The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
https://security.gentoo.org/glsa/201504-01
https://exchange.xforce.ibmcloud.com/vulnerabilities/90898
http://www.ubuntu.com/usn/USN-2119-1
http://www.ubuntu.com/usn/USN-2102-2
http://www.ubuntu.com/usn/USN-2102-1
http://www.securitytracker.com/id/1029721
http://www.securitytracker.com/id/1029720
http://www.securitytracker.com/id/1029717
http://www.securityfocus.com/bid/65320
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.mozilla.org/security/announce/2014/mfsa2014-02.html
http://www.debian.org/security/2014/dsa-2858
http://rhn.redhat.com/errata/RHSA-2014-0133.html
http://rhn.redhat.com/errata/RHSA-2014-0132.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html