The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=627552
openwall.com/lists/oss-security/2011/05/31/14
openwall.com/lists/oss-security/2011/05/31/18
openwall.com/lists/oss-security/2011/05/31/4
openwall.com/lists/oss-security/2011/05/31/9
www.securityfocus.com/bid/48064
bugzilla.mozilla.org/show_bug.cgi?id=660749
bugzilla.redhat.com/show_bug.cgi?id=709165
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14145