For support with specific websites
Moderator: trava90
Forum rules
Please
always mention the name/domain of the website in question in your topic title.
Please one website per topic thread (to help keep things organized). While behavior on different sites might at first glance seem similar, they are not necessarily caused by the same.
Please try to include any relevant output from the Toolkit Error Console or the Developer Tools Web Console using the following procedure:
- Clear any current output
- Navigate or refresh the page in question
- Copy and paste Errors or seemingly relevant Warnings into a single [ code ] block.
-
Stargate38
- Moonbather

- Posts: 73
- Joined: 2018-05-27, 22:55
- Location: Earth
Unread post
by Stargate38 » 2025-03-22, 18:04
Please always mention the name/domain of the website in question in your topic title.
Please try to include any relevant output from the Toolkit Error Console or the Developer Tools Web Console using the following procedure:
1) Clear any current output
2) Navigate or refresh the page in question
3) Copy and paste Errors or seemingly relevant Warnings into a single [ code ] block.
Code: Select all
uBO: [prevent-addEventListener ⁝ /^(mouseout|mouseleave)$/ ⁝ ] Prevented: mouseout
function bound Kt() {
[native code]
}
[data-hypernova-key="doc_page"][data-hypernova-id="c77ebf03-b136-4933-98e0-67f80e504b8c"]
Us-5373560:154:13
TypeError: window.visualViewport is undefined
Stack trace:
j@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:244789
K@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:244925
x_@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:222107
no@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2269676
Vs@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2322010
Il@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2309256
Sl@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2309184
Ml@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2309047
hl@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2306013
dl@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2303361
Kl@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2319330
nu/<@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2320718
_l@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2306391
nu@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2320703
[22551]/t.hydrate@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:2328266
client/<@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:1860022
client@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:1859920
d@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:1861609
[12964]/t.aI@https://s-f.scribdassets.com/webpack/doc_page/635.76562d.js:1:1859739
[30686]@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:230412
r@https://www.scribd.com/document/347633432/Us-5373560:672:141
t@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:312312
@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:312348
r.O@https://www.scribd.com/document/347633432/Us-5373560:672:433
@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:312362
t@https://www.scribd.com/document/347633432/Us-5373560:672:5412
@https://s-f.scribdassets.com/webpack/doc_page/app.a9074d.js:1:81
635.76562d.js:1:121607
Ignoring unsupported entryTypes: largest-contentful-paint.
635.76562d.js:1:98422
Ignoring unsupported entryTypes: first-input.
635.76562d.js:1:98422
Ignoring unsupported entryTypes: layout-shift.
635.76562d.js:1:98422
Ignoring unsupported entryTypes: event.
635.76562d.js:1:98422
Ignoring unsupported entryTypes: longtask, paint.
635.76562d.js:1:98585
TypeError: window.visualViewport is undefined[Learn More]
app.a9074d.js:1:244789
None of the “sha384” hashes in the integrity attribute match the content of the subresource.
Us-5373560
Failed to execute ‘postMessage’ on ‘DOMWindow’: The target origin provided (‘https://cmp.osano.com’) does not match the recipient window’s origin (‘https://www.scribd.com’).
Example link:
https://www.scribd.com/document/347633432/Us-5373560
Anyone know how to get it to work? I tried doing what was suggested in
viewtopic.php?f=70&t=30314&p=243697&hil ... rt#p243697, but it didn't work.
-
Moonchild
- Pale Moon guru

- Posts: 37352
- Joined: 2011-08-28, 17:27
- Location: Motala, SE
Unread post
by Moonchild » 2025-03-22, 23:28
window.visualViewport is undefined
They are trying to use a mobile-centric (and Google-sourced) API without checking for support first.
I filed
Issue #2714 (UXP) to implement what few readonly properties it is supposed to spit out but it would be useless to try and implement this entire API in UXP otherwise since we do not use mobile gestures, APZ or support whole-desktop-zooming as that is entirely something for small mobile devices which we don't support anyway.
"The world will not be destroyed by those who do evil, but by those who watch them without doing anything." - Albert Einstein
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
-
adoxa
- Lunatic

