Return a list of all the existing exploits.

get: Performs a get request to return all existing exploits

post: Create new exploits

GET /api/v1/exploits/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49171/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49171/43407/churchcrm-420-csvformula-injection/download/",
        "exploit_id": "49171",
        "exploit_description": "\"ChurchCRM 4.2.0 - CSV/Formula Injection\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Mufaddal Masalawala\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49168/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49168/43405/dotcms-2011-stored-cross-site-scripting/download/",
        "exploit_id": "49168",
        "exploit_description": "\"DotCMS 20.11 - Stored Cross-Site Scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Hardik Solanki\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49176/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49176/43348/mitel-mitel-cs018-call-data-information-disclosure/download/",
        "exploit_id": "49176",
        "exploit_description": "\"Mitel mitel-cs018 - Call Data Information Disclosure\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Andrea Intilangelo\"",
        "exploit_type": "remote",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49163/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49163/43401/local-service-search-engine-management-system-10-sqli-authentication-bypass/download/",
        "exploit_id": "49163",
        "exploit_description": "\"Local Service Search Engine Management System 1.0 - SQLi Authentication Bypass\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Aditya Wakhlu\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49156/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49156/43396/prtg-network-monitor-204631412-maps-stored-xss/download/",
        "exploit_id": "49156",
        "exploit_description": "\"PRTG Network Monitor 20.4.63.1412 - 'maps' Stored XSS\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Amin Rawah\"",
        "exploit_type": "webapps",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49160/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49160/43398/newslister-authenticated-persistent-cross-site-scripting/download/",
        "exploit_id": "49160",
        "exploit_description": "\"NewsLister - Authenticated Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Emre Aslan\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49179/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49179/43344/microsoft-windows-win32k-elevation-of-privilege/download/",
        "exploit_id": "49179",
        "exploit_description": "\"Microsoft Windows - Win32k Elevation of Privilege\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "nu11secur1ty",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49174/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49174/43410/anuko-time-tracker-119235311-password-reset-leading-to-account-takeover/download/",
        "exploit_id": "49174",
        "exploit_description": "\"Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Mufaddal Masalawala\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49159/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49159/43397/online-voting-system-project-in-php-username-persistent-cross-site-scripting/download/",
        "exploit_id": "49159",
        "exploit_description": "\"Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Sagar Banwa\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49149/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49149/43389/pharmacy-store-management-system-10-id-sql-injection/download/",
        "exploit_id": "49149",
        "exploit_description": "\"Pharmacy Store Management System 1.0 - 'id' SQL Injection\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Aydın Baran Ertemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49175/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49175/43411/simple-college-website-10-page-local-file-inclusion/download/",
        "exploit_id": "49175",
        "exploit_description": "\"Simple College Website 1.0 - 'page' Local File Inclusion\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "Mosaaed",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49161/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49161/43399/bakeshop-online-ordering-system-10-owner-persistent-cross-site-scripting/download/",
        "exploit_id": "49161",
        "exploit_description": "\"Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Parshwa Bhavsar\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49173/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49173/43409/anuko-time-tracker-119235311-no-rate-limit-on-password-reset-functionality/download/",
        "exploit_id": "49173",
        "exploit_description": "\"Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Mufaddal Masalawala\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49146/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49146/43387/expense-management-system-description-stored-cross-site-scripting/download/",
        "exploit_id": "49146",
        "exploit_description": "\"Expense Management System - 'description' Stored Cross Site Scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Nikhil Kumar\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49167/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49167/43404/artworks-gallery-10-arbitrary-file-upload-rce-authenticated-via-edit-profile/download/",
        "exploit_id": "49167",
