A malicious web site operator could set up an applet on a web page which would process http redirect requests to an external location and send back sensitive data to the originating server, regardless of file format. This is due to the fact that the applet security model in the implementation of Mac OS Runtime Java (MRJ) is ignored in this case. This vulnerability depends on the combination of MRJ and browser version the system is running. To check whether or not your machine is vulnerable, make note of what version of browser and MRJ you are running and visit the following URL: http://java-house.etl.go.jp/ml/archive/j-h-b/033471.html
A malicious web site operator could set up an applet on a web page which would process http redirect requests to an external location and send back sensitive data to the originating server, regardless of file format. This is due to the fact that the applet security model in the implementation of Mac OS Runtime Java (MRJ) is ignored in this case. This vulnerability depends on the combination of MRJ and browser version the system is running. To check whether or not your machine is vulnerable, make note of what version of browser and MRJ you are running and visit the following URL: http://java-house.etl.go.jp/ml/archive/j-h-b/033471.html