diff --git a/files.csv b/files.csv
index 859939f20..e9012b7f4 100755
--- a/files.csv
+++ b/files.csv
@@ -15218,6 +15218,8 @@ id,file,description,date,author,platform,type,port
17502,platforms/windows/local/17502.rb,"MicroP 0.1.1.1600 (MPPL File) Stack Buffer Overflow",2011-07-07,metasploit,windows,local,0
17503,platforms/jsp/webapps/17503.pl,"ManageEngine ServiceDesk <= 8.0.0.12 Database Disclosure Exploit",2011-07-07,@ygoltsev,jsp,webapps,0
17507,platforms/hardware/remote/17507.py,"Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal Vulnerability",2011-07-08,"SecPod Research",hardware,remote,0
+39661,platforms/windows/remote/39661.rb,"Easy File Sharing HTTP Server 7.2 SEH Overflow",2016-04-05,metasploit,windows,remote,80
+39662,platforms/windows/remote/39662.rb,"PCMAN FTP Server Buffer Overflow - PUT Command",2016-04-05,metasploit,windows,remote,21
17508,platforms/php/webapps/17508.txt,"appRain Quick Start Edition Core Edition Multiple 0.1.4-Alpha - XSS Vulnerabilities",2011-07-08,"SecPod Research",php,webapps,0
17510,platforms/php/webapps/17510.py,"phpMyAdmin3 (pma3) - Remote Code Execution Exploit",2011-07-08,wofeiwo,php,webapps,0
17511,platforms/windows/local/17511.pl,"ZipGenius 6.3.2.3000 - (.ZIP) Buffer Overflow Exploit",2011-07-08,"C4SS!0 G0M3S",windows,local,0
@@ -35883,3 +35885,6 @@ id,file,description,date,author,platform,type,port
39656,platforms/multiple/local/39656.py,"Hexchat IRC Client 2.11.0 - Directory Traversal",2016-04-04,PizzaHatHacker,multiple,local,0
39657,platforms/multiple/dos/39657.py,"Hexchat IRC Client 2.11.0 - CAP LS Handling Buffer Overflow",2016-04-04,PizzaHatHacker,multiple,dos,0
39659,platforms/hardware/webapps/39659.txt,"PQI Air Pen Express 6W51-0000R2 and 6W51-0000R2XXX - Multiple Vulnerabilities",2016-04-04,Orwelllabs,hardware,webapps,0
+39663,platforms/windows/dos/39663.html,"Internet Explorer - MSHTML!CSVGHelpers::SetAttributeStringAndPointer Use-After-Free (MS16-023)",2016-04-05,"Google Security Research",windows,dos,0
+39664,platforms/jsp/webapps/39664.txt,"ManageEngine Password Manager Pro 8102 to 8302 - Multiple Vulnerabilities",2016-04-05,S3ba,jsp,webapps,7272
+39666,platforms/windows/local/39666.txt,"Windows Kernel Win32k.sys Privilege Escalation Exploit (MS14-058)",2016-04-05,"MWR InfoSecurity",windows,local,0
diff --git a/platforms/jsp/webapps/39664.txt b/platforms/jsp/webapps/39664.txt
new file mode 100755
index 000000000..f1f6e6c49
--- /dev/null
+++ b/platforms/jsp/webapps/39664.txt
@@ -0,0 +1,388 @@
+[Systems Affected]
+ Product : ManageEngine Password Manager Pro
+ Company : ZOHO Corp.
+ Build Number : 8.1 to 8.3 and probably earlier versions
+ Affected Versions : 8102 to 8302 and probably earlier versions
+
+
+[Product Description]
+ Password Manager Pro is a secure vault for storing and managing
+shared sensitive information such as passwords, documents and digital
+identities of enterprises.
+
+
+[Vulnerabilities]
+ Multiple vulnerabilities were identified within this application:
+ 1- Stored XSS in /AddMail.ve
+ 2- Privilege escalation in /EditUser.do
+ 3- Business Login Bypass in /EditUser.do
+ 4- Password policy bypass in /jsp/xmlhttp/AjaxResponse.jsp
+ 5- Horizontal privilege escalation in /jsp/xmlhttp/AjaxResponse.jsp
+ 6- Resource's user enumeration in /jsp/xmlhttp/PasswdRetriveAjaxResponse.jsp
+ 7- Password Bruteforce for resources accounts in
+/jsp/xmlhttp/AjaxResponse.jsp
+ 8- Cross-Site Request Forgery
+
+
+[Advisory Timeline]
+ 17/07/2015 - Discovery and vendor notification
+ 17/07/2015 - ManageEngine responsed that they will notify their
+development team
+ 13/10/2015 - ManageEngine informed that they have fixed these issue
+ 14/10/2015 - Fixed Password Manager Pro build version 8300 has been released
+ 15/10/2015 - Test on Beta build version 8300 was performed and
+confirm the fix of these issues 2, 4, 7 and part of issue 8
+ 02/11/2015 - ManageEngine ask more time to fix the remaining issues
+before making this public
+ 29/12/2015 - ManageEngine contacted for an update - No reply
+ 12/01/2016 - ManageEngine contacted for an update - No reply
+ 08/02/2016 - ManageEngine contacted for an update - small update provided
+ 12/02/2016 - Last communication from ManageEngine
+ 04/04/2016 - Public Disclosure
+
+
+[Patch Available]
+ Password Manager Pro Release 8.3 (8300) (Released on October, 2015)
+fix issues #2, #4, #7 and partially #8
+ Password Manager Pro Release 8.3 (8303) (Released on December 2015)
+fix issues #1, #3, #5 and #6
+
+
+[Exploit]
+ There is an exploit available that takes advantage of the Privilege
+Escalation vulnerability (Issue #2) and elevates a regular user to
+SuperAdmin, and then downloads the passwords and files stored within
+the application. The exploit code is available here
+ - https://github.com/s3bap3/pmp-exploit
+
+
+[Description of Vulnerabilities]
+
+(1) Stored XSS in /AddMail.ve.
+ This functionality is under the personal accounts stored in the
+application. However, as the page is also vulnerable to CSRF, an html
+form can be forged to create a personal account an exploit the XSS
+vulnerability. The affected parameter is "password", and the POST
+message to send is something like this
+
+ [PoC]
+ POST /AddMail.ve?SUBREQUEST=XMLHTTP HTTP/1.1
+
+ service=1&serviceurl=1&loginname=1&password=" />
+
+
+
+
+
+