Hi malware fighters,
I contemplated the possible vulnerabilities during a recent dom-checker routine for Firefox.
I attached filters.txt, change this into filters.XML to be placed in the main firefox folder next to where are located e.g. blocklist.xml and active-update.xml etc.
After applying :
Content at http://lcamtuf.coredump.cx/dom_checker/ may not load or link to file:///c:/boot.ini.
Content at http://lcamtuf.coredump.cx/dom_checker/ may not load or link to file:////etc/hosts.
Content at http://lcamtuf.coredump.cx/dom_checker/ may not load or link to file:///c:/.
Content at http://lcamtuf.coredump.cx/dom_checker/ may not load or link to file:///etc/hosts.
This with NoScript temporarily allowing http://lcamtuf.coredump.cx/dom_checker/
enjoy the added security,
polonus
P.S. Read: http://php-ids.org/2007/09/