diff --git a/files.csv b/files.csv
index d41f01845..3c0e7842e 100755
--- a/files.csv
+++ b/files.csv
@@ -4164,6 +4164,7 @@ id,file,description,date,author,platform,type,port
4519,platforms/php/webapps/4519.txt,"Pindorama 0.1 client.php Remote File Inclusion Vulnerability",2007-10-11,S.W.A.T.,php,webapps,0
4520,platforms/php/webapps/4520.txt,"PicoFlat CMS <= 0.4.14 index.php Remote File Inclusion Vulnerability",2007-10-11,0in,php,webapps,0
4521,platforms/php/webapps/4521.txt,"Joomla Flash uploader 2.5.1 - Remote File Inclusion Vulnerabilities",2007-10-11,mdx,php,webapps,0
+4522,platforms/hardware/remote/4522.html,"Apple iTouch/iPhone 1.1.1 - '.tif' File Remote Jailbreak Exploit",2007-10-11,"Niacin and Dre",hardware,remote,0
4523,platforms/php/webapps/4523.pl,"KwsPHP 1.0 Newsletter Module Remote SQL Injection Exploit",2007-10-11,s4mi,php,webapps,0
4524,platforms/php/webapps/4524.txt,"joomla component com_colorlab 1.0 - Remote File Inclusion Vulnerability",2007-10-12,"Mehmet Ince",php,webapps,0
4525,platforms/php/webapps/4525.pl,"TikiWiki <= 1.9.8 tiki-graph_formula.php Command Execution Exploit",2007-10-12,str0ke,php,webapps,0
@@ -33207,7 +33208,7 @@ id,file,description,date,author,platform,type,port
36800,platforms/php/webapps/36800.txt,"Wordpress NEX-Forms < 3.0 - SQL Injection Vulnerability",2015-04-21,"Claudio Viviani",php,webapps,0
36801,platforms/php/webapps/36801.txt,"WordPress MiwoFTP Plugin <= 1.0.5 - Arbitrary File Download",2015-04-21,"dadou dz",php,webapps,0
36802,platforms/php/webapps/36802.txt,"WordPress Tune Library Plugin 1.5.4 - SQL Injection Vulnerability",2015-04-21,"Hannes Trunde",php,webapps,0
-36803,platforms/windows/remote/36803.py,"ProFTPd 1.3.5 (mod_copy) - Remote Command Execution",2015-04-21,R-73eN,windows,remote,0
+36803,platforms/linux/remote/36803.py,"ProFTPd 1.3.5 (mod_copy) - Remote Command Execution",2015-04-21,R-73eN,linux,remote,0
36804,platforms/php/webapps/36804.pl,"MediaSuite CMS - Artibary File Disclosure Exploit",2015-04-21,"KnocKout inj3ct0r",php,webapps,0
36805,platforms/php/webapps/36805.txt,"WordPress Community Events Plugin 1.3.5 - SQL Injection Vulnerability",2015-04-21,"Hannes Trunde",php,webapps,0
36808,platforms/windows/remote/36808.rb,"Adobe Flash Player copyPixelsToByteArray Integer Overflow",2015-04-21,metasploit,windows,remote,0
@@ -33293,12 +33294,20 @@ id,file,description,date,author,platform,type,port
36898,platforms/php/webapps/36898.txt,"Etano 1.20/1.22 search.php Multiple Parameter XSS",2012-03-05,"Aung Khant",php,webapps,0
36899,platforms/php/webapps/36899.txt,"Etano 1.20/1.22 photo_search.php Multiple Parameter XSS",2012-03-05,"Aung Khant",php,webapps,0
36900,platforms/php/webapps/36900.txt,"Etano 1.20/1.22 photo_view.php return Parameter XSS",2012-03-05,"Aung Khant",php,webapps,0
+36914,platforms/php/webapps/36914.txt,"Fork CMS 3.2.x Multiple Cross Site Scripting and HTML Injection Vulnerabilities",2012-03-06,"Gjoko Krstic",php,webapps,0
+36915,platforms/windows/remote/36915.txt,"NetDecision 4.6.1 Multiple Directory Traversal Vulnerabilities",2012-03-07,"Luigi Auriemma",windows,remote,0
