The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16718
https://exchange.xforce.ibmcloud.com/vulnerabilities/79153
https://bugzilla.mozilla.org/show_bug.cgi?id=768101
http://www.ubuntu.com/usn/USN-1611-1
http://www.securityfocus.com/bid/56119
http://www.mozilla.org/security/announce/2012/mfsa2012-83.html
http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
http://secunia.com/advisories/55318
http://secunia.com/advisories/50984
http://secunia.com/advisories/50936
http://secunia.com/advisories/50935
http://secunia.com/advisories/50904
http://secunia.com/advisories/50892
http://secunia.com/advisories/50856
http://rhn.redhat.com/errata/RHSA-2012-1351.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html