Action not permitted
Modal body text goes here.
CVE-2006-5462
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:48:30.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "23883", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23883" }, { "name": "23235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23235" }, { "name": "GLSA-200612-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200612-08.xml" }, { "name": "23013", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23013" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm" }, { "name": "22770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22770" }, { "name": "ADV-2006-4387", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4387" }, { "name": "DSA-1225", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1225" }, { "name": "1017180", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017180" }, { "name": "23009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23009" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215" }, { "name": "TA06-312A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "DSA-1227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1227" }, { "name": "22980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22980" }, { "name": "ADV-2007-0293", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "RHSA-2006:0733", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0733.html" }, { "name": "24711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24711" }, { "name": "23263", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23263" }, { "name": "22763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22763" }, { "name": "22965", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22965" }, { "name": "USN-382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-382-1" }, { "name": "ADV-2008-0083", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "RHSA-2006:0735", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0735.html" }, { "name": "20061101-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P" }, { "name": "1017181", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017181" }, { "name": "SUSE-SA:2006:068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_68_mozilla.html" }, { "name": "GLSA-200612-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200612-07.xml" }, { "name": "ADV-2007-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "23297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23297" }, { "name": "22727", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22727" }, { "name": "22815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22815" }, { "name": "RHSA-2006:0734", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0734.html" }, { "name": "VU#335392", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/335392" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "mozilla-nss-security-bypass(30098)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "22737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22737" }, { "name": "22929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22929" }, { "name": "23202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23202" }, { "name": "GLSA-200612-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200612-06.xml" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "MDKSA-2006:206", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:206" }, { "name": "oval:org.mitre.oval:def:10478", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10478" }, { "name": "23197", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23197" }, { "name": "DSA-1224", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1224" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22066" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "22817", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22817" }, { "name": "22722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22722" }, { "name": "102781", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "name": "1017182", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017182" }, { "name": "MDKSA-2006:205", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:205" }, { "name": "23287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23287" }, { "name": "USN-381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-381-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "23883", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23883" }, { "name": "23235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23235" }, { "name": "GLSA-200612-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200612-08.xml" }, { "name": "23013", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23013" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm" }, { "name": "22770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22770" }, { "name": "ADV-2006-4387", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4387" }, { "name": "DSA-1225", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1225" }, { "name": "1017180", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017180" }, { "name": "23009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23009" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215" }, { "name": "TA06-312A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "DSA-1227", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1227" }, { "name": "22980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22980" }, { "name": "ADV-2007-0293", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "RHSA-2006:0733", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0733.html" }, { "name": "24711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24711" }, { "name": "23263", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23263" }, { "name": "22763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22763" }, { "name": "22965", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22965" }, { "name": "USN-382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-382-1" }, { "name": "ADV-2008-0083", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "RHSA-2006:0735", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0735.html" }, { "name": "20061101-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P" }, { "name": "1017181", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017181" }, { "name": "SUSE-SA:2006:068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_68_mozilla.html" }, { "name": "GLSA-200612-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200612-07.xml" }, { "name": "ADV-2007-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "23297", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23297" }, { "name": "22727", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22727" }, { "name": "22815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22815" }, { "name": "RHSA-2006:0734", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2006-0734.html" }, { "name": "VU#335392", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/335392" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "mozilla-nss-security-bypass(30098)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "22737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22737" }, { "name": "22929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22929" }, { "name": "23202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23202" }, { "name": "GLSA-200612-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200612-06.xml" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "MDKSA-2006:206", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:206" }, { "name": "oval:org.mitre.oval:def:10478", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10478" }, { "name": "23197", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23197" }, { "name": "DSA-1224", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1224" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22066" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "22817", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22817" }, { "name": "22722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22722" }, { "name": "102781", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "name": "1017182", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017182" }, { "name": "MDKSA-2006:205", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:205" }, { "name": "23287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23287" }, { "name": "USN-381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-381-1" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-5462", "datePublished": "2006-11-08T21:00:00", "dateReserved": "2006-10-23T00:00:00", "dateUpdated": "2024-08-07T19:48:30.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-5462\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2006-11-08T21:07:00.000\",\"lastModified\":\"2017-10-11T01:31:19.453\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.\"},{\"lang\":\"es\",\"value\":\"La biblioteca Mozilla Network Security Service (NSS) en versiones anteriores a la 3.11.3, como el usado en el Mozilla Firefox en versiones anteriores a la 1.5.0.8, en el Thunderbird anterior a la versi\u00f3n 1.5.0.8 y en el SeaMonkey anteriores a la versi\u00f3n 1.0.6, cuando utiliza una clave RSA con exponente 3, no gestiona apropiadamente datos extra en la firma, lo cual permiten a atacantes remotos falsificar firmas para los certificados de correo electr\u00f3nico SSL/TLS. NOTA: este identificador es para versiones de productos no parchados, que inicialmente se vieron en el CVE-2006-4340.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB88E86-6E83-4A59-9266-8B98AA91774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BE50FE-EA21-4633-A181-CD35196DF06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F38886-C25A-4C6B-93E7-36461405BA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C65D2670-F37F-48CB-804A-D35BB1C27D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8E5194-7B34-4802-BDA6-6A86EB5EDE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F474C4B3-B85D-4059-B5D9-84238A642EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E18FC0-0C8C-4FA1-85B9-B868D00F002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"D62F740C-706B-4290-AD92-3ECBC3D30768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*\",\"matchCriteriaId\":\"55344F76-1C42-4DD8-A28B-1C33626C6FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB01A97F-ACE1-4A99-8939-6DF8FE5B5E8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6521C877-63C9-4B6E-9FC9-1263FFBB7950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D949DF0A-CBC2-40E1-AE6C-60E6F58D2481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5CDA57-1A50-4EDB-80E2-D3EBB44EA653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D33486-4956-4E2C-BA16-FA269A9D02BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3104343E-93B6-4D4A-BC95-ED9F7E91FB6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FB87608-0DF8-4729-95C5-CFA386AB3AC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A406214-29E5-4E13-B2E1-1CF72F1E60BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C169DA-26BC-42EE-817B-2F0685069495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C99BAF7-B48E-4402-B2BF-EB07235E402E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3F0C73F-291F-4A92-87B8-2269B5C1516D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0ADE8D7-B3C3-4490-9CD5-0263BBA75D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938B1260-74A7-4CFF-8086-415DCC284430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28672BA-E3C2-40C3-80E1-95B7CDD089E2\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0733.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0734.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0735.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22722\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22727\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22737\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22763\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22770\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22815\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22817\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22929\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22965\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22980\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23009\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23013\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23197\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23202\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23235\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23263\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23287\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23297\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23883\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200612-06.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200612-07.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200612-08.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1017180\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1017181\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1017182\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1224\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1225\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1227\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/335392\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:205\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:206\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-60.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-66.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_68_mozilla.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-381-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-382-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-312A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4387\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0293\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1198\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0083\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=356215\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/30098\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10478\",\"source\":\"secalert@redhat.com\"}]}}" } }
rhsa-2006_0734
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 2.1, 3, and 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processes certain malformed\nJavascript code. A malicious web page could cause the execution of\nJavascript code in such a way that could cause SeaMonkey to crash or\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-5463,\nCVE-2006-5747, CVE-2006-5748)\n\nSeveral flaws were found in the way SeaMonkey renders web pages. A\nmalicious web page could cause the browser to crash or possibly execute\narbitrary code as the user running SeaMonkey. (CVE-2006-5464)\n\nA flaw was found in the way SeaMonkey verifies RSA signatures. For RSA keys\nwith exponent 3 it is possible for an attacker to forge a signature that\nwould be incorrectly verified by the NSS library. SeaMonkey as shipped\ntrusts several root Certificate Authorities that use exponent 3. An\nattacker could have created a carefully crafted SSL certificate which be\nincorrectly trusted when their site was visited by a victim. This flaw was\npreviously thought to be fixed in SeaMonkey 1.0.5, however Ulrich Kuehn\ndiscovered the fix was incomplete (CVE-2006-5462)\n\nUsers of SeaMonkey are advised to upgrade to these erratum packages, which\ncontains SeaMonkey version 1.0.6 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0734", "url": "https://access.redhat.com/errata/RHSA-2006:0734" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "214447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=214447" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0734.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2024-11-22T00:37:46+00:00", "generator": { "date": "2024-11-22T00:37:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0734", "initial_release_date": "2006-11-08T09:45:00+00:00", "revision_history": [ { "date": "2006-11-08T09:45:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-11-08T04:48:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:37:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el4.ia64", "product": { "name": "seamonkey-0:1.0.6-0.1.el4.ia64", "product_id": "seamonkey-0:1.0.6-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el4.ia64", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ia64", "product_id": "seamonkey-chat-0:1.0.6-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el4.ia64", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ia64", "product_id": "seamonkey-devel-0:1.0.6-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el4.ia64", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ia64", "product_id": "seamonkey-mail-0:1.0.6-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-devel-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-chat-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-nss-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el3.ia64", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ia64", "product_id": "seamonkey-mail-0:1.0.6-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-devel-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-chat-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-nss-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el2.ia64", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.ia64", "product_id": "seamonkey-mail-0:1.0.6-0.1.