|
Mozilla browser "about:" exploit
|
|
Dec. 12, 2004, 05:16 PM
Post: #10
|
|||
|
|||
|
I don't think you can specifically target this vulnerabilty with Prox language only, unless you block all printing from within a document, which is what you're doing in your last filter. In the latter case there is no need to do anything with the preceding iframe.
I tried to intercept the print method with a script, inserting a confirm dialog. It actually works with the usual print call "window.print()" but i didn't get it to work with "window.frames.ID.print()". ![]() There used to be some people around that where good in such things, like Paul Rupe and JarC/TEgghead, but now i don't know. sidki |
|||
|
« Next Oldest | Next Newest »
|
| Messages In This Thread |
|
[] - Siamesecat - Dec. 08, 2004, 08:08 AM
[] - Siamesecat - Dec. 09, 2004, 06:30 AM
[] - Siamesecat - Dec. 10, 2004, 07:39 AM
[] - Siamesecat - Dec. 10, 2004, 08:13 AM
[] - Siamesecat - Dec. 12, 2004, 07:21 AM
[] - sidki3003 - Dec. 12, 2004 05:16 PM
|

Search
Member List
Calendar
Help






![[-]](images/ONi/collapse.gif)