Return all exploits belonging to a particular platform

For example

hardware

windows

multiple

php

linux

GET /searchindex/exploitbyplatform/irix/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/21571/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/21571/13548/sgi-irix-6x-rpcxfsmd-remote-command-execution/download/",
        "exploit_id": "21571",
        "exploit_description": "\"SGI IRIX 6.x - 'rpc.xfsmd' Remote Command Execution\"",
        "exploit_date": "2002-06-20",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20805/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20805/13264/sgi-irix-3456-openlinux-1011-routed-traceon/download/",
        "exploit_id": "20805",
        "exploit_description": "\"SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon\"",
        "exploit_date": "1998-10-21",
        "exploit_author": "Rootshell",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20149/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20149/12968/irix-52536x-telnetd-environment-variable-format-string/download/",
        "exploit_id": "20149",
        "exploit_description": "\"IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String\"",
        "exploit_date": "2000-07-01",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19949/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19949/12897/gauntlet-firewall-414250-webshield-e-ppliance-10003000-irix-65x-remote-buffer-overflow/download/",
        "exploit_id": "19949",
        "exploit_description": "\"Gauntlet Firewall 4.1/4.2/5.0 / Webshield E-ppliance 100.0/300.0 / IRIX 6.5.x - Remote Buffer Overflow\"",
        "exploit_date": "2000-05-18",
        "exploit_author": "_Gramble_",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19822/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19822/12841/sgi-irix-5x6x-objectserver/download/",
        "exploit_id": "19822",
        "exploit_description": "\"SGI IRIX 5.x/6.x - Objectserver\"",
        "exploit_date": "2000-03-29",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19788/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19788/12829/sgi-infosearch-10-sgi-irix-65x-fname/download/",
        "exploit_id": "19788",
        "exploit_description": "\"SGI InfoSearch 1.0 / SGI IRIX 6.5.x - fname\"",
        "exploit_date": "2000-03-05",
        "exploit_author": "rpc",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19316/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19316/12681/sgi-irix-652-nsd-information-gathering/download/",
        "exploit_id": "19316",
        "exploit_description": "\"SGI IRIX 6.5.2 - 'nsd' Information Gathering\"",
        "exploit_date": "1999-05-31",
        "exploit_author": "\"Jefferson Ogata\"",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/10033/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/10033/11446/irix-lpd-tagprinter-command-execution-metasploit/download/",
        "exploit_id": "10033",
        "exploit_description": "\"Irix LPD tagprinter - Command Execution (Metasploit)\"",
        "exploit_date": "2001-09-01",
        "exploit_author": "\"H D Moore\"",
        "exploit_type": "remote",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/25362/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/25362/8772/sgi-irix-6522-gr_osview-local-arbitrary-file-overwrite/download/",
        "exploit_id": "25362",
        "exploit_description": "\"SGI IRIX 6.5.22 - GR_OSView Local Arbitrary File Overwrite\"",
        "exploit_date": "2005-04-07",
        "exploit_author": "anonymous",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/25361/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/25361/8771/sgi-irix-6522-gr_osview-information-disclosure/download/",
        "exploit_id": "25361",
        "exploit_description": "\"SGI IRIX 6.5.22 - GR_OSView Information Disclosure\"",
        "exploit_date": "2005-04-07",
        "exploit_author": "anonymous",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/21720/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/21720/8453/sgi-irix-65x-fam-arbitrary-root-owned-directory-file-listing/download/",
        "exploit_id": "21720",
        "exploit_description": "\"SGI IRIX 6.5.x - FAM Arbitrary Root Owned Directory File Listing\"",
        "exploit_date": "2002-08-16",
        "exploit_author": "\"Michael Wardle\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20937/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20937/8292/sgi-performance-co-pilot-21x22-pmpost-symbolic-link/download/",
        "exploit_id": "20937",
        "exploit_description": "\"SGI Performance Co-Pilot 2.1.x/2.2 - pmpost Symbolic Link\"",
        "exploit_date": "2001-06-18",
        "exploit_author": "IhaQueR",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20804/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20804/8270/irix-536x-netprint-arbitrary-shared-library-usage/download/",
        "exploit_id": "20804",
        "exploit_description": "\"IRIX 5.3/6.x - 'netprint' Arbitrary Shared Library Usage\"",
        "exploit_date": "2001-04-26",
        "exploit_author": "V9",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20263/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20263/8171/irix-5260-permissions-file-manipulation/download/",
        "exploit_id": "20263",
        "exploit_description": "\"IRIX 5.2/6.0 - Permissions File Manipulation\"",
        "exploit_date": "1995-03-02",
        "exploit_author": "\"Larry Glaze\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20138/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20138/8138/irix-536x-usrbinmail-local-buffer-overflow/download/",
