The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16893
https://exchange.xforce.ibmcloud.com/vulnerabilities/75155
https://bugzilla.mozilla.org/show_bug.cgi?id=727547
http://www.securityfocus.com/bid/53227
http://www.mozilla.org/security/announce/2012/mfsa2012-30.html
http://www.mandriva.com/security/advisories?name=MDVSA-2012:081
http://www.mandriva.com/security/advisories?name=MDVSA-2012:066
http://secunia.com/advisories/49055