USN-717-3 -- firefox vulnerabilitiesID: oval:org.secpod.oval:def:700420 | Date: (C)2011-05-13 (M)2021-09-11 |
Class: PATCH | Family: unix |
Kojima Hajime discovered that Firefox did not properly handle an escaped null character. An attacker may be able to exploit this flaw to bypass script sanitization. Wladimir Palant discovered that Firefox did not restrict access to cookies in HTTP response headers. If a user were tricked into opening a malicious web page, a remote attacker could view sensitive information