Action not permitted
Modal body text goes here.
cve-2006-4340
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:07.315Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "1016858", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016858" }, { "name": "22992", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22992" }, { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "1016859", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016859" }, { "name": "RHSA-2006:0676", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0676.html" }, { "name": "23883", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23883" }, { "name": "ADV-2006-3899", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "22044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22044" }, { "name": "22055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22055" }, { "name": "22195", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22195" }, { "name": "USN-361-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-361-1" }, { "name": "USN-352-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-352-1" }, { "name": "22446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22446" }, { "name": "21950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21950" }, { "name": "USN-351-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-351-1" }, { "name": "22025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22025" }, { "name": "22056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22056" }, { "name": "[ietf-openpgp] 20060827 Bleichenbacher\u0027s RSA signature forgery based on implementation error", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "TA06-312A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "22247", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22247" }, { "name": "MDKSA-2006:168", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168" }, { "name": "DSA-1191", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.us.debian.org/security/2006/dsa-1191" }, { "name": "ADV-2007-0293", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "22210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22210" }, { "name": "DSA-1210", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1210" }, { "name": "24711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24711" }, { "name": "ADV-2006-3622", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3622" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm" }, { "name": "1016860", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016860" }, { "name": "22849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22849" }, { "name": "ADV-2008-0083", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "20060901-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "name": "21939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21939" }, { "name": "ADV-2006-3617", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3617" }, { "name": "GLSA-200610-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "21915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21915" }, { "name": "ADV-2007-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "RHSA-2006:0677", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0677.html" }, { "name": "DSA-1192", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1192" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm" }, { "name": "GLSA-200609-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "22274", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22274" }, { "name": "RHSA-2006:0675", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0675.html" }, { "name": "21940", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21940" }, { "name": "mozilla-nss-security-bypass(30098)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "102648", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "22001", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22001" }, { "name": "20060915 rPSA-2006-0169-1 firefox thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded" }, { "name": "21903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21903" }, { "name": "USN-350-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-350-1" }, { "name": "21906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21906" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "22342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22342" }, { "name": "GLSA-200610-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200610-01.xml" }, { "name": "22074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22074" }, { "name": "22226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22226" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22066" }, { "name": "22088", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22088" }, { "name": "21949", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21949" }, { "name": "SUSE-SA:2006:054", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-640" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "22036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22036" }, { "name": "SUSE-SA:2006:055", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "name": "oval:org.mitre.oval:def:11007", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007" }, { "name": "USN-354-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "102781", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "name": "22422", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22422" }, { "name": "22299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22299" }, { "name": "MDKSA-2006:169", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169" }, { "name": "21916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21916" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "1016858", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016858" }, { "name": "22992", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22992" }, { "name": "ADV-2006-3748", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "1016859", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016859" }, { "name": "RHSA-2006:0676", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0676.html" }, { "name": "23883", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23883" }, { "name": "ADV-2006-3899", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "22044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22044" }, { "name": "22055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22055" }, { "name": "22195", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22195" }, { "name": "USN-361-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-361-1" }, { "name": "USN-352-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-352-1" }, { "name": "22446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22446" }, { "name": "21950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21950" }, { "name": "USN-351-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-351-1" }, { "name": "22025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22025" }, { "name": "22056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22056" }, { "name": "[ietf-openpgp] 20060827 Bleichenbacher\u0027s RSA signature forgery based on implementation error", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "TA06-312A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "22247", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22247" }, { "name": "MDKSA-2006:168", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168" }, { "name": "DSA-1191", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.us.debian.org/security/2006/dsa-1191" }, { "name": "ADV-2007-0293", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "22210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22210" }, { "name": "DSA-1210", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1210" }, { "name": "24711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24711" }, { "name": "ADV-2006-3622", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3622" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm" }, { "name": "1016860", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016860" }, { "name": "22849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22849" }, { "name": "ADV-2008-0083", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "20060901-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "name": "21939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21939" }, { "name": "ADV-2006-3617", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3617" }, { "name": "GLSA-200610-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "21915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21915" }, { "name": "ADV-2007-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "RHSA-2006:0677", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0677.html" }, { "name": "DSA-1192", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1192" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm" }, { "name": "GLSA-200609-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml" }, { "name": "SSRT061181", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "22274", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22274" }, { "name": "RHSA-2006:0675", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0675.html" }, { "name": "21940", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21940" }, { "name": "mozilla-nss-security-bypass(30098)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "102648", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "22001", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22001" }, { "name": "20060915 rPSA-2006-0169-1 firefox thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded" }, { "name": "21903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21903" }, { "name": "USN-350-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-350-1" }, { "name": "21906", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21906" }, { "name": "HPSBUX02153", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "22342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22342" }, { "name": "GLSA-200610-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200610-01.xml" }, { "name": "22074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22074" }, { "name": "22226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22226" }, { "name": "22066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22066" }, { "name": "22088", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22088" }, { "name": "21949", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21949" }, { "name": "SUSE-SA:2006:054", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-640" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "22036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22036" }, { "name": "SUSE-SA:2006:055", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "name": "oval:org.mitre.oval:def:11007", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007" }, { "name": "USN-354-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "102781", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "name": "22422", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22422" }, { "name": "22299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22299" }, { "name": "MDKSA-2006:169", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169" }, { "name": "21916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21916" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-4340", "datePublished": "2006-09-15T18:00:00", "dateReserved": "2006-08-24T00:00:00", "dateUpdated": "2024-08-07T19:06:07.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-4340\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2006-09-15T18:07:00.000\",\"lastModified\":\"2023-11-07T01:59:16.680\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.\"},{\"lang\":\"es\",\"value\":\"La librer\u00eda Mozilla Network Security Service (NSS) anterior a 3.11.3, usada en Mozilla Firefox anterior a 1.5.0.7, Thunderbird anterior a 1.5.0.7, y SeaMonkey anterior a 1.0.5, cuando se usa una llave RSA con exponente 3, no maneja correctamente los datos en una firma, lo que permite a atacantes remotos falsificar firmas para SSL/TLS y certificados de correo electr\u00f3nico; una vulnerabilidad muy similar a la CVE-2006-4339. NOTA: el 7/11/2006, Mozilla public\u00f3 un aviso afirmando que estas versiones no estaban completamente parcheadas por MFSA2006-60. Las nuevas correcciones para 1.5.0.7 se tratan en CVE-2006-5462.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.0.6\",\"matchCriteriaId\":\"553BE4FA-523B-4AED-90D4-6FFCFD91E4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.11.2\",\"matchCriteriaId\":\"F61D6DE3-BD82-4A09-9537-806FAEEA8FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4\",\"matchCriteriaId\":\"2DCE4360-4064-47F8-B4B1-12D15D31BE13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.0.6\",\"matchCriteriaId\":\"4C246DC3-0BAF-4FE2-B160-EE223E8F3CD2\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21903\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21906\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21915\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21916\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21939\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21940\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21949\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21950\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22001\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22025\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22036\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22044\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22055\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22056\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22074\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22088\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22195\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22210\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22226\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22247\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22274\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22299\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22342\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22422\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22446\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/22849\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22992\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23883\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/24711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200609-19.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200610-01.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1016858\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1016859\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1016860\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1192\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1210\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:168\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:169\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-60.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-66.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_54_mozilla.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_55_ssl.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0675.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0676.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0677.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/446140/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-350-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-351-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-352-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-354-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-361-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-312A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us.debian.org/security/2006/dsa-1191\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3617\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3622\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3899\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0293\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1198\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0083\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/30098\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-640\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007\",\"source\":\"secalert@redhat.com\"}]}}" } }
