Mozilla Firefox 3.x before 3.0.5 allows remote attackers to bypass intended privacy restrictions by using the persist attribute in an XUL element to create and access data entities that are similar to cookies.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/32882 | vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=295994 | |
http://www.securitytracker.com/id?1021428 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2008-1036.html | vendor advisory |
http://www.vupen.com/english/advisories/2009/0977 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:245 | vendor advisory |
https://usn.ubuntu.com/690-1/ | vendor advisory |
http://secunia.com/advisories/33203 | third party advisory |
http://secunia.com/advisories/33216 | third party advisory |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 | vendor advisory |
http://www.mozilla.org/security/announce/2008/mfsa2008-63.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47411 | vdb entry |
http://secunia.com/advisories/33188 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10443 | vdb entry signature |
http://secunia.com/advisories/34501 | third party advisory |