Post Reply 
Mozilla browser "about:" exploit
Dec. 12, 2004, 05:16 PM
Post: #10
 
I don't think you can specifically target this vulnerabilty with Prox language only, unless you block all printing from within a document, which is what you're doing in your last filter. In the latter case there is no need to do anything with the preceding iframe.

I tried to intercept the print method with a script, inserting a confirm dialog. It actually works with the usual print call "window.print()" but i didn't get it to work with "window.frames.ID.print()". No Expression
There used to be some people around that where good in such things, like Paul Rupe and JarC/TEgghead, but now i don't know.

sidki
Add Thank You Quote this message in a reply
Post Reply 


Messages In This Thread
[] - Siamesecat - Dec. 08, 2004, 08:08 AM
[] - sidki3003 - Dec. 08, 2004, 05:17 PM
[] - Siamesecat - Dec. 09, 2004, 06:30 AM
[] - sidki3003 - Dec. 09, 2004, 12:09 PM
[] - Kye-U - Dec. 09, 2004, 08:55 PM
[] - Siamesecat - Dec. 10, 2004, 07:39 AM
[] - Siamesecat - Dec. 10, 2004, 08:13 AM
[] - sidki3003 - Dec. 10, 2004, 12:32 PM
[] - Siamesecat - Dec. 12, 2004, 07:21 AM
[] - sidki3003 - Dec. 12, 2004 05:16 PM
[] - Oddysey - Dec. 12, 2004, 05:56 PM
[] - sidki3003 - Dec. 12, 2004, 07:17 PM
[] - sidki3003 - Dec. 12, 2004, 08:21 PM
[] - Oddysey - Dec. 12, 2004, 11:09 PM
[] - sidki3003 - Dec. 13, 2004, 02:32 AM
[] - Kye-U - Dec. 15, 2004, 04:40 AM
[] - Kye-U - Dec. 25, 2004, 07:37 AM

Forum Jump: