Description
Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browser’s trusted zone improperly handles injected script content, allowing attackers to execute arbitrary JavaScript in a privileged context. This flaw enables modification of browser configuration and execution of arbitrary code through Maxthon’s exposed DOM APIs, including maxthon.program.Program.launch() and maxthon.io.writeDataURL(). Exploitation requires user interaction, typically by visiting a malicious webpage that triggers the injection.
INFO
Published Date :
2025-08-05T20:03:14.736Z
Last Modified :
2026-04-07T14:02:29.335Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2012-10032 vulnerability.
| Vendors | Products |
|---|---|
| Maxthon |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2012-10032.