superreview granted: [Bug 220215] use the xpcnativewrapper for the current callers of components.lookupmethod : [Attachment 135169] Actually it's document.location that's safe, window is totally uns

Boris Zbarsky (real world intrudes) <bz-vacation@mit.edu> has granted
neil@parkwaycc.co.uk <neil.parkwaycc.co.uk@myrealbox.com>'s request for
superreview:

Bug 220215: use the xpcnativewrapper for the current callers of
components.lookupmethod
http://bugzilla.mozilla.org/show_bug.cgi?id=220215

Attachment 135169: Actually it's document.location that's safe, window is totally unsafe
http://bugzilla.mozilla.org/attachment.cgi?id=135169&action=edit

------- Additional Comments from Boris Zbarsky (real world intrudes)
<bz-vacation@mit.edu>
sr=bzbarsky
0
bugzilla
11/17/2003 10:07:43 PM
netscape.mozilla.reviewers 29156 articles. 0 followers. Follow

0 Replies
639 Views

Similar Articles

[PageSpeed] 56

Reply:

Similar Artilces:

superreview requested: [Bug 220215] use the xpcnativewrapper for the current callers of components.lookupmethod : [Attachment 135169] Actually it's document.location that's safe, window is totally u
neil@parkwaycc.co.uk <neil.parkwaycc.co.uk@myrealbox.com> has asked Boris Zbarsky (real world intrudes) <bz-vacation@mit.edu> for superreview: Bug 220215: use the xpcnativewrapper for the current callers of components.lookupmethod http://bugzilla.mozilla.org/show_bug.cgi?id=220215 Attachment 135169: Actually it's document.location that's safe, window is totally unsafe http://bugzilla.mozilla.org/attachment.cgi?id=135169&action=edit ------- Additional Comments from neil@parkwaycc.co.uk <neil.parkwaycc.co.uk@myrealbox.com> Re-requesting reviews as the...

superreview granted: [Bug 280713] ContinueInterruptedParsing doesn't set the current context's scanner's mIncremental member correctly : [Attachment 173997] updated to review comments
Boris Zbarsky <bzbarsky@mit.edu> has granted Blake Kaplan <mrbkap@gmail.com>'s request for superreview: Bug 280713: ContinueInterruptedParsing doesn't set the current context's scanner's mIncremental member correctly https://bugzilla.mozilla.org/show_bug.cgi?id=280713 Attachment 173997: updated to review comments https://bugzilla.mozilla.org/attachment.cgi?id=173997&action=edit ------- Additional Comments from Boris Zbarsky <bzbarsky@mit.edu> sr=bzbarsky. Land this either _really_ early in 1.8b2 or in 1.9a.... ...

superreview granted: [Bug 292464] event listeners added using addEventListener() listen only trusted events : [Attachment 182542] v2: Use the document's principals to check whether it's chrome or not
Peter Van der Beken <peterv@propagandism.org> has granted Johnny Stenback <jst@mozilla.org>'s request for superreview: Bug 292464: event listeners added using addEventListener() listen only trusted events https://bugzilla.mozilla.org/show_bug.cgi?id=292464 Attachment 182542: v2: Use the document's principals to check whether it's chrome or not. https://bugzilla.mozilla.org/attachment.cgi?id=182542&action=edit ...

superreview granted: [Bug 287943] Rebrand bootstrap's Windows bits including nsNativeAppSupportWin.cpp : [Attachment 180579] patch v4: address biesi's review nits
neil@parkwaycc.co.uk <neil.parkwaycc.co.uk@myrealbox.com> has granted Robert Kaiser <kairo@kairo.at>'s request for superreview: Bug 287943: Rebrand bootstrap's Windows bits including nsNativeAppSupportWin.cpp https://bugzilla.mozilla.org/show_bug.cgi?id=287943 Attachment 180579: patch v4: address biesi's review nits https://bugzilla.mozilla.org/attachment.cgi?id=180579&action=edit ...

