Return all exploits belonging to a particular platform

For example

hardware

windows

multiple

php

linux

GET /searchindex/exploitbyplatform/windows_x86/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46070/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46070/40554/ayukov-nftp-ftp-client-20-buffer-overflow/download/",
        "exploit_id": "46070",
        "exploit_description": "\"Ayukov NFTP FTP Client 2.0 - Buffer Overflow\"",
        "exploit_date": "2019-01-02",
        "exploit_author": "\"Uday Mittal\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46059/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46059/40544/iperius-backup-581-buffer-overflow-seh/download/",
        "exploit_id": "46059",
        "exploit_description": "\"Iperius Backup 5.8.1 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-12-27",
        "exploit_author": "bzyo",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46058/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46058/40543/terminal-services-manager-31-local-buffer-overflow-seh/download/",
        "exploit_id": "46058",
        "exploit_description": "\"Terminal Services Manager 3.1 - Local Buffer Overflow (SEH)\"",
        "exploit_date": "2018-12-27",
        "exploit_author": "bzyo",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46056/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46056/40542/magix-music-editor-31-buffer-overflow-seh/download/",
        "exploit_id": "46056",
        "exploit_description": "\"MAGIX Music Editor 3.1 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-12-27",
        "exploit_author": "bzyo",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46063/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46063/40541/sharealarmpro-214-denial-of-service-poc/download/",
        "exploit_id": "46063",
        "exploit_description": "\"ShareAlarmPro 2.1.4 - Denial of Service (PoC)\"",
        "exploit_date": "2018-12-27",
        "exploit_author": "T3jv1l",
        "exploit_type": "dos",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46062/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46062/40540/netsharewatcher-158-denial-of-service-poc/download/",
        "exploit_id": "46062",
        "exploit_description": "\"NetShareWatcher 1.5.8 - Denial of Service (PoC)\"",
        "exploit_date": "2018-12-27",
        "exploit_author": "T3jv1l",
        "exploit_type": "dos",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46057/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46057/40539/product-key-explorer-409-denial-of-service-poc/download/",
        "exploit_id": "46057",
        "exploit_description": "\"Product Key Explorer 4.0.9 - Denial of Service (PoC)\"",
        "exploit_date": "2018-12-27",
        "exploit_author": "T3jv1l",
        "exploit_type": "dos",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/46018/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/46018/40520/lanspy-201159-buffer-overflow-seh-egghunter/download/",
        "exploit_id": "46018",
        "exploit_description": "\"LanSpy 2.0.1.159 - Buffer Overflow (SEH) (Egghunter)\"",
        "exploit_date": "2018-12-20",
        "exploit_author": "bzyo",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45956/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45956/40456/textpad-812-denial-of-service-poc/download/",
        "exploit_id": "45956",
        "exploit_description": "\"Textpad 8.1.2 - Denial Of Service (PoC)\"",
        "exploit_date": "2018-12-09",
        "exploit_author": "\"Gionathan Reale\"",
        "exploit_type": "dos",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45907/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45907/40403/arm-whois-311-buffer-overflow-aslr/download/",
        "exploit_id": "45907",
        "exploit_description": "\"Arm Whois 3.11 - Buffer Overflow (ASLR)\"",
        "exploit_date": "2018-11-26",
        "exploit_author": "zephyr",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45888/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45888/40393/html-video-player-125-buffer-overflow-seh/download/",
        "exploit_id": "45888",
        "exploit_description": "\"HTML Video Player 1.2.5 - Buffer-Overflow (SEH)\"",
        "exploit_date": "2018-11-19",
        "exploit_author": "\"Kağan Çapar\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45796/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45796/40302/arm-whois-311-buffer-overflow-seh/download/",
        "exploit_id": "45796",
        "exploit_description": "\"Arm Whois 3.11 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-11-06",
        "exploit_author": "\"Semen Alexandrovich Lyhin\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45296/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45296/40062/argus-surveillance-dvr-4000-directory-traversal/download/",
        "exploit_id": "45296",
        "exploit_description": "\"Argus Surveillance DVR 4.0.0.0 - Directory Traversal\"",
