The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.
2011-06-06T19:55:01.317
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0 | Yes |
Application | mozilla | firefox | 4.0.1 | Yes |