First published: Mon Jul 07 2008(Updated: )
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 on Mac OS X allow remote attackers to bypass the Same Origin Policy and create arbitrary socket connections via a crafted Java applet, related to the Java Embedding Plugin (JEP) and Java LiveConnect.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =2.0 | |
Mozilla Firefox | =2.0-beta_1 | |
Mozilla Firefox | =2.0-rc2 | |
Mozilla Firefox | =2.0-rc3 | |
Mozilla Firefox | =2.0.0.2 | |
Mozilla Firefox | =2.0.0.3 | |
Mozilla Firefox | =2.0.0.11 | |
Mozilla Firefox | =2.0.0.12 | |
Mozilla Firefox | =2.0.0.13 | |
Mozilla Firefox | =2.0.0.14 | |
Mozilla Firefox | =2.0_.1 | |
Mozilla Firefox | =2.0_.4 | |
Mozilla Firefox | =2.0_.5 | |
Mozilla Firefox | =2.0_.6 | |
Mozilla Firefox | =2.0_.7 | |
Mozilla Firefox | =2.0_.9 | |
Mozilla Firefox | =2.0_.10 | |
Mozilla Firefox | =2.0_8 | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.1.4 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla Thunderbird | =2.0_.4 | |
Mozilla Thunderbird | =2.0_.5 | |
Mozilla Thunderbird | =2.0_.6 | |
Mozilla Thunderbird | =2.0_.9 | |
Mozilla Thunderbird | =2.0_.12 | |
Mozilla Thunderbird | =2.0_.13 | |
Mozilla Thunderbird | =2.0_.14 | |
Mozilla Thunderbird | =2.0_8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.