        "exploit_date": "2018-08-29",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "webapps",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/15128/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/15128/25108/allpc-25-oscommerce-sql-injection-cross-site-scripting/download/",
        "exploit_id": "15128",
        "exploit_description": "\"Allpc 2.5 osCommerce - SQL Injection / Cross-Site Scripting\"",
        "exploit_date": "2010-09-27",
        "exploit_author": "**RoAd_KiLlEr**",
        "exploit_type": "webapps",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/15102/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/15102/25097/traidnt-up-cross-site-request-forgery-add-admin/download/",
        "exploit_id": "15102",
        "exploit_description": "\"Traidnt UP - Cross-Site Request Forgery (Add Admin)\"",
        "exploit_date": "2010-09-24",
        "exploit_author": "\"John Johnz\"",
        "exploit_type": "webapps",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/15100/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/15100/25079/joomla-component-elite-experts-sql-injection/download/",
        "exploit_id": "15100",
        "exploit_description": "\"Joomla! Component Elite Experts - SQL Injection\"",
        "exploit_date": "2010-09-24",
        "exploit_author": "**RoAd_KiLlEr**",
        "exploit_type": "webapps",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/14628/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/14628/24943/php-nuke-81-seo-arabic-remote-file-inclusion/download/",
        "exploit_id": "14628",
        "exploit_description": "\"PHP-Nuke 8.1 SEO Arabic - Remote File Inclusion\"",
        "exploit_date": "2010-08-12",
        "exploit_author": "LoSt.HaCkEr",
        "exploit_type": "webapps",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45220/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45220/16897/seig-modbus-34-remote-code-execution/download/",
        "exploit_id": "45220",
        "exploit_description": "\"SEIG Modbus 3.4 - Remote Code Execution\"",
        "exploit_date": "2018-08-20",
        "exploit_author": "\"Alejandro Parodi\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45218/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45218/16896/seig-scada-system-9-remote-code-execution/download/",
        "exploit_id": "45218",
        "exploit_description": "\"SEIG SCADA System 9 - Remote Code Execution\"",
        "exploit_date": "2018-08-19",
        "exploit_author": "\"Alejandro Parodi\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/43125/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/43125/16774/microsoft-internet-explorer-11-windows-7-x86-mshtmldll-remote-code-execution-ms17-007/download/",
        "exploit_id": "43125",
        "exploit_description": "\"Microsoft Internet Explorer 11 (Windows 7 x86) - 'mshtml.dll' Remote Code Execution (MS17-007)\"",
        "exploit_date": "2017-10-17",
        "exploit_author": "mschenk",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/39729/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/39729/16367/pcman-ftp-server-207-rename-remote-buffer-overflow-metasploit/download/",
        "exploit_id": "39729",
        "exploit_description": "\"PCMan FTP Server 2.0.7 - 'RENAME' Remote Buffer Overflow (Metasploit)\"",
        "exploit_date": "2016-04-25",
        "exploit_author": "\"Jonathan Smith\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/38599/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/38599/16235/symantec-pcanywhere-1250-windows-x86-remote-code-execution/download/",
        "exploit_id": "38599",
        "exploit_description": "\"Symantec pcAnywhere 12.5.0 (Windows x86) - Remote Code Execution\"",
        "exploit_date": "2015-11-02",
        "exploit_author": "\"Tomislav Paskalev\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/37812/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/37812/16141/symantec-endpoint-protection-manager-authentication-bypass-code-execution-metasploit/download/",
        "exploit_id": "37812",
        "exploit_description": "\"Symantec Endpoint Protection Manager - Authentication Bypass / Code Execution (Metasploit)\"",
        "exploit_date": "2015-08-18",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16825/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16825/12239/ca-cam-windows-x86-log_security-remote-stack-buffer-overflow-metasploit/download/",
        "exploit_id": "16825",
        "exploit_description": "\"CA CAM (Windows x86) - 'log_security()' Remote Stack Buffer Overflow (Metasploit)\"",
        "exploit_date": "2010-09-20",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16809/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16809/12223/oracle-9i-xdb-windows-x86-http-pass-overflow-metasploit/download/",
        "exploit_id": "16809",
        "exploit_description": "\"Oracle 9i XDB (Windows x86) - HTTP PASS Overflow (Metasploit)\"",