rhsa-2006_0675
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser.\n\nTwo flaws were found in the way Firefox processed certain regular\nexpressions. A malicious web page could crash the browser or possibly\nexecute arbitrary code as the user running Firefox. (CVE-2006-4565,\nCVE-2006-4566)\n\nA number of flaws were found in Firefox. A malicious web page could crash\nthe browser or possibly execute arbitrary code as the user running Firefox.\n (CVE-2006-4571)\n\nA flaw was found in the handling of Javascript timed events. A malicious\nweb page could crash the browser or possibly execute arbitrary code as the\nuser running Firefox. (CVE-2006-4253)\n\nDaniel Bleichenbacher recently described an implementation error in RSA\nsignature verification. For RSA keys with exponent 3 it is possible for an\nattacker to forge a signature that would be incorrectly verified by the NSS\nlibrary. Firefox as shipped trusts several root Certificate Authorities\nthat use exponent 3. An attacker could have created a carefully crafted\nSSL certificate which be incorrectly trusted when their site was visited by\na victim. (CVE-2006-4340)\n\nA flaw was found in the Firefox auto-update verification system. An\nattacker who has the ability to spoof a victim\u0027s DNS could get Firefox to\ndownload and install malicious code. In order to exploit this issue an\nattacker would also need to get a victim to previously accept an\nunverifiable certificate. (CVE-2006-4567)\n\nFirefox did not properly prevent a frame in one domain from injecting\ncontent into a sub-frame that belongs to another domain, which facilitates\nwebsite spoofing and other attacks (CVE-2006-4568)\n\nFirefox did not load manually opened, blocked popups in the right domain\ncontext, which could lead to cross-site scripting attacks. In order to\nexploit this issue an attacker would need to find a site which would frame\ntheir malicious page and convince the user to manually open a blocked\npopup. (CVE-2006-4569)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.7 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0675", "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "206428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=206428" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0675.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T00:30:41+00:00", "generator": { "date": "2024-11-22T00:30:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0675", "initial_release_date": "2006-09-15T06:38:00+00:00", "revision_history": [ { "date": "2006-09-15T06:38:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-15T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:30:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "product": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "product_id": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.7-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.7-0.1.el4.ia64", "product": { "name": "firefox-0:1.5.0.7-0.1.el4.ia64", "product_id": "firefox-0:1.5.0.7-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.7-0.1.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "product": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "product_id": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.7-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.7-0.1.el4.x86_64", "product": { "name": "firefox-0:1.5.0.7-0.1.el4.x86_64", "product_id": "firefox-0:1.5.0.7-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.7-0.1.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "product": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "product_id": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.7-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.7-0.1.el4.i386", "product": { "name": "firefox-0:1.5.0.7-0.1.el4.i386", "product_id": "firefox-0:1.5.0.7-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.7-0.1.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.7-0.1.el4.src", "product": { "name": "firefox-0:1.5.0.7-0.1.el4.src", "product_id": "firefox-0:1.5.0.7-0.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.7-0.1.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "product": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "product_id": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.7-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.7-0.1.el4.ppc", "product": { "name": "firefox-0:1.5.0.7-0.1.el4.ppc", "product_id": "firefox-0:1.5.0.7-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.7-0.1.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "product": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "product_id": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.7-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.7-0.1.el4.s390x", "product": { "name": "firefox-0:1.5.0.7-0.1.el4.s390x", "product_id": "firefox-0:1.5.0.7-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.7-0.1.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "product": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "product_id": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.7-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.7-0.1.el4.s390", "product": { "name": "firefox-0:1.5.0.7-0.1.el4.s390", "product_id": "firefox-0:1.5.0.7-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.7-0.1.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.7-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.7-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.7-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.7-0.1.el4.src" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4253", "discovery_date": "2006-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618177" } ], "notes": [ { "category": "description", "text": "Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3. NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie. Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability. NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4253" }, { "category": "external", "summary": "RHBZ#1618177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618177" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4253", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4253" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4253", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4253" } ], "release_date": "2006-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4340", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618183" } ], "notes": [ { "category": "description", "text": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4340" }, { "category": "external", "summary": "RHBZ#1618183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618183" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4340", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4340" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4565", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618191" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a \"minimal quantifier.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4565" }, { "category": "external", "summary": "RHBZ#1618191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4565" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-4566", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618192" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set (\"[\\\\\"), which leads to a buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4566" }, { "category": "external", "summary": "RHBZ#1618192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4566", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4566" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-4567", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618193" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4567" }, { "category": "external", "summary": "RHBZ#1618193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4567", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4567" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-4568", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618194" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4568" }, { "category": "external", "summary": "RHBZ#1618194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4568", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4568" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-4569", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618195" } ], "notes": [ { "category": "description", "text": "The popup blocker in Mozilla Firefox before 1.5.0.7 opens the \"blocked popups\" display in the context of the Location bar instead of the subframe from which the popup originated, which might make it easier for remote user-assisted attackers to conduct cross-site scripting (XSS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4569" }, { "category": "external", "summary": "RHBZ#1618195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618195" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4569", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4569" } ], "release_date": "2006-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-4571", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "209167" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey \u003c 1.0.5 multiple vulnerabilities; to replace Mozilla", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4571" }, { "category": "external", "summary": "RHBZ#209167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=209167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4571", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4571" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:38:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:firefox-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-0:1.5.0.7-0.1.el4.src", "4AS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-0:1.5.0.7-0.1.el4.src", "4Desktop:firefox-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-0:1.5.0.7-0.1.el4.src", "4ES:firefox-0:1.5.0.7-0.1.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-0:1.5.0.7-0.1.el4.src", "4WS:firefox-0:1.5.0.7-0.1.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0675" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "seamonkey \u003c 1.0.5 multiple vulnerabilities; to replace Mozilla" } ] }
rhsa-2006_0676
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 2.1, 3, and 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nTwo flaws were found in the way SeaMonkey processed certain regular\nexpressions. A malicious web page could crash the browser or possibly\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-4565,\nCVE-2006-4566)\n\nA flaw was found in the handling of Javascript timed events. A malicious\nweb page could crash the browser or possibly execute arbitrary code as the\nuser running SeaMonkey. (CVE-2006-4253)\n\nDaniel Bleichenbacher recently described an implementation error in RSA\nsignature verification. For RSA keys with exponent 3 it is possible for an\nattacker to forge a signature that would be incorrectly verified by the NSS\nlibrary. SeaMonkey as shipped trusts several root Certificate Authorities\nthat use exponent 3. An attacker could have created a carefully crafted\nSSL certificate which be incorrectly trusted when their site was visited by\na victim. (CVE-2006-4340)\n\nSeaMonkey did not properly prevent a frame in one domain from injecting\ncontent into a sub-frame that belongs to another domain, which facilitates\nwebsite spoofing and other attacks (CVE-2006-4568)\n\nA flaw was found in SeaMonkey Messenger triggered when a HTML message\ncontained a remote image pointing to a XBL script. An attacker could have\ncreated a carefully crafted message which would execute Javascript if\ncertain actions were performed on the email by the recipient, even if\nJavascript was disabled. (CVE-2006-4570)\n\nA number of flaws were found in SeaMonkey. A malicious web page could\ncrash the browser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-4571)\n\nUsers of SeaMonkey or Mozilla are advised to upgrade to this update, which\ncontains SeaMonkey version 1.0.5 that corrects these issues.\n\nFor users of Red Hat Enterprise Linux 2.1 this SeaMonkey update obsoletes\nGaleon. Galeon was a web browser based on the Mozilla Gecko layout engine.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0676", "url": "https://access.redhat.com/errata/RHSA-2006:0676" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "206429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=206429" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0676.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2024-11-22T00:30:45+00:00", "generator": { "date": "2024-11-22T00:30:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0676", "initial_release_date": "2006-09-15T07:41:00+00:00", "revision_history": [ { "date": "2006-09-15T07:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-15T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:30:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el4.ia64", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ia64", "product_id": "seamonkey-chat-0:1.0.5-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el4.ia64", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ia64", "product_id": "seamonkey-devel-0:1.0.5-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el4.ia64", "product": { "name": "seamonkey-0:1.0.5-0.1.el4.ia64", "product_id": "seamonkey-0:1.0.5-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el4.ia64", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ia64", "product_id": "seamonkey-mail-0:1.0.5-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-chat-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-devel-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-mail-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.5-0.1.el3.ia64", "product": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ia64", "product_id": "seamonkey-nss-0:1.0.5-0.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.5-0.1.el3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "product_id": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "product_id": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el4.x86_64", "product": { "name": "seamonkey-0:1.0.5-0.1.el4.x86_64", "product_id": "seamonkey-0:1.0.5-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "product_id": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.4.el4.x86_64", "product": { "name": "devhelp-devel-0:0.10-0.4.el4.x86_64", "product_id": "devhelp-devel-0:0.10-0.