The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2011-06-06 12:55
Updated : 2017-09-18 18:31
NVD link : CVE-2011-0082
Mitre link : CVE-2011-0082
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
mozilla
- firefox