-216-persistent-cross-site-scripting/download/",
        "exploit_id": "48772",
        "exploit_description": "\"Nagios Log Server 2.1.6 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-08-28",
        "exploit_author": "\"Jinson Varghese Behanan\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48774/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48774/43023/eibiz-i-media-server-digital-signage-380-privilege-escalation/download/",
        "exploit_id": "48774",
        "exploit_description": "\"Eibiz i-Media Server Digital Signage 3.8.0 - Privilege Escalation\"",
        "exploit_date": "2020-08-28",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48773/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48773/43022/symphonycms-300-persistent-cross-site-scripting/download/",
        "exploit_id": "48773",
        "exploit_description": "\"SymphonyCMS 3.0.0 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-08-28",
        "exploit_author": "SunCSR",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48769/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48769/43015/asx-to-mp3-converter-313720101105-wax-local-buffer-overflow-dep-aslr-bypass-poc/download/",
        "exploit_id": "48769",
        "exploit_description": "\"ASX to MP3 converter 3.1.3.7.2010.11.05 - '.wax' Local Buffer Overflow (DEP_ASLR Bypass) (PoC)\"",
        "exploit_date": "2020-08-27",
        "exploit_author": "\"Paras Bhatia\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48770/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48770/43019/wordpress-plugin-autoptimize-276-arbitrary-file-upload-authenticated/download/",
        "exploit_id": "48770",
        "exploit_description": "\"Wordpress Plugin Autoptimize 2.7.6 - Arbitrary File Upload (Authenticated)\"",
        "exploit_date": "2020-08-27",
        "exploit_author": "\"SunCSR Team\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48768/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48768/43018/mida-eframework-290-remote-code-execution/download/",
        "exploit_id": "48768",
        "exploit_description": "\"Mida eFramework 2.9.0 - Remote Code Execution\"",
        "exploit_date": "2020-08-27",
        "exploit_author": "elbae",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48765/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48765/43016/ericom-access-server-x64-920-server-side-request-forgery/download/",
        "exploit_id": "48765",
        "exploit_description": "\"Ericom Access Server x64 9.2.0 - Server-Side Request Forgery\"",
        "exploit_date": "2020-08-26",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48766/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48766/43017/eibiz-i-media-server-digital-signage-380-directory-traversal/download/",
        "exploit_id": "48766",
        "exploit_description": "\"Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal\"",
        "exploit_date": "2020-08-26",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48762/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48762/43012/limesurvey-4310-survey-menu-persistent-cross-site-scripting/download/",
        "exploit_id": "48762",
        "exploit_description": "\"LimeSurvey 4.3.10 - 'Survey Menu' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-08-24",
        "exploit_author": "\"Matthew Aberegg\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48763/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48763/43013/eibiz-i-media-server-digital-signage-380-authentication-bypass/download/",
        "exploit_id": "48763",
        "exploit_description": "\"Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass\"",
        "exploit_date": "2020-08-24",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48764/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48764/43014/eibiz-i-media-server-digital-signage-380-configuration-disclosure/download/",
        "exploit_id": "48764",
        "exploit_description": "\"Eibiz i-Media Server Digital Signage 3.8.0 - Configuration Disclosure\"",
        "exploit_date": "2020-08-24",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48759/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48759/43010/seowon-slc-130-router-remote-code-execution/download/",
        "exploit_id": "48759",
        "exploit_description": "\"Seowon SlC 130 Router - Remote Code Execution\"",
        "exploit_date": "2020-08-21",
        "exploit_author": "maj0rmil4d",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48758/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48758/43009/complaint-management-system-10-cid-sql-injection/download/",
        "exploit_id": "48758",
        "exploit_description": "\"Complaint Management System 1.0 - 'cid' SQL Injection\"",
        "exploit_date": "2020-08-21",
        "exploit_author": "\"Mohamed Elobeid\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48757/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48757/43008/pnpscada-2200816204020-interf-sql-injection-authenticated/download/",
        "exploit_id": "48757",
        "exploit_description": "\"PNPSCADA 2.200816204020 - 'interf' SQL Injection (Authenticated)\"",