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "product": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "product_id": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.4.el4.x86_64", "product": { "name": "devhelp-0:0.10-0.4.el4.x86_64", "product_id": "devhelp-0:0.10-0.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "product": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "product_id": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.5-0.1.el3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el4.i386", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.i386", "product_id": "seamonkey-chat-0:1.0.5-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el4.i386", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.i386", "product_id": "seamonkey-devel-0:1.0.5-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el4.i386", "product": { "name": "seamonkey-0:1.0.5-0.1.el4.i386", "product_id": "seamonkey-0:1.0.5-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el4.i386", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.i386", "product_id": "seamonkey-mail-0:1.0.5-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.4.el4.i386", "product": { "name": "devhelp-devel-0:0.10-0.4.el4.i386", "product_id": "devhelp-devel-0:0.10-0.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.4.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.4.el4.i386", "product": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.i386", "product_id": "devhelp-debuginfo-0:0.10-0.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.4.el4?arch=i386" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.4.el4.i386", "product": { "name": "devhelp-0:0.10-0.4.el4.i386", "product_id": "devhelp-0:0.10-0.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.4.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-nspr-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-nss-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-chat-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-devel-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.5-0.1.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el3.i386", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.i386", "product_id": "seamonkey-mail-0:1.0.5-0.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el4.src", "product": { "name": "seamonkey-0:1.0.5-0.1.el4.src", "product_id": "seamonkey-0:1.0.5-0.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el4?arch=src" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.4.el4.src", "product": { "name": "devhelp-0:0.10-0.4.el4.src", "product_id": "devhelp-0:0.10-0.4.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.4.el4?arch=src" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el3.src", "product": { "name": "seamonkey-0:1.0.5-0.1.el3.src", "product_id": "seamonkey-0:1.0.5-0.1.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el4.ppc", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ppc", "product_id": "seamonkey-chat-0:1.0.5-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el4.ppc", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ppc", "product_id": "seamonkey-devel-0:1.0.5-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el4.ppc", "product": { "name": "seamonkey-0:1.0.5-0.1.el4.ppc", "product_id": "seamonkey-0:1.0.5-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el4.ppc", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ppc", "product_id": "seamonkey-mail-0:1.0.5-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-devel-0:0.10-0.4.el4.ppc", "product": { "name": "devhelp-devel-0:0.10-0.4.el4.ppc", "product_id": "devhelp-devel-0:0.10-0.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-debuginfo-0:0.10-0.4.el4.ppc", "product": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.ppc", "product_id": "devhelp-debuginfo-0:0.10-0.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "devhelp-0:0.10-0.4.el4.ppc", "product": { "name": "devhelp-0:0.10-0.4.el4.ppc", "product_id": "devhelp-0:0.10-0.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/devhelp@0.10-0.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-chat-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-devel-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-mail-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.5-0.1.el3.ppc", "product": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ppc", "product_id": "seamonkey-nss-0:1.0.5-0.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.5-0.1.el3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390x", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390x", "product_id": "seamonkey-chat-0:1.0.5-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390x", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390x", "product_id": "seamonkey-devel-0:1.0.5-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el4.s390x", "product": { "name": "seamonkey-0:1.0.5-0.1.el4.s390x", "product_id": "seamonkey-0:1.0.5-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390x", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390x", "product_id": "seamonkey-mail-0:1.0.5-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-chat-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-devel-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-mail-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390x", "product": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390x", "product_id": "seamonkey-nss-0:1.0.5-0.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.5-0.1.el3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390", "product_id": "seamonkey-chat-0:1.0.5-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390", "product_id": "seamonkey-devel-0:1.0.5-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el4.s390", "product": { "name": "seamonkey-0:1.0.5-0.1.el4.s390", "product_id": "seamonkey-0:1.0.5-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390", "product_id": "seamonkey-mail-0:1.0.5-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-nspr-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-nss-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-chat-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-devel-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.5-0.1.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390", "product": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390", "product_id": "seamonkey-mail-0:1.0.5-0.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.5-0.1.el3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.5-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.5-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.5-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.5-0.1.el3.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.4.el4.src" }, "product_reference": "devhelp-0:0.10-0.4.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.5-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.4.el4.src" }, "product_reference": "devhelp-0:0.10-0.4.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.5-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.4.el4.src" }, "product_reference": "devhelp-0:0.10-0.4.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.5-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.4.el4.src" }, "product_reference": "devhelp-0:0.10-0.4.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.4.el4.i386" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.4.el4.ppc" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "devhelp-devel-0:0.10-0.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64" }, "product_reference": "devhelp-devel-0:0.10-0.4.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.5-0.1.el4.src" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4253", "discovery_date": "2006-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618177" } ], "notes": [ { "category": "description", "text": "Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3. NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie. Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability. NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4253" }, { "category": "external", "summary": "RHBZ#1618177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618177" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4253", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4253" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4253", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4253" } ], "release_date": "2006-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T07:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf you experience problems upgrading your seamonkey packages, please run\nthe following command to remove the problematic mozilla packages, and\nre-run up2date:\n\nrpm -e mozilla-nss mozilla-nspr", "product_ids": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0676" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4340", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618183" } ], "notes": [ { "category": "description", "text": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4340" }, { "category": "external", "summary": "RHBZ#1618183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618183" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4340", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4340" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T07:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf you experience problems upgrading your seamonkey packages, please run\nthe following command to remove the problematic mozilla packages, and\nre-run up2date:\n\nrpm -e mozilla-nss mozilla-nspr", "product_ids": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0676" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4565", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618191" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a \"minimal quantifier.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4565" }, { "category": "external", "summary": "RHBZ#1618191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4565" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T07:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf you experience problems upgrading your seamonkey packages, please run\nthe following command to remove the problematic mozilla packages, and\nre-run up2date:\n\nrpm -e mozilla-nss mozilla-nspr", "product_ids": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0676" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-4566", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618192" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set (\"[\\\\\"), which leads to a buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4566" }, { "category": "external", "summary": "RHBZ#1618192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4566", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4566" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T07:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf you experience problems upgrading your seamonkey packages, please run\nthe following command to remove the problematic mozilla packages, and\nre-run up2date:\n\nrpm -e mozilla-nss mozilla-nspr", "product_ids": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0676" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-4568", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618194" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4568" }, { "category": "external", "summary": "RHBZ#1618194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4568", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4568" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T07:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf you experience problems upgrading your seamonkey packages, please run\nthe following command to remove the problematic mozilla packages, and\nre-run up2date:\n\nrpm -e mozilla-nss mozilla-nspr", "product_ids": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0676" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-4570", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618196" } ], "notes": [ { "category": "description", "text": "Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with \"Load Images\" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4570" }, { "category": "external", "summary": "RHBZ#1618196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618196" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4570", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4570" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T07:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf you experience problems upgrading your seamonkey packages, please run\nthe following command to remove the problematic mozilla packages, and\nre-run up2date:\n\nrpm -e mozilla-nss mozilla-nspr", "product_ids": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0676" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4571", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "209167" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey \u003c 1.0.5 multiple vulnerabilities; to replace Mozilla", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4571" }, { "category": "external", "summary": "RHBZ#209167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=209167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4571", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4571" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T07:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf you experience problems upgrading your seamonkey packages, please run\nthe following command to remove the problematic mozilla packages, and\nre-run up2date:\n\nrpm -e mozilla-nss mozilla-nspr", "product_ids": [ "3AS:seamonkey-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-0:1.0.5-0.1.el3.src", "3AS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3AS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-0:1.0.5-0.1.el3.src", "3Desktop:seamonkey-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3Desktop:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-0:1.0.5-0.1.el3.src", "3ES:seamonkey-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3ES:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-0:1.0.5-0.1.el3.src", "3WS:seamonkey-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-chat-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-debuginfo-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-dom-inspector-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-js-debugger-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-mail-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nspr-devel-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-0:1.0.5-0.1.el3.x86_64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.i386", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ia64", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.ppc", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.s390x", "3WS:seamonkey-nss-devel-0:1.0.5-0.1.el3.x86_64", "4AS:devhelp-0:0.10-0.4.el4.i386", "4AS:devhelp-0:0.10-0.4.el4.ppc", "4AS:devhelp-0:0.10-0.4.el4.src", "4AS:devhelp-0:0.10-0.4.el4.x86_64", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4AS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4AS:devhelp-devel-0:0.10-0.4.el4.i386", "4AS:devhelp-devel-0:0.10-0.4.el4.ppc", "4AS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4AS:seamonkey-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-0:1.0.5-0.1.el4.src", "4AS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4AS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4Desktop:devhelp-0:0.10-0.4.el4.i386", "4Desktop:devhelp-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-0:0.10-0.4.el4.src", "4Desktop:devhelp-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4Desktop:devhelp-devel-0:0.10-0.4.el4.i386", "4Desktop:devhelp-devel-0:0.10-0.4.el4.ppc", "4Desktop:devhelp-devel-0:0.10-0.4.el4.x86_64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-0:1.0.5-0.1.el4.src", "4Desktop:seamonkey-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4Desktop:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4ES:devhelp-0:0.10-0.4.el4.i386", "4ES:devhelp-0:0.10-0.4.el4.ppc", "4ES:devhelp-0:0.10-0.4.el4.src", "4ES:devhelp-0:0.10-0.4.el4.x86_64", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4ES:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4ES:devhelp-devel-0:0.10-0.4.el4.i386", "4ES:devhelp-devel-0:0.10-0.4.el4.ppc", "4ES:devhelp-devel-0:0.10-0.4.el4.x86_64", "4ES:seamonkey-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-0:1.0.5-0.1.el4.src", "4ES:seamonkey-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4ES:seamonkey-mail-0:1.0.5-0.1.el4.x86_64", "4WS:devhelp-0:0.10-0.4.el4.i386", "4WS:devhelp-0:0.10-0.4.el4.ppc", "4WS:devhelp-0:0.10-0.4.el4.src", "4WS:devhelp-0:0.10-0.4.el4.x86_64", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.i386", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.ppc", "4WS:devhelp-debuginfo-0:0.10-0.4.el4.x86_64", "4WS:devhelp-devel-0:0.10-0.4.el4.i386", "4WS:devhelp-devel-0:0.10-0.4.el4.ppc", "4WS:devhelp-devel-0:0.10-0.4.el4.x86_64", "4WS:seamonkey-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-0:1.0.5-0.1.el4.src", "4WS:seamonkey-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-chat-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-debuginfo-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-devel-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-dom-inspector-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-js-debugger-0:1.0.5-0.1.el4.x86_64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.i386", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ia64", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.ppc", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.s390x", "4WS:seamonkey-mail-0:1.0.5-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0676" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "seamonkey \u003c 1.0.5 multiple vulnerabilities; to replace Mozilla" } ] }
rhsa-2006_0677
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nTwo flaws were found in the way Thunderbird processed certain regular\nexpressions. A malicious HTML email could cause a crash or possibly\nexecute arbitrary code as the user running Thunderbird. (CVE-2006-4565,\nCVE-2006-4566)\n\nA flaw was found in the Thunderbird auto-update verification system. An\nattacker who has the ability to spoof a victim\u0027s DNS could get Firefox to\ndownload and install malicious code. In order to exploit this issue an\nattacker would also need to get a victim to previously accept an\nunverifiable certificate. (CVE-2006-4567)\n\nA flaw was found in the handling of Javascript timed events. A malicious\nHTML email could crash the browser or possibly execute arbitrary code as\nthe user running Thunderbird. (CVE-2006-4253)\n\nDaniel Bleichenbacher recently described an implementation error in RSA\nsignature verification. For RSA keys with exponent 3 it is possible for an\nattacker to forge a signature that which would be incorrectly verified by\nthe NSS library. (CVE-2006-4340)\n\nA flaw was found in Thunderbird that triggered when a HTML message\ncontained a remote image pointing to a XBL script. An attacker could have\ncreated a carefully crafted message which would execute Javascript if\ncertain actions were performed on the email by the recipient, even if\nJavascript was disabled. (CVE-2006-4570)\n\nA number of flaws were found in Thunderbird. A malicious HTML email could\ncause a crash or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-4571)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains\nThunderbird version 1.5.0.7 that corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0677", "url": "https://access.redhat.com/errata/RHSA-2006:0677" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "206433", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=206433" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0677.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T00:30:51+00:00", "generator": { "date": "2024-11-22T00:30:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0677", "initial_release_date": "2006-09-15T06:49:00+00:00", "revision_history": [ { "date": "2006-09-15T06:49:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-09-15T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:30:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "product_id": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.7-0.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "thunderbird-0:1.5.0.7-0.1.el4.ia64", "product": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ia64", "product_id": "thunderbird-0:1.5.0.7-0.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.7-0.1.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "product": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "product_id": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.7-0.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-0:1.5.0.7-0.1.el4.x86_64", "product": { "name": "thunderbird-0:1.5.0.7-0.1.el4.x86_64", "product_id": "thunderbird-0:1.5.0.7-0.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.7-0.1.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "product": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "product_id": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.7-0.1.el4?arch=i386" } } }, { "category": "product_version", "name": "thunderbird-0:1.5.0.7-0.1.el4.i386", "product": { "name": "thunderbird-0:1.5.0.7-0.1.el4.i386", "product_id": "thunderbird-0:1.5.0.7-0.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.7-0.1.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:1.5.0.7-0.1.el4.src", "product": { "name": "thunderbird-0:1.5.0.7-0.1.el4.src", "product_id": "thunderbird-0:1.5.0.7-0.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.7-0.1.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "product": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "product_id": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.7-0.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "thunderbird-0:1.5.0.7-0.1.el4.ppc", "product": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ppc", "product_id": "thunderbird-0:1.5.0.7-0.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.7-0.1.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "product": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "product_id": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.7-0.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-0:1.5.0.7-0.1.el4.s390x", "product": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390x", "product_id": "thunderbird-0:1.5.0.7-0.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.7-0.1.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "product": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "product_id": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.7-0.1.el4?arch=s390" } } }, { "category": "product_version", "name": "thunderbird-0:1.5.0.7-0.1.el4.s390", "product": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390", "product_id": "thunderbird-0:1.5.0.7-0.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@1.5.0.7-0.1.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.7-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.7-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.7-0.1.el4.src" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" }, "product_reference": "thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4253", "discovery_date": "2006-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618177" } ], "notes": [ { "category": "description", "text": "Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3. NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie. Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability. NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4253" }, { "category": "external", "summary": "RHBZ#1618177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618177" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4253", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4253" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4253", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4253" } ], "release_date": "2006-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:49:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0677" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4340", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618183" } ], "notes": [ { "category": "description", "text": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4340" }, { "category": "external", "summary": "RHBZ#1618183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618183" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4340", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4340" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:49:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0677" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4565", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618191" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a \"minimal quantifier.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4565" }, { "category": "external", "summary": "RHBZ#1618191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4565" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:49:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0677" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-4566", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618192" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set (\"[\\\\\"), which leads to a buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4566" }, { "category": "external", "summary": "RHBZ#1618192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4566", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4566" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:49:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0677" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2006-4567", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618193" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4567" }, { "category": "external", "summary": "RHBZ#1618193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4567", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4567" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:49:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0677" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-4570", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618196" } ], "notes": [ { "category": "description", "text": "Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with \"Load Images\" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4570" }, { "category": "external", "summary": "RHBZ#1618196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618196" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4570", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4570" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:49:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0677" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4571", "discovery_date": "2006-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "209167" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.", "title": "Vulnerability description" }, { "category": "summary", "text": "seamonkey \u003c 1.0.5 multiple vulnerabilities; to replace Mozilla", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4571" }, { "category": "external", "summary": "RHBZ#209167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=209167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4571", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4571" } ], "release_date": "2006-09-15T00:01:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-09-15T06:49:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-0:1.5.0.7-0.1.el4.src", "4AS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4AS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.src", "4Desktop:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4Desktop:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-0:1.5.0.7-0.1.el4.src", "4ES:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4ES:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-0:1.5.0.7-0.1.el4.src", "4WS:thunderbird-0:1.5.0.7-0.1.el4.x86_64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.i386", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ia64", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.ppc", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.s390x", "4WS:thunderbird-debuginfo-0:1.5.0.7-0.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0677" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "seamonkey \u003c 1.0.5 multiple vulnerabilities; to replace Mozilla" } ] }
gsd-2006-4340
