diff --git a/files.csv b/files.csv
index e38bb4f6f..bc149b01f 100755
--- a/files.csv
+++ b/files.csv
@@ -28486,7 +28486,9 @@ id,file,description,date,author,platform,type,port
31691,platforms/hardware/webapps/31691.txt,"Office Assistant Pro 2.2.2 iOS - File Include Vulnerability",2014-02-16,Vulnerability-Lab,hardware,webapps,8080
31692,platforms/hardware/webapps/31692.txt,"mbDriveHD 1.0.7 iOS - Multiple Vulnerabilities",2014-02-16,Vulnerability-Lab,hardware,webapps,8080
31693,platforms/hardware/webapps/31693.txt,"File Hub 1.9.1 iOS - Multiple Vulnerabilities",2014-02-16,Vulnerability-Lab,hardware,webapps,8080
+31694,platforms/windows/remote/31694.py,"Eudora Qualcomm WorldMail 9.0.333.0 IMAPd Service UID - Buffer Overflow",2014-02-16,"Muhammad EL Harmeel",windows,remote,0
31695,platforms/php/remote/31695.rb,"Dexter (CasinoLoader) SQL Injection",2014-02-16,metasploit,php,remote,0
+31696,platforms/windows/dos/31696.txt,"Computer Associates eTrust Secure Content Manager 8.0 - 'eCSqdmn' Remote Denial of Service Vulnerability",2008-04-22,"Luigi Auriemma",windows,dos,0
31697,platforms/php/webapps/31697.txt,"Horde Webmail 1.0.6 'addevent.php' Cross-Site Scripting Vulnerability",2008-04-23,"Aria-Security Team",php,webapps,0
31698,platforms/hardware/remote/31698.txt,"F5 Networks FirePass 4100 SSL VPN 'installControl.php3' Cross-Site Scripting Vulnerability",2008-04-23,"Alberto Cuesta Partida",hardware,remote,0
31699,platforms/windows/remote/31699.txt,"RSA Authentication Agent for Web 5.3 URI Redirection Vulnerability",2008-04-23,"Richard Brain",windows,remote,0
@@ -28497,8 +28499,10 @@ id,file,description,date,author,platform,type,port
31704,platforms/php/webapps/31704.txt,"PHCDownload 1.1 admin/index.php hash Parameter SQL Injection",2008-04-24,ZoRLu,php,webapps,0
31705,platforms/php/webapps/31705.txt,"PHCDownload 1.1 upload/install/index.php step Parameter XSS",2008-04-24,ZoRLu,php,webapps,0
31706,platforms/unix/remote/31706.txt,"IBM Lotus Expeditor 6.1 URI Handler Command Execution Vulnerability",2008-04-24,"Thomas Pollet",unix,remote,0
+31707,platforms/windows/dos/31707.txt,"Computer Associates ARCserve Backup Discovery Service Remote - Denial Of Service Vulnerability",2008-04-24,"Luigi Auriemma",windows,dos,0
31708,platforms/php/webapps/31708.txt,"Joomla Visites 1.1 Component mosConfig_absolute_path Remote File Include Vulnerability",2008-04-26,NoGe,php,webapps,0
31709,platforms/php/webapps/31709.txt,"Siteman 2.0.x2 'module' Parameter Cross-Site Scripting and Local File Include Vulnerability",2008-04-26,IRCRASH,php,webapps,0
+31710,platforms/novell/dos/31710.txt,"Novell GroupWise 7.0 - HTML Injection and Denial of Service Vulnerabilities",2008-04-26,"Juan Pablo Lopez Yacubian",novell,dos,0
31711,platforms/windows/dos/31711.html,"Microsoft Excel 2007 JavaScript Code Remote Denial Of Service Vulnerability",2008-04-26,"Juan Pablo Lopez Yacubian",windows,dos,0
31712,platforms/php/webapps/31712.txt,"miniBB 2.2 'bb_admin.php' Cross-Site Scripting Vulnerability",2008-04-28,IRCRASH,php,webapps,0
31713,platforms/linux/dos/31713.py,"PeerCast 0.1218 'getAuthUserPass' Multiple Buffer Overflow Vulnerabilities",2008-04-29,"Nico Golde",linux,dos,0
@@ -28516,7 +28520,28 @@ id,file,description,date,author,platform,type,port
31725,platforms/php/webapps/31725.txt,"Zen Cart 2008 index.php keyword Parameter SQL Injection",2008-05-02,"Ivan Sanchez",php,webapps,0
31726,platforms/php/webapps/31726.txt,"Zen Cart 2008 index.php keyword Parameter XSS",2008-05-02,"Ivan Sanchez",php,webapps,0
31727,platforms/php/webapps/31727.txt,"ChiCoMaS 2.0.4 'index.php' Cross Site Scripting Vulnerability",2008-05-02,"Hadi Kiamarsi",php,webapps,0
