diff --git a/files.csv b/files.csv
index 060a8770a..ea994db89 100755
--- a/files.csv
+++ b/files.csv
@@ -26932,7 +26932,7 @@ id,file,description,date,author,platform,type,port
30011,platforms/windows/remote/30011.rb,"Microsoft Tagged Image File Format (TIFF) Integer Overflow",2013-12-03,metasploit,windows,remote,0
30012,platforms/php/webapps/30012.txt,"Chamilo Lms 1.9.6 (profile.php, password0 param) - SQL Injection",2013-12-03,"High-Tech Bridge SA",php,webapps,80
30013,platforms/php/webapps/30013.txt,"Dokeos 2.2 RC2 (index.php, language param) - SQL Injection",2013-12-03,"High-Tech Bridge SA",php,webapps,80
-30014,platforms/windows/local/30014.py,"Windows NDPROXY - Local SYSTEM Privilege Escalation",2013-12-03,ryujin,windows,local,0
+30014,platforms/windows/local/30014.py,"Windows NDPROXY - Local SYSTEM Privilege Escalation (MS14-002)",2013-12-03,ryujin,windows,local,0
30015,platforms/php/webapps/30015.txt,"Advanced Guestbook 2.4.2 Lang Cookie Parameter Local File Include Vulnerability",2007-05-08,netVigilance,php,webapps,0
30016,platforms/windows/remote/30016.txt,"Adobe RoboHelp Frameset-7.HTML Cross-Site Scripting Vulnerability",2007-05-08,"Michael Domberg",windows,remote,0
30017,platforms/unix/local/30017.sh,"HP Tru64 5.0.1 DOP Command Local Privilege Escalation Vulnerability",2007-05-08,"Daniele Calore",unix,local,0
@@ -32500,3 +32500,17 @@ id,file,description,date,author,platform,type,port
36057,platforms/cgi/webapps/36057.txt,"IBM Endpoint Manager - Stored XSS Vulnerability",2015-02-11,"RedTeam Pentesting",cgi,webapps,52311
36058,platforms/php/webapps/36058.txt,"Wordpress Video Gallery 2.7.0 - SQL Injection Vulnerability",2015-02-12,"Claudio Viviani",php,webapps,0
36059,platforms/php/webapps/36059.txt,"Exponent CMS 2.3.1 - Multiple XSS Vulnerabilities",2015-02-12,"Mayuresh Dani",php,webapps,80
+36063,platforms/asp/webapps/36063.txt,"Code Widgets Online Job Application 'admin.asp' Multiple SQL Injection Vulnerabilities",2011-08-17,"L0rd CrusAd3r",asp,webapps,0
+36064,platforms/asp/webapps/36064.txt,"Code Widgets DataBound Index Style Menu 'category.asp' SQL Injection Vulnerability",2011-08-17,Inj3ct0r,asp,webapps,0
+36065,platforms/asp/webapps/36065.txt,"Code Widgets DataBound Collapsible Menu 'main.asp' SQL Injection Vulnerability",2011-08-17,Inj3ct0r,asp,webapps,0
+36066,platforms/asp/webapps/36066.txt,"Code Widgets Multiple Question - Multiple Choice Online Questionaire SQL Injection Vulnerability",2011-08-17,"L0rd CrusAd3r",asp,webapps,0
+36067,platforms/cfm/webapps/36067.txt,"Adobe ColdFusion 'probe.cfm' Cross Site Scripting Vulnerability",2011-08-18,G.R0b1n,cfm,webapps,0
+36068,platforms/php/webapps/36068.txt,"MantisBT <= 1.1.8 Cross Site Scripting and SQL Injection Vulnerabilities",2011-08-18,Net.Edit0r,php,webapps,0
+36070,platforms/php/dos/36070.txt,"PHP Prior to 5.3.7 Multiple NULL Pointer Dereference Denial Of Service Vulnerabilities",2011-08-19,"Maksymilian Arciemowicz",php,dos,0
+36071,platforms/windows/dos/36071.py,"Xlight FTP Server 3.7 Remote Buffer Overflow Vulnerability",2011-08-19,KedAns-Dz,windows,dos,0
+36072,platforms/php/webapps/36072.txt,"OneFileCMS 1.1.1 'onefilecms.php' Cross Site Scripting Vulnerability",2011-08-21,mr.pr0n,php,webapps,0
+36073,platforms/php/webapps/36073.txt,"Pandora FMS 3.x 'index.php' Cross Site Scripting Vulnerability",2011-08-22,"mehdi boukazoula",php,webapps,0
+36074,platforms/php/webapps/36074.txt,"TotalShopUK 1.7.2 'index.php' SQL Injection Vulnerability",2011-08-22,"Eyup CELIK",php,webapps,0
+36075,platforms/windows/remote/36075.py,"Freefloat FTP Server 'ALLO' Command Remote Buffer Overflow Vulnerability",2011-08-20,Black.Spook,windows,remote,0
+36076,platforms/php/webapps/36076.txt,"Concrete 5.4.1 1 'rcID' Parameter Cross Site Scripting Vulnerability",2011-08-22,"Aung Khant",php,webapps,0
+36077,platforms/php/webapps/36077.txt,"Open Classifieds 1.7.2 Multiple Cross Site Scripting Vulnerabilities",2011-08-23,"Yassin Aboukir",php,webapps,0
diff --git a/platforms/asp/webapps/36063.txt b/platforms/asp/webapps/36063.txt
new file mode 100755
index 000000000..4c0bd9fe9
--- /dev/null
+++ b/platforms/asp/webapps/36063.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/49207/info
+
+Code Widgets Online Job Application is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+The following example input is available:
+
+Username : ' or 1=1 or ''=''
+Password: ' or 1=1 or ''=''
\ No newline at end of file
diff --git a/platforms/asp/webapps/36064.txt b/platforms/asp/webapps/36064.txt
new file mode 100755
index 000000000..4fe4fc7cb
--- /dev/null
+++ b/platforms/asp/webapps/36064.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49208/info
+