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2006-4340", "description": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.", "id": "GSD-2006-4340", "references": [ "https://www.suse.com/security/cve/CVE-2006-4340.html", "https://www.debian.org/security/2006/dsa-1210", "https://www.debian.org/security/2006/dsa-1192", "https://www.debian.org/security/2006/dsa-1191", "https://access.redhat.com/errata/RHSA-2006:0677", "https://access.redhat.com/errata/RHSA-2006:0676", "https://access.redhat.com/errata/RHSA-2006:0675", "https://linux.oracle.com/cve/CVE-2006-4340.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-4340" ], "details": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.", "id": "GSD-2006-4340", "modified": "2023-12-13T01:19:51.547080Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-4340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/22055", "refsource": "MISC", "url": "http://secunia.com/advisories/22055" }, { "name": "http://secunia.com/advisories/22066", "refsource": "MISC", "url": "http://secunia.com/advisories/22066" }, { "name": "http://secunia.com/advisories/22210", "refsource": "MISC", "url": "http://secunia.com/advisories/22210" }, { "name": "http://secunia.com/advisories/22342", "refsource": "MISC", "url": "http://secunia.com/advisories/22342" }, { "name": "http://www.ubuntu.com/usn/usn-350-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-350-1" }, { "name": "http://www.ubuntu.com/usn/usn-354-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "http://www.ubuntu.com/usn/usn-361-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-361-1" }, { "name": "http://www.vupen.com/english/advisories/2006/3748", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "http://www.vupen.com/english/advisories/2008/0083", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc", "refsource": "MISC", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "name": "http://secunia.com/advisories/21903", "refsource": "MISC", "url": "http://secunia.com/advisories/21903" }, { "name": "http://secunia.com/advisories/21906", "refsource": "MISC", "url": "http://secunia.com/advisories/21906" }, { "name": "http://secunia.com/advisories/21915", "refsource": "MISC", "url": "http://secunia.com/advisories/21915" }, { "name": "http://secunia.com/advisories/21916", "refsource": "MISC", "url": "http://secunia.com/advisories/21916" }, { "name": "http://secunia.com/advisories/21939", "refsource": "MISC", "url": "http://secunia.com/advisories/21939" }, { "name": "http://secunia.com/advisories/21940", "refsource": "MISC", "url": "http://secunia.com/advisories/21940" }, { "name": "http://secunia.com/advisories/21949", "refsource": "MISC", "url": "http://secunia.com/advisories/21949" }, { "name": "http://secunia.com/advisories/21950", "refsource": "MISC", "url": "http://secunia.com/advisories/21950" }, { "name": "http://secunia.com/advisories/22001", "refsource": "MISC", "url": "http://secunia.com/advisories/22001" }, { "name": "http://secunia.com/advisories/22025", "refsource": "MISC", "url": "http://secunia.com/advisories/22025" }, { "name": "http://secunia.com/advisories/22036", "refsource": "MISC", "url": "http://secunia.com/advisories/22036" }, { "name": "http://secunia.com/advisories/22044", "refsource": "MISC", "url": "http://secunia.com/advisories/22044" }, { "name": "http://secunia.com/advisories/22056", "refsource": "MISC", "url": "http://secunia.com/advisories/22056" }, { "name": "http://secunia.com/advisories/22074", "refsource": "MISC", "url": "http://secunia.com/advisories/22074" }, { "name": "http://secunia.com/advisories/22088", "refsource": "MISC", "url": "http://secunia.com/advisories/22088" }, { "name": "http://secunia.com/advisories/22195", "refsource": "MISC", "url": "http://secunia.com/advisories/22195" }, { "name": "http://secunia.com/advisories/22226", "refsource": "MISC", "url": "http://secunia.com/advisories/22226" }, { "name": "http://secunia.com/advisories/22247", "refsource": "MISC", "url": "http://secunia.com/advisories/22247" }, { "name": "http://secunia.com/advisories/22274", "refsource": "MISC", "url": "http://secunia.com/advisories/22274" }, { "name": "http://secunia.com/advisories/22299", "refsource": "MISC", "url": "http://secunia.com/advisories/22299" }, { "name": "http://secunia.com/advisories/22422", "refsource": "MISC", "url": "http://secunia.com/advisories/22422" }, { "name": "http://secunia.com/advisories/22446", "refsource": "MISC", "url": "http://secunia.com/advisories/22446" }, { "name": "http://secunia.com/advisories/22849", "refsource": "MISC", "url": "http://secunia.com/advisories/22849" }, { "name": "http://secunia.com/advisories/22992", "refsource": "MISC", "url": "http://secunia.com/advisories/22992" }, { "name": "http://secunia.com/advisories/23883", "refsource": "MISC", "url": "http://secunia.com/advisories/23883" }, { "name": "http://secunia.com/advisories/24711", "refsource": "MISC", "url": "http://secunia.com/advisories/24711" }, { "name": "http://security.gentoo.org/glsa/glsa-200609-19.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml" }, { "name": "http://security.gentoo.org/glsa/glsa-200610-01.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200610-01.xml" }, { "name": "http://securitytracker.com/id?1016858", "refsource": "MISC", "url": "http://securitytracker.com/id?1016858" }, { "name": "http://securitytracker.com/id?1016859", "refsource": "MISC", "url": "http://securitytracker.com/id?1016859" }, { "name": "http://securitytracker.com/id?1016860", "refsource": "MISC", "url": "http://securitytracker.com/id?1016860" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm" }, { "name": "http://www.debian.org/security/2006/dsa-1192", "refsource": "MISC", "url": "http://www.debian.org/security/2006/dsa-1192" }, { "name": "http://www.debian.org/security/2006/dsa-1210", "refsource": "MISC", "url": "http://www.debian.org/security/2006/dsa-1210" }, { "name": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml", "refsource": "MISC", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html", "refsource": "MISC", "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169" }, { "name": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/", "refsource": "MISC", "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html", "refsource": "MISC", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html", "refsource": "MISC", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html" }, { "name": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2006-0675.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2006-0675.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2006-0676.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2006-0676.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2006-0677.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2006-0677.html" }, { "name": "http://www.securityfocus.com/archive/1/446140/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded" }, { "name": "http://www.ubuntu.com/usn/usn-351-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-351-1" }, { "name": "http://www.ubuntu.com/usn/usn-352-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-352-1" }, { "name": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html", "refsource": "MISC", "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "http://www.us.debian.org/security/2006/dsa-1191", "refsource": "MISC", "url": "http://www.us.debian.org/security/2006/dsa-1191" }, { "name": "http://www.vupen.com/english/advisories/2006/3617", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3617" }, { "name": "http://www.vupen.com/english/advisories/2006/3622", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3622" }, { "name": "http://www.vupen.com/english/advisories/2006/3899", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "http://www.vupen.com/english/advisories/2007/0293", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "http://www.vupen.com/english/advisories/2007/1198", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742", "refsource": "MISC", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "https://issues.rpath.com/browse/RPL-640", "refsource": "MISC", "url": "https://issues.rpath.com/browse/RPL-640" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.11.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0.6", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-4340" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "[ietf-openpgp] 20060827 Bleichenbacher\u0027s RSA signature forgery based on implementation error", "refsource": "MLIST", "tags": [], "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "name": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/", "refsource": "MISC", "tags": [], "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "name": "RHSA-2006:0676", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0676.html" }, { "name": "RHSA-2006:0677", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0677.html" }, { "name": "21906", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21906" }, { "name": "21949", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21949" }, { "name": "RHSA-2006:0675", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0675.html" }, { "name": "1016858", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1016858" }, { "name": "1016859", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1016859" }, { "name": "1016860", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1016860" }, { "name": "21903", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21903" }, { "name": "21915", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21915" }, { "name": "21916", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21916" }, { "name": "21939", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21939" }, { "name": "21940", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21940" }, { "name": "21950", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21950" }, { "name": "20060901-01-P", "refsource": "SGI", "tags": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc" }, { "name": "USN-350-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-350-1" }, { "name": "22036", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22036" }, { "name": "22001", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22001" }, { "name": "GLSA-200609-19", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml" }, { "name": "SUSE-SA:2006:054", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html" }, { "name": "SUSE-SA:2006:055", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "name": "USN-351-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-351-1" }, { "name": "USN-352-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-352-1" }, { "name": "USN-354-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "name": "22025", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22025" }, { "name": "22055", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22055" }, { "name": "22074", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22074" }, { "name": "22088", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22088" }, { "name": "DSA-1191", "refsource": "DEBIAN", "tags": [], "url": "http://www.us.debian.org/security/2006/dsa-1191" }, { "name": "GLSA-200610-01", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200610-01.xml" }, { "name": "102648", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "name": "22210", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22210" }, { "name": "22226", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22226" }, { "name": "22247", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22247" }, { "name": "22274", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22274" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm" }, { "name": "DSA-1192", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1192" }, { "name": "GLSA-200610-06", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "name": "USN-361-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-361-1" }, { "name": "22299", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22299" }, { "name": "22342", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22342" }, { "name": "22422", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22422" }, { "name": "22446", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22446" }, { "name": "TA06-312A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "name": "DSA-1210", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1210" }, { "name": "22849", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22849" }, { "name": "22056", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22056" }, { "name": "22195", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22195" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm" }, { "name": "22992", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22992" }, { "name": "https://issues.rpath.com/browse/RPL-640", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-640" }, { "name": "102781", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "name": "23883", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23883" }, { "name": "22044", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22044" }, { "name": "24711", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24711" }, { "name": "MDKSA-2006:168", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168" }, { "name": "MDKSA-2006:169", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169" }, { "name": "22066", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22066" }, { "name": "ADV-2006-3617", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3617" }, { "name": "ADV-2007-0293", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "name": "ADV-2006-3748", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "name": "ADV-2007-1198", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "name": "SSRT061181", "refsource": "HP", "tags": [], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" }, { "name": "ADV-2008-0083", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "name": "ADV-2006-3899", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "name": "ADV-2006-3622", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3622" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html", "refsource": "MISC", "tags": [], "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "name": "mozilla-nss-security-bypass(30098)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "name": "oval:org.mitre.oval:def:11007", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007" }, { "name": "20060915 rPSA-2006-0169-1 firefox thunderbird", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:16Z", "publishedDate": "2006-09-15T18:07Z" } } }
var-200110-0171
Vulnerability from variot
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. A buffer overflow vulnerability in an OpenSSL library function could allow a remote attacker to execute code on an affected system. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: gzip Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA21996
VERIFY ADVISORY: http://secunia.com/advisories/21996/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: gzip 1.x http://secunia.com/product/4220/
DESCRIPTION: Tavis Ormandy has reported some vulnerabilities in gzip, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
1) A boundary error within the "make_table()" function in unlzh.c can be used to modify certain stack data. tricking a user or automated system into unpacking a specially crafted archive file. tricking a user or automated system into unpacking a specially crafted "pack" archive file.
3) A buffer overflow within the "make_table()" function of gzip's LZH support can be exploited to cause a DoS and potentially to compromise a vulnerable system by e.g. tricking a user or automated system into unpacking an archive containing a specially crafted decoding table.
4) A NULL pointer dereference within the "huft_build()" function and an infinite loop within the LZH handling can be exploited to cause a DoS by e.g. tricking a user or automated system into unpacking a specially crafted archive file.
The vulnerabilities have been reported in version 1.3.5.
SOLUTION: Do not unpack untrusted archive files.
PROVIDED AND/OR DISCOVERED BY: Tavis Ormandy, Google Security Team
ORIGINAL ADVISORY: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676
OTHER REFERENCES: US-CERT VU#554780: http://www.kb.cert.org/vuls/id/554780
US-CERT VU#381508: http://www.kb.cert.org/vuls/id/381508
US-CERT VU#773548: http://www.kb.cert.org/vuls/id/773548
US-CERT VU#933712: http://www.kb.cert.org/vuls/id/933712
US-CERT VU#596848 http://www.kb.cert.org/vuls/id/596848
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Background
The Mozilla Network Security Service is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. This impacts any software using the NSS library, like the Mozilla products Firefox, Thunderbird and Seamonkey. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 1192-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 6th, 2006 http://www.debian.org/security/faq
Package : mozilla Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566 CVE-2006-4568 CVE-2006-4570 CVE-2006-4571 BugTraq ID : 20042
Several security related problems have been discovered in Mozilla and derived products.
CVE-2006-4340
Daniel Bleichenbacher recently described an implementation error
in RSA signature verification that cause the application to
incorrectly trust SSL certificates.
CVE-2006-4570
Georgi Guninski demonstrated that even with JavaScript disabled in
mail (the default) an attacker can still execute JavaScript when a
mail message is viewed, replied to, or forwarded.
For the stable distribution (sarge) these problems have been fixed in version 1.7.8-1sarge7.3.1.
