<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: DoS в Firefox, Internet Explorer, Chrome та Opera</title>
	<link>http://websecurity.com.ua/4248/</link>
	<description></description>
	<pubDate>Sun, 12 Apr 2026 17:20:19 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/4248/#comment-326406</link>
		<pubDate>Fri, 04 Jun 2010 11:51:50 +0000</pubDate>
		<guid>http://websecurity.com.ua/4248/#comment-326406</guid>
					<description>&lt;strong&gt;Manko&lt;/strong&gt;

Thanks for the link. After I made my &lt;a href="/4206/" rel="nofollow"&gt;first advisory&lt;/a&gt; in this series of advisories and informed Mozilla, they opened &lt;a href="https://bugzilla.mozilla.org/show_bug.cgi?id=566893" target="_blank" rel="nofollow"&gt;Bug 566893&lt;/a&gt; in Bugzilla for it. For DoS attack via mailto: iframes (but as I wrote them, there can be used other protocols in iframes and I showed it in my next advisories).

From your Bugzilla's entry I see, that you talked about the same topic already in 2002 (i.e. much earlier then me). So you was the first discoverer of this issue and I just rediscovered it :-). And not just in Mozilla, but in many browsers. And I'm stating the full solidarity with you about this issue.

Note that only this year Mozilla fully fixed this issue in img tags (with mailto: URL in MFSA 2010-23) and even not in all their last browsers (without Firefox 3.0.19). But they didn't draw attention to iframe vector of attack. So I'm drawing their attention (and other browser vednors') to iframe vector.</description>
		<content:encoded><![CDATA[<p><strong>Manko</strong></p>
<p>Thanks for the link. After I made my <a href="/4206/" rel="nofollow">first advisory</a> in this series of advisories and informed Mozilla, they opened <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=566893" target="_blank" rel="nofollow">Bug 566893</a> in Bugzilla for it. For DoS attack via mailto: iframes (but as I wrote them, there can be used other protocols in iframes and I showed it in my next advisories).</p>
<p>From your Bugzilla&#8217;s entry I see, that you talked about the same topic already in 2002 (i.e. much earlier then me). So you was the first discoverer of this issue and I just rediscovered it <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> . And not just in Mozilla, but in many browsers. And I&#8217;m stating the full solidarity with you about this issue.</p>
<p>Note that only this year Mozilla fully fixed this issue in img tags (with mailto: URL in MFSA 2010-23) and even not in all their last browsers (without Firefox 3.0.19). But they didn&#8217;t draw attention to iframe vector of attack. So I&#8217;m drawing their attention (and other browser vednors&#8217;) to iframe vector.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Manko</title>
		<link>http://websecurity.com.ua/4248/#comment-326397</link>
		<pubDate>Fri, 04 Jun 2010 07:53:37 +0000</pubDate>
		<guid>http://websecurity.com.ua/4248/#comment-326397</guid>
					<description>See here:
https://bugzilla.mozilla.org/show_bug.cgi?id=167475</description>
		<content:encoded><![CDATA[<p>See here:<br />
<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=167475" rel="nofollow">https://bugzilla.mozilla.org/show_bug.cgi?id=167475</a>
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