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el4.x86_64", "product": { "name": "seamonkey-0:1.0.6-0.1.el4.x86_64", "product_id": "seamonkey-0:1.0.6-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "product_id": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "product_id": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "product_id": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.5.el4.x86_64", "product": { "name": "devhelp-0:0.10-0.5.el4.x86_64", "product_id": "devhelp-0:0.10-0.5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.5.el4.x86_64", "product": { "name": "devhelp-devel-0:0.10-0.5.el4.x86_64", "product_id": "devhelp-devel-0:0.10-0.5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "product": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "product_id": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.5.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "product_id": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el4.i386", "product": { "name": "seamonkey-0:1.0.6-0.1.el4.i386", "product_id": "seamonkey-0:1.0.6-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el4.i386", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.i386", "product_id": "seamonkey-chat-0:1.0.6-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el4.i386", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.i386", "product_id": "seamonkey-devel-0:1.0.6-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el4.i386", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.i386", "product_id": "seamonkey-mail-0:1.0.6-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.5.el4.i386", "product": { "name": "devhelp-0:0.10-0.5.el4.i386", "product_id": "devhelp-0:0.10-0.5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.5.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.5.el4.i386", "product": { "name": "devhelp-devel-0:0.10-0.5.el4.i386", "product_id": "devhelp-devel-0:0.10-0.5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.5.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.5.el4.i386", "product": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.i386", "product_id": "devhelp-debuginfo-0:0.10-0.5.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.5.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-nss-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-devel-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-chat-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el3.i386", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.i386", "product_id": "seamonkey-mail-0:1.0.6-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-devel-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-chat-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-nss-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el2.i386", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.i386", "product_id": "seamonkey-mail-0:1.0.6-0.1.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el4.src", "product": { "name": "seamonkey-0:1.0.6-0.1.el4.src", "product_id": "seamonkey-0:1.0.6-0.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el4?arch=src" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.5.el4.src", "product": { "name": "devhelp-0:0.10-0.5.el4.src", "product_id": "devhelp-0:0.10-0.5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.5.el4?arch=src" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el3.src", "product": { "name": "seamonkey-0:1.0.6-0.1.el3.src", "product_id": "seamonkey-0:1.0.6-0.1.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el3?arch=src" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el2.src", "product": { "name": "seamonkey-0:1.0.6-0.1.el2.src", "product_id": "seamonkey-0:1.0.6-0.1.el2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el4.ppc", "product": { "name": "seamonkey-0:1.0.6-0.1.el4.ppc", "product_id": "seamonkey-0:1.0.6-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el4.ppc", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ppc", "product_id": "seamonkey-chat-0:1.0.6-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el4.ppc", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ppc", "product_id": "seamonkey-devel-0:1.0.6-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el4.ppc", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ppc", "product_id": "seamonkey-mail-0:1.0.6-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.5.el4.ppc", "product": { "name": "devhelp-0:0.10-0.5.el4.ppc", "product_id": "devhelp-0:0.10-0.5.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.5.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.5.el4.ppc", "product": { "name": "devhelp-devel-0:0.10-0.5.el4.ppc", "product_id": "devhelp-devel-0:0.10-0.5.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.5.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.5.el4.ppc", "product": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.ppc", "product_id": "devhelp-debuginfo-0:0.10-0.5.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.5.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-devel-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-chat-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-nss-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el3.ppc", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ppc", "product_id": "seamonkey-mail-0:1.0.6-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el4.s390x", "product": { "name": "seamonkey-0:1.0.6-0.1.el4.s390x", "product_id": "seamonkey-0:1.0.6-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390x", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390x", "product_id": "seamonkey-chat-0:1.0.6-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390x", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390x", "product_id": "seamonkey-devel-0:1.0.6-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390x", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390x", "product_id": "seamonkey-mail-0:1.0.6-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-devel-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-chat-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-nss-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390x", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390x", "product_id": "seamonkey-mail-0:1.0.6-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el4.s390", "product": { "name": "seamonkey-0:1.0.6-0.1.el4.s390", "product_id": "seamonkey-0:1.0.6-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390", "product_id": "seamonkey-chat-0:1.0.6-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390", "product_id": "seamonkey-devel-0:1.0.6-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390", "product_id": "seamonkey-mail-0:1.0.6-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-nss-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-nspr-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-devel-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-chat-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.6-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390", "product": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390", "product_id": "seamonkey-mail-0:1.0.6-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.6-0.1.el3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-0:1.0.6-0.1.el2.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-0:1.0.6-0.1.el2.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-0:1.0.6-0.1.el2.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el2.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-0:1.0.6-0.1.el2.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el2.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.6-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.6-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.6-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.6-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.5.el4.src" }, "product_reference": "devhelp-0:0.10-0.5.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.6-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.5.el4.src" }, "product_reference": "devhelp-0:0.10-0.5.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.6-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.5.el4.src" }, "product_reference": "devhelp-0:0.10-0.5.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.6-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.5.el4.src" }, "product_reference": "devhelp-0:0.10-0.5.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.5.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.5.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.5.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.6-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-5462", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618211" } ], "notes": [ { "category": "description", "text": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5462" }, { "category": "external", "summary": "RHBZ#1618211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618211" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5462", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5462" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T09:45:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0734" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-5463", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618212" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary JavaScript bytecode via unspecified vectors involving modification of a Script object while it is executing.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5463" }, { "category": "external", "summary": "RHBZ#1618212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5463", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5463" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T09:45:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0734" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5464", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618214" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5464" }, { "category": "external", "summary": "RHBZ#1618214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5464", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5464" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T09:45:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0734" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5747", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5747" }, { "category": "external", "summary": "RHBZ#1618223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5747", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5747" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T09:45:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0734" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5748", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "214822" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey \u003c 1.0.6 multiple vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5748" }, { "category": "external", "summary": "RHBZ#214822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=214822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5748", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5748" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T09:45:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "2.1AS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-0:1.0.6-0.1.el2.src", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-0:1.0.6-0.1.el2.src", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1AW:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-0:1.0.6-0.1.el2.src", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1ES:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-0:1.0.6-0.1.el2.src", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-chat-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-dom-inspector-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-js-debugger-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-mail-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nspr-devel-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-0:1.0.6-0.1.el2.ia64", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.i386", "2.1WS:seamonkey-nss-devel-0:1.0.6-0.1.el2.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-0:1.0.6-0.1.el3.src", "3AS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.6-0.1.el3.src", "3Desktop:seamonkey-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-0:1.0.6-0.1.el3.src", "3ES:seamonkey-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-0:1.0.6-0.1.el3.src", "3WS:seamonkey-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.6-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.6-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.5.el4.i386", "4AS:devhelp-0:0.10-0.5.el4.ppc", "4AS:devhelp-0:0.10-0.5.el4.src", "4AS:devhelp-0:0.10-0.5.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.5.el4.i386", "4AS:devhelp-devel-0:0.10-0.5.el4.ppc", "4AS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4AS:seamonkey-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-0:1.0.6-0.1.el4.src", "4AS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.5.el4.i386", "4Desktop:devhelp-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-0:0.10-0.5.el4.src", "4Desktop:devhelp-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.5.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.5.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.5.el4.x86_64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.6-0.1.el4.src", "4Desktop:seamonkey-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.5.el4.i386", "4ES:devhelp-0:0.10-0.5.el4.ppc", "4ES:devhelp-0:0.10-0.5.el4.src", "4ES:devhelp-0:0.10-0.5.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.5.el4.i386", "4ES:devhelp-devel-0:0.10-0.5.el4.ppc", "4ES:devhelp-devel-0:0.10-0.5.el4.x86_64", "4ES:seamonkey-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-0:1.0.6-0.1.el4.src", "4ES:seamonkey-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.6-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.5.el4.i386", "4WS:devhelp-0:0.10-0.5.el4.ppc", "4WS:devhelp-0:0.10-0.5.el4.src", "4WS:devhelp-0:0.10-0.5.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.5.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.5.el4.i386", "4WS:devhelp-devel-0:0.10-0.5.el4.ppc", "4WS:devhelp-devel-0:0.10-0.5.el4.x86_64", "4WS:seamonkey-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-0:1.0.6-0.1.el4.src", "4WS:seamonkey-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.6-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.6-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0734" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "seamonkey \u003c 1.0.6 multiple vulnerabilities" } ] }
rhsa-2006_0735
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the way Thunderbird processes certain malformed\nJavascript code. A malicious HTML mail message could cause the execution of\nJavascript code in such a way that could cause Thunderbird to crash or\nexecute arbitrary code as the user running Thunderbird. (CVE-2006-5463,\nCVE-2006-5747, CVE-2006-5748)\n\nSeveral flaws were found in the way Thunderbird renders HTML mail messages.\nA malicious HTML mail message could cause the mail client to crash or\npossibly execute arbitrary code as the user running Thunderbird.\n(CVE-2006-5464)\n\nA flaw was found in the way Thunderbird verifies RSA signatures. For RSA\nkeys with exponent 3 it is possible for an attacker to forge a signature\nthat would be incorrectly verified by the NSS library. Thunderbird as\nshipped trusts several root Certificate Authorities that use exponent 3. An\nattacker could have created a carefully crafted SSL certificate which would\nbe incorrectly trusted when their site was visited by a victim. This flaw\nwas previously thought to be fixed in Thunderbird 1.5.0.7, however Ulrich\nKuehn discovered the fix was incomplete (CVE-2006-5462)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains\nThunderbird version 1.5.0.8 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0735", "url": "https://access.redhat.com/errata/RHSA-2006:0735" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "214450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=214450" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0735.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T00:37:52+00:00", "generator": { "date": "2024-11-22T00:37:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0735", "initial_release_date": "2006-11-08T08:46:00+00:00", "revision_history": [ { "date": "2006-11-08T08:46:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-11-08T03:46:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:37:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.8-0.1.el4.ia64", "product": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ia64", "product_id": "thunderbird-0:1.5.0.8-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.8-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "product_id": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.8-0.1.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.8-0.1.el4.src", "product": { "name": "thunderbird-0:1.5.0.8-0.1.el4.src", "product_id": "thunderbird-0:1.5.0.8-0.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.8-0.1.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.8-0.1.el4.x86_64", "product": { "name": "thunderbird-0:1.5.0.8-0.1.el4.x86_64", "product_id": "thunderbird-0:1.5.0.8-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.8-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "product_id": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.8-0.1.