Return all exploits belonging to a particular platform

For example

hardware

windows

multiple

php

linux

GET /searchindex/exploitbyplatform/openbsd/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45922/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45922/40422/xorg-x11-server-1203-modulepath-local-privilege-escalation/download/",
        "exploit_id": "45922",
        "exploit_description": "\"xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation\"",
        "exploit_date": "2018-11-30",
        "exploit_author": "\"Marco Ivaldi\"",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/29725/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/29725/14994/openbsd-3x4x-icmpv6-packet-handling-remote-buffer-overflow/download/",
        "exploit_id": "29725",
        "exploit_description": "\"OpenBSD 3.x/4.x - ICMPv6 Packet Handling Remote Buffer Overflow\"",
        "exploit_date": "2007-03-09",
        "exploit_author": "\"Alfredo Ortega\"",
        "exploit_type": "remote",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/22858/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/22858/13940/openbsd-3x-pf-rdr-network-information-leakage/download/",
        "exploit_id": "22858",
        "exploit_description": "\"OpenBSD 3.x - PF RDR Network Information Leakage\"",
        "exploit_date": "2003-07-02",
        "exploit_author": "Ed3f",
        "exploit_type": "remote",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20733/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20733/13240/openbsd-2x-28-ftpd-glob-remote-buffer-overflow/download/",
        "exploit_id": "20733",
        "exploit_description": "\"OpenBSD 2.x < 2.8 FTPd - 'glob()' Remote Buffer Overflow\"",
        "exploit_date": "2001-04-16",
        "exploit_author": "\"Elias Levy\"",
        "exploit_type": "remote",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45742/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45742/10076/xorg-x11-server-1203-privilege-escalation/download/",
        "exploit_id": "45742",
        "exploit_description": "\"xorg-x11-server 1.20.3 - Privilege Escalation\"",
        "exploit_date": "2018-10-30",
        "exploit_author": "\"Marco Ivaldi\"",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/42271/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/42271/9743/openbsd-at-stack-clash-local-privilege-escalation/download/",
        "exploit_id": "42271",
        "exploit_description": "\"OpenBSD - 'at Stack Clash' Local Privilege Escalation\"",
        "exploit_date": "2017-06-28",
        "exploit_author": "\"Qualys Corporation\"",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/29102/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/29102/8901/openbsd-3940-ldso-local-environment-variable-clearing/download/",
        "exploit_id": "29102",
        "exploit_description": "\"OpenBSD 3.9/4.0 - 'ld.so' Local Environment Variable Clearing\"",
        "exploit_date": "2006-11-20",
        "exploit_author": "\"Mark Dowd\"",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/23047/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/23047/8630/openbsd-33-semget-integer-overflow-2/download/",
        "exploit_id": "23047",
        "exploit_description": "\"OpenBSD 3.3 - 'Semget()' Integer Overflow (2)\"",
        "exploit_date": "2003-08-20",
        "exploit_author": "blexim",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/23046/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/23046/8629/openbsd-33-semget-integer-overflow-1/download/",
        "exploit_id": "23046",
        "exploit_description": "\"OpenBSD 3.3 - 'Semget()' Integer Overflow (1)\"",
        "exploit_date": "2003-08-20",
        "exploit_author": "blexim",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/22210/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/22210/8509/openbsd-2x3x-chpass-temporary-file-link-file-content-revealing/download/",
        "exploit_id": "22210",
        "exploit_description": "\"OpenBSD 2.x/3.x - CHPass Temporary File Link File Content Revealing\"",
        "exploit_date": "2003-02-03",
        "exploit_author": "\"Marc Bevand\"",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/21373/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/21373/8394/openbsd-2930-default-crontab-root-command-injection/download/",
        "exploit_id": "21373",
        "exploit_description": "\"OpenBSD 2.9/3.0 - Default Crontab Root Command Injection\"",
        "exploit_date": "2002-04-11",