+31728,platforms/multiple/dos/31728.txt,"Call of Duty 4 1.5 - Malformed 'stats' command Denial of Service Vulnerability",2008-05-02,"Luigi Auriemma",multiple,dos,0
31729,platforms/php/webapps/31729.pl,"SiteXS CMS 0.0.1 'upload.php' Arbitrary File Upload Vulnerability",2008-05-03,"Hadi Kiamarsi",php,webapps,0
31730,platforms/php/webapps/31730.txt,"GEDCOM_TO_MYSQL php/prenom.php Multiple Parameter XSS",2008-05-05,ZoRLu,php,webapps,0
31731,platforms/php/webapps/31731.txt,"GEDCOM_TO_MYSQL php/index.php nom_branche Parameter XSS",2008-05-05,ZoRLu,php,webapps,0
31732,platforms/php/webapps/31732.txt,"GEDCOM_TO_MYSQL php/info.php Multiple Parameter XSS",2008-05-05,ZoRLu,php,webapps,0
+31733,platforms/hardware/webapps/31733.txt,"My PDF Creator & DE DM 1.4 iOS - Multiple Vulnerabilities",2014-02-18,Vulnerability-Lab,hardware,webapps,50496
+31735,platforms/php/webapps/31735.txt,"Concrete5 5.6.2.1 (index.php, cID param) - SQL Injection",2014-02-18,killall-9,php,webapps,80
+31737,platforms/windows/remote/31737.rb,"Oracle Forms and Reports Remote Code Execution",2014-02-18,metasploit,windows,remote,0
+31738,platforms/php/webapps/31738.txt,"Open Web Analytics 1.5.4 (owa_email_address param) - SQL Injection Vulnerability",2014-02-18,"Dana James Traversie",php,webapps,0
+31739,platforms/php/webapps/31739.txt,"TLM CMS 1.1 'index.php' Multiple SQL Injection Vulnerabilities",2008-05-05,ZoRLu,php,webapps,0
+31740,platforms/php/webapps/31740.html,"LifeType 1.2.8 'admin.php' Cross Site Scripting Vulnerability",2008-05-05,"Khashayar Fereidani",php,webapps,0
+31741,platforms/php/webapps/31741.txt,"Maian Uploader 4.0 index.php keywords Parameter XSS",2008-05-05,"Khashayar Fereidani",php,webapps,0
+31742,platforms/php/webapps/31742.txt,"Maian Uploader 4.0 admin/index.php keywords Parameter XSS",2008-05-05,"Khashayar Fereidani",php,webapps,0
+31743,platforms/php/webapps/31743.txt,"Maian Uploader 4.0 admin/inc/header.php Multiple Parameter XSS",2008-05-05,"Khashayar Fereidani",php,webapps,0
+31744,platforms/php/webapps/31744.txt,"osCommerce 2.1/2.2 Multiple Cross-Site Scripting Vulnerabilities",2008-05-05,"David Sopas Ferreira",php,webapps,0
+31745,platforms/php/webapps/31745.txt,"BatmanPorTaL uyeadmin.asp id Parameter SQL Injection",2008-05-05,U238,php,webapps,0
+31746,platforms/php/webapps/31746.txt,"BatmanPorTaL profil.asp id Parameter SQL Injection",2008-05-05,U238,php,webapps,0
+31747,platforms/php/webapps/31747.pl,"iGaming CMS 1.5 'poll_vote.php' SQL Injection Vulnerability",2008-05-05,Cod3rZ,php,webapps,0
+31748,platforms/windows/dos/31748.txt,"Yahoo! Assistant 3.6 'yNotifier.dll' ActiveX Control Memory Corruption Vulnerability",2008-05-06,Sowhat,windows,dos,0
+31750,platforms/php/webapps/31750.txt,"QTO File Manager 1.0 'qtofm.php' Arbitrary File Upload Vulnerability",2008-05-06,"CrAzY CrAcKeR",php,webapps,0
+31751,platforms/php/webapps/31751.txt,"Sphider 1.3.4 'query' Parameter Cross-Site Scripting Vulnerability",2008-05-06,"Christian Holler",php,webapps,0
+31752,platforms/php/webapps/31752.txt,"Forum Rank System 6 'settings['locale']' Parameter Multiple Local File Include Vulnerabilities",2008-05-07,Matrix86,php,webapps,0
+31753,platforms/php/webapps/31753.txt,"Tux CMS 0.1 Multiple Cross-Site Scripting Vulnerabilities",2008-05-07,"Hadi Kiamarsi",php,webapps,0
+31754,platforms/cgi/webapps/31754.txt,"SAP Internet Transaction Server 6200.1017.50954.0 Bu WGate wgate.dll ~service Parameter XSS",2008-05-08,Portcullis,cgi,webapps,0
+31755,platforms/cgi/webapps/31755.txt,"SAP Internet Transaction Server 6200.1017.50954.0 Bu query String Javascript Splicing XSS",2008-05-08,Portcullis,cgi,webapps,0
diff --git a/platforms/cgi/webapps/31754.txt b/platforms/cgi/webapps/31754.txt