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.8-0.1.el4.i386", "product": { "name": "thunderbird-0:1.5.0.8-0.1.el4.i386", "product_id": "thunderbird-0:1.5.0.8-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.8-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "product": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "product_id": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.8-0.1.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.8-0.1.el4.ppc", "product": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ppc", "product_id": "thunderbird-0:1.5.0.8-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.8-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "product": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "product_id": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.8-0.1.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.8-0.1.el4.s390x", "product": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390x", "product_id": "thunderbird-0:1.5.0.8-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.8-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "product": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "product_id": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.8-0.1.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.8-0.1.el4.s390", "product": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390", "product_id": "thunderbird-0:1.5.0.8-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.8-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "product": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "product_id": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.8-0.1.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.8-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.8-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.8-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-5462", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618211" } ], "notes": [ { "category": "description", "text": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5462" }, { "category": "external", "summary": "RHBZ#1618211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618211" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5462", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5462" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:46:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0735" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-5463", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618212" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary JavaScript bytecode via unspecified vectors involving modification of a Script object while it is executing.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5463" }, { "category": "external", "summary": "RHBZ#1618212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5463", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5463" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:46:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0735" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5464", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618214" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5464" }, { "category": "external", "summary": "RHBZ#1618214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5464", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5464" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:46:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0735" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5747", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5747" }, { "category": "external", "summary": "RHBZ#1618223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5747", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5747" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:46:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0735" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5748", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "214822" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey \u003c 1.0.6 multiple vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5748" }, { "category": "external", "summary": "RHBZ#214822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=214822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5748", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5748" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:46:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.8-0.1.el4.src", "4AS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.8-0.1.el4.src", "4ES:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.8-0.1.el4.src", "4WS:thunderbird-0:1.5.0.8-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0735" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "seamonkey \u003c 1.0.6 multiple vulnerabilities" } ] }
rhsa-2006_0733
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser.\n\nSeveral flaws were found in the way Firefox processes certain malformed\nJavascript code. A malicious web page could cause the execution of\nJavascript code in such a way that could cause Firefox to crash or execute\narbitrary code as the user running Firefox. (CVE-2006-5463, CVE-2006-5747,\nCVE-2006-5748)\n\nSeveral flaws were found in the way Firefox renders web pages. A malicious\nweb page could cause the browser to crash or possibly execute arbitrary\ncode as the user running Firefox. (CVE-2006-5464) \n\nA flaw was found in the way Firefox verifies RSA signatures. For RSA keys\nwith exponent 3 it is possible for an attacker to forge a signature that\nwould be incorrectly verified by the NSS library. Firefox as shipped trusts\nseveral root Certificate Authorities that use exponent 3. An attacker could\nhave created a carefully crafted SSL certificate which be incorrectly\ntrusted when their site was visited by a victim. This flaw was previously\nthought to be fixed in Firefox 1.5.0.7, however Ulrich Kuehn discovered the\nfix was incomplete (CVE-2006-5462)\n\nUsers of Firefox are advised to upgrade to these erratum packages, which\ncontain Firefox version 1.5.0.8 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0733", "url": "https://access.redhat.com/errata/RHSA-2006:0733" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "214445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=214445" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0733.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T00:37:41+00:00", "generator": { "date": "2024-11-22T00:37:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0733", "initial_release_date": "2006-11-08T08:30:00+00:00", "revision_history": [ { "date": "2006-11-08T08:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-11-08T03:38:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:37:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "product": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "product_id": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.8-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.8-0.1.el4.ia64", "product": { "name": "firefox-0:1.5.0.8-0.1.el4.ia64", "product_id": "firefox-0:1.5.0.8-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.8-0.1.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "product": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "product_id": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.8-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.8-0.1.el4.x86_64", "product": { "name": "firefox-0:1.5.0.8-0.1.el4.x86_64", "product_id": "firefox-0:1.5.0.8-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.8-0.1.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "product": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "product_id": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.8-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.8-0.1.el4.i386", "product": { "name": "firefox-0:1.5.0.8-0.1.el4.i386", "product_id": "firefox-0:1.5.0.8-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.8-0.1.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.8-0.1.el4.src", "product": { "name": "firefox-0:1.5.0.8-0.1.el4.src", "product_id": "firefox-0:1.5.0.8-0.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.8-0.1.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "product": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "product_id": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.8-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.8-0.1.el4.ppc", "product": { "name": "firefox-0:1.5.0.8-0.1.el4.ppc", "product_id": "firefox-0:1.5.0.8-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.8-0.1.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "product": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "product_id": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.8-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.8-0.1.el4.s390x", "product": { "name": "firefox-0:1.5.0.8-0.1.el4.s390x", "product_id": "firefox-0:1.5.0.8-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.8-0.1.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "product": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "product_id": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.8-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.8-0.1.el4.s390", "product": { "name": "firefox-0:1.5.0.8-0.1.el4.s390", "product_id": "firefox-0:1.5.0.8-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.8-0.1.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.8-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.8-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.8-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.8-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-5462", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618211" } ], "notes": [ { "category": "description", "text": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5462" }, { "category": "external", "summary": "RHBZ#1618211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618211" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5462", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5462" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0733" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-5463", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618212" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary JavaScript bytecode via unspecified vectors involving modification of a Script object while it is executing.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5463" }, { "category": "external", "summary": "RHBZ#1618212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5463", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5463" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0733" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5464", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618214" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5464" }, { "category": "external", "summary": "RHBZ#1618214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5464", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5464" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0733" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5747", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5747" }, { "category": "external", "summary": "RHBZ#1618223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5747", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5747" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0733" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-5748", "discovery_date": "2006-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "214822" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey \u003c 1.0.6 multiple vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5748" }, { "category": "external", "summary": "RHBZ#214822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=214822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5748", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5748" } ], "release_date": "2006-11-08T01:03:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-11-08T08:30:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-0:1.5.0.8-0.1.el4.src", "4AS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.8-0.1.el4.src", "4Desktop:firefox-0:1.5.0.8-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-0:1.5.0.8-0.1.el4.src", "4ES:firefox-0:1.5.0.8-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-0:1.5.0.8-0.1.el4.src", "4WS:firefox-0:1.5.0.8-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.8-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0733" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "seamonkey \u003c 1.0.6 multiple vulnerabilities" } ] }
var-200110-0176
Vulnerability from variot
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340. This vulnerability may allow an attacker to forge RSA signatures. A buffer overflow in certain Apple AirPort drivers may allow an attacker to execute arbitrary code with system privileges, or create a denial-of-service condition. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200612-06
http://security.gentoo.org/
Severity: High Title: Mozilla Thunderbird: Multiple vulnerabilities Date: December 10, 2006 Bugs: #154448 ID: 200612-06
Synopsis
Multiple vulnerabilities have been identified in Mozilla Thunderbird.
Background
Mozilla Thunderbird is a popular open-source email client from the Mozilla Project.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 mozilla-thunderbird < 1.5.0.8 >= 1.5.0.8 2 mozilla-thunderbird-bin < 1.5.0.8 >= 1.5.0.8 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures. -------------------------------------------------------------------
Description
It has been identified that Mozilla Thunderbird improperly handles Script objects while they are being executed, allowing them to be modified during execution. JavaScript is disabled in Mozilla Thunderbird by default. Mozilla Thunderbird has also been found to be vulnerable to various potential buffer overflows. Lastly, the binary release of Mozilla Thunderbird is vulnerable to a low exponent RSA signature forgery issue because it is bundled with a vulnerable version of NSS. An attacker could also entice a user to view an email containing specially crafted JavaScript and execute arbitrary code with the rights of the user running Mozilla Thunderbird. It is important to note that JavaScript is off by default in Mozilla Thunderbird, and enabling it is strongly discouraged. It is also possible for an attacker to create SSL/TLS or email certificates that would not be detected as invalid by the binary release of Mozilla Thunderbird, raising the possibility for Man-in-the-Middle attacks.
Workaround
There is no known workaround at this time.
Resolution
Users upgrading to the following releases of Mozilla Thunderbird should note that this version of Mozilla Thunderbird has been found to not display certain messages in some cases.
All Mozilla Thunderbird users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.8"
All Mozilla Thunderbird binary release users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.8"
References
[ 1 ] CVE-2006-5462 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462 [ 2 ] CVE-2006-5463 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463 [ 3 ] CVE-2006-5464 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464 [ 4 ] CVE-2006-5747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747 [ 5 ] CVE-2006-5748 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748 [ 6 ] Mozilla Thunderbird Email Loss Bug https://bugzilla.mozilla.org/show_bug.cgi?id=360409
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
Background
The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as 'Mozilla Application Suite'.
To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German.
The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios.
This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links
Read the full description: http://corporate.secunia.com/products/48/?r=l
Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l
TITLE: Apple Airport Probe Response Kernel Memory Corruption Vulnerability
SECUNIA ADVISORY ID: SA22679
VERIFY ADVISORY: http://secunia.com/advisories/22679/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/
DESCRIPTION: H.D. Moore has reported a vulnerability in the Apple Airport driver, which potentially can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an error in the Airport driver provided with Orinoco-based Airport cards when handling probe response frames. This can be exploited to overwrite kernel memory and potentially execute arbitrary code when the driver is running in active scanning mode.
The vulnerability is reported in the driver on a PowerBook running version 10.4.8.
SOLUTION: Do not place the card into active scanning mode.
PROVIDED AND/OR DISCOVERED BY: H D Moore
ORIGINAL ADVISORY: http://projects.info-pull.com/mokb/MOKB-01-11-2006.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. =========================================================== Ubuntu Security Notice USN-381-1 November 16, 2006 firefox vulnerabilities CVE-2006-5462, CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 5.10 Ubuntu 6.06 LTS
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 5.10: firefox 1.5.dfsg+1.5.0.8-0ubuntu0.5.10 firefox-dev 1.5.dfsg+1.5.0.8-0ubuntu0.5.10
Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.8-0ubuntu0.6.06 firefox-dev 1.5.dfsg+1.5.0.8-0ubuntu0.6.06 libnspr-dev 1.5.dfsg+1.5.0.8-0ubuntu0.6.06 libnspr4 1.5.dfsg+1.5.0.8-0ubuntu0.6.06 libnss-dev 1.5.dfsg+1.5.0.8-0ubuntu0.6.06 libnss3 1.5.dfsg+1.5.0.8-0ubuntu0.6.06
After a standard system upgrade you need to restart Firefox to effect the necessary changes.