        "exploit_date": "2010-09-20",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16786/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16786/12202/peercast-01216-windows-x86-url-handling-buffer-overflow-metasploit/download/",
        "exploit_id": "16786",
        "exploit_description": "\"PeerCast 0.1216 (Windows x86) - URL Handling Buffer Overflow (Metasploit)\"",
        "exploit_date": "2010-09-20",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16783/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16783/12199/mcafee-epolicy-orchestrator-protectionpilot-remote-overflow-metasploit/download/",
        "exploit_id": "16783",
        "exploit_description": "\"McAfee ePolicy Orchestrator / ProtectionPilot - Remote Overflow (Metasploit)\"",
        "exploit_date": "2010-09-20",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16782/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16782/12198/apache-windows-x86-chunked-encoding-metasploit/download/",
        "exploit_id": "16782",
        "exploit_description": "\"Apache (Windows x86) - Chunked Encoding (Metasploit)\"",
        "exploit_date": "2010-07-07",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16763/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16763/12179/icecast-201-windows-x86-header-overwrite-metasploit/download/",
        "exploit_id": "16763",
        "exploit_description": "\"Icecast 2.0.1 (Windows x86) - Header Overwrite (Metasploit)\"",
        "exploit_date": "2010-04-30",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16759/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16759/12175/shttpd-134-windows-x86-uri-encoded-post-request-overflow-metasploit/download/",
        "exploit_id": "16759",
        "exploit_description": "\"SHTTPD 1.34 (Windows x86) - URI-Encoded POST Request Overflow (Metasploit)\"",
        "exploit_date": "2010-05-09",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16751/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16751/12167/shoutcast-dnaswin32-194-file-request-format-string-overflow-metasploit/download/",
        "exploit_id": "16751",
        "exploit_description": "\"SHOUTcast DNAS/Win32 1.9.4 - File Request Format String Overflow (Metasploit)\"",
        "exploit_date": "2010-04-30",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16743/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16743/12159/32bit-ftp-client-remote-stack-buffer-overflow-metasploit/download/",
        "exploit_id": "16743",
        "exploit_description": "\"32bit FTP Client - Remote Stack Buffer Overflow (Metasploit)\"",
        "exploit_date": "2010-11-14",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16738/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16738/12154/aasync-2210-windows-x86-remote-stack-buffer-overflow-list-metasploit/download/",
        "exploit_id": "16738",
        "exploit_description": "\"AASync 2.2.1.0 (Windows x86) - Remote Stack Buffer Overflow 'LIST' (Metasploit)\"",
        "exploit_date": "2010-11-14",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16731/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16731/12147/oracle-9i-xdb-windows-x86-ftp-pass-overflow-metasploit/download/",
        "exploit_id": "16731",
        "exploit_description": "\"Oracle 9i XDB (Windows x86) - FTP PASS Overflow (Metasploit)\"",
        "exploit_date": "2010-04-30",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16714/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16714/12130/oracle-9i-xdb-windows-x86-ftp-unlock-overflow-metasploit/download/",
        "exploit_id": "16714",
        "exploit_description": "\"Oracle 9i XDB (Windows x86) - FTP UNLOCK Overflow (Metasploit)\"",
        "exploit_date": "2010-10-05",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/16466/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/16466/11960/knox-arkeia-backup-client-type-77-windows-x86-remote-overflow-metasploit/download/",
        "exploit_id": "16466",
        "exploit_description": "\"Knox Arkeia Backup Client Type 77 (Windows x86) - Remote Overflow (Metasploit)\"",
        "exploit_date": "2010-05-09",
        "exploit_author": "Metasploit",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/14941/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/14941/11669/integard-home-and-pro-2-remote-http-buffer-overflow/download/",
        "exploit_id": "14941",
        "exploit_description": "\"Integard Home and Pro 2 - Remote HTTP Buffer Overflow\"",
        "exploit_date": "2010-09-07",
        "exploit_author": "\"Lincoln_ Nullthreat_ rick2600\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/11615/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/11615/11518/microsoft-internet-explorer-678-winhlp32exe-msgbox-remote-code-execution/download/",
        "exploit_id": "11615",
        "exploit_description": "\"Microsoft Internet Explorer 6/7/8 - 'winhlp32.exe MsgBox()' Remote Code Execution\"",
        "exploit_date": "2010-03-02",
