Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
rhn.redhat.com/errata/RHSA-2012-1210.html
www.mozilla.org/security/announce/2012/mfsa2012-69.html
www.securityfocus.com/bid/55313
www.ubuntu.com/usn/USN-1548-1
www.ubuntu.com/usn/USN-1548-2
www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
bugzilla.mozilla.org/show_bug.cgi?id=768568
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16060