Details follow:
USN-351-1 fixed a flaw in the verification of PKCS certificate signatures. Ulrich Kuehn discovered a variant of the original attack which the original fix did not cover. (CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748)
Updated packages for Ubuntu 5.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10.diff.gz
Size/MD5: 177335 10b377fae580ae8f70363ffd70e47269
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10.dsc
Size/MD5: 1056 5db441b8802f27c49571095404b73bb7
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8.orig.tar.gz
Size/MD5: 44080423 9716c747d634997ec34dbf5f2e9ed80f
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_all.deb
Size/MD5: 49586 9c0480fccb28d05f504b4b07811bccc1
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_all.deb
Size/MD5: 50476 ad8be2b891ceb1884c64b04057201418
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb
Size/MD5: 82786 7c57efcd467f65b5fddb99045f368cde
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb
Size/MD5: 10228966 98741e95215a819e389680e91f18e72e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb
Size/MD5: 3152342 e0ab77c6e143bb59b43fd92d34b68900
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb
Size/MD5: 216484 8c13b0af86b6f83f5ee92e6367a887d7
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb
Size/MD5: 210022 38257be6e6a43928bb10802118a264af
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb
Size/MD5: 75156 0d8a65e5fa64cb0e4230e85e975a05d7
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb
Size/MD5: 3152316 f4b306a5bf76d7788c581ae969a754d0
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb
Size/MD5: 8651302 6f375546f6d948932f4a1652b3569e70
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb
Size/MD5: 3152444 7293cd7542ea90e41823b76b822a6e8b
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb
Size/MD5: 213430 b274f35517ffb38ce880679d79764a52
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb
Size/MD5: 78406 41578a0497fce59bee796ff4fcdaab3c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb
Size/MD5: 9831168 0aabf7e840fef774adc05edef039caad
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb
Size/MD5: 76784 d69cac5024601a5ea20074e9964e288e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb
Size/MD5: 9166628 27f5d52e3c828c8b1604b0982dda7cc3
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb
Size/MD5: 210978 4a5ffba99714c584ca8e349b988c4400
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb
Size/MD5: 3152400 65ee6a126404960525e73d7c32d587d7
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06.diff.gz
Size/MD5: 175871 52f1c28309ee6c7ef8c2f1d43d963cf8
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06.dsc
Size/MD5: 1113 cd1281da2de45441a5a3e6034a38ab13
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8.orig.tar.gz
Size/MD5: 44080423 9716c747d634997ec34dbf5f2e9ed80f
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_all.deb
Size/MD5: 49602 ab797aec8733b6c3e2280cdb09b64d1a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_all.deb
Size/MD5: 50490 1b3e5005f5e3fa797b3682b200cc50d4
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 47328882 934c4351e36288e88e1168c041542f5a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 2798910 7ee44fb3180623ce8a3a1f9efeb0d419
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 216552 92a1743a061e332e080a626dbd399570
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 82776 7d4b77da6a355c5e9f0113aaba778b03
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 9420500 dc95e234fc1c321b64073816aa347550
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 219228 e12302edf6ea04accaf83a8879dff274
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 162300 35187fec0d3be43ef0aa9bd83dfabd6b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 236150 c98d56050fe2e27e3915acf2662aa8d4
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb
Size/MD5: 757954 8ee38f642969b44e7d342d89e0c91dfd
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 43902878 41afd17ae29b433ff26e51ef80e04599
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 2798856 219ca82f455cad14a0021c0f66d6e8c0
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 209962 02b36bc31e994256b74dd3d84dba7254
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 75136 388a11c39a72e0a9a1969a5a1c0a48f8
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 7932082 d6b266569d4bf056aa04a760459b8fc8
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 219220 38b33e647137f579876b9047657fe390
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 146980 57afd15fd3b17f8d5bf53b72592889e4
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 236146 3936122367330caea7cf573973bdb0a2
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb
Size/MD5: 670102 67a930f2102173f1c84dd0ddf751b388
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 48721788 ad5ed6cebb6c5c97521e8416cbb6ba06
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 2798932 aa5d623d34acb2bea9e7a1dc21e891dc
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 213390 0323fadebfa079e9724e1cf3e930b977
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 78300 fda19c102717648e93f332314c0d8020
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 9031548 360d013efe74f061ba266d4ae7ff9177
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 219224 7385d32cb21f0b83933822c4495a6783
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 159522 ee71fefedbaade594b3b0064524db684
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 236156 8ea5d14656d349724f5b254e035dfc2f
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb
Size/MD5: 768836 19b4c155f8c00ccff6656590d4ffc3be
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 45291164 417432698e5e51ae96d59ac90cc8390a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 2798918 6d3cfdc63c80688263b567e06e876d74
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 210898 d8884f2ae360e55fdcad1b1ef8b3e338
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 76754 68db0c6ff37422083ed5f0a46103a723
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 8425346 ea28be8619f1411eaff2f7fba07a47f5
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 219232 a81a2dedef311f71a8c3ae1b96d7b9d1
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 149470 08152c38d3129bc6bf3164d6f48727cc
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 236140 3b742ce49bbb397b1de45a8371672828
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb
Size/MD5: 682188 d4155e8163fed88108c17a31d0320e69
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 1225-1 security@debian.org http://www.debian.org/security/ Martin Schulze December 3rd, 2006 http://www.debian.org/security/faq
Package : mozilla-firefox Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2006-4310 CVE-2006-5462 CVE-2006-5463 CVE-2006-5464 CVE-2006-5748 CERT advisories: VU#335392 VU#390480 VU#495288 VU#714496 BugTraq IDs : 19678 20957
Several security related problems have been discovered in Mozilla and derived products such as Mozilla Firefox. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:
CVE-2006-4310
Tomas Kempinsky discovered that malformed FTP server responses
could lead to denial of service.
CVE-2006-5462
Ulrich K\xfchn discovered that the correction for a cryptographic
flaw in the handling of PKCS-1 certificates was incomplete, which
allows the forgery of certificates.
CVE-2006-5463
"shutdown" discovered that modification of JavaScript objects
during execution could lead to the execution of arbitrary
JavaScript bytecode.
CVE-2006-5464
Jesse Ruderman and Martijn Wargers discovered several crashes in
the layout engine, which might also allow execution of arbitrary
code.
CVE-2006-5748
Igor Bukanov and Jesse Ruderman discovered several crashes in the
JavaScript engine, which might allow execution of arbitrary code.
This update also adresses several crashes, which could be triggered by malicious websites and fixes a regression introduced in the previous Mozilla update.
For the stable distribution (sarge) these problems have been fixed in version 1.0.4-2sarge13.
For the unstable distribution (sid) these problems have been fixed in the current iceweasel package 2.0+dfsg-1.
We recommend that you upgrade your mozilla-firefox package.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.dsc
Size/MD5 checksum: 1003 4a8d05c1e9563e6066ca838e7c0b2f53
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.diff.gz
Size/MD5 checksum: 450265 46d4bedf12a1e0c92a275ae012d92b5a
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d
Alpha architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_alpha.deb
Size/MD5 checksum: 11182242 388bf02a94456182cd7a39187886875a
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_alpha.deb
Size/MD5 checksum: 170908 4cbff185bb88b1c7e11791059cd83142
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_alpha.deb
Size/MD5 checksum: 62736 f42571aa18001fc521be0f5348eb9511
AMD64 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_amd64.deb
Size/MD5 checksum: 9412474 fcd7ced169a47d7413197a918047036a
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_amd64.deb
Size/MD5 checksum: 165706 931ebeee155ac01fcecb1467388a2fab
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_amd64.deb
Size/MD5 checksum: 61276 cf839454fe9e09a0b58641353f9c75c6
ARM architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_arm.deb
Size/MD5 checksum: 8233670 39a042f6300c805ad372828fd115cab0
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_arm.deb
Size/MD5 checksum: 157176 873eb90c91c98e1c4168f215b493fd74
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_arm.deb
Size/MD5 checksum: 56586 c53ca4b95b188684381338eae43603cc
HP Precision architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_hppa.deb
Size/MD5 checksum: 10287242 8a7eddef738dfe4eb164bd5e486474a2
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_hppa.deb
Size/MD5 checksum: 168624 fa195e512062a19cf92018de4009160d
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_hppa.deb
Size/MD5 checksum: 61736 b0dbfbbce97f954c9487a126d20b9a90
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_i386.deb
Size/MD5 checksum: 8908194 9cfe0ac430050c7d62066cd3f8beb64f
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_i386.deb
Size/MD5 checksum: 160902 77a78dd1eac37417b4a5629e745e4391
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_i386.deb
Size/MD5 checksum: 58124 f82b3d3fc66e1054d5da72a69ab9bd20
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_ia64.deb
Size/MD5 checksum: 11646376 83d5349be8156e1f95eb75da89beb578
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_ia64.deb
Size/MD5 checksum: 171244 46ae3d6d9112d31f92407922832e6599
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_ia64.deb
Size/MD5 checksum: 65934 690969e2e7a865faee22ed6fb8a88384
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_m68k.deb
Size/MD5 checksum: 8186050 ab9f31d6cbd9ff6c1820c59ef1e44ce7
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_m68k.deb
Size/MD5 checksum: 159792 69c3cf68fc12fd5fb3929339aa8cd9cb
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_m68k.deb
Size/MD5 checksum: 57394 14636fe25df3a18c536819129e83e1a0
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_mips.deb
Size/MD5 checksum: 9943474 75b7796d42079421a151bfac35a17f95
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_mips.deb
Size/MD5 checksum: 158694 a3c6f1c71947cb5e9c2fc8d8acece832
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_mips.deb
Size/MD5 checksum: 58386 395683ab3ebb0983e24bc3afde8d28f5
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_mipsel.deb
Size/MD5 checksum: 9819470 41ecbd5f3543c0b110771e93e2307abc
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_mipsel.deb
Size/MD5 checksum: 157672 43ca2a353bacf378a2dc7dfa9a7f3a73
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_mipsel.deb
Size/MD5 checksum: 57634 8d16796108c3a7627ab9654e977277a5
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_powerpc.deb
Size/MD5 checksum: 8580222 c2f239d0961911962bea6b7f7bf1cdc1
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_powerpc.deb
Size/MD5 checksum: 159320 5a5ea9d8a9f7a845bc1898b0c9976112
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_powerpc.deb
Size/MD5 checksum: 60508 3ce3df0f45aeef3acb1964960bf76406
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_s390.deb
Size/MD5 checksum: 9650866 9fd3e3788898152580a0ab344112b5ab
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_s390.deb
Size/MD5 checksum: 166290 70bcea0f67fc9d0288c75bb2ad8e7b36
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_s390.deb
Size/MD5 checksum: 60696 7d6b7a3cf65fa798f3e41275f4bb9967
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_sparc.deb
Size/MD5 checksum: 8672090 c32301aeb3eb3ebbad2ff26f56d3e9ee
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_sparc.deb
Size/MD5 checksum: 159508 7c3fd5b5a0c78c8abf09082dcb06bbfc
http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_sparc.deb
Size/MD5 checksum: 56946 0b154ceb732d771ca492e4d98ea21350