- Posts: 381
- Joined: 2019-03-16, 13:26
- Location: Qld, Aus.
Unread post
by adoxa » 2025-03-22, 23:48
If you have Greasemonkey here's a userscript to work around it; depending on your needs you may also be able to simply turn off Javascript, or block the "635" script.
Code: Select all
// ==UserScript==
// @name Scribd visualViewport
// @namespace adoxa
// @include https://www.scribd.com/*
// @version 1
// @grant none
// @run-at document-start
// ==/UserScript==
window.visualViewport={scale:1,addEventListener:()=>{},removeEventListener:()=>{}}
-
Gemmaugr
- Moon lover

- Posts: 85
- Joined: 2025-02-03, 07:55
Unread post
by Gemmaugr » 2025-03-23, 08:07
adoxa wrote: ↑2025-03-22, 23:48
If you have Greasemonkey here's a userscript to work around it; depending on your needs you may also be able to simply turn off Javascript, or block the "635" script.
Code: Select all
// ==UserScript==
// @name Scribd visualViewport
// @namespace adoxa
// @include https://www.scribd.com/*
// @version 1
// @grant none
// @run-at document-start
// ==/UserScript==
window.visualViewport={scale:1,addEventListener:()=>{},removeEventListener:()=>{}}
If I were to change scribd in the GM script to the relevant site, would this also work for
https://www.citygross.se/ &
https://yep.com/ &
https://stein.world/ ?
Off-topic:
Sadly, Visual Viewport is becoming more popular, and site devs/frameworks has lost the concept of fallback code. Just thinking to myself here, but it would be interesting too see if most of the problematic sites rely on the same, or same source, framework.
https://survey.stackoverflow.co/2023/#m ... s-webframe
The larger majority of frameworks seems to come from or rely on google, meta, and microsoft.. googles deep vertical and even sometimes horizontal integration just can't be legal..! Not that current legislators even grasp the difference between chrome and chromium, or google search and frontends like startpage..
Rant over. Sorry
-
adoxa
- Lunatic

- Posts: 381
- Joined: 2019-03-16, 13:26
- Location: Qld, Aus.
Unread post
by adoxa » 2025-03-23, 09:26
It worked for citygross & yep; I had no issues with stein.world. Just add the includes (and rename without "Scribd ").
Code: Select all
// @include https://www.citygross.se/*
// @include https://yep.com/*
-
Gemmaugr
- Moon lover

- Posts: 85
- Joined: 2025-02-03, 07:55
Unread post
by Gemmaugr » 2025-03-23, 09:34
adoxa wrote: ↑2025-03-23, 09:26
It worked for citygross & yep; I had no issues with stein.world. Just add the includes (and rename without "Scribd ").
Code: Select all
// @include https://www.citygross.se/*
// @include https://yep.com/*
Much appreciated, thanks!
Ah, yeah, Stein World has it when trying to log in. My bad. I'll try to add it as well and see.
-
Moonchild
- Pale Moon guru

- Posts: 37352
- Joined: 2011-08-28, 17:27
- Location: Motala, SE
Unread post
by Moonchild » 2025-03-24, 18:27
Off-topic:Speaking of frameworks having become too complex to manage...
CVE-2025-29927 Severity:9.1
Impact
It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.
This can effectively be spoofed with the x-middleware-subrequest header sent from a client. "Trust me bro! I'm authorized!"
oopsie!
"The world will not be destroyed by those who do evil, but by those who watch them without doing anything." - Albert Einstein
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
-
Gemmaugr
- Moon lover

- Posts: 85
- Joined: 2025-02-03, 07:55
Unread post
by Gemmaugr » 2025-03-24, 19:25
Moonchild wrote: ↑2025-03-24, 18:27
Off-topic:Speaking of frameworks having become too complex to manage...
CVE-2025-29927 Severity:9.1
Impact
It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.
This can effectively be spoofed with the x-middleware-subrequest header sent from a client. "Trust me bro! I'm authorized!"
oopsie!
Off-topic:
Yikes!
Also, Next.js is React.js(1) based, requiring a Node.js server(2), and Node.js runs on googles V8 javascript engine..
If I understand it right.
1. React.js being a Meta/Facebook product.
2. Or a Vercel server using Cloudflare.