        "exploit_author": "\"Maurycy Prodeus\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/8623/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/8623/11275/32bit-ftp-pasv-reply-client-remote-overflow-metasploit/download/",
        "exploit_id": "8623",
        "exploit_description": "\"32bit FTP - 'PASV' Reply Client Remote Overflow (Metasploit)\"",
        "exploit_date": "2009-05-07",
        "exploit_author": "His0k4",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/8621/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/8621/11274/32bit-ftp-090424-cwd-response-universal-overwrite-seh/download/",
        "exploit_id": "8621",
        "exploit_description": "\"32bit FTP (09.04.24) - 'CWD Response' Universal Overwrite (SEH)\"",
        "exploit_date": "2009-05-05",
        "exploit_author": "His0k4",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/8614/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/8614/11273/32bit-ftp-090424-banner-remote-buffer-overflow/download/",
        "exploit_id": "8614",
        "exploit_description": "\"32bit FTP (09.04.24) - 'Banner' Remote Buffer Overflow\"",
        "exploit_date": "2009-05-05",
        "exploit_author": "His0k4",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/8613/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/8613/11272/32bit-ftp-090424-cwd-response-remote-buffer-overflow/download/",
        "exploit_id": "8613",
        "exploit_description": "\"32bit FTP (09.04.24) - 'CWD Response' Remote Buffer Overflow\"",
        "exploit_date": "2009-05-05",
        "exploit_author": "His0k4",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/6100/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/6100/11056/apache-mod_jk-1219-windows-x86-remote-buffer-overflow/download/",
        "exploit_id": "6100",
        "exploit_description": "\"Apache mod_jk 1.2.19 (Windows x86) - Remote Buffer Overflow\"",
        "exploit_date": "2008-07-18",
        "exploit_author": "Unohope",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/5330/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/5330/11006/apache-20-mod_jk2-202-windows-x86-remote-buffer-overflow/download/",
        "exploit_id": "5330",
        "exploit_description": "\"Apache 2.0 mod_jk2 2.0.2 (Windows x86) - Remote Buffer Overflow\"",
        "exploit_date": "2008-03-31",
        "exploit_author": "Heretic2",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/5079/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/5079/10974/saplpd-628-windows-x86-remote-buffer-overflow/download/",
        "exploit_id": "5079",
        "exploit_description": "\"SapLPD 6.28 (Windows x86) - Remote Buffer Overflow\"",
        "exploit_date": "2008-02-07",
        "exploit_author": "BackBone",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/4754/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/4754/10923/3proxy-053g-windows-x86-logurl-remote-buffer-overflow-perl/download/",
        "exploit_id": "4754",
        "exploit_description": "\"3proxy 0.5.3g (Windows x86) - 'logurl()' Remote Buffer Overflow (Perl)\"",
        "exploit_date": "2007-12-18",
        "exploit_author": "\"Marcin Kozlowski\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/3822/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/3822/10747/3proxy-053g-windows-x86-proxyc-logurl-remote-buffer-overflow/download/",
        "exploit_id": "3822",
        "exploit_description": "\"3proxy 0.5.3g (Windows x86) - 'proxy.c logurl()' Remote Buffer Overflow\"",
        "exploit_date": "2007-04-30",
        "exploit_author": "vade79",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/3680/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/3680/10732/apache-mod_rewrite-windows-x86-off-by-one-remote-overflow/download/",
        "exploit_id": "3680",
        "exploit_description": "\"Apache mod_rewrite (Windows x86) - Off-by-One Remote Overflow\"",
        "exploit_date": "2007-04-07",
        "exploit_author": "axis",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/2680/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/2680/10605/privatewire-gateway-37-windows-x86-remote-buffer-overflow-metasploit/download/",
        "exploit_id": "2680",
        "exploit_description": "\"PrivateWire Gateway 3.7 (Windows x86) - Remote Buffer Overflow (Metasploit)\"",
        "exploit_date": "2006-10-29",
        "exploit_author": "\"Michael Thumann\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/1264/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/1264/10459/veritas-netbackup-60-windows-x86-bpjava-msvc-remote-command-execution/download/",
        "exploit_id": "1264",
        "exploit_description": "\"Veritas NetBackup 6.0 (Windows x86) - 'bpjava-msvc' Remote Command Execution\"",
        "exploit_date": "2005-10-20",
        "exploit_author": "\"Kevin Finisterre\"",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/584/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/584/10283/microsoft-windows-x86-metafile-emf-heap-overflow-ms04-032/download/",
        "exploit_id": "584",
        "exploit_description": "\"Microsoft Windows (x86) - Metafile '.emf' Heap Overflow (MS04-032)\"",