        "exploit_id": "20138",
        "exploit_description": "\"IRIX 5.3/6.x - '/usr/bin/mail' Local Buffer Overflow\"",
        "exploit_date": "1997-09-01",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20137/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20137/8137/irix-626364-xfs-truncate-privilege-check/download/",
        "exploit_id": "20137",
        "exploit_description": "\"IRIX 6.2/6.3/6.4 - xfs truncate() Privilege Check\"",
        "exploit_date": "1997-02-01",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20130/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20130/8135/irix-65x-usrlibinpersoninpview-race-condition/download/",
        "exploit_id": "20130",
        "exploit_description": "\"IRIX 6.5.x - '/usr/lib/InPerson/inpview' Race Condition\"",
        "exploit_date": "2000-01-01",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20129/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20129/8134/irix-6263-binlpstat-local-buffer-overflow/download/",
        "exploit_id": "20129",
        "exploit_description": "\"IRIX 6.2/6.3 - '/bin/lpstat' Local Buffer Overflow\"",
        "exploit_date": "1998-11-01",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20128/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20128/8133/irix-65x-usrsbindmplay-local-buffer-overflow/download/",
        "exploit_id": "20128",
        "exploit_description": "\"IRIX 6.5.x - '/usr/sbin/dmplay' Local Buffer Overflow\"",
        "exploit_date": "2000-08-02",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20127/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20127/8132/sgi-irix-62-libglso-local-buffer-overflow/download/",
        "exploit_id": "20127",
        "exploit_description": "\"SGI IRIX 6.2 - 'libgl.so' Local Buffer Overflow\"",
        "exploit_date": "1997-09-01",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20126/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20126/8131/irix-65x-usrsbingr_osview-local-buffer-overflow/download/",
        "exploit_id": "20126",
        "exploit_description": "\"IRIX 6.5.x - '/usr/sbin/gr_osview' Local Buffer Overflow\"",
        "exploit_date": "1997-01-01",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19706/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19706/8023/sgi-irix-62-midikeyssoundplayer-local-privilege-escalation/download/",
        "exploit_id": "19706",
        "exploit_description": "\"SGI IRIX 6.2 - 'midikeys'/'soundplayer' Local Privilege Escalation\"",
        "exploit_date": "1999-12-31",
        "exploit_author": "Loneguard",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19358/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19358/7909/sgi-irix-64-xfsdump-local-privilege-escalation/download/",
        "exploit_id": "19358",
        "exploit_description": "\"SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation\"",
        "exploit_date": "1997-05-07",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19356/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19356/7908/sgi-irix-63-systour-outofbox-local-privilege-escalation/download/",
        "exploit_id": "19356",
        "exploit_description": "\"SGI IRIX 6.3 - 'Systour' / 'OutOfBox' Local Privilege Escalation\"",
        "exploit_date": "1996-10-30",
        "exploit_author": "\"Tun-Hui Hu\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19355/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19355/7907/sgi-irix-64-startmidi-local-privilege-escalation/download/",
        "exploit_id": "19355",
        "exploit_description": "\"SGI IRIX 6.4 - 'startmidi' Local Privilege Escalation\"",
        "exploit_date": "1997-02-09",
        "exploit_author": "\"David Hedley\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19353/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19353/7905/sgi-irix-64-suid_exec-local-privilege-escalation/download/",
        "exploit_id": "19353",
        "exploit_description": "\"SGI IRIX 6.4 - 'suid_exec' Local Privilege Escalation\"",
        "exploit_date": "1996-12-02",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19351/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19351/7904/sgi-irix-5253-serial_ports-local-privilege-escalation/download/",
        "exploit_id": "19351",
        "exploit_description": "\"SGI IRIX 5.2/5.3 - 'serial_ports' Local Privilege Escalation\"",
        "exploit_date": "1994-02-02",
        "exploit_author": "transit",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19349/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19349/7902/sgi-irix-64-rmail-local-privilege-escalation/download/",
        "exploit_id": "19349",
        "exploit_description": "\"SGI IRIX 6.4 - 'rmail' Local Privilege Escalation\"",
        "exploit_date": "1997-05-07",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19347/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19347/7901/sgi-irix-63-pset-local-privilege-escalation/download/",
        "exploit_id": "19347",
        "exploit_description": "\"SGI IRIX 6.3 - 'pset' Local Privilege Escalation\"",
        "exploit_date": "1997-07-17",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19319/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19319/7891/sgi-irix-53-pkgadjust-local-privilege-escalation/download/",
        "exploit_id": "19319",
        "exploit_description": "\"SGI IRIX 5.3 - 'pkgadjust' Local Privilege Escalation\"",
        "exploit_date": "1996-09-23",
        "exploit_author": "\"Hui-Hui Hu\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19317/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19317/7889/sgi-irix-5362-ordist-local-privilege-escalation/download/",
