Tìm kiếm hỗ trợ

Tránh các lừa đảo về hỗ trợ. Chúng tôi sẽ không bao giờ yêu cầu bạn gọi hoặc nhắn tin đến số điện thoại hoặc chia sẻ thông tin cá nhân. Vui lòng báo cáo hoạt động đáng ngờ bằng cách sử dụng tùy chọn "Báo cáo lạm dụng".

Tìm hiểu thêm

Mouseover link tooltip url persistent through click and page load.

  • 6 trả lời
  • 2 gặp vấn đề này
  • 1 lượt xem
  • Trả lời mới nhất được viết bởi zeroknight

more options

So on most sites there has been an issue for me for quite some time.

I hover over a link, the tooltip appears on the bottom left of the window showing the URL of the link. I click on link and page reloads but the tooltip is still on bottom left of the new window. The tooltip will disappear if I hover over any other link on the newly loaded page.

I expect the tooltip to go away when clicking the link and going to that page/site.

Firefox on win10 & 11 This problem does not occur in Edge.

So on most sites there has been an issue for me for quite some time. I hover over a link, the tooltip appears on the bottom left of the window showing the URL of the link. I click on link and page reloads but the tooltip is still on bottom left of the new window. The tooltip will disappear if I hover over any other link on the newly loaded page. I expect the tooltip to go away when clicking the link and going to that page/site. Firefox on win10 & 11 This problem does not occur in Edge.

Giải pháp được chọn

Nope not an extension, addin or setting, and I don't use themes.

I had to figure this one out for myself, the websites experiencing this issue are not reloading the page, they are reusing it which keeps the tooltip on screen until "esc"aped or hovering over another link. Expected behavior is to load the link that was clicked, not reuse the page and leave tooltip on screen. This is a bug in the Behavior of Firefox. I expect a fresh page reload when clicking a link.

FYI what is it with Mozilla not filling in my email/user in order to login to this abortion of a support site. Stop with the horrible multi-redirection in the middle of an OAUTH. Once again you're making Mozilla worse to use...

Đọc câu trả lời này trong ngữ cảnh 👍 0

Tất cả các câu trả lời (6)

more options

Hey, thanks everyone!

2 weeks and no answer...

Not even Cor-el the killer of browsers has commented...

more options

Start Firefox in Troubleshoot Mode to check if one of the extensions ("3-bar" menu button or Tools -> Add-ons -> Extensions) or if hardware acceleration or if userChrome.css/userContent.css is causing the problem.

  • switch to the Default System theme: "3-bar" menu button or Tools -> Add-ons -> Themes
  • do NOT click the "Refresh Firefox" button on the Troubleshoot Mode start window
more options

Giải pháp được chọn

Nope not an extension, addin or setting, and I don't use themes.

I had to figure this one out for myself, the websites experiencing this issue are not reloading the page, they are reusing it which keeps the tooltip on screen until "esc"aped or hovering over another link. Expected behavior is to load the link that was clicked, not reuse the page and leave tooltip on screen. This is a bug in the Behavior of Firefox. I expect a fresh page reload when clicking a link.

FYI what is it with Mozilla not filling in my email/user in order to login to this abortion of a support site. Stop with the horrible multi-redirection in the middle of an OAUTH. Once again you're making Mozilla worse to use...

more options

Can you link an example website that has this persistent URL statuspanel?

Single Page Applications (SPA) are not meant to refresh when following internal links.

Does it still happen in a new profile? An easy way to test a new profile is to install Developer Edition and see if it happens there or refresh your existing profile. Make sure you stay signed out of your sync account when testing.

more options

It's an SPA.

Just another thing Users never asked for that reduces security and adds memory problems making it easy to compromise their systems. There is an exploit related to this issue, you should fix it.

more options

Can you link an example with steps to reproduce the exploit?