We recommend that you upgrade your Mozilla package.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.dsc
Size/MD5 checksum: 1131 d15b48d8e6d5bb470cffefdb98fd8c58
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.diff.gz
Size/MD5 checksum: 565099 9539b911c438e419cee16fdce5ccebb1
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz
Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a
Alpha architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 168064 ebdd93280990a822fe619b20d2c5651b
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 147992 527d6cfc2f148b2b57a5710e927d2f7d
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 184944 6b61d08d769e011cbd2c90e8fb45c13b
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 857794 f734aa2ccf548cd02f29c41af248191b
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 1038 03fa5f515ce9cf9ee8b6909112e67241
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 11492210 6370fe9a4502211f03d1c556db10a9a9
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 403278 be6c2e243d2690311b9ebd3f39d0699d
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 158336 6e0d851b64e2eef0a971ec836bf1d8be
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 3358952 739167a1d53ef3fea8d48ac68a0ff985
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 122296 6fdf00b74974a4e264d5ad8cc211d10a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 204154 17bc334d8f76a7f53f4e1bf8487dc47a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 1937186 381885d5a06821864c32f351b37dc906
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_alpha.deb
Size/MD5 checksum: 212632 bb11ae317c16108ca9320317eef099c7
AMD64 architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 168068 a6ec123adfd2fcbf9408596b5c73b9d4
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 147080 9152fff3ba0fbf2a2bf5460d8c96cb5f
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 184956 524afa513ee220128c8524c1205ef8f5
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 715998 08791e74ecdf20de41e5f19d94a716ca
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 1036 6742c0d8e01ba7280ee2517b02a0692a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 10958842 2dd4d59281c666921689dab18cc97a7f
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 403286 ae407a2bc00ed600a3e4381bf4b2f5fa
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 158332 9dc4bdb8e22d6a43a426768e1159465a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 3352976 007632e26f24148508945746e9b38808
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 121182 0b6333f64e2c554b0714ab2300a231f2
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 204176 ddf17971c28fb17165bc67136e899437
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 1936044 5595ca57ce7bad38f20e8d096e263719
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_amd64.deb
Size/MD5 checksum: 204450 d2da3c40abbd17b414db5eae5075dbd5
ARM architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 168072 ff2516439a6a9142f390711efb348ad8
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 125426 a4c096f68b567473cedf980a41b7841e
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 184972 958ce2289c9f9001c05c6fcbcb5c8a71
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 633292 f9ae3102e3e1db4c7193cc647108affc
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 1038 c615211b7d148e6914ccc8206ae72269
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 9220338 f018149aeceba69d07abd6ccf40511f8
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 403324 791115daa9842a854c101152b2aa53e8
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 158364 ea384cea48bab4655a5b155b670dcbbe
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 3342410 147a1d3e30e68d492d1606d8f5b75e8b
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 112668 151c1100ded9a89a7dca01496f657bde
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 204172 ed28f22bc9063cd418041f1212cc3a01
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 1604524 311d5cd9eaab1aaa9bb10ec44f1b43b8
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_arm.deb
Size/MD5 checksum: 169016 e827fe7370f7f3766230765c66e1b9ed
HP Precision architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 168070 64581dd9cc92cd679ee2fc0ee61db9f5
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 157996 716faceb18fb7018141b84f51c6503a7
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 184952 10cf87ce4aac77800d045012455f52b7
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 756042 44e58475246ab2da5fce46332b9bed8f
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 1042 5cbd847400e085f61ce114727dc400e6
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 12176912 0d2a27beadca59f8eb2102d1a032b351
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 403290 0640f6da79eab04ce3fb60f52f235763
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 158358 c748bbf13608c462fa51a7c200344324
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 3359202 f9182415beea6800a2799ef66853f001
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 123514 efafd42607f1d4219906f39f1153f56d
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 204170 5f500679a2fbb03620fe96e5a9e66615
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 2135248 fbdad52922d54cbbd93b2c07435f114b
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_hppa.deb
Size/MD5 checksum: 216440 bfbe9cda6e01d1f17872512935be0699
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 170352 93c0132757c2f5927cbcd3edbc6c50e1
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 137902 746c7c10db2d40314da82cfbfe68b21b
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 187134 448048f13343dd917bf8e5b4aebc9c6c
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 662738 c6c6a485eddccd6827e459d5a3ef1802
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 1032 7dba2a502de330766b38b3de3415bb96
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 10349414 3433a083e8caf92aeccd640fa8e3051c
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 403516 f2bf1fe26de0867f652d0279ee09a2ce
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 158364 5efe6a701d8ec73f9b68c99f6ed8743a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 3595032 20d25e4e398ee8e061023c051202ead0
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 116690 832936b80e72faa976f9b88cf7bbce1e
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 204166 8232c7007d5674ec81cadb21e1152192
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 1816124 d86ab51a3bae24c0c15812c09a6d5aca
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_i386.deb
Size/MD5 checksum: 192792 f6aa69247beb6d659fceeda712570211
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 168064 c7e380c8c28cb27c75f0eb4f5308ce0f
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 175418 51df9210069ec76233e987faf7332f73
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 184940 fa8414c133c69fcbc757eb5a973fd619
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 968238 1325acd2d3c6cd55da5862c4cc37c7e7
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 1034 7cb96d17eca85528e75571e908eea762
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 12965968 c806fe57cad11be3e517ae32a9bf8a74
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 403278 38b8e1dee5235aba18f4481e8358e17a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 158342 92e3349223f0ce8018df4a5e3dd3d284
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 3378668 afbbe0a2a0388afa336f0fa5b2e9b375
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 125586 f628ec3a2a0e9ffd882349a4748b5bb5
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 204164 b64822e5541dbf9ce18c25c3c57a727c
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 2302358 89a93b8c9f670c25508881335159d695
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_ia64.deb
Size/MD5 checksum: 242930 62fc9a87649de2ecef2a39542c470857
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 168078 c3b7aa1b816f29a98e4a111cb8eee55b
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 127086 70b2e18c48d5fa16a42ea2c230841434
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 184992 b243567f7524c97f6d32ef7acfd419cd
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 601300 39d6c017e68ea837f0ce4da5fed30499
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 1044 70236bff1f5c7409fa727dbb9125aaa0
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 9717226 5ba4f9b972b837b6007874872dd3b352
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 403386 fff7cf6c197cb493e92daf6d41d26e34
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 158420 701da929538dad73aec9fdc68cdcf749
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 3338098 a046f1d0df0784228383a9e8406d7a65
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 114484 669b9051c0991e44bda2db410c91cb95
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 204216 99c53a9c2f2350a4a1a9d39c78054047
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 1683242 aa2ed286b86606c51481d4a51729b1f9
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_m68k.deb
Size/MD5 checksum: 175022 504150e924b5ad04892b29e06646d9e5
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 168068 986e98f644a1ce7e41c8b66ea64a78d3
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 141958 9d48c8ead5b703ec59e151fe015017a9
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 184944 8c22e740e0f30065e3e2555470a7400e
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 727008 4eb13d18c10aba6970877152605932d6
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 1042 a03a2cb21c195c0be9fddc05bc36ae2a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 10738234 765f082c174e71fcf336a1a05d4da21e
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 403294 321aad797e8afc4d201f2e2f5b2aa451
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 158346 83a396e806b4d7d0f488081d0f573adf
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 3358822 e9c2a6ec923da290335ca1251b871ea3
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 117644 1b60a2916cd066c5e8ee1bc615b549ba
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 204164 0b7ec0de758949ede920d1fda470b406
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 1795554 1ecdca7f3d0175d64d1320cccb3e4c97
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mips.deb
Size/MD5 checksum: 190110 d507d038190177f2a07a236770596b43
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 168076 daeb11c43fcdae32f8107fc870d413ea
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 141908 58052e46884d461b22cf6308183d8104
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 184954 793c3b33874d48779520cbb302ccf07d
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 716464 ca48760ff0f4621ee9562aa839358520
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 1042 9f3f22a5debbcc2e8dfc009d97e35d2e
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 10617798 9fde4aa43c30493758af5c0d27248a85
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 403288 15fd9ac211379c4a53d1a00002f1954d
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 158330 62e83130300fef744be42b911f872701
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 3359560 9af2ab0f437e08b5936c7cd56a181b63
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 117204 2c2503930b8b58af5e74ad2d1270591d
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 204156 0bb224941755465b55ff6df8cec8cfcb
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 1777612 cbcf8085e6ec3a7ba97b0e751b5345c4
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mipsel.deb
Size/MD5 checksum: 187622 9bc6ba814ade0445aff6d5a9c4d3a696
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 168074 d7b4a7c5bbe3baac5133c3fa1a265e07
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 132428 774701aa5761a72b48719cc3c90b95e7
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 184956 7b79f2e6d9d4cba7c9b8ab88b2232604
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 720214 ef13301949fb2cb87c0f2464220bfad0
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 1042 b11e9180cd97514ea791541dc51c6e5d
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 9711648 8c107826f2ec6cca249be5f1042dea0e
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 403292 12e27826c444ab1f8c5afd88f154fbcb
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 158356 affeb35493057105a7dfd89bba5d40dd
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 3341204 ad03912ca42d8d14ab7b269e30c444b1
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 114582 3c198af3d33673a9d6f2e7c1cec00e4f