        "exploit_date": "2020-08-20",
        "exploit_author": "\"İsmail ERKEK\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48756/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48756/43007/elkarbackup-133-persistent-cross-site-scripting/download/",
        "exploit_id": "48756",
        "exploit_description": "\"ElkarBackup 1.3.3 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-08-20",
        "exploit_author": "\"Enes Özeser\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48755/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48755/43006/ruijie-networks-switch-eweb-s29-rgos-114-directory-traversal/download/",
        "exploit_id": "48755",
        "exploit_description": "\"Ruijie Networks Switch eWeb S29_RGOS 11.4 - Directory Traversal\"",
        "exploit_date": "2020-08-19",
        "exploit_author": "Tuygun",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48753/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48753/43005/savsoft-quiz-5-stored-cross-site-scripting/download/",
        "exploit_id": "48753",
        "exploit_description": "\"Savsoft Quiz 5 - Stored Cross-Site Scripting\"",
        "exploit_date": "2020-08-18",
        "exploit_author": "\"Mayur Parmar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48752/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48752/43004/pharmacy-medical-store-and-sale-point-10-catid-sql-injection/download/",
        "exploit_id": "48752",
        "exploit_description": "\"Pharmacy Medical Store and Sale Point 1.0  - 'catid' SQL Injection\"",
        "exploit_date": "2020-08-18",
        "exploit_author": "\"Moaaz Taha\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48747/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48747/42999/microsoft-sharepoint-server-2019-remote-code-execution/download/",
        "exploit_id": "48747",
        "exploit_description": "\"Microsoft SharePoint Server 2019 - Remote Code Execution\"",
        "exploit_date": "2020-08-17",
        "exploit_author": "\"West Shepherd\"",
        "exploit_type": "webapps",
        "exploit_platform": "aspx",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48751/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48751/43003/qihang-media-web-digital-signage-309-remote-code-execution-unauthenticated/download/",
        "exploit_id": "48751",
        "exploit_description": "\"QiHang Media Web Digital Signage 3.0.9 - Remote Code Execution (Unauthenticated)\"",
        "exploit_date": "2020-08-17",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48750/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48750/43002/qihang-media-web-digital-signage-309-unauthenticated-arbitrary-file-disclosure/download/",
        "exploit_id": "48750",
        "exploit_description": "\"QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure\"",
        "exploit_date": "2020-08-17",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48749/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48749/43001/qihang-media-web-digital-signage-309-unauthenticated-arbitrary-file-deletion/download/",
        "exploit_id": "48749",
        "exploit_description": "\"QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Deletion\"",
        "exploit_date": "2020-08-17",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48746/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48746/42998/bludit-392-authentication-bruteforce-mitigation-bypass/download/",
        "exploit_id": "48746",
        "exploit_description": "\"Bludit  3.9.2 - Authentication Bruteforce Mitigation Bypass\"",
        "exploit_date": "2020-08-17",
        "exploit_author": "\"Alexandre ZANNI\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48748/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48748/43000/qihang-media-web-digital-signage-309-cleartext-credential-disclosure/download/",
        "exploit_id": "48748",
        "exploit_description": "\"QiHang Media Web Digital Signage 3.0.9 - Cleartext Credential Disclosure\"",
        "exploit_date": "2020-08-17",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48744/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48744/42996/artica-proxy-430-authentication-bypass/download/",
        "exploit_id": "48744",
        "exploit_description": "\"Artica Proxy 4.3.0 - Authentication Bypass\"",
        "exploit_date": "2020-08-13",
        "exploit_author": "\"Dan Duffy\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48745/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48745/42997/getsimple-cms-plugin-multi-user-182-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48745",
        "exploit_description": "\"GetSimple CMS Plugin Multi User 1.8.2 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-08-13",
        "exploit_author": "boku",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48743/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48743/42995/vbulletin-562-widget-tabbedcontainer-tab-panel-remote-code-execution/download/",
        "exploit_id": "48743",
        "exploit_description": "\"vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution\"",