        "exploit_date": "2004-10-20",
        "exploit_author": "houseofdabus",
        "exploit_type": "remote",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45710/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45710/10074/modbus-slave-plc-7-msw-buffer-overflow-poc/download/",
        "exploit_id": "45710",
        "exploit_description": "\"Modbus Slave PLC 7 - '.msw' Buffer Overflow (PoC)\"",
        "exploit_date": "2018-10-29",
        "exploit_author": "\"Kağan Çapar\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45687/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45687/10070/adult-filter-10-buffer-overflow-seh/download/",
        "exploit_id": "45687",
        "exploit_description": "\"Adult Filter 1.0 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-10-25",
        "exploit_author": "AkkuS",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45627/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45627/10065/any-sound-recorder-293-buffer-overflow-seh/download/",
        "exploit_id": "45627",
        "exploit_description": "\"Any Sound Recorder 2.93 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-10-17",
        "exploit_author": "\"Abdullah Alıç\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45598/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45598/10062/snes9k-009z-buffer-overflow-seh/download/",
        "exploit_id": "45598",
        "exploit_description": "\"Snes9K 0.0.9z - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-10-15",
        "exploit_author": "\"Abdullah Alıç\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45531/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45531/10052/nico-ftp-30119-buffer-overflow-seh-aslr-bypass/download/",
        "exploit_id": "45531",
        "exploit_description": "\"NICO-FTP 3.0.1.19 - Buffer Overflow (SEH) (ASLR Bypass)\"",
        "exploit_date": "2018-10-04",
        "exploit_author": "\"Miguel Mendez Z\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45505/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45505/10049/zahir-enterprise-plus-6-build-10b-buffer-overflow-seh/download/",
        "exploit_id": "45505",
        "exploit_description": "\"Zahir Enterprise Plus 6 build 10b - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-10-01",
        "exploit_author": "SPARC",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45504/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45504/10048/snes9k-009z-denial-of-service-poc/download/",
        "exploit_id": "45504",
        "exploit_description": "\"Snes9K 0.0.9z - Denial of Service (PoC)\"",
        "exploit_date": "2018-10-01",
        "exploit_author": "crash_manucoot",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45492/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45492/10044/faleemi-desktop-software-182-device-alias-local-buffer-overflow-seh/download/",
        "exploit_id": "45492",
        "exploit_description": "\"Faleemi Desktop Software 1.8.2 - 'Device alias' Local Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-25",
        "exploit_author": "\"Gionathan Reale\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45467/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45467/10042/easy-phororesq-10-buffer-overflow/download/",
        "exploit_id": "45467",
        "exploit_description": "\"Easy PhoroResQ 1.0 - Buffer Overflow\"",
        "exploit_date": "2018-09-25",
        "exploit_author": "\"Cemal Cihad ÇİFTÇİ\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45442/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45442/10041/nico-ftp-30119-buffer-overflow-seh/download/",
        "exploit_id": "45442",
        "exploit_description": "\"NICO-FTP 3.0.1.19 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-20",
        "exploit_author": "\"Abdullah Alıç\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45412/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45412/10039/free-mp3-cd-ripper-26-wma-local-buffer-overflow-seh/download/",
        "exploit_id": "45412",
        "exploit_description": "\"Free MP3 CD Ripper 2.6 - '.wma' Local Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-14",
        "exploit_author": "\"Gionathan Reale\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45403/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45403/10036/free-mp3-cd-ripper-26-mp3-buffer-overflow-seh/download/",
        "exploit_id": "45403",
        "exploit_description": "\"Free MP3 CD Ripper 2.6 - '.mp3' Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-13",
        "exploit_author": "\"Gionathan Reale\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45356/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45356/10028/any-sound-recorder-293-denial-of-service-poc/download/",
        "exploit_id": "45356",
        "exploit_description": "\"Any Sound Recorder 2.93 - Denial of Service (PoC)\"",
        "exploit_date": "2018-09-10",
