|Description||Mozilla Firefox 3.x before 3.0.5 and 2.x before 188.8.131.52, Thunderbird 2.x before 184.108.40.206, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|References||DSA-1696-1, DSA-1697-1, DSA-1704-1, DSA-1707-1|
The information below is based on the following data on fixed versions.