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFcvzPW5ql+IAeqTIRAv/HAJwNUC+NOPCf2Nq1161rGipNubPqDQCfWnmg FvfjUK0FBtQjuT9x9Fg3gu8= =1YQv -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200110-0176", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "thunderbird", "scope": "eq", "trust": 1.9, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": null, "scope": null, "trust": 1.6, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ubuntu", "version": null }, { "model": "thunderbird", "scope": "eq", "trust": 1.6, "vendor": "mozilla", "version": "1.5.0.4" }, { "model": "firefox", "scope": "eq", "trust": 1.6, "vendor": "mozilla", "version": "1.5.0.1" }, { "model": "firefox", "scope": "eq", "trust": 1.6, "vendor": "mozilla", "version": "1.5.0.2" }, { "model": "thunderbird", "scope": "eq", "trust": 1.6, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "firefox", "scope": "eq", "trust": 1.6, "vendor": "mozilla", "version": "1.5" }, { "model": "thunderbird", "scope": "eq", "trust": 1.6, "vendor": "mozilla", "version": "1.5.0.3" }, { "model": "thunderbird", "scope": "eq", "trust": 1.6, "vendor": "mozilla", "version": "1.5.0.2" }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "seamonkey", "scope": "eq", "trust": 1.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "seamonkey", "scope": "eq", "trust": 1.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "firefox", "scope": "eq", "trust": 1.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "firefox", "scope": "eq", "trust": 1.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "firefox", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "firefox", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.5.0.4" }, { "model": "thunderbird", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.5" }, { "model": "seamonkey", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.0" }, { "model": "firefox", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.5.0.3" }, { "model": "seamonkey", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.0.2" }, { "model": "thunderbird", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.5.0.1" }, { "model": "seamonkey", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.0.1" }, { "model": "network security services", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "3.11.3" }, { "model": "seamonkey", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": "1.0.4" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rpath", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#335392" }, { "db": "CERT/CC", "id": "VU#247744" }, { "db": "CERT/CC", "id": "VU#191336" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200611-148" }, { "db": "NVD", "id": "CVE-2006-5462" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-5462" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "shutdown shutdown@flashmail.comJesse Ruderman jruderman@gmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200611-148" } ], "trust": 0.6 }, "cve": "CVE-2006-5462", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-5462", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#335392", "trust": 0.8, "value": "7.56" }, { "author": "CARNEGIE MELLON", "id": "VU#247744", "trust": 0.8, "value": "0.28" }, { "author": "CARNEGIE MELLON", "id": "VU#191336", "trust": 0.8, "value": "0.34" }, { "author": "CARNEGIE MELLON", "id": "VU#547300", "trust": 0.8, "value": "2.53" }, { "author": "CNNVD", "id": "CNNVD-200611-148", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#335392" }, { "db": "CERT/CC", "id": "VU#247744" }, { "db": "CERT/CC", "id": "VU#191336" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "CNNVD", "id": "CNNVD-200611-148" }, { "db": "NVD", "id": "CVE-2006-5462" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340. This vulnerability may allow an attacker to forge RSA signatures. A buffer overflow in certain Apple AirPort drivers may allow an attacker to execute arbitrary code with system privileges, or create a denial-of-service condition. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200612-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Mozilla Thunderbird: Multiple vulnerabilities\n Date: December 10, 2006\n Bugs: #154448\n ID: 200612-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been identified in Mozilla Thunderbird. \n\nBackground\n==========\n\nMozilla Thunderbird is a popular open-source email client from the\nMozilla Project. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 mozilla-thunderbird \u003c 1.5.0.8 \u003e= 1.5.0.8\n 2 mozilla-thunderbird-bin \u003c 1.5.0.8 \u003e= 1.5.0.8\n -------------------------------------------------------------------\n 2 affected packages on all of their supported architectures. \n -------------------------------------------------------------------\n\nDescription\n===========\n\nIt has been identified that Mozilla Thunderbird improperly handles\nScript objects while they are being executed, allowing them to be\nmodified during execution. JavaScript is disabled in Mozilla\nThunderbird by default. Mozilla Thunderbird has also been found to be\nvulnerable to various potential buffer overflows. Lastly, the binary\nrelease of Mozilla Thunderbird is vulnerable to a low exponent RSA\nsignature forgery issue because it is bundled with a vulnerable version\nof NSS. An attacker could also entice a user to view an\nemail containing specially crafted JavaScript and execute arbitrary\ncode with the rights of the user running Mozilla Thunderbird. It is\nimportant to note that JavaScript is off by default in Mozilla\nThunderbird, and enabling it is strongly discouraged. It is also\npossible for an attacker to create SSL/TLS or email certificates that\nwould not be detected as invalid by the binary release of Mozilla\nThunderbird, raising the possibility for Man-in-the-Middle attacks. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nUsers upgrading to the following releases of Mozilla Thunderbird should\nnote that this version of Mozilla Thunderbird has been found to not\ndisplay certain messages in some cases. \n\n\u003c/br\u003e \n\n\u003c/br\u003e All Mozilla Thunderbird users should upgrade to the latest\nversion:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=mail-client/mozilla-thunderbird-1.5.0.8\"\n\nAll Mozilla Thunderbird binary release users should upgrade to the\nlatest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=mail-client/mozilla-thunderbird-bin-1.5.0.8\"\n\nReferences\n==========\n\n [ 1 ] CVE-2006-5462\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462\n [ 2 ] CVE-2006-5463\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463\n [ 3 ] CVE-2006-5464\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464\n [ 4 ] CVE-2006-5747\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747\n [ 5 ] CVE-2006-5748\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748\n [ 6 ] Mozilla Thunderbird Email Loss Bug\n https://bugzilla.mozilla.org/show_bug.cgi?id=360409\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200612-06.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2006 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nBackground\n==========\n\nThe SeaMonkey project is a community effort to deliver\nproduction-quality releases of code derived from the application\nformerly known as \u0027Mozilla Application Suite\u0027. \n\n----------------------------------------------------------------------\n\nTo improve our services to our customers, we have made a number of\nadditions to the Secunia Advisories and have started translating the\nadvisories to German. \n\nThe improvements will help our customers to get a better\nunderstanding of how we reached our conclusions, how it was rated,\nour thoughts on exploitation, attack vectors, and scenarios. \n\nThis includes:\n* Reason for rating\n* Extended description\n* Extended solution\n* Exploit code or links to exploit code\n* Deep links\n\nRead the full description:\nhttp://corporate.secunia.com/products/48/?r=l\n\nContact Secunia Sales for more information:\nhttp://corporate.secunia.com/how_to_buy/15/?r=l\n\n----------------------------------------------------------------------\n\nTITLE:\nApple Airport Probe Response Kernel Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA22679\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/22679/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nH.D. Moore has reported a vulnerability in the Apple Airport driver,\nwhich potentially can be exploited by malicious people to compromise\na vulnerable system. \n\nThe vulnerability is caused due to an error in the Airport driver\nprovided with Orinoco-based Airport cards when handling probe\nresponse frames. This can be exploited to overwrite kernel memory and\npotentially execute arbitrary code when the driver is running in\nactive scanning mode. \n\nThe vulnerability is reported in the driver on a PowerBook running\nversion 10.4.8. \n\nSOLUTION:\nDo not place the card into active scanning mode. \n\nPROVIDED AND/OR DISCOVERED BY:\nH D Moore\n\nORIGINAL ADVISORY:\nhttp://projects.info-pull.com/mokb/MOKB-01-11-2006.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. =========================================================== \nUbuntu Security Notice USN-381-1 November 16, 2006\nfirefox vulnerabilities\nCVE-2006-5462, CVE-2006-5463, CVE-2006-5464, CVE-2006-5747,\nCVE-2006-5748\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 5.10\nUbuntu 6.06 LTS\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 5.10:\n firefox 1.5.dfsg+1.5.0.8-0ubuntu0.5.10\n firefox-dev 1.5.dfsg+1.5.0.8-0ubuntu0.5.10\n\nUbuntu 6.06 LTS:\n firefox 1.5.dfsg+1.5.0.8-0ubuntu0.6.06\n firefox-dev 1.5.dfsg+1.5.0.8-0ubuntu0.6.06\n libnspr-dev 1.5.dfsg+1.5.0.8-0ubuntu0.6.06\n libnspr4 1.5.dfsg+1.5.0.8-0ubuntu0.6.06\n libnss-dev 1.5.dfsg+1.5.0.8-0ubuntu0.6.06\n libnss3 1.5.dfsg+1.5.0.8-0ubuntu0.6.06\n\nAfter a standard system upgrade you need to restart Firefox to\neffect the necessary changes. \n\nDetails follow:\n\nUSN-351-1 fixed a flaw in the verification of PKCS certificate\nsignatures. Ulrich Kuehn discovered a variant of the original attack\nwhich the original fix did not cover. (CVE-2006-5463,\nCVE-2006-5464, CVE-2006-5747, CVE-2006-5748)\n\n\nUpdated packages for Ubuntu 5.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10.diff.gz\n Size/MD5: 177335 10b377fae580ae8f70363ffd70e47269\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10.dsc\n Size/MD5: 1056 5db441b8802f27c49571095404b73bb7\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8.orig.tar.gz\n Size/MD5: 44080423 9716c747d634997ec34dbf5f2e9ed80f\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_all.deb\n Size/MD5: 49586 9c0480fccb28d05f504b4b07811bccc1\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_all.deb\n Size/MD5: 50476 ad8be2b891ceb1884c64b04057201418\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb\n Size/MD5: 82786 7c57efcd467f65b5fddb99045f368cde\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb\n Size/MD5: 10228966 98741e95215a819e389680e91f18e72e\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb\n Size/MD5: 3152342 e0ab77c6e143bb59b43fd92d34b68900\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb\n Size/MD5: 216484 8c13b0af86b6f83f5ee92e6367a887d7\n\n i386 architecture (x86 compatible Intel/AMD)\n\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb\n Size/MD5: 210022 38257be6e6a43928bb10802118a264af\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb\n Size/MD5: 75156 0d8a65e5fa64cb0e4230e85e975a05d7\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb\n Size/MD5: 3152316 f4b306a5bf76d7788c581ae969a754d0\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb\n Size/MD5: 8651302 6f375546f6d948932f4a1652b3569e70\n\n powerpc architecture (Apple Macintosh G3/G4/G5)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb\n Size/MD5: 3152444 7293cd7542ea90e41823b76b822a6e8b\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb\n Size/MD5: 213430 b274f35517ffb38ce880679d79764a52\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb\n Size/MD5: 78406 41578a0497fce59bee796ff4fcdaab3c\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb\n Size/MD5: 9831168 0aabf7e840fef774adc05edef039caad\n\n sparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb\n Size/MD5: 76784 d69cac5024601a5ea20074e9964e288e\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb\n Size/MD5: 9166628 27f5d52e3c828c8b1604b0982dda7cc3\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb\n Size/MD5: 210978 4a5ffba99714c584ca8e349b988c4400\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb\n Size/MD5: 3152400 65ee6a126404960525e73d7c32d587d7\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06.diff.gz\n Size/MD5: 175871 52f1c28309ee6c7ef8c2f1d43d963cf8\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06.dsc\n Size/MD5: 1113 cd1281da2de45441a5a3e6034a38ab13\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8.orig.tar.gz\n Size/MD5: 44080423 9716c747d634997ec34dbf5f2e9ed80f\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_all.deb\n Size/MD5: 49602 ab797aec8733b6c3e2280cdb09b64d1a\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_all.deb\n Size/MD5: 50490 1b3e5005f5e3fa797b3682b200cc50d4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 47328882 934c4351e36288e88e1168c041542f5a\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 2798910 7ee44fb3180623ce8a3a1f9efeb0d419\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 216552 92a1743a061e332e080a626dbd399570\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 82776 7d4b77da6a355c5e9f0113aaba778b03\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 9420500 dc95e234fc1c321b64073816aa347550\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 219228 e12302edf6ea04accaf83a8879dff274\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 162300 35187fec0d3be43ef0aa9bd83dfabd6b\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 236150 c98d56050fe2e27e3915acf2662aa8d4\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb\n Size/MD5: 757954 8ee38f642969b44e7d342d89e0c91dfd\n\n i386 architecture (x86 compatible Intel/AMD)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 43902878 41afd17ae29b433ff26e51ef80e04599\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 2798856 219ca82f455cad14a0021c0f66d6e8c0\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 209962 02b36bc31e994256b74dd3d84dba7254\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 75136 388a11c39a72e0a9a1969a5a1c0a48f8\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 7932082 d6b266569d4bf056aa04a760459b8fc8\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 