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 204176 a6d09e9b630d9210a1cf1ffbc81c8569
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 1643154 2d343f903c492177885ee167aa89eb7a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_powerpc.deb
Size/MD5 checksum: 175816 8e2eddbd5631017cb725b69e1e493143
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 168072 181bd53f98bae36e2c65617f7d19d3dd
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 157706 4841fbcddea3c973c0e58f650b02be0a
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 184944 3676098265fe184b29eeaeb5600fb0b0
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 800404 d59043ee3f8de6109ded310eb2676caa
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 1038 f2edb972286fb96d781b6eedda318047
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 11339772 1d4d0d4737b0da240db0aa3d64f740de
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 403280 4a628c6906de57be839683efc0e75385
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 158330 d948a64b56af65bcef8ea69095d2c7f0
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 3353612 fdd6c8b25715b6bd4a19afa9a1f6d6de
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 121366 c9a927eaf8fdd5e81ec5e4ccd65cbfcc
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 204170 db1baf6a69237d2ad992312f7e49e06f
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 1944792 7c2ccc266fed2030012e957b1e8468b5
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_s390.deb
Size/MD5 checksum: 213644 610bee894928b26d2b807525e5cae97e
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 168068 6fcfd42726a291edb1cfd61e2f11a984
http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 129660 f339731cd85d092184e8d645692b6a46
http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 184956 753e6c5c8897c8b295069be4aedcc55b
http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 674042 57126ff0e746ea6353e94c9cd12f19de
http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 1040 c67300bde176389372c7fc1c165f5976
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 9384000 d747594bfa533f6df4021ec0230289f2
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 403286 4be3db86d8867bb882fee94008bc5246
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 158348 549784d01068073683bc83977403e545
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 3342172 b6572f524ddc2f0a90cb1b57ef53066a
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 112514 8dfad0f1400d292cafe84da604f849d8
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 204154 a09ecfc644a8bbb0f8a6d333afbc6b59
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 1583764 1d3bca34a075297f04f503831eea979c
http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_sparc.deb
Size/MD5 checksum: 168194 ad23c724cea9ef75bde64e0d5565e791
These files will probably be moved into the stable distribution on its next update. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
This update provides the latest Firefox to correct these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571 http://www.mozilla.org/security/announce/2006/mfsa2006-57.html http://www.mozilla.org/security/announce/2006/mfsa2006-58.html http://www.mozilla.org/security/announce/2006/mfsa2006-59.html http://www.mozilla.org/security/announce/2006/mfsa2006-60.html http://www.mozilla.org/security/announce/2006/mfsa2006-61.html http://www.mozilla.org/security/announce/2006/mfsa2006-62.html http://www.mozilla.org/security/announce/2006/mfsa2006-64.html
Updated Packages:
Mandriva Linux 2006.0: 4e750ef25e44a1b493d2a61ad5f9a7a2 2006.0/i586/devhelp-0.10-7.2.20060mdk.i586.rpm e6cd690c11d4e8f352d2ce7bf0f7d4be 2006.0/i586/epiphany-1.8.5-4.2.20060mdk.i586.rpm b2f094942eca657f3dc7a8699cb8b776 2006.0/i586/epiphany-devel-1.8.5-4.2.20060mdk.i586.rpm c4ae8fc253aa1fe055ec4c1560205fab 2006.0/i586/epiphany-extensions-1.8.2-3.2.20060mdk.i586.rpm 08cde29a26e6ac2d0e3b629f660db9fe 2006.0/i586/galeon-2.0.1-1.2.20060mdk.i586.rpm 9c94b904a9f2c64090328edd73d0e1fa 2006.0/i586/libdevhelp-1_0-0.10-7.2.20060mdk.i586.rpm b5ad67818794371f50d63a611c79b45b 2006.0/i586/libdevhelp-1_0-devel-0.10-7.2.20060mdk.i586.rpm fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/i586/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm 770e8d6c5643c78f486ae2c115f7c740 2006.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm ffb123d21760cbba92a232dfb1150b7e 2006.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mdk.i586.rpm fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/i586/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/i586/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm 2596f8b787cea221c80a85fd0854f766 2006.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mdk.i586.rpm c912e48bd5138b8f42b24b3c34653a19 2006.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.i586.rpm 1a82466395715237df552070e51f6525 2006.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.i586.rpm 514de0cacb2462a8a6a26206ac18b617 2006.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.i586.rpm 70415104d0814a6e94c1997c0c464957 2006.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.i586.rpm c2b5a360abd1a8a3e78dd8e9df072b4c 2006.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.i586.rpm f8dd2e9e5a5e374782d9154b09ca7b7d 2006.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.i586.rpm a20a2bee8f26440b13294ef6247f66ec 2006.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.i586.rpm c60d356eddf74e8799b239a925b35953 2006.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.i586.rpm 5b4fbc76811530cfc20ef319daf2f577 2006.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.i586.rpm fdc7591dc15dce7e373f4e167fb2c769 2006.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.i586.rpm 00a17b297ea7b7ee31a3fca5d3109ffc 2006.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.i586.rpm 2bee9151bc0e40bf1ff22a9224643dcb 2006.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.i586.rpm 03285b22a86c82b8558467befb5fa04b 2006.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.i586.rpm f9dbe9c8d7b907e6c1a80f0bce2d9323 2006.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.i586.rpm 4e13ea6856a71514c569581e06515ae8 2006.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.i586.rpm 81b56a020127b1e9c41facb963e670be 2006.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.i586.rpm 3a14f0cee1271d5f4cfedc8967a2be45 2006.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.i586.rpm 9612ac69d69114d1da1dc1bfa6530d9b 2006.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.i586.rpm 9a47da16333b9c1d839e19420ab5c3a5 2006.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.i586.rpm ea5b214a43077114d8adaf184ba6ce61 2006.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.i586.rpm ebf899b39e850438dd4cfb1bbab9ba8d 2006.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.i586.rpm 18522be12bdda788de662d07d5a07e08 2006.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.i586.rpm 19a62453c05c0443aa2999a177d50dac 2006.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.i586.rpm 352aa6197b0b79025f5a71a3135d95c9 2006.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.i586.rpm 64b460d997ff70bf0ff50400c20a98e1 2006.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.i586.rpm 1f67f28a68d57baa96523ef05ccd1bbe 2006.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.i586.rpm f5b2681e10e6eb68e4fb9041262b65c5 2006.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.i586.rpm 8d47794342c430b50dc04f7d4c65cf9d 2006.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.i586.rpm d975c5d5ec3c8fed8846f02105ba4795 2006.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.i586.rpm 563d01331a992ec6ded54d5118bc10ad 2006.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.i586.rpm 4da569e782da6c5b98eab4862c335600 2006.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.i586.rpm 4a77a4d9b22704184694a1a0580440f5 2006.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.i586.rpm 0a153e8351a1ffdfadf067cdf9b2ee06 2006.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.i586.rpm e7ed42daf0c68890a34422d8f5b7dcf6 2006.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.i586.rpm 542ce6ba9713683b8a741ab921cd3e45 2006.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.i586.rpm 55c8c83ad72d6289bf1d45ea517b74ba 2006.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.i586.rpm 591beaf9e8abf8911f023fb147efe765 2006.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.i586.rpm 23b9d2502d7cb24aeea82f358a428ec2 2006.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.i586.rpm be8acdc18fe55ea8a9d0afc553bf21d3 2006.0/i586/yelp-2.10.0-6.2.20060mdk.i586.rpm 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64: 8f79a25451b9f41d48df89f996869cc7 2006.0/x86_64/devhelp-0.10-7.2.20060mdk.x86_64.rpm a9b851ddb7a77ee0f6d73c9a475658e0 2006.0/x86_64/epiphany-1.8.5-4.2.20060mdk.x86_64.rpm 606bb2a3ece209a7c260fd81d776c123 2006.0/x86_64/epiphany-devel-1.8.5-4.2.20060mdk.x86_64.rpm bb99bf7ed2e5608849cb9b0bcac49041 2006.0/x86_64/epiphany-extensions-1.8.2-3.2.20060mdk.x86_64.rpm 6caf5e05026177525d0d04225e5dcc4a 2006.0/x86_64/galeon-2.0.1-1.2.20060mdk.x86_64.rpm 2ef32f51f707beff08db88d61aab842d 2006.0/x86_64/lib64devhelp-1_0-0.10-7.2.20060mdk.x86_64.rpm 50b6716aa33e6065ce0ba0b107fb3a8c 2006.0/x86_64/lib64devhelp-1_0-devel-0.10-7.2.20060mdk.x86_64.rpm 0b3997e3f646af18f684fdce56194ae3 2006.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mdk.x86_64.rpm 75e63b4f3785b8c7fa4924d7f30be921 2006.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm cda6b659c2777c44fdde0ac3ab1fb11b 2006.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm 4f3e6424fa71a629be1b81415fe2b875 2006.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mdk.x86_64.rpm 7bd353454999969148524636267b68c5 2006.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/x86_64/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm 770e8d6c5643c78f486ae2c115f7c740 2006.0/x86_64/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/x86_64/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/x86_64/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm 561212c426f35a3e2393ad3acbf11bda 2006.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mdk.x86_64.rpm a4a76ca919cec68bef5ec0521e4185b2 2006.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.x86_64.rpm e23f698f02d78a8d8b2ac056e91f106a 2006.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.x86_64.rpm 1e815c45fb57ee56bd4d4258a8cda5ad 2006.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.x86_64.rpm 1c348254b80cec87c2b804825cdd8a5d 2006.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.x86_64.rpm 6eac0be09030f9ed629107600bcbf88f 2006.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.x86_64.rpm a06b4569f5392501df97fb209315782f 2006.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.x86_64.rpm 98aac82b44a66047d884b95f251cd6c5 2006.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.x86_64.rpm 9479078391f288562b612afff9cb994e 2006.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm 247dce39896e7230ffda5ca8bc58d736 2006.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.x86_64.rpm a86cb00b8b07cd45a1274ddc318de2bd 2006.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.x86_64.rpm 8ba8f4e4d9fcfef9f3cc4ac71b15c5df 2006.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.x86_64.rpm 4c477d0ef8c843b9416185508c9181a1 2006.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.x86_64.rpm 6e9c4c9c6ba8cfefd32e4d135943824d 2006.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.x86_64.rpm b8046ef3da338188287fa9a8ebfb9515 2006.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.x86_64.rpm 1609e86fa50ef7c5c3ef827bf47090e8 2006.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.x86_64.rpm 5cdf122cafadd7f2125d42246402e29d 2006.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.x86_64.rpm 75f82717c62d51d00ba25abcdf3e26a5 2006.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.x86_64.rpm 75b03be94bdea20dbbf361a3a295e4c9 2006.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.x86_64.rpm 672f36e40f7c5463b5e771bcaeae31af 2006.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.x86_64.rpm 8cf3e2082d406f71c4c7d3f638792e1e 2006.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.x86_64.rpm 4f0f77a0b9fd79a671857fd330933289 2006.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.x86_64.rpm b5c00962987efb764ea77e76c9734c79 2006.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.x86_64.rpm f788aefcdac5b098d8853a3ef4fe146c 2006.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.x86_64.rpm 4afff3966656a65b55290d08d446d864 2006.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.x86_64.rpm e63e4db3037a915ac24dca78e5ae8617 2006.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.x86_64.rpm 7e443e15233a3db5b76ae7c299d1e7d9 2006.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.x86_64.rpm 75ca84a45213c2d33d66b68c649dd875 2006.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.x86_64.rpm 7a8cd126f5f5c63d45efe79a1e78e94d 2006.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.x86_64.rpm 342155314a7801a1637d807e8ae8754d 2006.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.x86_64.rpm 359e5cb75905f2c08b49ecb1eccdf335 2006.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.x86_64.rpm fa480b18d46eaed805f8fe0c92f6a9fe 2006.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.x86_64.rpm 3233bb351b6c89deb25a6722df088e9a 2006.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.x86_64.rpm f1347555bb50e32c58ac3edba31f3d1a 2006.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.x86_64.rpm c20fd1c8861e74829879a63075fdf2f4 2006.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.x86_64.rpm 8c73daea2686e503d3367d112c4c691e 2006.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.x86_64.rpm 59d920837831e1a165ce19447066b4e5 2006.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.x86_64.rpm 869bea0fbfc6b2c65ab525d80aed03b9 2006.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.x86_64.rpm 1b867a3b0b7d8efd86377d0f0dcb67c3 2006.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.x86_64.rpm 12ab7912491456d673058667c8c0dc3a 2006.0/x86_64/yelp-2.10.0-6.2.20060mdk.x86_64.rpm 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm
