The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "29.0+build1-0ubuntu0.14.04.2"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "29.0+build1-0ubuntu0.14.04.2"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "29.0+build1-0ubuntu0.14.04.2"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "29.0+build1-0ubuntu0.14.04.2"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "29.0+build1-0ubuntu0.14.04.2"
        }
    ]
}
          {
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libnss3",
            "binary_version": "2:3.15.4-1ubuntu7"
        },
        {
            "binary_name": "libnss3-1d",
            "binary_version": "2:3.15.4-1ubuntu7"
        },
        {
            "binary_name": "libnss3-dev",
            "binary_version": "2:3.15.4-1ubuntu7"
        },
        {
            "binary_name": "libnss3-nssdb",
            "binary_version": "2:3.15.4-1ubuntu7"
        },
        {
            "binary_name": "libnss3-tools",
            "binary_version": "2:3.15.4-1ubuntu7"
        }
    ]
}