        "exploit_date": "2020-08-12",
        "exploit_author": "zenofex",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48742/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48742/42994/cms-made-simple-2214-authenticated-arbitrary-file-upload/download/",
        "exploit_id": "48742",
        "exploit_description": "\"CMS Made Simple 2.2.14 - Authenticated Arbitrary File Upload\"",
        "exploit_date": "2020-08-12",
        "exploit_author": "\"Roel van Beurden\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48741/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48741/42993/fuel-cms-147-col-sql-injection-authenticated/download/",
        "exploit_id": "48741",
        "exploit_description": "\"Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated)\"",
        "exploit_date": "2020-08-11",
        "exploit_author": "\"Roel van Beurden\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48739/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48739/42992/manageengine-adselfservice-build-prior-to-6003-remote-code-execution-unauthenticated/download/",
        "exploit_id": "48739",
        "exploit_description": "\"ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated)\"",
        "exploit_date": "2020-08-10",
        "exploit_author": "\"Bhadresh Patel\"",
        "exploit_type": "webapps",
        "exploit_platform": "java",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48740/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48740/42990/barcodeocr-1936-barcodeocr-unquoted-service-path/download/",
        "exploit_id": "48740",
        "exploit_description": "\"BarcodeOCR 19.3.6 - 'BarcodeOCR' Unquoted Service Path\"",
        "exploit_date": "2020-08-10",
        "exploit_author": "\"Daniel Bertoni\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48738/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48738/42991/warehouse-inventory-system-10-cross-site-request-forgery-change-admin-password/download/",
        "exploit_id": "48738",
        "exploit_description": "\"Warehouse Inventory System 1.0 - Cross-Site Request Forgery (Change Admin Password)\"",
        "exploit_date": "2020-08-10",
        "exploit_author": "boku",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48736/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48736/42988/all-dynamics-digital-signage-system-202-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "48736",
        "exploit_description": "\"All-Dynamics Digital Signage System 2.0.2 - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2020-08-07",
        "exploit_author": "LiquidWorm",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48737/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48737/42989/daily-expenses-management-system-10-item-sql-injection/download/",
        "exploit_id": "48737",
        "exploit_description": "\"Daily Expenses Management System 1.0 - 'item' SQL Injection\"",
        "exploit_date": "2020-08-07",
        "exploit_author": "screetsec",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48734/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48734/42987/victor-cms-10-search-sql-injection/download/",
        "exploit_id": "48734",
        "exploit_description": "\"Victor CMS 1.0 - 'Search' SQL Injection\"",
        "exploit_date": "2020-08-06",
        "exploit_author": "screetsec",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48735/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48735/42986/codemeter-660-codemeterexe-unquoted-service-path/download/",
        "exploit_id": "48735",
        "exploit_description": "\"CodeMeter 6.60 - 'CodeMeter.exe' Unquoted Service Path\"",
        "exploit_date": "2020-08-06",
        "exploit_author": "\"Luis Martínez\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48732/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48732/42984/qlikview-1250200000-ftp-server-address-denial-of-service-poc/download/",
        "exploit_id": "48732",
        "exploit_description": "\"QlikView 12.50.20000.0 - 'FTP Server Address' Denial of Service (PoC)\"",
        "exploit_date": "2020-08-05",
        "exploit_author": "\"Luis Martínez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48731/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48731/42983/acti-nvr3-standard-or-professional-server-301242-denial-of-service-poc/download/",
        "exploit_id": "48731",
        "exploit_description": "\"ACTi NVR3 Standard or Professional Server 3.0.12.42 - Denial of Service (PoC)\"",
        "exploit_date": "2020-08-05",
        "exploit_author": "MegaMagnus",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48733/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48733/42985/stock-management-system-10-authentication-bypass/download/",
        "exploit_id": "48733",
        "exploit_description": "\"Stock Management System 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-08-05",
        "exploit_author": "\"Adeeb Shah\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48730/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48730/42982/daily-expenses-management-system-10-username-sql-injection/download/",
