Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml" class="reftest-wait">
2 <head>
4 <bindings xmlns="http://www.mozilla.org/xbl">
5 <binding id="foo">
6 <content>
7 <children xmlns="http://www.mozilla.org/xbl" />
8 </content>
9 </binding>
10 </bindings>
12 <script>
13 function boom()
14 {
15 document.getElementById("div").style.MozBinding = "url('#foo')";
17 var opt1 = document.getElementById("opt1");
18 opt1.removeChild(opt1.firstChild);
20 document.getElementById("textarea").value += " ";
22 document.documentElement.removeAttribute("class")
23 }
24 </script>
26 </head>
28 <body onload="setTimeout(boom, 30);">
30 <div id="div">
31 <textarea rows="3" cols="5" id="textarea"></textarea>
32 </div>
34 <select>
35 <option id="opt1">opt1</option>
36 </select>
38 </body>
39 </html>