mstoltz%netscape.com b51a5f7784 bug 77485 - exploit inserting a function into another window using targeted
javascript URL links. Two-part fix: moving the call to GetCurrentDocumentOwner
in nsDocShell::LoadInternal to before the target docshell is called, and
changing nsScriptSecurityManager::GetFunctionObjectPrincipal to only get
the principal from the function object's scope chain if the function object's
principal is the system principal. r=jst, sr=vidur, a=asa.


git-svn-id: svn://10.0.0.236/trunk@96045 18797224-902f-48f8-a5cc-f745e15eee43
2001-05-30 02:22:22 +00:00
2001-05-01 22:43:38 +00:00
Description
No description provided
982 MiB
Languages
C++ 31%
C 21.9%
HTML 13.3%
JavaScript 12.9%
Java 5.1%
Other 15.5%