diff --git a/exploits/php/webapps/48457.txt b/exploits/php/webapps/48457.txt
index d654f1ff6..aa99ab715 100644
--- a/exploits/php/webapps/48457.txt
+++ b/exploits/php/webapps/48457.txt
@@ -37,10 +37,4 @@ Parameter: id (GET)
[08:55:01] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu
web application technology: Apache 2.4.29
-back-end DBMS: MySQL >= 5.0.12
-
-I am looking forward to you accepting and approving my PoC.
-
-Thankyou!
-
-Vu Tien Hoa
\ No newline at end of file
+back-end DBMS: MySQL >= 5.0.12
\ No newline at end of file
diff --git a/exploits/php/webapps/48466.txt b/exploits/php/webapps/48466.txt
new file mode 100644
index 000000000..bbc96dce0
--- /dev/null
+++ b/exploits/php/webapps/48466.txt
@@ -0,0 +1,171 @@
+# Exploit Title: Tryton 5.4 - Persistent Cross-Site Scripting
+# Exploit Author: Vulnerability-Lab
+# Date: 2020-05-13
+# Vendor Homepage: https://www.tryton.org/
+# Version: 5.4
+# Software Link: https://www.tryton.org/download
+
+
+Document Title:
+===============
+Tryton v5.4 - (Name) Persistent Cross Site Vulnerability
+
+
+References (Source):
+====================
+https://www.vulnerability-lab.com/get_content.php?id=2233
+
+
+Common Vulnerability Scoring System:
+====================================
+4.4
+
+
+Product & Service Introduction:
+===============================
+https://www.tryton.org/ & https://www.tryton.org/download
+
+
+Affected Product(s):
+====================
+Tryton Foundation
+Product: Tryton v5.4 - CMS (Web-Application)
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2020-05-12: Public Disclosure (Vulnerability Laboratory)
+
+
+Technical Details & Description:
+================================
+A persistent input validation web vulnerability has been discovered in
+the official Tryton v5.4 web-application series.
+The vulnerability allows remote attackers to inject own malicious script
+codes with persistent attack vector to compromise
+browser to web-application requests from the application-side.
+
+The persistent vulnerability is located in the `name` parameter of the
+`User Profile` module. Remote attackers with low
+privileges are able to inject own malicious persistent script code as
+name for user accounts. The injected code can be
+used to attack the frontend or backend of the web-application. The
+request method to inject is POST and the attack vector
+is located on the application-side. Injection point is the profile input
+field with the name value and the execute occurs
+in the front ui on top right were the avatar is listed or in the admin
+backend on the res.user;name="Users"&views.
+
+Successful exploitation of the vulnerabilities results in session
+hijacking, persistent phishing attacks, persistent
+external redirects to malicious source and persistent manipulation of
+affected application modules.
+
+Request Method(s):
+[+] POST
+
+Vulnerable Module(s):
+[+] User Profile
+
+Vulnerable Input(s):
+[+] Name
+
+Vulnerable Parameter(s):
+[+] name
+
+Affected Module(s):
+[+] /index
+[+] /model/res.user;name="Users"&views (backend)
+
+
+Proof of Concept (PoC):
+=======================
+The persistent web vulnerability can be exploited by low privileged web
+application user account with low user interaction.
+For security demonstration or to reproduce the vulnerability follow the
+provided information and steps below to continue.
+
+
+Manual steps to reproduce the vulnerability ...
+1. Open the application and login to your low privileged user account
+2. Move to the profile on top right side (click)
+3. Inject test payload to the "Name" input field and save the entry
+4. Execution occurs after save on top right and
+/model/res.user;name="Users"&views of the admin backend
+5. Successful reproduce of the persistent cross site vulnerability!
