Verlihub 1.0.3.9
Even more stable.Changes in 1.0.3.9
Commit log: https://github.com/verlihub/verlihub/commits/master
File information: Verlihub 1.0.3.9
Ledokol 2.9.3.46
Changes in 2.9.3.46
[ 36] Fixed: Errors on configuration conversion from string to number and vice versa, report by Alexandr[ 38] Fixed: Lua 5.3 number to string conversions in MySQL queries
[ 39] Fixed: Missing default password value when adding new PM block entry
[ 37] Added: Optional reason to country code gag
[ 40] Added: Optional filter parameter to word ranks command, request by Meka][Meka
[ 41] Added: Split help texts and send on hub help command execution
[ 42] Added: Replacer debug configuration repldebug, request by KCAHDEP
[ 43] Added: IP gag now supports single IP, range or LRE, request by KCAHDEP
[ 44] Added: Forbidden chat nick MyINFO check
[ 45] Added: Column support to Team Elite hublist user search
[ 46] Added: Default type and limit parameters to user logger command, idea by Lord_Zero
File information: Ledokol 2.9.3.46
They never learn: Symantec support page search form XSS bug
Vulnerable page: https://support.symantec.com/PoC
https://support.symantec.com/en_US/search.html?keyword="><img src=http://www.te-home.net/gallery/xssd_by_teamelite.png>
You can either include any XSS code in search input box, or request any XSS code directly using GET method and keyword parameter.
Note: This is a proof of concept and it doesn't reflect the views or interests of above websites.
AdvOR 0.3.1.3
Changes in 0.3.1.3
- when a client uses an unrecognized Socks5 login, the request will be allowed; however, a warning will be shown that contains the username and the password to allow users to find bad configuration settings (this solves the problem with replacing Tor with AdvOR in the Tor Browser Bundle)- the files Help\Firefox\readme.txt and Help\Firefox\AdvOR.ini were updated to work with the 6.5.2 version of Tor Browser
- updated language strings: 3262, 3263
File information: AdvOR 0.3.1.3
Arcabit (Subscription renewal service) vulnerable to XSS
Arcabit (Subscription renewal service) - XSSVulnerable page: https://www.arcabit.pl/pre-renew.html
PoC
"><img src=http://www.te-home.net/gallery/xssd_by_teamelite.png>
It is enough to insert any XSS code directly into serial field and your code will be executed and displayed immediately.
Note: This is a proof of concept and it doesn't reflect the views or interests of above website.