        "exploit_description": "\"Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Shahrukh Iqbal Mirza\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49169/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49169/43347/ksix-zigbee-devices-playback-protection-bypass-poc/download/",
        "exploit_id": "49169",
        "exploit_description": "\"Ksix Zigbee Devices - Playback Protection Bypass (PoC)\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Alejandro Vazquez Vazquez\"",
        "exploit_type": "remote",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49178/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49178/43413/wordpress-plugin-wp-filemanager-68-rce/download/",
        "exploit_id": "49178",
        "exploit_description": "\"WordPress Plugin Wp-FileManager 6.8 - RCE\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Mansoor R\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49152/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49152/43392/student-result-management-system-10-authentication-bypass-sql-injection/download/",
        "exploit_id": "49152",
        "exploit_description": "\"Student Result Management System 1.0 - Authentication Bypass SQL Injection\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Ritesh Gohil\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49148/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49148/43388/ilias-learning-management-system-43-ssrf/download/",
        "exploit_id": "49148",
        "exploit_description": "\"ILIAS Learning Management System 4.3 - SSRF\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "Dot",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49170/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49170/43406/webdamn-user-registration-login-system-with-user-panel-sqli-auth-bypass/download/",
        "exploit_id": "49170",
        "exploit_description": "\"WebDamn User Registration & Login System with User Panel - SQLi Auth Bypass\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Aakash Madaan\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49155/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49155/43395/wondercms-313-authenticated-remote-code-execution/download/",
        "exploit_id": "49155",
        "exploit_description": "\"WonderCMS 3.1.3 - Authenticated Remote Code Execution\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "zetc0de",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49151/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49151/43391/egavilanmedia-user-registration-login-system-with-admin-panel-10-csrf/download/",
        "exploit_id": "49151",
        "exploit_description": "\"EgavilanMedia User Registration & Login System with Admin Panel 1.0 - CSRF\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Hardik Solanki\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49166/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49166/43403/artworks-gallery-10-arbitrary-file-upload-rce-authenticated-via-add-artwork/download/",
        "exploit_id": "49166",
        "exploit_description": "\"Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Add Artwork\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Shahrukh Iqbal Mirza\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49162/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49162/43400/online-news-portal-system-10-title-stored-cross-site-scripting/download/",
        "exploit_id": "49162",
        "exploit_description": "\"Online News Portal System 1.0 - 'Title' Stored Cross Site Scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Parshwa Bhavsar\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49147/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49147/43342/asc-timetables-202162-denial-of-service-poc/download/",
        "exploit_id": "49147",
        "exploit_description": "\"aSc TimeTables 2021.6.2 - Denial of Service (PoC)\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Ismael Nava\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49150/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49150/43390/under-construction-page-with-cpanel-10-sql-injection/download/",
        "exploit_id": "49150",
        "exploit_description": "\"Under Construction Page with CPanel 1.0 - SQL injection\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Mayur Parmar\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49172/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49172/43408/churchcrm-421-persistent-cross-site-scripting-xss/download/",
        "exploit_id": "49172",
        "exploit_description": "\"ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Mufaddal Masalawala\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49157/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49157/43343/idt-pc-audio-1064330-stacsv-unquoted-service-path/download/",
        "exploit_id": "49157",
        "exploit_description": "\"IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Manuel Alvarez\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49153/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49153/43393/egavilanmedia-user-registration-login-system-with-admin-panel-10-stored-cross-site-scripting/download/",
        "exploit_id": "49153",
        "exploit_description": "\"EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Soushikta Chowdhury\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49177/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49177/43412/car-rental-management-system-10-sql-injection-local-file-include/download/",
        "exploit_id": "49177",