        "exploit_author": "T3jv1l",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45355/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45355/10027/flash-slideshow-maker-professional-520-buffer-overflow-seh/download/",
        "exploit_id": "45355",
        "exploit_description": "\"Flash Slideshow Maker Professional 5.20 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-10",
        "exploit_author": "\"Shubham Singh\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45353/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45353/10025/photo-to-video-converter-professional-807-buffer-overflow-seh/download/",
        "exploit_id": "45353",
        "exploit_description": "\"Photo To Video Converter Professional 8.07 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-10",
        "exploit_author": "\"Shubham Singh\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45352/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45352/10024/socusoft-3gp-photo-slideshow-805-buffer-overflow-seh/download/",
        "exploit_id": "45352",
        "exploit_description": "\"Socusoft 3GP Photo Slideshow 8.05 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-10",
        "exploit_author": "\"Shubham Singh\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45350/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45350/10023/socusoft-ipod-photo-slideshow-805-buffer-overflow-seh/download/",
        "exploit_id": "45350",
        "exploit_description": "\"SocuSoft iPod Photo Slideshow 8.05 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-10",
        "exploit_author": "\"Shubham Singh\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45349/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45349/10022/ismartviewpro-15-savepath-for-screenshots-local-buffer-overflow-seh/download/",
        "exploit_id": "45349",
        "exploit_description": "\"iSmartViewPro 1.5 - 'SavePath for ScreenShots' Local Buffer Overflow (SEH)\"",
        "exploit_date": "2018-09-07",
        "exploit_author": "\"Gionathan Reale\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45325/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45325/10020/ismartviewpro-15-ddns-buffer-overflow/download/",
        "exploit_id": "45325",
        "exploit_description": "\"iSmartViewPro 1.5 - 'DDNS' Buffer Overflow\"",
        "exploit_date": "2018-09-04",
        "exploit_author": "\"Luis Martínez\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45312/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45312/10018/argus-surveillance-dvr-4000-privilege-escalation/download/",
        "exploit_id": "45312",
        "exploit_description": "\"Argus Surveillance DVR 4.0.0.0 - Privilege Escalation\"",
        "exploit_date": "2018-08-31",
        "exploit_author": "hyp3rlinx",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45259/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45259/10013/cuteftp-50-buffer-overflow/download/",
        "exploit_id": "45259",
        "exploit_description": "\"CuteFTP 5.0 - Buffer Overflow\"",
        "exploit_date": "2018-08-27",
        "exploit_author": "\"Matteo Malvica\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45250/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45250/10012/stylewriter-4-10-denial-of-service-poc/download/",
        "exploit_id": "45250",
        "exploit_description": "\"StyleWriter 4 1.0 - Denial of Service (PoC)\"",
        "exploit_date": "2018-08-23",
        "exploit_author": "\"Gionathan Reale\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45235/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45235/10009/project64-232-buffer-overflow-seh/download/",
        "exploit_id": "45235",
        "exploit_description": "\"Project64 2.3.2 - Buffer Overflow (SEH)\"",
        "exploit_date": "2018-08-22",
        "exploit_author": "\"Shubham Singh\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/45181/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/45181/10004/monitoring-software-ismartviewpro-15-savepath-for-screenshots-buffer-overflow/download/",
        "exploit_id": "45181",
        "exploit_description": "\"Monitoring software iSmartViewPro 1.5 - 'SavePath for ScreenShots' Buffer Overflow\"",
        "exploit_date": "2018-08-13",
        "exploit_author": "\"Shubham Singh\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/41705/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/41705/9956/fortinet-forticlient-523-windows-10-x86-local-privilege-escalation/download/",
        "exploit_id": "41705",
        "exploit_description": "\"Fortinet FortiClient 5.2.3 (Windows 10 x86) - Local Privilege Escalation\"",
        "exploit_date": "2017-03-11",
        "exploit_author": "sickness",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44841/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44841/9953/10-strike-network-scanner-30-local-buffer-overflow-seh/download/",
        "exploit_id": "44841",
        "exploit_description": "\"10-Strike Network Scanner 3.0 - Local Buffer Overflow (SEH)\"",
