Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Maxthon | Maxthon | 1.2 (including) | 1.2 (including) |
| Maxthon | Maxthon | 1.2.1 (including) | 1.2.1 (including) |