        "exploit_id": "19317",
        "exploit_description": "\"SGI IRIX 5.3/6.2 - 'ordist' Local Privilege Escalation\"",
        "exploit_date": "1997-05-24",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19313/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19313/7886/sgi-irix-64-netprint-local-privilege-escalation/download/",
        "exploit_id": "19313",
        "exploit_description": "\"SGI IRIX 6.4 - 'netprint' Local Privilege Escalation\"",
        "exploit_date": "1997-01-04",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19310/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19310/7883/sgi-irix-64-login-local-privilege-escalation/download/",
        "exploit_id": "19310",
        "exploit_description": "\"SGI IRIX 6.4 - 'login' Local Privilege Escalation\"",
        "exploit_date": "1997-05-26",
        "exploit_author": "\"David Hedley\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19304/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19304/7878/sgi-irix-64-inpview-local-privilege-escalation/download/",
        "exploit_id": "19304",
        "exploit_description": "\"SGI IRIX 6.4 - 'inpview' Local Privilege Escalation\"",
        "exploit_date": "1997-05-07",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19280/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19280/7867/sgi-irix-62-fsdump-local-privilege-escalation/download/",
        "exploit_id": "19280",
        "exploit_description": "\"SGI IRIX 6.2 - 'fsdump' Local Privilege Escalation\"",
        "exploit_date": "1996-12-03",
        "exploit_author": "\"Jaechul Choe\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19277/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19277/7865/sgi-irix-62-eject-local-privilege-escalation-2/download/",
        "exploit_id": "19277",
        "exploit_description": "\"SGI IRIX 6.2 - 'eject' Local Privilege Escalation (2)\"",
        "exploit_date": "1997-05-25",
        "exploit_author": "\"Last Stage of Delirium\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19276/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19276/7864/sgi-irix-62-eject-local-privilege-escalation-1/download/",
        "exploit_id": "19276",
        "exploit_description": "\"SGI IRIX 6.2 - 'eject' Local Privilege Escalation (1)\"",
        "exploit_date": "1997-05-25",
        "exploit_author": "DCRH",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19275/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19275/7863/sgi-irix-64-datmancdman-local-privilege-escalation/download/",
        "exploit_id": "19275",
        "exploit_description": "\"SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation\"",
        "exploit_date": "1996-12-09",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19274/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19274/7862/sgi-irix-63-df-local-privilege-escalation/download/",
        "exploit_id": "19274",
        "exploit_description": "\"SGI IRIX 6.3 - 'df' Local Privilege Escalation\"",
        "exploit_date": "1997-05-24",
        "exploit_author": "\"David Hedley\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19273/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19273/7861/sgi-irix-62-day5notifier-local-privilege-escalation/download/",
        "exploit_id": "19273",
        "exploit_description": "\"SGI IRIX 6.2 - 'day5notifier' Local Privilege Escalation\"",
        "exploit_date": "1997-05-16",
        "exploit_author": "\"Mike Neuman\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19269/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19269/7859/sgi-irix-601-colorview-read-files/download/",
        "exploit_id": "19269",
        "exploit_description": "\"SGI IRIX 6.0.1 - 'colorview' Read Files\"",
        "exploit_date": "1995-02-09",
        "exploit_author": "\"Dave Sill\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19268/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19268/7858/sgi-irix-53-cadmin-local-privilege-escalation/download/",
        "exploit_id": "19268",
        "exploit_description": "\"SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation\"",
        "exploit_date": "1996-08-06",
        "exploit_author": "\"Grant Kaufmann\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19267/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19267/7857/sgi-irix-63-xrm-buffer-overflow/download/",
        "exploit_id": "19267",
        "exploit_description": "\"SGI IRIX 6.3 - xrm Buffer Overflow\"",
        "exploit_date": "1997-05-27",
        "exploit_author": "\"David Hedley\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19262/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19262/7856/sgi-irix-62-cdplayer-local-privilege-escalation/download/",
        "exploit_id": "19262",
        "exploit_description": "\"SGI IRIX 6.2 - 'cdplayer' Local Privilege Escalation\"",
        "exploit_date": "1996-11-21",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19260/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19260/7854/sgi-irix-62-usrlibnetaddpr-local-privilege-escalation/download/",
        "exploit_id": "19260",
        "exploit_description": "\"SGI IRIX 6.2 - '/usr/lib/netaddpr' Local Privilege Escalation\"",
        "exploit_date": "1997-05-09",
        "exploit_author": "\"Jaechul Choe\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19210/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19210/7829/sgi-irix-654-midikeys-root/download/",
        "exploit_id": "19210",
