So here's a question about the recently-discovered heartbleed OpenSSL bug.
Let's say I connect to a server with Firefox/Chrome. Could the server read the client's memory and extract cookies/history/sessions for other sites the client visited?
I'm not sure if firefox or chrome link against OpenSSL, but that could also be pretty tricky.
More generally, it's my understanding that either end of a TLS connection can send a heartbeat request, so clients using openssl would be vulnerable (assuming they use an affected version, with heartbeat support).