CVE-2011-0082
06.06.2011, 19:55
The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 4.0 |
mozilla | firefox | 4.0:beta1 |
mozilla | firefox | 4.0:beta10 |
mozilla | firefox | 4.0:beta11 |
mozilla | firefox | 4.0:beta12 |
mozilla | firefox | 4.0:beta2 |
mozilla | firefox | 4.0:beta3 |
mozilla | firefox | 4.0:beta4 |
mozilla | firefox | 4.0:beta5 |
mozilla | firefox | 4.0:beta6 |
mozilla | firefox | 4.0:beta7 |
mozilla | firefox | 4.0:beta8 |
mozilla | firefox | 4.0:beta9 |
mozilla | firefox | 4.0.1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References