Secunia Research has discovered two vulnerabilities in Maxthon, which can be exploited by malicious web sites to obtain sensitive information and spoof dialog boxes.
1). Inactive tabs can launch dialog boxes so they appear to be displayed by a web site in another tab. This can be exploited by a malicious web site to show a dialog box, which seems to originate from a trusted web site. Successful exploitation would normally require that a user is tricked into opening a link from a malicious web site to a trusted web site in a new tab.
Browsers:Konqueror
Mozilla / Mozilla Firefox
Opera
Netscape
Avant
Maxthon
Safari2). Inactive tabs can gain focus from form fields on web sites in another tab. This can potentially be exploited to collect sensitive data entered in form fields on other web sites. Successful exploitation would normally require that a user is tricked into opening a link from a malicious web site to a trusted web site in a new tab.
Browsers:Mozilla / Mozilla Firefox
Netscape
Avant Browser
Maxthon View: Multiple Browsers Dialog Box Spoofing Test
View: Multiple Browsers Form Field Focus Test
News source:
Neowin
Full story:
View Here