superreview granted: [Bug 305528] Cannot setTimeout window.focus or window.alert : [Attachment 193751] Make xpconnect attempt to use obj's outer if it can't find a wrapper using the given obj
Brendan Eich <brendan@mozilla.org> has granted Johnny Stenback <jst@mozilla.org>'s request for superreview: Bug 305528: Cannot setTimeout window.focus or window.alert https://bugzilla.mozilla.org/show_bug.cgi?id=305528 Attachment 193751: Make xpconnect attempt to use obj's outer if it can't find a wrapper using the given obj https://bugzilla.mozilla.org/attachment.cgi?id=193751&action=edit ------- Additional Comments from Brendan Eich <brendan@mozilla.org> Pre-emptive a=me as well as sr=me. This is it. /be ...

superreview granted: [Bug 238733] Components.classes['@mozilla.org/wallet/wallet-service;1'] has no properties in contentAreaClick.js : [Attachment 144811] don't call the function if it's going to fa
Boris Zbarsky <bzbarsky@mit.edu> has granted timeless@myrealbox.com (working) <timeless@bemail.org>'s request for superreview: Bug 238733: Components.classes['@mozilla.org/wallet/wallet-service;1'] has no properties in contentAreaClick.js https://bugzilla.mozilla.org/show_bug.cgi?id=238733 Attachment 144811: don't call the function if it's going to fail https://bugzilla.mozilla.org/attachment.cgi?id=144811&action=edit ...

superreview granted: [Bug 307632] Can't extend Selection Class anymore with Firefox 1.5b1 : [Attachment 195818] Use the current inner scope when wrapping natives in an outer window's scope.
Brendan Eich <brendan@mozilla.org> has granted Johnny Stenback <jst@mozilla.org>'s request for superreview: Bug 307632: Can't extend Selection Class anymore with Firefox 1.5b1 https://bugzilla.mozilla.org/show_bug.cgi?id=307632 Attachment 195818: Use the current inner scope when wrapping natives in an outer window's scope. https://bugzilla.mozilla.org/attachment.cgi?id=195818&action=edit ------- Additional Comments from Brendan Eich <brendan@mozilla.org> sr=me ahead of mrbkap, he better not embarrass me ;-). /be ...

superreview granted: [Bug 292355] Plugins send document's base URI as referrer, instead of document's URI : [Attachment 182225] patch
Boris Zbarsky <bzbarsky@mit.edu> has granted Christian Biesinger (:bi) <cbiesinger@gmx.at>'s request for superreview: Bug 292355: Plugins send document's base URI as referrer, instead of document's URI https://bugzilla.mozilla.org/show_bug.cgi?id=292355 Attachment 182225: patch https://bugzilla.mozilla.org/attachment.cgi?id=182225&action=edit ...

superreview granted: [Bug 280713] ContinueInterruptedParsing doesn't set the current context's scanner's mIncremental member correctly : [Attachment 173127] patch v1
Boris Zbarsky <bzbarsky@mit.edu> has granted Blake Kaplan <mrbkap@gmail.com>'s request for superreview: Bug 280713: ContinueInterruptedParsing doesn't set the current context's scanner's mIncremental member correctly https://bugzilla.mozilla.org/show_bug.cgi?id=280713 Attachment 173127: patch v1 https://bugzilla.mozilla.org/attachment.cgi?id=173127&action=edit ------- Additional Comments from Boris Zbarsky <bzbarsky@mit.edu> sr=bzbarsky, but it sounds like some cleanup of incremental vs final chunk is in order.... ...

superreview requested: [Bug 280713] ContinueInterruptedParsing doesn't set the current context's scanner's mIncremental member correctly : [Attachment 173997] updated to review comments
Blake Kaplan <mrbkap@gmail.com> has asked Boris Zbarsky <bzbarsky@mit.edu> for superreview: Bug 280713: ContinueInterruptedParsing doesn't set the current context's scanner's mIncremental member correctly https://bugzilla.mozilla.org/show_bug.cgi?id=280713 Attachment 173997: updated to review comments https://bugzilla.mozilla.org/attachment.cgi?id=173997&action=edit ...

superreview cancelled: [Bug 292464] event listeners added using addEventListener() listen only trusted events : [Attachment 182447] Use the document's principals to check whether it's chrome or not.
Johnny Stenback <jst@mozilla.org> has cancelled Johnny Stenback <jst@mozilla.org>'s request for superreview: Bug 292464: event listeners added using addEventListener() listen only trusted events https://bugzilla.mozilla.org/show_bug.cgi?id=292464 Attachment 182447: Use the document's principals to check whether it's chrome or not. https://bugzilla.mozilla.org/attachment.cgi?id=182447&action=edit ...

