Finally, after a couple of years, ApexDC++ developers have fixed
the NMDC search exploit that I was speaking
about earlier. Everyone should update to latest version
. Now I also can say that only StrongDC++ is left of all the popular clients.
Due to new OpenSSL vulnerabilities
the library was updated to latest version 1.0.2h
Changes in 0.3.0.23
- the OpenSSL library was updated to openssl-1.0.2h
- geoip_c.h was updated with GeoIPCountryWhois.csv released on May 3'rd; there are 121733 IP ranges having 94 ranges in the fake "A1" country; 91 ranges were approximated to real countries
File information: AdvOR 0.3.0.23
Vulnerable page: http://www.technicolor.com/search/
In order to reproduce the bug, you have to replace any forward slash /
with backslash \
because forward slash is being URL encoded.
POST /search/ HTTP/1.1
You can either include any XSS code in search input box, or request any XSS code directly using POST method and search_block_form
Note: This is a proof of concept and it doesn't reflect the views or interests of above websites.
Changes in 0.3.0.22
- geoip_c.h was updated with GeoIPCountryWhois.csv released on April 5'th; there are 120651 IP ranges having 94 ranges in the fake "A1" country; 91 ranges were approximated to real countries
File information: AdvOR 0.3.0.22
Just wanted to let you know that we have added a SOCKS tool
to our online tools
collection. It displays list of daily updated SOCKS of versions 5 and 4. Feel free to bookmark this page
for your daily free list of SOCKS proxies. In order to get parsed plain text list of SOCKS you need to submit the security code on that page. Please note that any frequent sniff attempts will trigger flood detection and cause source address to get banned at firewall level.