+
+
+PoC: Payload
+%20>">
+
+
+PoC: Vulnerable Source (Execution Point)
+
+
+
+--- PoC Session Logs [POST] ---
+https://tryton.localhost:8080/tryton/
+Host: tryton.localhost:8080
+Accept: application/json, text/javascript, */*; q=0.01
+Content-Type: application/json
+Authorization: Session
+ZGVtbzoyOjMyYmIyOWE3ODYxMzA3NGVkZThlMDBhNmEyMWVkNzFhZTAxOGQwMzA1YTJhMGU1NTNjOWU2YTNhZWM5MzA1MzM=
+X-Requested-With: XMLHttpRequest
+Content-Length: 527
+Origin: https://tryton.localhost:8080
+Connection: keep-alive
+Referer: https://tryton.localhost:8080/
+{"id":195,"method":"model.res.user.set_preferences","params":[{"name":"%20>">
">",
+"signature":"test
+signature"},{"client":"1aab6de2-1f59-43de-b0d0-a8319558e4e8","warehouse":null,"employee":null,"company":1,
+"company.rec_name":"Michael Scott Paper
+Company","language":"en","language_direction":"ltr","groups":[5,15,16,13,19,20,17,9,10],
+"locale":{"date":"%m/%d/%Y","grouping":[3,3,0],"decimal_point":".","thousands_sep":","},"company_work_time":
+{"h":3600,"m":60,"s":1,"Y":6912000,"M":576000,"w":144000,"d":28800}}]}
+-
+POST: HTTP/2.0 200 OK
+server: nginx/1.16.1
+content-type: application/json
+access-control-allow-origin: https://tryton.localhost:8080
+vary: Origin
+content-encoding: gzip
+
+
+Credits & Authors:
+==================
+Vulnerability-Lab -
+https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
+Benjamin Kunz Mejri -
+https://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.
+
+
+
+
+--
+VULNERABILITY LABORATORY - RESEARCH TEAM
\ No newline at end of file
diff --git a/exploits/php/webapps/48467.txt b/exploits/php/webapps/48467.txt
new file mode 100644
index 000000000..d3dbd0e76
--- /dev/null
+++ b/exploits/php/webapps/48467.txt
@@ -0,0 +1,138 @@
+# Exploit Title: Sellacious eCommerce 4.6 - Persistent Cross-Site Scripting
+# Exploit Author: gurbanli
+# Date: 2020-05-13
+# Vendor Homepage: https://www.sellacious.com
+# Version: 4.6
+# Software Link: https://www.sellacious.com/free-open-source-ecommerce-software
+
+Document Title:
+===============
+Sellacious eCommerce - Multiple Persistent Vulnerabilities
+
+
+References (Source):
+====================
+https://www.vulnerability-lab.com/get_content.php?id=2226
+
+
+Common Vulnerability Scoring System:
+====================================
+4.6
+
+
+Product & Service Introduction:
+===============================
+https://www.sellacious.com/free-open-source-ecommerce-software
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2020-05-08: Public Disclosure (Vulnerability Laboratory)
+
+
+Technical Details & Description:
+================================
+A persistent input validation web vulnerability has been discovered in
+the official Sellacious eCommerce Shop CMS (2020 Q1).
+The vulnerability allows remote attackers to inject own malicious script
+codes with persistent attack vector to compromise
+browser to web-application requests from the application-side.
+
+The cross site web vulnerabilities are located in the all the adress
+input fields of the `Manage Your Addresses` module.
+Remote attackers are able to register a low privilege user account to
+inject own malicious script code to the adress
+information page. The execution of the script code occurs each time the
+adress information is used in the web ui of
+the ecommerce application. The request method to inject is POST and the
+attack vector is persistent on the application-side.
+
+Successful exploitation of the vulnerabilities results in session
+hijacking, persistent phishing attacks, persistent
+external redirects to malicious source and persistent manipulation of
+affected application modules.
+
+Request Method(s):
+[+] POST
+
+Vulnerable Module(s):
+[+] Manage Your Addresses
+
+Vulnerable Input(s):
+[+] Full name
+[+] First name
+[+] Middle name
+[+] Last name
+[+] Company
+[+] PO Box
+[+] Address
+[+] Landmark
+
+Affected(s):
+[+] index.php/manage-your-addresses
+[+] Backend user adress information listing
+
+
+Proof of Concept (PoC):
+=======================
+The persistent input validation web vulnerabilities can be exploited by
+remote attackers with user account and low user interaction.
+For security demonstration or to reproduce the web vulnerability follow
+the provided information and steps below to continue.
+
+
+PoC: Exploitation
+