        "exploit_description": "\"Car Rental Management System 1.0 - SQL Injection / Local File include\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "Mosaaed",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49164/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49164/43402/wondercms-313-menu-persistent-cross-site-scripting/download/",
        "exploit_id": "49164",
        "exploit_description": "\"WonderCMS 3.1.3 - 'Menu' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "\"Hemant Patidar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49154/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49154/43394/wondercms-313-authenticated-ssrf-to-remote-remote-code-execution/download/",
        "exploit_id": "49154",
        "exploit_description": "\"WonderCMS 3.1.3 - Authenticated SSRF to Remote Remote Code Execution\"",
        "exploit_date": "2020-12-02",
        "exploit_author": "zetc0de",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49142/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49142/43339/global-registration-service-1003-gregsvcexe-unquoted-service-path/download/",
        "exploit_id": "49142",
        "exploit_description": "\"Global Registration Service 1.0.0.3 - 'GREGsvc.exe' Unquoted Service Path\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Emmanuel Lujan\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49128/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49128/43374/typesetter-51-csrf-change-admin-e-mail/download/",
        "exploit_id": "49128",
        "exploit_description": "\"TypeSetter 5.1 - CSRF (Change admin e-mail)\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Alperen Ergel\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49131/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49131/43377/online-shopping-alphaware-10-error-based-sql-injection/download/",
        "exploit_id": "49131",
        "exploit_description": "\"Online Shopping Alphaware 1.0 - Error Based SQL injection\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Moaaz Taha\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49145/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49145/43386/tendenci-1231-csv-formula-injection/download/",
        "exploit_id": "49145",
        "exploit_description": "\"Tendenci 12.3.1 - CSV/ Formula Injection\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Mufaddal Masalawala\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49143/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49143/43340/pearson-vue-vts-231911-installer-vueapplicationwrapper-unquoted-service-path/download/",
        "exploit_id": "49143",
        "exploit_description": "\"Pearson Vue VTS 2.3.1911 Installer - VUEApplicationWrapper Unquoted Service Path\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "Jok3r",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49141/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49141/43338/epson-status-monitor-3-epson-pm-rpcv4-06-unquoted-service-path/download/",
        "exploit_id": "49141",
        "exploit_description": "\"EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "SamAlucard",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49144/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49144/43341/intelr-management-and-security-application-52-user-notification-service-unquoted-service-path/download/",
        "exploit_id": "49144",
        "exploit_description": "\"Intel(r) Management and Security Application 5.2 - User Notification Service Unquoted Service Path\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Metin Yunus Kandemir\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49129/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49129/43375/joomla-component-gmapfp-35-unauthenticated-arbitrary-file-upload/download/",
        "exploit_id": "49129",
        "exploit_description": "\"Joomla! Component GMapFP 3.5 - Unauthenticated Arbitrary File Upload\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "ThelastVvV",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49136/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49136/43381/tailor-management-system-10-unrestricted-file-upload-to-remote-code-execution/download/",
        "exploit_id": "49136",
        "exploit_description": "\"Tailor Management System 1.0 - Unrestricted File Upload to Remote Code Execution\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Saeed Bala Ahmed\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49132/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49132/43378/pharmacymedical-store-sale-point-10-email-sql-injection/download/",
        "exploit_id": "49132",
        "exploit_description": "\"Pharmacy/Medical Store & Sale Point 1.0  - 'email' SQL Injection\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "naivenom",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49140/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49140/43385/social-networking-site-authentication-bypass-sqli/download/",
        "exploit_id": "49140",
        "exploit_description": "\"Social Networking Site - Authentication Bypass (SQli)\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "gh1mau",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49130/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49130/43376/wordpress-plugin-eventon-calendar-305-reflected-cross-site-scripting/download/",
        "exploit_id": "49130",