        "exploit_description": "\"SGI IRIX 6.5.4 - midikeys Root\"",
        "exploit_date": "1999-05-19",
        "exploit_author": "\"W. Cashdollar\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19163/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19163/7811/sgi-irix-64-ioconfig-local-privilege-escalation/download/",
        "exploit_id": "19163",
        "exploit_description": "\"SGI IRIX 6.4 - 'ioconfig' Local Privilege Escalation\"",
        "exploit_date": "1998-07-20",
        "exploit_author": "Loneguard",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19067/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19067/7784/sgi-irix-64-sgi-license_oeo-3031311-licensemanager-licensemgr_file_root-local-privilege-escalation/download/",
        "exploit_id": "19067",
        "exploit_description": "\"SGI IRIX 6.4 / SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Local Privilege Escalation\"",
        "exploit_date": "1996-11-22",
        "exploit_author": "\"Yuri Volobuev\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19066/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19066/7783/sgi-irix-5362-sgi-license_oeo-10-licensemanager-netls_license_file-local-privilege-escalation/download/",
        "exploit_id": "19066",
        "exploit_description": "\"SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation\"",
        "exploit_date": "1996-04-05",
        "exploit_author": "\"Arthur Hagen\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/1577/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/1577/6473/sgi-irix-6528-runpriv-design-error/download/",
        "exploit_id": "1577",
        "exploit_description": "\"SGI IRIX 6.5.28 - 'runpriv' Design Error\"",
        "exploit_date": "2005-10-10",
        "exploit_author": "anonymous",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/337/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/337/6277/irix-53-usrsbiniwsh-local-buffer-overflow-local-privilege-escalation/download/",
        "exploit_id": "337",
        "exploit_description": "\"IRIX 5.3 - '/usr/sbin/iwsh' Local Buffer Overflow / Local Privilege Escalation\"",
        "exploit_date": "1997-05-27",
        "exploit_author": "\"David Hedley\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/336/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/336/6276/sgi-irix-binlogin-local-buffer-overflow/download/",
        "exploit_id": "336",
        "exploit_description": "\"SGI IRIX - '/bin/login' Local Buffer Overflow\"",
        "exploit_date": "1997-05-26",
        "exploit_author": "\"David Hedley\"",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/334/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/334/6274/sgi-irix-lsd-multiple-local-buffer-overflows/download/",
        "exploit_id": "334",
        "exploit_description": "\"SGI IRIX - 'LsD' Multiple Local Buffer Overflows\"",
        "exploit_date": "1997-05-25",
        "exploit_author": "LSD-PLaNET",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/270/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/270/6252/irix-53626364656511-usrlibprintnetprint-local-privilege-escalation/download/",
        "exploit_id": "270",
        "exploit_description": "\"IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Privilege Escalation\"",
        "exploit_date": "2001-05-08",
        "exploit_author": "LSD-PLaNET",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/265/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/265/6251/irix-53626364656511-usrbinlpstat-local-overflow-local-privilege-escalation/download/",
        "exploit_id": "265",
        "exploit_description": "\"IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local Overflow / Local Privilege Escalation\"",
        "exploit_date": "2001-05-07",
        "exploit_author": "LSD-PLaNET",
        "exploit_type": "local",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/23167/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/23167/2987/sendmail-892-headers-prescan-denial-of-service/download/",
        "exploit_id": "23167",
        "exploit_description": "\"Sendmail 8.9.2 - Headers Prescan Denial of Service\"",
        "exploit_date": "1998-12-12",
        "exploit_author": "marchew",
        "exploit_type": "dos",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/22638/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/22638/2874/irix-5x6x-mediamail-home-environment-variable-buffer-overflow/download/",
        "exploit_id": "22638",
        "exploit_description": "\"IRIX 5.x/6.x - MediaMail HOME Environment Variable Buffer Overflow\"",
        "exploit_date": "2003-05-23",
        "exploit_author": "bazarr@ziplip.com",
        "exploit_type": "dos",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/21431/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/21431/2642/irix-65x-performance-co-pilot-remote-denial-of-service/download/",
        "exploit_id": "21431",
        "exploit_description": "\"IRIX 6.5.x - Performance Co-Pilot Remote Denial of Service\"",
        "exploit_date": "2002-04-12",
        "exploit_author": "\"Marcelo Magnasco\"",
        "exploit_type": "dos",
        "exploit_platform": "irix",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19357/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19357/2281/sgi-irix-62-spaceware/download/",
        "exploit_id": "19357",
        "exploit_description": "\"SGI IRIX 6.2 - SpaceWare\"",
        "exploit_date": "1996-10-30",
        "exploit_author": "\"J.A. Guitierrez\"",
        "exploit_type": "dos",
        "exploit_platform": "irix",
        "exploit_port": null
    }
]