+36916,platforms/php/webapps/36916.txt,"Exponent CMS 2.0 'src' Parameter SQL Injection Vulnerability",2012-03-07,"Rob Miller",php,webapps,0
+36917,platforms/php/webapps/36917.txt,"OSClass 2.3.x Directory Traversal and Arbitrary File Upload Vulnerabilities",2012-03-07,"Filippo Cavallarin",php,webapps,0
36909,platforms/windows/local/36909.rb,"RM Downloader 2.7.5.400 - Local Buffer Overflow (MSF)",2015-05-04,"TUNISIAN CYBER",windows,local,0
36910,platforms/php/webapps/36910.txt,"Open Realty 2.5.x 'select_users_template' Parameter Local File Include Vulnerability",2012-03-05,"Aung Khant",php,webapps,0
36911,platforms/php/webapps/36911.txt,"11in1 CMS 1.2.1 admin/comments topicID Parameter SQL Injection",2012-03-05,"Chokri B.A",php,webapps,0
36912,platforms/php/webapps/36912.txt,"11in1 CMS 1.2.1 admin/tps id Parameter SQL Injection",2012-03-05,"Chokri B.A",php,webapps,0
+36913,platforms/php/webapps/36913.pl,"Joomla! 'redirect.php' SQL Injection Vulnerability",2012-03-05,"Colin Wong",php,webapps,0
36903,platforms/ios/dos/36903.txt,"Grindr 2.1.1 iOS - Denial of Service",2015-05-04,Vulnerability-Lab,ios,dos,0
36904,platforms/ios/webapps/36904.txt,"PhotoWebsite 3.1 iOS - File Include Web Vulnerability",2015-05-04,Vulnerability-Lab,ios,webapps,0
+36920,platforms/windows/local/36920.py,"Mediacoder 0.8.34.5716 - Buffer Overflow SEH Exploit (.m3u)",2015-05-06,evil_comrade,windows,local,0
+36921,platforms/lin_x86/shellcode/36921.c,"Linux x86 - /bin/nc -le /bin/sh -vp 17771 Shellcode (58 Bytes)",2015-05-06,"Oleg Boytsev",lin_x86,shellcode,0
+36922,platforms/ios/webapps/36922.txt,"vPhoto-Album 4.2 iOS - File Include Web Vulnerability",2015-05-06,Vulnerability-Lab,ios,webapps,0
36906,platforms/linux/dos/36906.txt,"Apache Xerces-C XML Parser < 3.1.2 - DoS POC",2015-05-04,beford,linux,dos,0
36907,platforms/php/webapps/36907.txt,"Wordpress Ultimate Product Catalogue 3.1.2 - Multiple Persistent XSS & CSRF & File Upload",2015-05-04,"Felipe Molina",php,webapps,0
36908,platforms/lin_x86/shellcode/36908.c,"linux/x86 - exit(0) (6 bytes)",2015-05-04,"Febriyanto Nugroho",lin_x86,shellcode,0
diff --git a/platforms/hardware/remote/4522.html b/platforms/hardware/remote/4522.html
index cc5531449..d852690ef 100755
--- a/platforms/hardware/remote/4522.html
+++ b/platforms/hardware/remote/4522.html
@@ -1,31 +1,31 @@
-
-
-
-
-
-
-# milw0rm.com [2007-10-11]
+
+
+
+
+
+
+# milw0rm.com [2007-10-11]
diff --git a/platforms/ios/dos/36903.txt b/platforms/ios/dos/36903.txt
new file mode 100755
index 000000000..ced6b8bd4
--- /dev/null
+++ b/platforms/ios/dos/36903.txt
@@ -0,0 +1,162 @@
+Document Title:
+===============
+Grindr 2.1.1 iOS Bug Bounty #2 - Denial of Service Software Vulnerability
+
+
+References (Source):
+====================
+http://www.vulnerability-lab.com/get_content.php?id=1418
+
+
+Release Date:
+=============
+2015-05-02
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+1418
+
+
+Common Vulnerability Scoring System:
+====================================
+3.3
+
+
+Product & Service Introduction:
+===============================
+Grindr, which first launched in 2009, has exploded into the largest and most popular all-male location-based social network out there.