+Code Widgets DataBound Index Style Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+http://www.example.com/CS0106/category.asp?cat=[sqli]
\ No newline at end of file
diff --git a/platforms/asp/webapps/36065.txt b/platforms/asp/webapps/36065.txt
new file mode 100755
index 000000000..9b1762778
--- /dev/null
+++ b/platforms/asp/webapps/36065.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49209/info
+
+Code Widgets DataBound Collapsible Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+http://www.example.com/CS0077/main.asp?key=[sqli]
\ No newline at end of file
diff --git a/platforms/asp/webapps/36066.txt b/platforms/asp/webapps/36066.txt
new file mode 100755
index 000000000..29a641371
--- /dev/null
+++ b/platforms/asp/webapps/36066.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49210/info
+
+Code Widgets Multiple Question - Multiple Choice Online Questionaire is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+http://www.example.com/CS0099/index.asp?Q=2&A=[sqli]
\ No newline at end of file
diff --git a/platforms/cfm/webapps/36067.txt b/platforms/cfm/webapps/36067.txt
new file mode 100755
index 000000000..00b6b21dc
--- /dev/null
+++ b/platforms/cfm/webapps/36067.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49220/info
+
+Adobe ColdFusion is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker could exploit this vulnerability to execute arbitrary script code in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+http://www.example.com/CFIDE/probe.cfm?name=
\ No newline at end of file
diff --git a/platforms/cgi/webapps/35900.txt b/platforms/cgi/webapps/35900.txt
new file mode 100755
index 000000000..c956599ad
--- /dev/null
+++ b/platforms/cgi/webapps/35900.txt
@@ -0,0 +1,143 @@
+Document Title:
+===============
+Barracuda Networks Cloud Series - Filter Bypass Vulnerability
+
+
+References (Source):
+====================
+http://www.vulnerability-lab.com/get_content.php?id=754
+
+Barracuda Networks Security ID (BNSEC): 731
+
+
+Release Date:
+=============
+2015-01-19
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+754
+
+
+Common Vulnerability Scoring System:
+====================================
+4.5
+
+
+Abstract Advisory Information:
+==============================
+The Vulnerability Laboratory Research Team discovered a filter bypass vulnerability in the official Barracuda Cloud Series Products.
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2015-01-19: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Affected Product(s):
+====================
+Barracuda Networks
+Product: Cloud Control Center 2014 Q2
+
+
+Exploitation Technique:
+=======================
+Remote
+
+
+Severity Level:
+===============
+Medium
+
+
+Technical Details & Description:
+================================
+A filter bypass vulnerability has been discovered in the official Barracuda Networks Cloud Series Appliance Applications 2014-Q1.
+The filter bypass issue allows an attacker to bypass the secure filter validation of the service to execute malicious script codes.
+
+The barracuda filter blocks for example standard iframes, scripts and other invalid code context: The cloud service has a own exception-handling
+to parse or encode malicious injected web context. The mechanism filters the first request and sanitizes the output in every input field.
+
+During a pentest we injected a standard iframe to check and provoke the validation. The frame got blocked! In the next step the attacker splits (%20%20%20)
+the request and injects at the end an onload frame to an external malicious source. The second iframe with the onload alert executes the script codes after
+the validation encoded only the first script code tag. The second script code tag can bypass the applicance filter mechanism and executes in the web context
+of affected modules. The secure validation does not recognize a splitted request which results in client-side and application-side script code execution in
+the cloud series products.
+
+The security risk of the filter bypass vulnerability is estimated as medium and the cvss (common vulnerability scoring system) count is 4.5 (medium).
+Exploitation of the filter bypass vulnerability requires a low privileged application user account with restricted access and low user interaction.
+Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects and persistent manipulation
+of affected or connected module context.
+
+Vulnerable Request Method(s):
+ [+] POST & GET
+
+
+Proof of Concept (PoC):
+=======================
+The filter bypass web vulnerability can be exploited by local privileged user accounts and remote attackers with low or medium user interaction.
+For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
+
+PoC:
+