Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml" class="reftest-wait">
2 <head>
4 <script>
5 <![CDATA[
7 var a;
8 var b;
10 function foopy()
11 {
12 a = document.getElementById("a");
13 b = document.getElementById("b");
15 var img = document.getElementById("img");
16 var rx = document.getElementById("rx");
18 img.setAttribute('src', "javascript:aC(a, b);");
19 aC(rx, a);
21 document.documentElement.removeAttribute("class");
22 }
24 // This has to be a top-level function to avoid hitting bug 344890.
25 function aC(q1, q2) { q1.appendChild(q2); }
27 ]]>
28 </script>
30 </head>
32 <body onload="setTimeout(foopy, 30);">
34 <span id="a" style="border: 1px solid green;">A<img src="../../../../testing/crashtest/images/tree.gif" id="img" /></span>
36 <span id="b">B</span>
38 <div data="text/plain,Hi!" style="border: 1px solid blue; display: block;" id="rx" />
40 </body>
41 </html>