        "exploit_id": "48730",
        "exploit_description": "\"Daily Expenses Management System 1.0 - 'username' SQL Injection\"",
        "exploit_date": "2020-08-04",
        "exploit_author": "\"Daniel Ortiz\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48727/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48727/42981/pi-hole-432-remote-code-execution-authenticated/download/",
        "exploit_id": "48727",
        "exploit_description": "\"Pi-hole 4.3.2 - Remote Code Execution (Authenticated)\"",
        "exploit_date": "2020-08-04",
        "exploit_author": "\"Luis Vacacas\"",
        "exploit_type": "webapps",
        "exploit_platform": "python",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48728/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48728/42979/mocha-telnet-lite-for-ios-42-user-denial-of-service-poc/download/",
        "exploit_id": "48728",
        "exploit_description": "\"Mocha Telnet Lite for iOS 4.2 - 'User' Denial of Service (PoC)\"",
        "exploit_date": "2020-08-04",
        "exploit_author": "\"Luis Martínez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48729/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48729/42980/rtsp-for-ios-10-ip-address-denial-of-service-poc/download/",
        "exploit_id": "48729",
        "exploit_description": "\"RTSP for iOS 1.0 - 'IP Address' Denial of Service (PoC)\"",
        "exploit_date": "2020-08-04",
        "exploit_author": "\"Luis Martínez\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48725/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48725/42978/online-shopping-alphaware-10-authentication-bypass/download/",
        "exploit_id": "48725",
        "exploit_description": "\"Online Shopping Alphaware 1.0 - Authentication Bypass\"",
        "exploit_date": "2020-07-30",
        "exploit_author": "\"Ahmed Abbas\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48724/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48724/42977/wordpress-plugin-maintenance-mode-by-seedprod-511-persistent-cross-site-scripting/download/",
        "exploit_id": "48724",
        "exploit_description": "\"Wordpress Plugin Maintenance Mode by SeedProd 5.1.1 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-07-29",
        "exploit_author": "\"Jinson Varghese Behanan\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48723/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48723/42976/cisco-adaptive-security-appliance-software-97-unauthenticated-arbitrary-file-deletion/download/",
        "exploit_id": "48723",
        "exploit_description": "\"Cisco Adaptive Security Appliance Software 9.7 - Unauthenticated Arbitrary File Deletion\"",
        "exploit_date": "2020-07-29",
        "exploit_author": "0xmmnbassel",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48722/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48722/42975/cisco-adaptive-security-appliance-software-911-local-file-inclusion/download/",
        "exploit_id": "48722",
        "exploit_description": "\"Cisco Adaptive Security Appliance Software 9.11 - Local File Inclusion\"",
        "exploit_date": "2020-07-28",
        "exploit_author": "0xmmnbassel",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48720/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48720/42974/egroupware-114-spellcheckerphp-remote-command-execution/download/",
        "exploit_id": "48720",
        "exploit_description": "\"eGroupWare 1.14 - 'spellchecker.php' Remote Command Execution\"",
        "exploit_date": "2020-07-27",
        "exploit_author": "\"Berk KIRAS\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48698/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48698/42957/wordpress-plugin-email-subscribers-newsletters-422-unauthenticated-file-download/download/",
        "exploit_id": "48698",
        "exploit_description": "\"WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "KBA@SOGETI_ESEC",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48712/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48712/42968/sickbeard-01-cross-site-request-forgery-disable-authentication/download/",
        "exploit_id": "48712",
        "exploit_description": "\"Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "bdrake",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48701/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48701/42959/bludit-392-directory-traversal/download/",
        "exploit_id": "48701",
        "exploit_description": "\"Bludit 3.9.2 - Directory Traversal\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "\"James Green\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/48690/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/48690/42953/goautodial-40-persistent-cross-site-scripting-authenticated/download/",
        "exploit_id": "48690",
        "exploit_description": "\"GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated)\"",
        "exploit_date": "2020-07-26",
        "exploit_author": "Balzabu",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    }
]