+With more than 5 million guys in 192 countries around the world -- and approximately 10,000 more new users downloading the app
+every day -- you’ll always find a new date, buddy, or friend on Grindr. Grindr is a simple app that uses your mobile device’s
+location-based services to show you the guys closest to you who are also on Grindr. How much of your info they see is
+entirely your call.
+
+(Copy of the Vendor Homepage: http://grindr.com/learn-more )
+
+
+Abstract Advisory Information:
+==============================
+The Vulnerability Laboratory Research Team discovered a local and remote denial of servie vulnerability in the official Grindr v2.1.1 iOS mobile web-application.
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2015-01-22: Researcher Notification & Coordination (Benjamin Kunz Mejri - Evolution Security)
+2015-01-22: Vendor Notification (Grinder - Bug Bounty Program)
+2015-02-02: Vendor Response/Feedback (Grinder - Bug Bounty Program)
+2015-04-01: Vendor Fix/Patch (Grindr Developer Team - Reward: x & Manager: x)
+2015-05-04: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Affected Product(s):
+====================
+Grindr LLC
+Product: Grinder - iOS Mobile Web Application (API) 2.2.1
+
+
+Exploitation Technique:
+=======================
+Remote
+
+
+Severity Level:
+===============
+Medium
+
+
+Technical Details & Description:
+================================
+A local and remote Denial of Service vulnerability has been discovered in the official Grindr v2.1.1 iOS mobile web-application.
+
+The attacker injects a script code tag or multiple termination strings (%00%20%00%20%00) to the Display Name input field of the Edit Profile module.
+After the inject the service stored the malicious values as DisplayName. After the inject a random user is processing to click in the profile the
+contact information (facebook/twitter). After that the victim wants to copy the link and an internal service corruption occurs thats crashs the mobile app.
+The issue is local and remote exploitable.
+
+Vulnerable Module(s):
+[+] Edit Profile
+
+Vulnerable Parameter(s): (Input)
+[+] Display Name
+
+Affected Module(s):
+[+] Contact > Social Network > Copy Link
+
+
+
+Proof of Concept (PoC):
+=======================
+The denial of service web vulnerability can be exploited by remote attacker and local user accounts with low user interaction (click).
+To demonstrate the vulnerability or to reproduce the issue follow the provided information and steps below to continue.
+
+Manual steps to reproduce ...
+1. Open the grindr mobile application
+2. Inject a script code tag as Display Name or use the terminated String with empty values
+3. Save and click in the profile the contact button (exp. facebook)
+4. Click to the send button ahead and push the Copy Link function
+5. The app service is getting terminated with an uncaught exception because of an internal parsing error
+
+Note:To exploit the issue remotly the profile needs to be shared with another user and then the user only needs to push the same way the social contact button.
+
+PoC Video:
+
+
+Solution - Fix & Patch:
+=======================
+First step is to prevent the issue by a secure restriction of the input. Attach a own excpetion-handling to prevent next to the insert itself.
+The social network accounts that are linked do not allow special chars in the username. The grindr ios app and the android app allows to register
+an account and to insert own scripts or null strings that corrupts the process of copy the link by an error. After the restriction has been
+set in the code of both (api) the issue can not anymore execute to shutdown anothers users account. Even if this issue execution is prevented that
+was only a solution to prevent.