219220 38b33e647137f579876b9047657fe390\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 146980 57afd15fd3b17f8d5bf53b72592889e4\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 236146 3936122367330caea7cf573973bdb0a2\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb\n Size/MD5: 670102 67a930f2102173f1c84dd0ddf751b388\n\n powerpc architecture (Apple Macintosh G3/G4/G5)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 48721788 ad5ed6cebb6c5c97521e8416cbb6ba06\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 2798932 aa5d623d34acb2bea9e7a1dc21e891dc\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 213390 0323fadebfa079e9724e1cf3e930b977\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 78300 fda19c102717648e93f332314c0d8020\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 9031548 360d013efe74f061ba266d4ae7ff9177\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 219224 7385d32cb21f0b83933822c4495a6783\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 159522 ee71fefedbaade594b3b0064524db684\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 236156 8ea5d14656d349724f5b254e035dfc2f\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb\n Size/MD5: 768836 19b4c155f8c00ccff6656590d4ffc3be\n\n sparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 45291164 417432698e5e51ae96d59ac90cc8390a\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 2798918 6d3cfdc63c80688263b567e06e876d74\n http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 210898 d8884f2ae360e55fdcad1b1ef8b3e338\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 76754 68db0c6ff37422083ed5f0a46103a723\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 8425346 ea28be8619f1411eaff2f7fba07a47f5\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 219232 a81a2dedef311f71a8c3ae1b96d7b9d1\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 149470 08152c38d3129bc6bf3164d6f48727cc\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 236140 3b742ce49bbb397b1de45a8371672828\n http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb\n Size/MD5: 682188 d4155e8163fed88108c17a31d0320e69\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1225-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nDecember 3rd, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla-firefox\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-4310 CVE-2006-5462 CVE-2006-5463 CVE-2006-5464\n CVE-2006-5748\nCERT advisories: VU#335392 VU#390480 VU#495288 VU#714496 \nBugTraq IDs : 19678 20957\n\nSeveral security related problems have been discovered in Mozilla and\nderived products such as Mozilla Firefox. The Common Vulnerabilities\nand Exposures project identifies the following vulnerabilities:\n\nCVE-2006-4310\n\n Tomas Kempinsky discovered that malformed FTP server responses\n could lead to denial of service. \n\nCVE-2006-5462\n\n Ulrich K\\xfchn discovered that the correction for a cryptographic\n flaw in the handling of PKCS-1 certificates was incomplete, which\n allows the forgery of certificates. \n\nCVE-2006-5463\n\n \"shutdown\" discovered that modification of JavaScript objects\n during execution could lead to the execution of arbitrary\n JavaScript bytecode. \n\nCVE-2006-5464\n\n Jesse Ruderman and Martijn Wargers discovered several crashes in\n the layout engine, which might also allow execution of arbitrary\n code. \n\nCVE-2006-5748\n\n Igor Bukanov and Jesse Ruderman discovered several crashes in the\n JavaScript engine, which might allow execution of arbitrary code. \n\nThis update also adresses several crashes, which could be triggered by\nmalicious websites and fixes a regression introduced in the previous\nMozilla update. \n\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.0.4-2sarge13. \n\nFor the unstable distribution (sid) these problems have been fixed in\nthe current iceweasel package 2.0+dfsg-1. \n\nWe recommend that you upgrade your mozilla-firefox package. \n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.dsc\n Size/MD5 checksum: 1003 4a8d05c1e9563e6066ca838e7c0b2f53\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.diff.gz\n Size/MD5 checksum: 450265 46d4bedf12a1e0c92a275ae012d92b5a\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz\n Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_alpha.deb\n Size/MD5 checksum: 11182242 388bf02a94456182cd7a39187886875a\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_alpha.deb\n Size/MD5 checksum: 170908 4cbff185bb88b1c7e11791059cd83142\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_alpha.deb\n Size/MD5 checksum: 62736 f42571aa18001fc521be0f5348eb9511\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_amd64.deb\n Size/MD5 checksum: 9412474 fcd7ced169a47d7413197a918047036a\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_amd64.deb\n Size/MD5 checksum: 165706 931ebeee155ac01fcecb1467388a2fab\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_amd64.deb\n Size/MD5 checksum: 61276 cf839454fe9e09a0b58641353f9c75c6\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_arm.deb\n Size/MD5 checksum: 8233670 39a042f6300c805ad372828fd115cab0\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_arm.deb\n Size/MD5 checksum: 157176 873eb90c91c98e1c4168f215b493fd74\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_arm.deb\n Size/MD5 checksum: 56586 c53ca4b95b188684381338eae43603cc\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_hppa.deb\n Size/MD5 checksum: 10287242 8a7eddef738dfe4eb164bd5e486474a2\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_hppa.deb\n Size/MD5 checksum: 168624 fa195e512062a19cf92018de4009160d\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_hppa.deb\n Size/MD5 checksum: 61736 b0dbfbbce97f954c9487a126d20b9a90\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_i386.deb\n Size/MD5 checksum: 8908194 9cfe0ac430050c7d62066cd3f8beb64f\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_i386.deb\n Size/MD5 checksum: 160902 77a78dd1eac37417b4a5629e745e4391\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_i386.deb\n Size/MD5 checksum: 58124 f82b3d3fc66e1054d5da72a69ab9bd20\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_ia64.deb\n Size/MD5 checksum: 11646376 83d5349be8156e1f95eb75da89beb578\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_ia64.deb\n Size/MD5 checksum: 171244 46ae3d6d9112d31f92407922832e6599\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_ia64.deb\n Size/MD5 checksum: 65934 690969e2e7a865faee22ed6fb8a88384\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_m68k.deb\n Size/MD5 checksum: 8186050 ab9f31d6cbd9ff6c1820c59ef1e44ce7\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_m68k.deb\n Size/MD5 checksum: 159792 69c3cf68fc12fd5fb3929339aa8cd9cb\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_m68k.deb\n Size/MD5 checksum: 57394 14636fe25df3a18c536819129e83e1a0\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_mips.deb\n Size/MD5 checksum: 9943474 75b7796d42079421a151bfac35a17f95\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_mips.deb\n Size/MD5 checksum: 158694 a3c6f1c71947cb5e9c2fc8d8acece832\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_mips.deb\n Size/MD5 checksum: 58386 395683ab3ebb0983e24bc3afde8d28f5\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_mipsel.deb\n Size/MD5 checksum: 9819470 41ecbd5f3543c0b110771e93e2307abc\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_mipsel.deb\n Size/MD5 checksum: 157672 43ca2a353bacf378a2dc7dfa9a7f3a73\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_mipsel.deb\n Size/MD5 checksum: 57634 8d16796108c3a7627ab9654e977277a5\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_powerpc.deb\n Size/MD5 checksum: 8580222 c2f239d0961911962bea6b7f7bf1cdc1\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_powerpc.deb\n Size/MD5 checksum: 159320 5a5ea9d8a9f7a845bc1898b0c9976112\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_powerpc.deb\n Size/MD5 checksum: 60508 3ce3df0f45aeef3acb1964960bf76406\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_s390.deb\n Size/MD5 checksum: 9650866 9fd3e3788898152580a0ab344112b5ab\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_s390.deb\n Size/MD5 checksum: 166290 70bcea0f67fc9d0288c75bb2ad8e7b36\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_s390.deb\n Size/MD5 checksum: 60696 7d6b7a3cf65fa798f3e41275f4bb9967\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_sparc.deb\n Size/MD5 checksum: 8672090 c32301aeb3eb3ebbad2ff26f56d3e9ee\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_sparc.deb\n Size/MD5 checksum: 159508 7c3fd5b5a0c78c8abf09082dcb06bbfc\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_sparc.deb\n Size/MD5 checksum: 56946 0b154ceb732d771ca492e4d98ea21350\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (GNU/Linux)\n\niD8DBQFFcvzPW5ql+IAeqTIRAv/HAJwNUC+NOPCf2Nq1161rGipNubPqDQCfWnmg\nFvfjUK0FBtQjuT9x9Fg3gu8=\n=1YQv\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-5462" }, { "db": "CERT/CC", "id": "VU#335392" }, { "db": "CERT/CC", "id": "VU#247744" }, { "db": "CERT/CC", "id": "VU#191336" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52925" }, { "db": "PACKETSTORM", "id": "52927" }, { "db": "PACKETSTORM", "id": "51595" }, { "db": "PACKETSTORM", "id": "52429" }, { "db": "PACKETSTORM", "id": "52766" }, { "db": "PACKETSTORM", "id": "52759" }, { "db": "PACKETSTORM", "id": "52758" }, { "db": "PACKETSTORM", "id": "52926" } ], "trust": 4.77 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-5462", "trust": 2.6 }, { "db": "SECUNIA", "id": "23009", "trust": 2.4 }, { "db": "SECUNIA", "id": "23013", "trust": 2.4 }, { "db": "SECUNIA", "id": "22727", "trust": 2.4 }, { "db": "SECUNIA", "id": "23883", "trust": 2.4 }, { "db": "SECUNIA", "id": "22722", "trust": 2.4 }, { "db": "SECUNIA", "id": "22763", "trust": 2.4 }, { "db": "SECUNIA", "id": "22929", "trust": 2.4 }, { "db": "SECUNIA", "id": "22815", "trust": 2.4 }, { "db": "SECUNIA", "id": "22770", "trust": 2.4 }, { "db": "SECUNIA", "id": "22980", "trust": 2.4 }, { "db": "CERT/CC", "id": "VU#335392", "trust": 2.4 }, { "db": "SECUNIA", "id": "22259", "trust": 1.6 }, { "db": "SECUNIA", "id": "23155", "trust": 1.6 }, { "db": "SECUNIA", "id": "23280", "trust": 1.6 }, { "db": "SECUNIA", "id": "23309", "trust": 1.6 }, { "db": "SECUNIA", "id": "22094", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-0083", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2007-0293", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2007-1198", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-4387", "trust": 1.6 }, { "db": "SECUNIA", "id": "23263", "trust": 1.6 }, { "db": "SECUNIA", "id": "24711", "trust": 1.6 }, { "db": "SECUNIA", "id": "23202", "trust": 1.6 }, { "db": "SECUNIA", "id": "23297", "trust": 1.6 }, { "db": "SECUNIA", "id": "23197", "trust": 1.6 }, { "db": "SECUNIA", "id": "22817", "trust": 1.6 }, { "db": "SECUNIA", "id": "22066", "trust": 1.6 }, { "db": "SECUNIA", "id": "22737", "trust": 1.6 }, { "db": "SECUNIA", "id": "23235", "trust": 1.6 }, { "db": "SECUNIA", "id": "23287", "trust": 1.6 }, { "db": "SECUNIA", "id": "22965", "trust": 1.6 }, { "db": "SECTRACK", "id": "1017182", "trust": 1.6 }, { "db": "SECTRACK", "id": "1017180", "trust": 1.6 }, { "db": "SECTRACK", "id": "1017181", "trust": 1.6 }, { "db": "USCERT", "id": "TA06-312A", "trust": 1.6 }, { "db": "BID", "id": "19849", "trust": 1.1 }, { "db": "SECUNIA", "id": "22679", "trust": 0.9 }, { "db": "SECUNIA", "id": "23340", "trust": 0.8 }, { "db": "SECUNIA", "id": "22671", "trust": 0.8 }, { "db": "SECUNIA", "id": "23351", "trust": 0.8 }, { "db": "SECUNIA", "id": "22385", "trust": 0.8 }, { "db": "SECUNIA", "id": "23131", "trust": 0.8 }, { "db": "SECUNIA", "id": "22544", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#247744", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#191336", "trust": 0.8 }, { "db": "SECUNIA", "id": "22207", "trust": 0.8 }, { "db": "SECUNIA", "id": "22212", "trust": 0.8 }, { "db": "SECUNIA", "id": "22116", "trust": 0.8 }, { "db": "SECUNIA", "id": "22216", "trust": 0.8 }, { "db": "SECUNIA", "id": "22220", "trust": 0.8 }, { "db": "SECUNIA", "id": "22330", "trust": 0.8 }, { "db": "SECUNIA", "id": "22130", "trust": 0.8 }, { "db": "SECUNIA", "id": "22240", "trust": 0.8 }, { "db": "SECUNIA", "id": "22260", "trust": 0.8 }, { "db": "SECUNIA", "id": "22165", "trust": 0.8 }, { "db": "SECUNIA", "id": "22166", "trust": 0.8 }, { "db": "SECUNIA", "id": "22172", "trust": 0.8 }, { "db": "SECUNIA", "id": "22284", "trust": 0.8 }, { "db": "SECUNIA", "id": "22186", "trust": 0.8 }, { "db": "SECUNIA", "id": "22193", "trust": 0.8 }, { "db": "BID", "id": "20249", "trust": 0.8 }, { "db": "BID", "id": "22083", "trust": 0.8 }, { "db": "SECTRACK", "id": "1016943", "trust": 0.8 }, { "db": "XF", "id": "29237", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#547300", "trust": 0.8 }, { "db": "DEBIAN", "id": "DSA-1224", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1225", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1227", "trust": 0.6 }, { "db": "XF", "id": "30098", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0734", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0735", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0733", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:206", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:205", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA06-312A", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-382-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-381-1", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200612-06", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200612-08", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200612-07", "trust": 0.6 }, { "db": "HP", "id": "SSRT061181", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2006:068", "trust": 