xpcom/string/crashtests/395651-1.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <html>
     2 <head>
     3 <script>
     5 function X() { dump("X\n"); }
     6 function Y() { dump("Y\n"); }
     8 function boom()
     9 {
    10   dump("Start9\n");
    12   var div = document.getElementById("v");
    14   var textNode = document.createTextNode(String.fromCharCode(0xDAAF)); // high surrogate
    15   div.appendChild(textNode);
    17   document.addEventListener("DOMCharacterDataModified", X, true);
    18   textNode.data += 'B';
    19   document.removeEventListener("DOMCharacterDataModified", X, true);
    21   document.addEventListener("DOMAttrModified", Y, true);
    22   textNode.data += String.fromCharCode(0xDF53); // low surrogate
    23   document.removeEventListener("DOMAttrModified", Y, true);
    24 }
    26 </script>
    27 </head>
    29 <body onload="boom();"><div id="v"></div></body>
    31 </html>

mercurial