superreview requested: [Bug 292464] event listeners added using addEventListener() listen only trusted events : [Attachment 182447] Use the document's principals to check whether it's chrome or not.
Johnny Stenback <jst@mozilla.org> has asked Peter Van der Beken <peterv@propagandism.org> for superreview: Bug 292464: event listeners added using addEventListener() listen only trusted events https://bugzilla.mozilla.org/show_bug.cgi?id=292464 Attachment 182447: Use the document's principals to check whether it's chrome or not. https://bugzilla.mozilla.org/attachment.cgi?id=182447&action=edit ...

superreview requested: [Bug 292464] event listeners added using addEventListener() listen only trusted events : [Attachment 182542] v2: Use the document's principals to check whether it's chrome or n
Johnny Stenback <jst@mozilla.org> has asked Peter Van der Beken <peterv@propagandism.org> for superreview: Bug 292464: event listeners added using addEventListener() listen only trusted events https://bugzilla.mozilla.org/show_bug.cgi?id=292464 Attachment 182542: v2: Use the document's principals to check whether it's chrome or not. https://bugzilla.mozilla.org/attachment.cgi?id=182542&action=edit ------- Additional Comments from Johnny Stenback <jst@mozilla.org> Yeah, duh. This should get all places in the code where this is needed. ...

superreview granted: [Bug 189307] typeahead initializes sound when it's uninitialized instead of if it's unitialized and there's a sound to play : [Attachment 135251] right
Robert O'Callahan <roc@ocallahan.org> has granted timeless@myrealbox.com <timeless@bemail.org>'s request for superreview: Bug 189307: typeahead initializes sound when it's uninitialized instead of if it's unitialized and there's a sound to play http://bugzilla.mozilla.org/show_bug.cgi?id=189307 Attachment 135251: right http://bugzilla.mozilla.org/attachment.cgi?id=135251&action=edit ...

Web resources about - superreview granted: [Bug 220215] use the xpcnativewrapper for the current callers of components.lookupmethod : [Attachment 135169] Actually it's document.location that's safe, window is totally uns - netscape.mozilla.reviewers

Greasemonkey - Wikipedia, the free encyclopedia
This article is about the software. For the comic, see Grease Monkey . For other uses, see Grease monkey (disambiguation) . Firefox 3 , 3.5 , ...

Five Vulnerabilities Patched In Firefox 3.0.2 and 2.0.0.17, Two Of Them Are Critical
Firefox 3.0.2 was released today with 5 fixes for security vulnerabilities. The Mozilla Foundation has addressed 2 critical and 2 moderate security ...

Firefox Update Zaps Code Execution Bugs
The most serious of the flaws affect the browser's JavaScript engine and could lead to privilege escalation or arbitrary code execution attacks. ...

Highly Critical Firefox Vulnerabilities Emerge
Mozilla has released a scad of security bulletins outlining many new vulnerabilities discovered in its Firefox browser. All users of the software ...

Security Advisory SA30911 - Mozilla Firefox Multiple Vulnerabilities - Secunia
IT security alert detailing mozilla firefox multiple vulnerabilities which poses a highly critical threat and impacts Security Bypass, Cross ...

At Long Last: Compartment-Per-Global
Yesterday morning, I landed a very major change to our Javascript, XPConnect, and DOM code. This change is commonly known as Compartment-Per-Global. ...

Security Patches For Mozilla Firefox, Thunderbird and Seamonkey
Information leaking vulnerability, can be combined with XSS, although limited. Affects Firefox and SeaMonkey. MFSA 2006-48 ( http://www.moz ...

MFSA 2008-14: JavaScript privilege escalation and arbitrary code execution
Title: JavaScript privilege escalation and arbitrary code execution Impact: Critical Announced: March 25, 2008 Reporter: moz_bug_r_a4, Boris ...

bholley.work.blog
1 post published by bholley during May 2012


Resources last updated: 12/10/2015 3:41:10 AM