        "exploit_description": "\"Wordpress Plugin EventON Calendar 3.0.5 - Reflected Cross-Site Scripting\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "B3KC4T",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49135/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49135/43380/multi-restaurant-table-reservation-system-10-multiple-persistent-xss/download/",
        "exploit_id": "49135",
        "exploit_description": "\"Multi Restaurant Table Reservation System 1.0 - Multiple Persistent XSS\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "yunaranyancat",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49133/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49133/43379/setelsa-conacwin-3712-local-file-inclusion/download/",
        "exploit_id": "49133",
        "exploit_description": "\"Setelsa Conacwin 3.7.1.2 - Local File Inclusion\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Bryan Rodriguez Martin\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49134/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49134/43337/10-strike-network-inventory-explorer-865-buffer-overflow-seh/download/",
        "exploit_id": "49134",
        "exploit_description": "\"10-Strike Network Inventory Explorer 8.65 - Buffer Overflow (SEH)\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "Sectechs",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49139/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49139/43384/pandora-fms-70-ng-749-multiple-persistent-cross-site-scripting-vulnerabilities-date-11-14-2020/download/",
        "exploit_id": "49139",
        "exploit_description": "\"Pandora FMS 7.0 NG 749 - Multiple Persistent Cross-Site Scripting Vulnerabilities # Date: 11-14-2020\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Matthew Aberegg\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49138/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49138/43383/medical-center-portal-management-system-10-login-sql-injection/download/",
        "exploit_id": "49138",
        "exploit_description": "\"Medical Center Portal Management System 1.0 - 'login' SQL Injection\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Aydın Baran Ertemir\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49137/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49137/43382/lepton-cms-470-url-persistent-cross-site-scripting/download/",
        "exploit_id": "49137",
        "exploit_description": "\"LEPTON CMS 4.7.0 - 'URL' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-12-01",
        "exploit_author": "\"Sagar Banwa\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49124/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49124/43371/atx-minicmts200a-broadband-gateway-20-credential-disclosure/download/",
        "exploit_id": "49124",
        "exploit_description": "\"ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure\"",
        "exploit_date": "2020-11-30",
        "exploit_author": "\"Zagros Bingol\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49127/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49127/43346/yatinywinftp-denial-of-service-poc/download/",
        "exploit_id": "49127",
        "exploit_description": "\"YATinyWinFTP - Denial of Service (PoC)\"",
        "exploit_date": "2020-11-30",
        "exploit_author": "strider",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49126/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49126/43373/intelbras-router-rf-301k-112-authentication-bypass/download/",
        "exploit_id": "49126",
        "exploit_description": "\"Intelbras Router RF 301K 1.1.2 - Authentication Bypass\"",
        "exploit_date": "2020-11-30",
        "exploit_author": "\"Kaio Amaral\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49125/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49125/43372/rejetto-httpfileserver-23x-remote-command-execution-3/download/",
        "exploit_id": "49125",
        "exploit_description": "\"Rejetto HttpFileServer 2.3.x - Remote Command Execution (3)\"",
        "exploit_date": "2020-11-30",
        "exploit_author": "\"Óscar Andreu\"",
        "exploit_type": "webapps",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49107/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49107/43361/wordpress-theme-wibar-118-brand-component-stored-cross-site-scripting/download/",
        "exploit_id": "49107",
        "exploit_description": "\"Wordpress Theme Wibar 1.1.8 - 'Brand Component' Stored Cross Site Scripting\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Ilca Lucian Florin\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49109/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49109/43362/wondercms-313-uploadfile-stored-cross-site-scripting/download/",
        "exploit_id": "49109",
        "exploit_description": "\"WonderCMS 3.1.3 - 'uploadFile' Stored Cross-Site Scripting\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Sun* Cyber Security Research Team\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49121/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49121/43369/elkarbackup-133-policyname-and-policydescription-stored-cross-site-scripting/download/",
        "exploit_id": "49121",
        "exploit_description": "\"ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Vyshnav nk\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49108/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49108/43335/sap-lumira-131-stored-cross-site-scripting/download/",
        "exploit_id": "49108",
        "exploit_description": "\"SAP Lumira 1.31 - Stored Cross-Site Scripting\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Ilca Lucian Florin\"",