        "exploit_author": "\"Przemyslaw Frasunek\"",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20256/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20256/8167/openbsd-2x-fstat-format-string/download/",
        "exploit_id": "20256",
        "exploit_description": "\"OpenBSD 2.x - 'fstat' Format String\"",
        "exploit_date": "2000-10-04",
        "exploit_author": "K2",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/5979/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/5979/6744/openbsd-40-vga-local-privilege-escalation/download/",
        "exploit_id": "5979",
        "exploit_description": "\"OpenBSD 4.0 - 'vga' Local Privilege Escalation\"",
        "exploit_date": "2008-07-01",
        "exploit_author": "\"lul-disclosure inc.\"",
        "exploit_type": "local",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/41278/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/41278/5399/openbsd-httpd-60-memory-exhaustion-denial-of-service/download/",
        "exploit_id": "41278",
        "exploit_description": "\"OpenBSD HTTPd < 6.0 - Memory Exhaustion Denial of Service\"",
        "exploit_date": "2017-02-07",
        "exploit_author": "PierreKimSec",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/24181/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/24181/3186/openbsd-3x-isakmpd-security-association-piggyback-delete-payload-denial-of-service/download/",
        "exploit_id": "24181",
        "exploit_description": "\"OpenBSD 3.x - ISAKMPD Security Association Piggyback Delete Payload Denial of Service\"",
        "exploit_date": "2004-06-08",
        "exploit_author": "\"Thomas Walpuski\"",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/23392/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/23392/3038/openbsd-3334-semctlsemop-local-unexpected-array-indexing/download/",
        "exploit_id": "23392",
        "exploit_description": "\"OpenBSD 3.3/3.4 - semctl/semop Local Unexpected Array Indexing\"",
        "exploit_date": "2003-11-21",
        "exploit_author": "anonymous",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/23339/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/23339/3029/openbsd-2x3x-local-malformed-binary-execution-denial-of-service/download/",
        "exploit_id": "23339",
        "exploit_description": "\"OpenBSD 2.x/3.x - Local Malformed Binary Execution Denial of Service\"",
        "exploit_date": "2003-11-04",
        "exploit_author": "\"Georgi Guninski\"",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/23389/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/23389/3017/openbsd-3334-sysctl-local-denial-of-service/download/",
        "exploit_id": "23389",
        "exploit_description": "\"OpenBSD 3.3/3.4 - 'sysctl' Local Denial of Service\"",
        "exploit_date": "2003-11-19",
        "exploit_author": "anonymous",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/21167/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/21167/2595/openbsd-2x30-user-mode-return-value-denial-of-service/download/",
        "exploit_id": "21167",
        "exploit_description": "\"OpenBSD 2.x/3.0 - User Mode Return Value Denial of Service\"",
        "exploit_date": "2001-12-03",
        "exploit_author": "\"Marco Peereboom\"",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20271/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20271/2450/openbsd-2x-pending-arp-request-remote-denial-of-service/download/",
        "exploit_id": "20271",
        "exploit_description": "\"OpenBSD 2.x - Pending ARP Request Remote Denial of Service\"",
        "exploit_date": "2000-10-05",
        "exploit_author": "skyper",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/8430/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/8430/1011/openbsd-45-ip-datagram-null-pointer-deref-denial-of-service/download/",
        "exploit_id": "8430",
        "exploit_description": "\"OpenBSD 4.5 - IP datagram Null Pointer Deref Denial of Service\"",
        "exploit_date": "2009-04-14",
        "exploit_author": "nonroot",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/8406/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/8406/1008/openbsd-45-ip-datagrams-remote-denial-of-service/download/",
        "exploit_id": "8406",
        "exploit_description": "\"OpenBSD 4.5 - IP datagrams Remote Denial of Service\"",
        "exploit_date": "2009-04-13",
        "exploit_author": "Rembrandt",
        "exploit_type": "dos",
        "exploit_platform": "openbsd",
        "exploit_port": null
    }
]