+
+To fix the bug ...
+Connect for example ios device with the running app to windows. Sync the process and reproduce the remote error and local error. Move to the iOS error
+folder that has been synced. Get the error attach another debugger and so on ...
+
+
+Security Risk:
+==============
+The secuirty risk of the local and remote denial of service vulnerability in the copy link function that corrupts is estimated as medium.
+
+
+Credits & Authors:
+==================
+Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [www.vulnerability-lab.com]
+
+
+Disclaimer & Information:
+=========================
+The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed
+or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable
+in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab
+or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for
+consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses,
+policies, deface websites, hack into databases or trade with fraud/stolen material.
+
+Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com
+Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com
+Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact
+Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
+Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
+Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/
+
+Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to
+electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
+Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website
+is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact
+(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
+
+ Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
+
+--
+VULNERABILITY LABORATORY - RESEARCH TEAM
+SERVICE: www.vulnerability-lab.com
+CONTACT: research@vulnerability-lab.com
+PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt
+
+
diff --git a/platforms/ios/webapps/36922.txt b/platforms/ios/webapps/36922.txt
new file mode 100755
index 000000000..ba21d6a21
--- /dev/null
+++ b/platforms/ios/webapps/36922.txt
@@ -0,0 +1,263 @@
+Document Title:
+===============
+vPhoto-Album v4.2 iOS - File Include Web Vulnerability
+
+
+References (Source):
+====================
+http://www.vulnerability-lab.com/get_content.php?id=1477
+
+
+Release Date:
+=============
+2015-05-05
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+1477
+
+
+Common Vulnerability Scoring System:
+====================================
+6.2
+
+
+Product & Service Introduction:
+===============================
+vPhoto Pro is your side of the most powerful local album management software that allows you to easily manage your massive photos,
+while giving you an unprecedented user experience. No in-app purchase, no functional limitations.
+
+(Copy of the Homepage: https://itunes.apple.com/us/app/veryphoto-album-password-wifi/id720810114 )
+
+
+Abstract Advisory Information:
+==============================
+The Vulnerability Laboratory Research team discovered a local file include web vulnerability in the official vPhoto-Album v4.2 iOS mobile web-application.
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2015-05-05: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Affected Product(s):
+====================
+Cheng Chen
+Product: vPhoto-Album - iOS Web Application (Wifi) 4.1
+
+
+Exploitation Technique:
+=======================
+Remote
+
+
+Severity Level:
+===============
+High
+
+
+Technical Details & Description:
+================================
+A local file include web vulnerability has been discovered in the official vPhoto-Album v4.2 iOS mobile web-application.
+The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system
+specific path commands to compromise the mobile web-application.
+
+The vulnerability is located in the `name` value of the wifi interface module. Local attackers are able to manipulate the
+wifi web interface by usage of the vulnerable sync function. The sync does not encode or parse the context of the albumname.
+
+Local attacker are able to manipulate the input of the folder path value to exploit the issue by web-application sync.
+The execution of unauthorized local file or path request occurs in the index file dir listing module of the wifi web-application.
+The request method to inject is a sync and the attack vector is located on the application-side of the affected service.
+
+The security risk of the local file include web vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 7.1.
+Exploitation of the file include web vulnerability requires no user interaction or privileged web-application user account. Successful exploitation
+of the local file include web vulnerability results in mobile application or connected device component compromise.
+
+Vulnerable Method(s):
+ [+] [Sync]
+
+Vulnerable Module(s):
+ [+] Albumname
+
+Vulnerable Parameter(s):
+ [+] name
+
+Affected Module(s):
+ [+] File Dir Index
+
+
+Proof of Concept (PoC):
+=======================
+The local file include web vulnerability can be exploited by local attackers with restricted physical device access and no user interaction.
+For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
+
+
+PoC: http://localhost:8080/
+
+
+
| | 
| | | | |
">(2) | | Camera Roll(2) | | | | |
|
+
+
+