Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
http://rhn.redhat.com/errata/RHSA-2012-1210.html
https://bugzilla.mozilla.org/show_bug.cgi?id=768568
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16060
http://www.mozilla.org/security/announce/2012/mfsa2012-69.html