new file mode 100755
index 000000000..6d5e2388a
--- /dev/null
+++ b/platforms/cgi/webapps/31754.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/29103/info
+
+SAP Internet Transaction Server is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
+
+These issues affect ITS 6200.1017.50954.0, Build 730827 (win32/IIS 5.0).
+
+
+http://www.example.com/scripts/wgate.dll?~service=--> submit module of the mobile web-application interface.
+Remote attackers can manipulate the `upload > submit` POST method request with the vulnerable `filename`
+value to compromise the application or connected device components. The issue allows remote attackers to
+include local app path values or wifi web-server files. The exploitation appears on the application-side
+and the inject request method is POST. The exection occurs in the main index file dir list or in the
+selected sub category folder/path. The security risk of the local file include web vulnerability is
+estimated as high(+) with a cvss (common vulnerability scoring system) count of 7.3(+)|(-)7.4.
+
+Exploitation of the vulnerability requires no user interaction or privileged mobile application user account.
+Successful exploitation of the file include web vulnerability results in mobile application compromise,
+connected device compromise or web-server compromise.
+
+Request Method(s):
+ [+] POST
+
+Vulnerable Module(s):
+ [+] Upload File
+
+Vulnerable Procedure(s):
+ [+] Submit
+
+Vulnerable Parameter(s):
+ [+] filename
+
+Affected Module(s):
+ [+] File Dir Index Listing (http://localhost:50496)
+ [+] Sub Category (Path) Listing (http://localhost:50496/.xpath)
+
+
+1.2
+An arbitrary file upload web vulnerability has been discovered in the official My PDF Creator & Document Editor
+(Document Manager) v1.4 iOS mobile web-application. The arbitrary file upload issue allows remote attackers to
+upload files with multiple extensions to bypass the web-server or system validation. As result the attacker is
+mostly able to execute the uploaded malicious file.
+
+The vulnerability is located in the upload file module with the submit procedure. Remote attackers are able to upload
+a php or js web-shells by a rename of the file with multiple extensions to bypass the file restriction mechanism.
+The attacker uploads for example a web-shell with the following name and extension `image.jpg.gif.js.php.jpg`. After the
+upload the attacker needs to open the file in the web application. He deletes the .jpg & . gif file extension and can
+access the application with elevated access rights. The security risk of the arbitrary file upload web vulnerability
+is estimated as high with a cvss (common vulnerability scoring system) count of 6.7(-).
+
+Exploitation of the arbitrary file upload web vulnerability requires no user interaction or privileged mobile application
+user account with password. Successful exploitation of the vulnerability results in unauthorized file access because of a
+compromise after the upload of web-shells.
+
+Request Method(s):
+ [+] [POST]
+
+Vulnerable Module(s):
+ [+] Upload File
+
+Vulnerable Parameter(s):
+ [+] filename (multiple extensions)
+
+Affected Module(s):
+ [+] File Dir Index Listing (http://localhost:50496)
+ [+] Sub Category (Path) Listing (http://localhost:50496/.xpath)
+
+
+Proof of Concept (PoC):
+=======================
+1.1
+The arbitrary file upload web vulnerability can be exploited by remote attackers without user interaction or privileged mobile
+application user account. For security demonstration or to reproduce the vulnerability follow the information and steps below.
+
+PoC: File Dir Index Listing - filename
+
+