0.6 }, { "db": "SUNALERT", "id": "102781", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200611-148", "trust": 0.6 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 0.3 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "52925", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52927", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "51595", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52429", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52766", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52759", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52758", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52926", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#335392" }, { "db": "CERT/CC", "id": "VU#247744" }, { "db": "CERT/CC", "id": "VU#191336" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52925" }, { "db": "PACKETSTORM", "id": "52927" }, { "db": "PACKETSTORM", "id": "51595" }, { "db": "PACKETSTORM", "id": "52429" }, { "db": "PACKETSTORM", "id": "52766" }, { "db": "PACKETSTORM", "id": "52759" }, { "db": "PACKETSTORM", "id": "52758" }, { "db": "PACKETSTORM", "id": "52926" }, { "db": "CNNVD", "id": "CNNVD-200611-148" }, { "db": "NVD", "id": "CVE-2006-5462" } ] }, "id": "VAR-200110-0176", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-07-23T20:50:33.705000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-5462" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 2.7, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 1.9, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200612-06.xml" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200612-08.xml" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200612-07.xml" }, { "trust": 1.6, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23155/" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23280/" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23309/" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1" }, { "trust": 1.6, "url": "http://www.us-cert.gov/cas/techalerts/ta06-312a.html" }, { "trust": 1.6, "url": "http://www.kb.cert.org/vuls/id/335392" }, { "trust": 1.6, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22770" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22722" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1017182" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1017181" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1017180" }, { "trust": 1.6, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-382-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-381-1" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2006_68_mozilla.html" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:206" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:205" }, { "trust": 1.6, "url": "http://www.debian.org/security/2006/dsa-1227" }, { "trust": 1.6, "url": "http://www.debian.org/security/2006/dsa-1225" }, { "trust": 1.6, "url": "http://www.debian.org/security/2006/dsa-1224" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24711" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23883" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23297" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23287" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23263" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23235" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23202" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23197" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23013" }, { "trust": 1.6, "url": "http://secunia.com/advisories/23009" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22980" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22965" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22929" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22817" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22815" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22763" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22737" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22727" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 1.1, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-p" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/4387" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10478" }, { "trust": 0.9, "url": "http://secunia.com/advisories/22679/" }, { "trust": 0.9, "url": "http://projects.info-pull.com/mokb/mokb-01-11-2006.html" }, { "trust": 0.8, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22929/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22980/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23013/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22763/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23009/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22815/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22727/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22770/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22722/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23883/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/19849" }, { "trust": 0.8, "url": "http://www.openssl.org/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23131/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22544/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22385/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22671/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23340/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22094/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/22259/" }, { "trust": 0.8, "url": "http://www.f-secure.com/security/fsc-2006-6.shtml" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23351/" }, { "trust": 0.8, "url": "http://standards.ieee.org/announcements/pr_frames.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23547300/index.html" }, { "trust": 0.8, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-september/049715.html " }, { "trust": 0.8, "url": "https://issues.rpath.com/browse/rpl-613 " }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt " }, { "trust": 0.8, "url": "http://kolab.org/security/kolab-vendor-notice-11.txt " }, { "trust": 0.8, "url": "http://openvpn.net/changelog.html " }, { "trust": 0.8, "url": "http://www.serv-u.com/releasenotes/ " }, { "trust": 0.8, "url": "http://openbsd.org/errata.html#openssl2 " }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20249 " }, { "trust": 0.8, "url": "http://securitytracker.com/id?1016943 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22130 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22094 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22165 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22186 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22193 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22207 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22259 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22260 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22166 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22172 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22212 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22240 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22216 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22116 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22220 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22284 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22330 " }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/29237 " }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/4387" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/30098" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0083" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/1198" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/0293" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3748" }, { "trust": 0.6, "url": "http://rhn.redha" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-5748" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-5463" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-5462" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-5464" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.3, "url": "http://bugs.gentoo.org." }, { "trust": 0.3, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5464" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5462" }, { "trust": 0.3, "url": "http://security.gentoo.org/" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5463" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5747" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5748" }, { "trust": 0.3, "url": "http://www.debian.org/security/faq" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4310" }, { "trust": 0.3, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.3, "url": "http://security.debian.org/" }, { "trust": 0.3, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=360409" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/products/48/?r=l" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/96/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/15/?r=l" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-5747" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.8-0ubuntu0.6.06_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.8-0ubuntu0.5.10_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.8-0ubuntu0.6.06_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8d.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8d.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8d.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8d.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8d.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge13_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge13_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge13_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge8_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge8_hppa.deb" } ], "sources": [ { "db": "CERT/CC", "id": "VU#335392" }, { "db": "CERT/CC", "id": "VU#247744" }, { "db": "CERT/CC", "id": "VU#191336" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52925" }, { "db": "PACKETSTORM", "id": "52927" }, { "db": "PACKETSTORM", "id": "51595" }, { "db": "PACKETSTORM", "id": "52429" }, { "db": "PACKETSTORM", "id": "52766" }, { "db": "PACKETSTORM", "id": "52759" }, { "db": "PACKETSTORM", "id": "52758" }, { "db": "PACKETSTORM", "id": "52926" }, { "db": "CNNVD", "id": "CNNVD-200611-148" }, { "db": "NVD", "id": "CVE-2006-5462" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#335392" }, { "db": "CERT/CC", "id": "VU#247744" }, { "db": "CERT/CC", "id": "VU#191336" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "52925" }, { "db": "PACKETSTORM", "id": "52927" }, { "db": "PACKETSTORM", "id": "51595" }, { "db": "PACKETSTORM", "id": "52429" }, { "db": "PACKETSTORM", "id": "52766" }, { "db": "PACKETSTORM", "id": "52759" }, { "db": "PACKETSTORM", "id": "52758" }, { "db": "PACKETSTORM", "id": "52926" }, { "db": "CNNVD", "id": "CNNVD-200611-148" }, { "db": "NVD", "id": "CVE-2006-5462" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-11-08T00:00:00", "db": "CERT/CC", "id": "VU#335392" }, { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#247744" }, { "date": "2006-11-30T00:00:00", "db": "CERT/CC", "id": "VU#191336" }, { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#547300" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2006-12-11T16:02:55", "db": "PACKETSTORM", "id": "52925" }, { "date": "2006-12-11T16:03:46", "db": "PACKETSTORM", "id": "52927" }, { "date": "2006-11-03T00:05:01", "db": "PACKETSTORM", "id": "51595" }, { "date": "2006-11-22T02:48:54", "db": "PACKETSTORM", "id": "52429" }, { "date": "2006-12-06T05:32:19", "db": "PACKETSTORM", "id": "52766" }, { "date": "2006-12-06T05:20:15", "db": "PACKETSTORM", "id": "52759" }, { "date": "2006-12-06T05:18:55", "db": "PACKETSTORM", "id": "52758" }, { "date": "2006-12-11T16:03:24", "db": "PACKETSTORM", "id": "52926" }, { "date": "2001-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200611-148" }, { "date": "2006-11-08T21:07:00", "db": "NVD", "id": "CVE-2006-5462" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-01-23T00:00:00", "db": "CERT/CC", "id": "VU#335392" }, { "date": "2007-02-09T00:00:00", "db": "CERT/CC", "id": "VU#247744" }, { "date": "2006-11-30T00:00:00", "db": "CERT/CC", "id": "VU#191336" }, { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#547300" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2006-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200611-148" }, { "date": "2017-10-11T01:31:19.453000", "db": "NVD", "id": "CVE-2006-5462" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200611-148" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Mozilla Network Security Services library fails to properly verify RSA signatures", "sources": [ { "db": "CERT/CC", "id": "VU#335392" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200611-148" } ], "trust": 0.9 } }
gsd-2006-5462