        "exploit_type": "local",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49122/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49122/43370/best-support-system-304-ticket-body-persistent-xss-authenticated/download/",
        "exploit_id": "49122",
        "exploit_description": "\"Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "Ex.Mi",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49112/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49112/43364/laravel-administrator-4-unrestricted-file-upload-authenticated/download/",
        "exploit_id": "49112",
        "exploit_description": "\"Laravel Administrator 4 - Unrestricted File Upload (Authenticated)\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Xavi Beltran\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49117/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49117/43368/house-rental-10-keywords-sql-injection/download/",
        "exploit_id": "49117",
        "exploit_description": "\"House Rental 1.0 - 'keywords' SQL Injection\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "boku",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49115/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49115/43367/wordpress-theme-accesspress-social-icons-179-sql-injection-authenticated/download/",
        "exploit_id": "49115",
        "exploit_description": "\"Wordpress Theme Accesspress Social Icons 1.7.9 - SQL injection (Authenticated)\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "SunCSR",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49113/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49113/43365/acronis-cyber-backup-125-build-16341-unauthenticated-ssrf/download/",
        "exploit_id": "49113",
        "exploit_description": "\"Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Julien Ahrens\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49110/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49110/43363/ruckus-iot-controller-ruckus-vriot-151021-remote-code-execution/download/",
        "exploit_id": "49110",
        "exploit_description": "\"Ruckus IoT Controller (Ruckus vRIoT) 1.5.1.0.21 - Remote Code Execution\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Emre SUREN\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49119/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49119/43331/libupnp-1618-stack-based-buffer-overflow-dos/download/",
        "exploit_id": "49119",
        "exploit_description": "\"libupnp 1.6.18 - Stack-based buffer overflow (DoS)\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Patrik Lantz\"",
        "exploit_type": "dos",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49114/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49114/43366/moodle-38-unrestricted-file-upload/download/",
        "exploit_id": "49114",
        "exploit_description": "\"Moodle 3.8 - Unrestricted File Upload\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "\"Sirwan Veisi\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49116/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49116/43336/foxit-reader-9011049-arbitrary-code-execution/download/",
        "exploit_id": "49116",
        "exploit_description": "\"Foxit Reader 9.0.1.1049 - Arbitrary Code Execution\"",
        "exploit_date": "2020-11-27",
        "exploit_author": "CrossWire",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49106/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49106/43345/razer-chroma-sdk-server-31602-race-condition-remote-file-execution/download/",
        "exploit_id": "49106",
        "exploit_description": "\"Razer Chroma SDK Server 3.16.02 - Race Condition Remote File Execution\"",
        "exploit_date": "2020-11-26",
        "exploit_author": "\"Loke Hui Yi\"",
        "exploit_type": "remote",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49105/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49105/43330/pure-ftpd-1048-remote-denial-of-service/download/",
        "exploit_id": "49105",
        "exploit_description": "\"Pure-FTPd 1.0.48 - Remote Denial of Service\"",
        "exploit_date": "2020-11-26",
        "exploit_author": "xynmaps",
        "exploit_type": "dos",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49104/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49104/43360/syncbreeze-10028-password-remote-buffer-overflow/download/",
        "exploit_id": "49104",
        "exploit_description": "\"SyncBreeze 10.0.28 - 'password' Remote Buffer Overflow\"",
        "exploit_date": "2020-11-25",
        "exploit_author": "\"Abdessalam king\"",
        "exploit_type": "webapps",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49102/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49102/43358/wondercms-313-page-persistent-cross-site-scripting/download/",
        "exploit_id": "49102",
        "exploit_description": "\"WonderCMS 3.1.3 - 'page' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-11-25",
        "exploit_author": "\"Mayur Parmar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49103/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49103/43359/oscommerce-2341-title-persistent-cross-site-scripting/download/",
        "exploit_id": "49103",
        "exploit_description": "\"osCommerce 2.3.4.1 - 'title' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-11-25",
        "exploit_author": "\"Emre Aslan\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49101/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49101/43334/wondershare-driver-install-service-help-1071321-elevationservice-unquote-service-path/download/",
