NONE · 0

CVE-2012-10032

Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browser’s trusted zone improperly handles injected script content, allowing attackers to ...

Vulnerability Description

Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browser’s trusted zone improperly handles injected script content, allowing attackers to execute arbitrary JavaScript in a privileged context. This flaw enables modification of browser configuration and execution of arbitrary code through Maxthon’s exposed DOM APIs, including maxthon.program.Program.launch() and maxthon.io.writeDataURL(). Exploitation requires user interaction, typically by visiting a malicious webpage that triggers the injection.

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-10032?

CVE-2012-10032 is a documented vulnerability. Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browser’s trusted zone improperly handles injected script content, allowing attackers to ...

How severe is CVE-2012-10032?

CVSS scoring is not yet available for CVE-2012-10032. Check NVD for updates.

Is there a patch for CVE-2012-10032?

Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.