The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17005
https://bugzilla.mozilla.org/show_bug.cgi?id=751422
http://www.mozilla.org/security/announce/2012/mfsa2012-36.html
http://www.mandriva.com/security/advisories?name=MDVSA-2012:088
http://secunia.com/advisories/49981
http://rhn.redhat.com/errata/RHSA-2012-0715.html
http://rhn.redhat.com/errata/RHSA-2012-0710.html
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html