        "exploit_id": "49101",
        "exploit_description": "\"Wondershare Driver Install Service help 10.7.1.321 - 'ElevationService' Unquote Service Path\"",
        "exploit_date": "2020-11-25",
        "exploit_author": "\"Luis Sandoval\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49099/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49099/43357/opencart-3036-subject-stored-cross-site-scripting/download/",
        "exploit_id": "49099",
        "exploit_description": "\"OpenCart 3.0.3.6 - 'subject' Stored Cross-Site Scripting\"",
        "exploit_date": "2020-11-24",
        "exploit_author": "\"Hemant Patidar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49097/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49097/43355/seowon-130-slc-router-1011-ipaddr-rce-authenticated/download/",
        "exploit_id": "49097",
        "exploit_description": "\"Seowon 130-SLC router 1.0.11 - 'ipAddr' RCE (Authenticated)\"",
        "exploit_date": "2020-11-24",
        "exploit_author": "maj0rmil4d",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49100/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49100/43333/docprint-pro-80-add-url-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "49100",
        "exploit_description": "\"docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter)\"",
        "exploit_date": "2020-11-24",
        "exploit_author": "MasterVlad",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49098/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49098/43356/opencart-3036-profile-image-stored-cross-site-scripting-authenticated/download/",
        "exploit_id": "49098",
        "exploit_description": "\"OpenCart 3.0.3.6 - 'Profile Image' Stored Cross-Site Scripting (Authenticated)\"",
        "exploit_date": "2020-11-24",
        "exploit_author": "\"Hemant Patidar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49096/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49096/43354/zeroshell-390-cgi-binkerbynet-remote-root-command-injection-metasploit/download/",
        "exploit_id": "49096",
        "exploit_description": "\"ZeroShell 3.9.0 - 'cgi-bin/kerbynet' Remote Root Command Injection (Metasploit)\"",
        "exploit_date": "2020-11-24",
        "exploit_author": "\"Giuseppe Fuggiano\"",
        "exploit_type": "webapps",
        "exploit_platform": "linux",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49093/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49093/43352/nopcommerce-store-430-name-stored-cross-site-scripting/download/",
        "exploit_id": "49093",
        "exploit_description": "\"nopCommerce Store 4.30 - 'name' Stored Cross-Site Scripting\"",
        "exploit_date": "2020-11-24",
        "exploit_author": "\"Hemant Patidar\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49094/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49094/43353/apache-openmeetings-500-hostname-denial-of-service/download/",
        "exploit_id": "49094",
        "exploit_description": "\"Apache OpenMeetings 5.0.0 - 'hostname' Denial of Service\"",
        "exploit_date": "2020-11-24",
        "exploit_author": "SunCSR",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49089/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49089/43332/boxoft-audio-converter-230-wav-buffer-overflow-seh/download/",
        "exploit_id": "49089",
        "exploit_description": "\"Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH)\"",
        "exploit_date": "2020-11-23",
        "exploit_author": "\"Luis Martínez\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49091/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49091/43351/liferay-721-ga2-stored-xss/download/",
        "exploit_id": "49091",
        "exploit_description": "\"LifeRay 7.2.1 GA2 - Stored XSS\"",
        "exploit_date": "2020-11-23",
        "exploit_author": "3ndG4me",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49090/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49090/43350/vtiger-v70-crm-to-persistent-xss/download/",
        "exploit_id": "49090",
        "exploit_description": "\"VTiger v7.0 CRM - 'To' Persistent XSS\"",
        "exploit_date": "2020-11-23",
        "exploit_author": "Vulnerability-Lab",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49092/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49092/43349/tp-link-tl-wa855re-v5-200415-device-reset-auth-bypass/download/",
        "exploit_id": "49092",
        "exploit_description": "\"TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass\"",
        "exploit_date": "2020-11-23",
        "exploit_author": "malwrforensics",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49084/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49084/43290/zortam-mp3-media-studio-2760-remote-code-execution-seh/download/",
        "exploit_id": "49084",
        "exploit_description": "\"Zortam Mp3 Media Studio 27.60 - Remote Code Execution (SEH)\"",
        "exploit_date": "2020-11-20",
        "exploit_author": "\"Vincent Wolterman\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49085/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49085/43329/wondercms-313-content-persistent-cross-site-scripting/download/",
        "exploit_id": "49085",
        "exploit_description": "\"WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-11-20",
        "exploit_author": "\"Hemant Patidar\"",
        "exploit_type": "webapps",
        "exploit_platform": "php",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49086/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49086/43291/ibm-tivoli-storage-manager-command-line-administrative-interface-5201-id-field-stack-based-buffer-overflow/download/",