        "exploit_date": "2018-06-05",
        "exploit_author": "\"Hashim Jawad\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44840/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44840/9952/10-strike-network-inventory-explorer-854-registration-key-buffer-overflow-seh/download/",
        "exploit_id": "44840",
        "exploit_description": "\"10-Strike Network Inventory Explorer 8.54 - 'Registration Key' Buffer Overflow (SEH)\"",
        "exploit_date": "2018-06-05",
        "exploit_author": "\"Hashim Jawad\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44838/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44838/9951/10-strike-network-inventory-explorer-854-local-buffer-overflow-seh/download/",
        "exploit_id": "44838",
        "exploit_description": "\"10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH)\"",
        "exploit_date": "2018-06-05",
        "exploit_author": "\"Hashim Jawad\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44787/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44787/9941/alftp-531-local-buffer-overflow-seh-bypass/download/",
        "exploit_id": "44787",
        "exploit_description": "\"ALFTP 5.31 - Local Buffer Overflow (SEH Bypass)\"",
        "exploit_date": "2018-05-28",
        "exploit_author": "\"Gokul Babu\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44680/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44680/9929/r-344-local-buffer-overflow-dep-bypass/download/",
        "exploit_id": "44680",
        "exploit_description": "\"R 3.4.4 - Local Buffer Overflow (DEP Bypass)\"",
        "exploit_date": "2018-05-21",
        "exploit_author": "\"Hashim Jawad\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44499/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44499/9905/free-download-manager-20-built-417-local-buffer-overflow-seh/download/",
        "exploit_id": "44499",
        "exploit_description": "\"Free Download Manager 2.0 Built 417 - Local Buffer Overflow (SEH)\"",
        "exploit_date": "2018-04-23",
        "exploit_author": "\"Marwan Shamel\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44480/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44480/9904/microsoft-windows-kernel-windows-7-x86-local-privilege-escalation-ms16-039/download/",
        "exploit_id": "44480",
        "exploit_description": "\"Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS16-039)\"",
        "exploit_date": "2018-03-01",
        "exploit_author": "xiaodaozhi",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44479/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44479/9903/microsoft-windows-kernel-windows-7-x86-local-privilege-escalation-ms17-017/download/",
        "exploit_id": "44479",
        "exploit_description": "\"Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS17-017)\"",
        "exploit_date": "2018-03-15",
        "exploit_author": "xiaodaozhi",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44478/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44478/9902/microsoft-window-manager-windows-7-x86-menu-management-component-uaf-privilege-elevation/download/",
        "exploit_id": "44478",
        "exploit_description": "\"Microsoft Window Manager (Windows 7 x86) - Menu Management Component UAF Privilege Elevation\"",
        "exploit_date": "2018-03-26",
        "exploit_author": "xiaodaozhi",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44472/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44472/9897/ultra-minihttpd-12-get-remote-stack-buffer-overflow-poc/download/",
        "exploit_id": "44472",
        "exploit_description": "\"Ultra MiniHTTPd 1.2 - 'GET' Remote Stack Buffer Overflow PoC\"",
        "exploit_date": "2018-04-17",
        "exploit_author": "jollymongrel",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44438/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44438/9893/dvd-x-player-standard-5539-buffer-overflow/download/",
        "exploit_id": "44438",
        "exploit_description": "\"DVD X Player Standard 5.5.3.9 - Buffer Overflow\"",
        "exploit_date": "2018-04-10",
        "exploit_author": "\"Prasenjit Kanti Paul\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/44167/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/44167/9840/nomachine-6080-x86-nxfuse-privilege-escalation/download/",
        "exploit_id": "44167",
        "exploit_description": "\"NoMachine < 6.0.80 (x86) - 'nxfuse' Privilege Escalation\"",
        "exploit_date": "2018-02-22",
        "exploit_author": "\"Fidus InfoSecurity\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/43192/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/43192/9819/microsoft-windows-10-creators-update-version-1703-x86-warbird-ntquerysysteminformation-kernel-local-privilege-escalation/download/",
        "exploit_id": "43192",
        "exploit_description": "\"Microsoft Windows 10 Creators Update (version 1703) (x86) - 'WARBIRD' 'NtQuerySystemInformation ' Kernel Local Privilege Escalation\"",