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2006-5462", "description": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.", "id": "GSD-2006-5462", "references": [ "https://www.suse.com/security/cve/CVE-2006-5462.html", "https://www.debian.org/security/2006/dsa-1227", "https://www.debian.org/security/2006/dsa-1225", "https://www.debian.org/security/2006/dsa-1224", "https://access.redhat.com/errata/RHSA-2006:0735", "https://access.redhat.com/errata/RHSA-2006:0734", "https://access.redhat.com/errata/RHSA-2006:0733", "https://linux.oracle.com/cve/CVE-2006-5462.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-5462" ], "details": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.", "id": "GSD-2006-5462", "modified": "2023-12-13T01:19:56.014647Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-5462", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/22066", "refsource": "MISC", "url": "http://secunia.com/advisories/22066" }, { "name": "http://www.vupen.com/english/advisories/2006/3748", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "http://www.vupen.com/english/advisories/2008/0083", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "http://secunia.com/advisories/23883", "refsource": "MISC", "url": "http://secunia.com/advisories/23883" }, { "name": "http://secunia.com/advisories/24711", "refsource": "MISC", "url": "http://secunia.com/advisories/24711" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html", "refsource": "MISC", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html", "refsource": "MISC", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html", "refsource": "MISC", "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "http://www.vupen.com/english/advisories/2007/0293", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "http://www.vupen.com/english/advisories/2007/1198", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742", "refsource": "MISC", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P", "refsource": "MISC", "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P" }, { "name": "http://secunia.com/advisories/22929", "refsource": "MISC", "url": "http://secunia.com/advisories/22929" }, { "name": "http://rhn.redhat.com/errata/RHSA-2006-0733.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2006-0733.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2006-0734.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2006-0734.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2006-0735.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2006-0735.html" }, { "name": "http://secunia.com/advisories/22722", "refsource": "MISC", "url": "http://secunia.com/advisories/22722" }, { "name": "http://secunia.com/advisories/22727", "refsource": "MISC", "url": "http://secunia.com/advisories/22727" }, { "name": "http://secunia.com/advisories/22737", "refsource": "MISC", "url": "http://secunia.com/advisories/22737" }, { "name": "http://secunia.com/advisories/22763", "refsource": "MISC", "url": "http://secunia.com/advisories/22763" }, { "name": "http://secunia.com/advisories/22770", "refsource": "MISC", "url": "http://secunia.com/advisories/22770" }, { "name": "http://secunia.com/advisories/22815", "refsource": "MISC", "url": "http://secunia.com/advisories/22815" }, { "name": "http://secunia.com/advisories/22817", "refsource": "MISC", "url": "http://secunia.com/advisories/22817" }, { "name": "http://secunia.com/advisories/22965", "refsource": "MISC", "url": "http://secunia.com/advisories/22965" }, { "name": "http://secunia.com/advisories/22980", "refsource": "MISC", "url": "http://secunia.com/advisories/22980" }, { "name": "http://secunia.com/advisories/23009", "refsource": "MISC", "url": "http://secunia.com/advisories/23009" }, { "name": "http://secunia.com/advisories/23013", "refsource": "MISC", "url": "http://secunia.com/advisories/23013" }, { "name": "http://secunia.com/advisories/23197", "refsource": "MISC", "url": "http://secunia.com/advisories/23197" }, { "name": "http://secunia.com/advisories/23202", "refsource": "MISC", "url": "http://secunia.com/advisories/23202" }, { "name": "http://secunia.com/advisories/23235", "refsource": "MISC", "url": "http://secunia.com/advisories/23235" }, { "name": "http://secunia.com/advisories/23263", "refsource": "MISC", "url": "http://secunia.com/advisories/23263" }, { "name": "http://secunia.com/advisories/23287", "refsource": "MISC", "url": "http://secunia.com/advisories/23287" }, { "name": "http://secunia.com/advisories/23297", "refsource": "MISC", "url": "http://secunia.com/advisories/23297" }, { "name": "http://security.gentoo.org/glsa/glsa-200612-06.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200612-06.xml" }, { "name": "http://security.gentoo.org/glsa/glsa-200612-07.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200612-07.xml" }, { "name": "http://security.gentoo.org/glsa/glsa-200612-08.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200612-08.xml" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm" }, { "name": "http://www.debian.org/security/2006/dsa-1224", "refsource": "MISC", "url": "http://www.debian.org/security/2006/dsa-1224" }, { "name": "http://www.debian.org/security/2006/dsa-1225", "refsource": "MISC", "url": "http://www.debian.org/security/2006/dsa-1225" }, { "name": "http://www.debian.org/security/2006/dsa-1227", "refsource": "MISC", "url": "http://www.debian.org/security/2006/dsa-1227" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:205", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:205" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:206", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:206" }, { "name": "http://www.novell.com/linux/security/advisories/2006_68_mozilla.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2006_68_mozilla.html" }, { "name": "http://www.ubuntu.com/usn/usn-381-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-381-1" }, { "name": "http://www.ubuntu.com/usn/usn-382-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-382-1" }, { "name": "http://www.vupen.com/english/advisories/2006/4387", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/4387" }, { "name": "http://securitytracker.com/id?1017180", "refsource": "MISC", "url": "http://securitytracker.com/id?1017180" }, { "name": "http://securitytracker.com/id?1017181", "refsource": "MISC", "url": "http://securitytracker.com/id?1017181" }, { "name": "http://securitytracker.com/id?1017182", "refsource": "MISC", "url": "http://securitytracker.com/id?1017182" }, { "name": "http://www.kb.cert.org/vuls/id/335392", "refsource": "MISC", "url": "http://www.kb.cert.org/vuls/id/335392" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10478", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10478" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-5462" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html", "refsource": "MISC", "tags": [ "Patch" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215" }, { "name": "TA06-312A", "refsource": "CERT", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "VU#335392", "refsource": "CERT-VN", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/335392" }, { "name": "1017180", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1017180" }, { "name": "1017181", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1017181" }, { "name": "1017182", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1017182" }, { "name": "22722", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22722" }, { "name": "22770", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22770" }, { "name": "RHSA-2006:0733", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0733.html" }, { "name": "RHSA-2006:0734", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0734.html" }, { "name": "RHSA-2006:0735", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2006-0735.html" }, { "name": "22727", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22727" }, { "name": "22737", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22737" }, { "name": "22763", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22763" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm" }, { "name": "20061101-01-P", "refsource": "SGI", "tags": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P" }, { "name": "SUSE-SA:2006:068", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_68_mozilla.html" }, { "name": "USN-381-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-381-1" }, { "name": "USN-382-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-382-1" }, { "name": "22817", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22817" }, { "name": "22929", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22929" }, { "name": "22965", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22965" }, { "name": "22980", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22980" }, { "name": "23009", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23009" }, { "name": "23013", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23013" }, { "name": "DSA-1224", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1224" }, { "name": "DSA-1225", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1225" }, { "name": "DSA-1227", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1227" }, { "name": "23197", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23197" }, { "name": "23202", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23202" }, { "name": "23235", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23235" }, { "name": "GLSA-200612-06", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200612-06.xml" }, { "name": "GLSA-200612-07", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200612-07.xml" }, { "name": "GLSA-200612-08", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200612-08.xml" }, { "name": "23263", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23263" }, { "name": "23287", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23287" }, { "name": "23297", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23297" }, { "name": "102781", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "name": "23883", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23883" }, { "name": "22815", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22815" }, { "name": "24711", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24711" }, { "name": "MDKSA-2006:205", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:205" }, { "name": "MDKSA-2006:206", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:206" }, { "name": "22066", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22066" }, { "name": "ADV-2006-4387", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/4387" }, { "name": "ADV-2007-0293", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "ADV-2006-3748", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "ADV-2007-1198", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "SSRT061181", "refsource": "HP", "tags": [], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "ADV-2008-0083", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "mozilla-nss-security-bypass(30098)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "oval:org.mitre.oval:def:10478", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10478" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:31Z", "publishedDate": "2006-11-08T21:07Z" } } }
ghsa-rmhr-q7w5-3ffq
Vulnerability from github
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.
{ "affected": [], "aliases": [ "CVE-2006-5462" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-11-08T21:07:00Z", "severity": "MODERATE" }, "details": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.", "id": "GHSA-rmhr-q7w5-3ffq", "modified": "2022-05-03T03:16:37Z", "published": "2022-05-03T03:16:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5462" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356215" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10478" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2006-0733.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2006-0734.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2006-0735.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/22066" }, { "type": "WEB", "url": "http://secunia.com/advisories/22722" }, { "type": "WEB", "url": "http://secunia.com/advisories/22727" }, { "type": "WEB", "url": "http://secunia.com/advisories/22737" }, { "type": "WEB", "url": "http://secunia.com/advisories/22763" }, { "type": "WEB", "url": "http://secunia.com/advisories/22770" }, { "type": "WEB", "url": "http://secunia.com/advisories/22815" }, { "type": "WEB", "url": "http://secunia.com/advisories/22817" }, { "type": "WEB", "url": "http://secunia.com/advisories/22929" }, { "type": "WEB", "url": "http://secunia.com/advisories/22965" }, { "type": "WEB", "url": "http://secunia.com/advisories/22980" }, { "type": "WEB", "url": "http://secunia.com/advisories/23009" }, { "type": "WEB", "url": "http://secunia.com/advisories/23013" }, { "type": "WEB", "url": "http://secunia.com/advisories/23197" }, { "type": "WEB", "url": "http://secunia.com/advisories/23202" }, { "type": "WEB", "url": "http://secunia.com/advisories/23235" }, { "type": "WEB", "url": "http://secunia.com/advisories/23263" }, { "type": "WEB", "url": "http://secunia.com/advisories/23287" }, { "type": "WEB", "url": "http://secunia.com/advisories/23297" }, { "type": "WEB", "url": "http://secunia.com/advisories/23883" }, { "type": "WEB", "url": "http://secunia.com/advisories/24711" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200612-06.xml" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200612-07.xml" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200612-08.xml" }, { "type": "WEB", "url": "http://securitytracker.com/id?1017180" }, { "type": "WEB", "url": "http://securitytracker.com/id?1017181" }, { "type": "WEB", "url": "http://securitytracker.com/id?1017182" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1224" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1225" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1227" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/335392" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:205" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:206" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_68_mozilla.html" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-381-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-382-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/4387" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "type": "WEB", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.