The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-0710.html
http://rhn.redhat.com/errata/RHSA-2012-0715.html
http://secunia.com/advisories/49981
http://www.mandriva.com/security/advisories?name=MDVSA-2012:088
http://www.mozilla.org/security/announce/2012/mfsa2012-36.html
https://bugzilla.mozilla.org/show_bug.cgi?id=751422
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17005