        "exploit_date": "2017-11-27",
        "exploit_author": "XPN",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/40627/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/40627/9544/microsoft-windows-x86-ndistapi-local-privilege-escalation-ms11-062/download/",
        "exploit_id": "40627",
        "exploit_description": "\"Microsoft Windows (x86) - 'NDISTAPI' Local Privilege Escalation (MS11-062)\"",
        "exploit_date": "2016-10-24",
        "exploit_author": "\"Tomislav Paskalev\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/40564/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/40564/9503/microsoft-windows-x86-afdsys-local-privilege-escalation-ms11-046/download/",
        "exploit_id": "40564",
        "exploit_description": "\"Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046)\"",
        "exploit_date": "2016-10-18",
        "exploit_author": "\"Tomislav Paskalev\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/40039/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/40039/9453/microsoft-windows-7-sp1-x86-local-privilege-escalation-ms16-014/download/",
        "exploit_id": "40039",
        "exploit_description": "\"Microsoft Windows 7 SP1 (x86) - Local Privilege Escalation (MS16-014)\"",
        "exploit_date": "2016-06-29",
        "exploit_author": "blomster81",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/39574/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/39574/9396/microsoft-windows-8110-x86-secondary-logon-standard-handles-missing-sanitization-privilege-escalation-ms16-032/download/",
        "exploit_id": "39574",
        "exploit_description": "\"Microsoft Windows 8.1/10 (x86) - Secondary Logon Standard Handles Missing Sanitization Privilege Escalation (MS16-032)\"",
        "exploit_date": "2016-03-21",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/39446/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/39446/9386/microsoft-windows-7-x86-afdsys-dangling-pointer-privilege-escalation-ms14-040/download/",
        "exploit_id": "39446",
        "exploit_description": "\"Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)\"",
        "exploit_date": "2016-02-15",
        "exploit_author": "\"Rick Larabee\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/39432/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/39432/9381/microsoft-windows-7-sp1-x86-webdav-local-privilege-escalation-ms16-016-1/download/",
        "exploit_id": "39432",
        "exploit_description": "\"Microsoft Windows 7 SP1 (x86) - 'WebDAV' Local Privilege Escalation (MS16-016) (1)\"",
        "exploit_date": "2016-02-10",
        "exploit_author": "koczkatamas",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/38403/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/38403/9316/truecrypt-7-veracrypt-113-drive-letter-symbolic-link-creation-privilege-escalation/download/",
        "exploit_id": "38403",
        "exploit_description": "\"TrueCrypt 7 / VeraCrypt 1.13 - Drive Letter Symbolic Link Creation Privilege Escalation\"",
        "exploit_date": "2015-10-05",
        "exploit_author": "\"Google Security Research\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/37732/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/37732/9257/microsoft-windows-xp-sp3-x86-2003-sp2-x86-ndproxy-local-privilege-escalation-ms14-002/download/",
        "exploit_id": "37732",
        "exploit_description": "\"Microsoft Windows XP SP3 (x86) / 2003 SP2 (x86) - 'NDProxy' Local Privilege Escalation (MS14-002)\"",
        "exploit_date": "2015-08-07",
        "exploit_author": "\"Tomislav Paskalev\"",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/35020/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/35020/9116/microsoft-windows-ole-package-manager-code-execution-ms14-060-metasploit/download/",
        "exploit_id": "35020",
        "exploit_description": "\"Microsoft Windows - OLE Package Manager Code Execution (MS14-060) (Metasploit)\"",
        "exploit_date": "2014-10-20",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/34982/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/34982/9112/microsoft-bluetooth-personal-area-networking-bthpansys-local-privilege-escalation-metasploit/download/",
        "exploit_id": "34982",
        "exploit_description": "\"Microsoft Bluetooth Personal Area Networking - 'BthPan.sys' Local Privilege Escalation (Metasploit)\"",
        "exploit_date": "2014-10-15",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/34167/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/34167/9092/microsoft-windows-xp-sp3-mqacsys-arbitrary-write-privilege-escalation-metasploit/download/",
        "exploit_id": "34167",
        "exploit_description": "\"Microsoft Windows XP SP3 - 'MQAC.sys' Arbitrary Write Privilege Escalation (Metasploit)\"",
        "exploit_date": "2014-07-25",
        "exploit_author": "Metasploit",
        "exploit_type": "local",
        "exploit_platform": "windows_x86",
        "exploit_port": null
    }
]