CSSIZE the MENU

Hi ...

 

I need to stylize a "dolphin generated menù" (the tabs) in this website:

www.girlsexcommunity.com

 

In the upper menù, the "xxx" link needs to be red and blinking.

 

So I thinked about it and the best solution is to have a class for each menu element, like:

<ul class="sub main_elements">
<li CLASS="page-###">
<a class="button more_ntop_element" href="http://www.girlsexcommunity.com/page/link">Link</a>
</li>
</ul>

The "CLASS="page-###"" is  what I would add to every menù link, so with a CSS it is possible to personalize the menù.

Can you help me?

Quote · 9 Sep 2010

the "xxx" link needs to be red and blinking.

easiest way to do this is to create an animated gif file and add code to show this animated gif file in the language key, like this

<img style="vertical-align: middle; width: 75px; height: 37px;" src="templates/base/images/icons/under_construction1.gif">

upload gif file to templates/base/images/icons

Quote · 9 Sep 2010

I agree. The use of an animated gif set as the text for the language key is the best way.

You could also use this as text for the language key. <span style="color: #FF0000; text-decoration: blink">xxx</span>


The problem is, Firefox is pretty much the only browser that supports the use of the blink attribute in css. IE, Chrome and Safari ignore it.

So using css is pointless to do it if you want cross browser support. Thats why the gif is the best way.

https://www.deanbassett.com
Quote · 9 Sep 2010

could you just tell it to use a gif in menu builder ?  or will dolphin strip it to some other format and it will not blink anymore ?

https://dolphin-techs.com - Skype: Dolphin Techs
Quote · 10 Sep 2010

Uh... it PARTIALLY works.

 

If I use the code <img src="/media/images/xxx.gif"> it works.

If I use <img src="/media/images/xxx.gif" style="margin-top: 4px;"> I get a break security email:

Total impact: 24

Affected tags: xss, csrf, id, rfe, lfi

Variable: REQUEST.Caption | Value: &lt;img src=&quot;/media/images/xxx.gif&quot; /&gt;

Impact: 12 | Tags: xss, csrf, id, rfe, lfi

Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38

Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68


Variable: POST.Caption | Value: &lt;img src=&quot;/media/images/xxx.gif&quot; /&gt;

Impact: 12 | Tags: xss, csrf, id, rfe, lfi

Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38

Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

REMOTE_ADDR: 93.37.152.80

 

What can I do?

Quote · 10 Sep 2010

Turn off those security settings. See this post.

http://www.boonex.com/unity/forums/#topic/Troubleshooting-Possible-Security-Attacks-.htm

https://www.deanbassett.com
Quote · 10 Sep 2010

 

Uh... it PARTIALLY works.

 

If I use the code <img src="/media/images/xxx.gif"> it works.

If I use <img src="/media/images/xxx.gif" style="margin-top: 4px;"> I get a break security email:

Total impact: 24

Affected tags: xss, csrf, id, rfe, lfi

Variable: REQUEST.Caption | Value: &lt;img src=&quot;/media/images/xxx.gif&quot; /&gt;

Impact: 12 | Tags: xss, csrf, id, rfe, lfi

Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38

Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68


Variable: POST.Caption | Value: &lt;img src=&quot;/media/images/xxx.gif&quot; /&gt;

Impact: 12 | Tags: xss, csrf, id, rfe, lfi

Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38

Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

REMOTE_ADDR: 93.37.152.80

 

What can I do?

Switch of the security(set it to -1) or increase the numbers, should now not receive any email about security, not sure if some code still will be removed when you use Navigation Menu Builder, never had this problem when I use a language key...

Go to Admin/Settings/Advanced Settings -> Security

Total security impact threshold to send report: -1
Total security impact threshold to send report and block aggressor: -1

Quote · 10 Sep 2010

The problem was only the double attributes (style and background)

With 1 attribute the "breakdown" function does not work:

class="xxx"

With 2 attributes it sends the email.

 

So I resolved using this trick: <div class="xxx" />

And editing CSS.

Quote · 10 Sep 2010
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.