|Description||Mozilla Firefox 3.x before 3.0.5 and 2.x before 18.104.22.168, Thunderbird 2.x before 22.214.171.124, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|References||DSA-1696-1, DSA-1697-1, DSA-1704-1, DSA-1707-1|
The information below is based on the following data on fixed versions.