        "exploit_id": "49086",
        "exploit_description": "\"IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 - id' Field Stack Based Buffer Overflow\"",
        "exploit_date": "2020-11-20",
        "exploit_author": "\"Paolo Stagno\"",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49088/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49088/43293/boxoft-convert-master-130-wav-seh-local-exploit/download/",
        "exploit_id": "49088",
        "exploit_description": "\"Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit\"",
        "exploit_date": "2020-11-20",
        "exploit_author": "stresser",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49087/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49087/43292/free-mp3-cd-ripper-28-multiple-file-buffer-overflow-metasploit/download/",
        "exploit_id": "49087",
        "exploit_description": "\"Free MP3 CD Ripper 2.8 - Multiple File Buffer Overflow (Metasploit)\"",
        "exploit_date": "2020-11-20",
        "exploit_author": "ZwX",
        "exploit_type": "local",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49073/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49073/43321/xuucms-3-keywords-sql-injection/download/",
        "exploit_id": "49073",
        "exploit_description": "\"xuucms 3 - 'keywords' SQL Injection\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "icekam",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49076/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49076/43322/gitlab-1290-arbitrary-file-read-authenticated/download/",
        "exploit_id": "49076",
        "exploit_description": "\"Gitlab 12.9.0 - Arbitrary File Read (Authenticated)\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Jasper Rasenberg\"",
        "exploit_type": "webapps",
        "exploit_platform": "ruby",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49083/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49083/43280/internet-download-manager-63812-scheduler-downloads-scheduler-buffer-overflow-poc/download/",
        "exploit_id": "49083",
        "exploit_description": "\"Internet Download Manager 6.38.12 - Scheduler Downloads Scheduler Buffer Overflow (PoC)\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Vincent Wolterman\"",
        "exploit_type": "dos",
        "exploit_platform": "windows",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49081/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49081/43327/mmonit-374-password-disclosure/download/",
        "exploit_id": "49081",
        "exploit_description": "\"M/Monit 3.7.4 - Password Disclosure\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Dolev Farhi\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49072/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49072/43319/pescms-team-232-multiple-reflected-xss/download/",
        "exploit_id": "49072",
        "exploit_description": "\"PESCMS TEAM 2.3.2 - Multiple Reflected XSS\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "icekam",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49082/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49082/43328/nagios-log-server-217-persistent-cross-site-scripting/download/",
        "exploit_id": "49082",
        "exploit_description": "\"Nagios Log Server 2.1.7 - Persistent Cross-Site Scripting\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Emre ÖVÜNÇ\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49080/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49080/43326/mmonit-374-privilege-escalation/download/",
        "exploit_id": "49080",
        "exploit_description": "\"M/Monit 3.7.4 - Privilege Escalation\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Dolev Farhi\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49074/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49074/43320/fortinet-fortios-604-unauthenticated-ssl-vpn-user-password-modification/download/",
        "exploit_id": "49074",
        "exploit_description": "\"Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Ricardo Longatto\"",
        "exploit_type": "webapps",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49075/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49075/43298/genexis-platinum-4410-router-21-upnp-credential-exposure/download/",
        "exploit_id": "49075",
        "exploit_description": "\"Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Nitesh Surana\"",
        "exploit_type": "remote",
        "exploit_platform": "hardware",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49077/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49077/43323/testbox-cfml-test-framework-410-arbitrary-file-write-and-remote-code-execution/download/",
        "exploit_id": "49077",
        "exploit_description": "\"TestBox CFML Test Framework 4.1.0 - Arbitrary File Write and Remote Code Execution\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Darren King\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/v1/exploitdetails/49078/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/49078/43324/testbox-cfml-test-framework-410-directory-traversal/download/",
        "exploit_id": "49078",
        "exploit_description": "\"TestBox CFML Test Framework 4.1.0 - Directory Traversal\"",
        "exploit_date": "2020-11-19",
        "exploit_author": "\"Darren King\"",
        "exploit_type": "webapps",
        "exploit_platform": "multiple",
        "exploit_port": null
    }
]