Corporate 3.0: c106557de1e045e5840a453d710b63e7 corporate/3.0/i586/libnspr4-1.5.0.7-0.1.C30mdk.i586.rpm b5a3de7c01f7a4187f85bc66db242c67 corporate/3.0/i586/libnspr4-devel-1.5.0.7-0.1.C30mdk.i586.rpm 8d1cfeaf1cb031bc1ec4519994801b6a corporate/3.0/i586/libnspr4-static-devel-1.5.0.7-0.1.C30mdk.i586.rpm d08546a25f6e78701feed1d67d53fabd corporate/3.0/i586/libnss3-1.5.0.7-0.1.C30mdk.i586.rpm 3371ded40c0bd1a8e828d9e92aed09fd corporate/3.0/i586/libnss3-devel-1.5.0.7-0.1.C30mdk.i586.rpm 6d635b07ba60ed49fe27d4c633204520 corporate/3.0/i586/mozilla-firefox-1.5.0.7-0.1.C30mdk.i586.rpm aa83aaff11daa5889c9d36c928075341 corporate/3.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.i586.rpm 059c5de9e7a5f658cfbc692c913b3403 corporate/3.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.i586.rpm 63b8a1a7db1568964fe4dc1d32552f52 corporate/3.0/i586/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.i586.rpm cf48e548709250792e5a87c12db71cf1 corporate/3.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.i586.rpm 90c83713c4fd403c9999cf52c56eb282 corporate/3.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.i586.rpm 91279bd7d327c1a3bc0855cb06007f82 corporate/3.0/i586/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.i586.rpm 1fec2333c2988cc7cb7238d5bcf1812d corporate/3.0/i586/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.i586.rpm debf0c0ddd775793cd87fedcaefc5cf7 corporate/3.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.i586.rpm 6e9ec67c3a28bde55146ca1f475cb847 corporate/3.0/i586/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.i586.rpm 53c7defd9f6f8168990e4f4d4fa3a495 corporate/3.0/i586/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.i586.rpm 5ac67c7e12f4edd0429bc2f085e438e6 corporate/3.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.i586.rpm 5d4ac2f2cd3d6aecd52365e54aa85d66 corporate/3.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.i586.rpm aad00d0da3781f7165ed63df0276962d corporate/3.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.i586.rpm c531c8f33674e476980aa2cf112440bc corporate/3.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.i586.rpm 8f33047a9c560757a90831ea415ef814 corporate/3.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.i586.rpm ec0a957af4cd462f58c3d846a37d68b4 corporate/3.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.i586.rpm 1f8f0a6a7f962c1b1cf9d3dec38af0e2 corporate/3.0/i586/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.i586.rpm 354c14637e7df983f16903f46bf81171 corporate/3.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.i586.rpm b9fdd2f2db6f74ef240e23ace3a3a0c3 corporate/3.0/i586/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.i586.rpm 831a3b7c411cc716527dfe1c97d63de2 corporate/3.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.i586.rpm a89843c85143fa62e264f37df634b920 corporate/3.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.i586.rpm 382ff5621db369b06e9d76a41a4fa509 corporate/3.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.i586.rpm 4181358e7b0b84ff907bd5173be137d2 corporate/3.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.i586.rpm 6da617d32c9eb917180eddd62aeabf54 corporate/3.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.i586.rpm c0e559c0dc865c97435a918d77d690dd corporate/3.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.i586.rpm 05a64d9e97c0ec16b661d93e4c49ba93 corporate/3.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.i586.rpm ef2379b44f8e241a7811eee7031e9838 corporate/3.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.i586.rpm 08f36ddea8f0b8ad5decc76b6ebf7106 corporate/3.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.i586.rpm 9af857fcd8a7e98707ae77fcbd17e25d corporate/3.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.i586.rpm 5b23c90450de3a6ee1b879dafb4e0ebb corporate/3.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.i586.rpm 646d7d7ca0374da1d90c77ff827b7a3b corporate/3.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.i586.rpm 25746d2ce3a97f620f1c098daef474ed corporate/3.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.i586.rpm fb12bfb159f9d9a291e838cb6994daa5 corporate/3.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.i586.rpm 962b2b084cde62a28341c177d006b755 corporate/3.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.i586.rpm 784906446777df1d03ba5ac75e790104 corporate/3.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.i586.rpm 543df7658745731ec6341a1d46901e5e corporate/3.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.i586.rpm ef4728e96d4c1dadc4e9286022c6fc1a corporate/3.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.i586.rpm f974e234f39298065b5a120da2aad80f corporate/3.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.i586.rpm da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64: 38e5d39281cf8fe28ae400ef6880ed82 corporate/3.0/x86_64/lib64nspr4-1.5.0.7-0.1.C30mdk.x86_64.rpm 8594d09e78d9ec76bed9bb5bf9065a9d corporate/3.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 88ea20792afc414a8511312fc53c9973 corporate/3.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 0749638fca3fc55a0c84b374c8ddce4c corporate/3.0/x86_64/lib64nss3-1.5.0.7-0.1.C30mdk.x86_64.rpm 3bd450c319eada8936baad026c0e7edc corporate/3.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 86a6c461d4b783867fbf62dba98b76a0 corporate/3.0/x86_64/mozilla-firefox-1.5.0.7-0.1.C30mdk.x86_64.rpm fa3bdb060dc9933093cd59604e0e9770 corporate/3.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.x86_64.rpm cf50847d5e76e5a9b0cd9c48a156f919 corporate/3.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.x86_64.rpm 5251818cebcf07fdb025aded5d99f092 corporate/3.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.x86_64.rpm 1ae9e70895e0bfb45034d2cfa4c937b8 corporate/3.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.x86_64.rpm 3585c137dc33769069e8961fa5a7ae7b corporate/3.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.x86_64.rpm e10f6d78aa54d325f8a38d7f8729f1ac corporate/3.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.x86_64.rpm 62bd1fd39df7abf0ce81eb9d711f6d14 corporate/3.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.x86_64.rpm e34c011d455b576e4e27b20d4bc057db corporate/3.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm aebe66911dac80623339aee380ec165a corporate/3.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.x86_64.rpm 3c5f109ae088242966604dce6338f07b corporate/3.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.x86_64.rpm 17ef425bc7fc131b9de3632fb92317d1 corporate/3.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.x86_64.rpm 15ea134fde2b507f46e6e4faf243135f corporate/3.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.x86_64.rpm ce6f4aa7a0fb1ac425afc5d915bb392d corporate/3.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.x86_64.rpm 13b0b693682e7def5e320473342cf4a0 corporate/3.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.x86_64.rpm d5fd81f204e46d15b6d1124376ab0930 corporate/3.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.x86_64.rpm cb389fc624d1961cf2ab00488bad7cef corporate/3.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.x86_64.rpm 3cd572d77c055bf562c3678c513ff3c8 corporate/3.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.x86_64.rpm ea7215256650d751ae2ce0d20812fa96 corporate/3.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.x86_64.rpm 57fcf8c6e9f251d3eb4f0096ca55cea3 corporate/3.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.x86_64.rpm d7f6310911b7e049876f7b70c16b8ccc corporate/3.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.x86_64.rpm 8c0b97b440922510631400b5aea900ac corporate/3.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.x86_64.rpm 8045c85ca598518aff6c7ead8f3fbf61 corporate/3.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.x86_64.rpm 996d7bb252cf32b3ddce18a90b4bb8d9 corporate/3.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.x86_64.rpm 5a3b346110144f79e05c20d13ac90663 corporate/3.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.x86_64.rpm c56729c0896b11a9e49875fe2b493872 corporate/3.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.x86_64.rpm da6306fcba9fba87d98f68208e752bf8 corporate/3.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.x86_64.rpm e94eca882ce53af3086bac6cf70076ea corporate/3.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.x86_64.rpm 810bc3ca66d52d5537ece20a12679fec corporate/3.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.x86_64.rpm c97bcde75d8118bb3d6c38428b811cc9 corporate/3.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.x86_64.rpm 629ec7999ae3fd23e36e2c6722847bbe corporate/3.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.x86_64.rpm ad435041d1138f8a38a0a0739cff18d8 corporate/3.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.x86_64.rpm f76501363a31bcd388f5edcc80881196 corporate/3.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.x86_64.rpm e400f4b7e77307c8c5ab1bc26691168a corporate/3.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.x86_64.rpm 126f45e769e463182b4ade57183684c1 corporate/3.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.x86_64.rpm 160b09d1c10d0b781d8c1a17779432ed corporate/3.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.x86_64.rpm c5c363d0552c8365bf5dc6a0936d28b2 corporate/3.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.x86_64.rpm c4baf08469f1dbea8924429a7ec7b86e corporate/3.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.x86_64.rpm b9ce84c78e92b6f5e75954ada2706722 corporate/3.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.x86_64.rpm da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm
Corporate 4.0: 64a0356cc8f1b1ffcdfdef3d8d146cc5 corporate/4.0/i586/libnspr4-1.5.0.7-0.1.20060mlcs4.i586.rpm 3f0b705031d1e95280e8194338b2d381 corporate/4.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm 1bba2e76f21b670f44ba65f8c92b67e1 corporate/4.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm cb10e515e0fad365a81273a9b620cbc7 corporate/4.0/i586/libnss3-1.5.0.7-0.1.20060mlcs4.i586.rpm 3534b6f0e0b64686aee7b0758ec33daf corporate/4.0/i586/libnss3-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm c3aa90658d2adeb4e6543426c493a0fe corporate/4.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.i586.rpm 122e2ce3928dd2898118533f45f851e1 corporate/4.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.i586.rpm 3ade855a9fc71980eec72c8dbc107ae3 corporate/4.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.i586.rpm c189b7b4b54f4bdf040635750df007f8 corporate/4.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.i586.rpm 360d587d53e2a9c47dfff8a9137f1b4c corporate/4.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.i586.rpm c2fa5da5d44a5f70bb49d5b4ba7e86e6 corporate/4.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.i586.rpm 5df7bf2ff4059259ed0b5ea9f3587cc3 corporate/4.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.i586.rpm 278a321f6ee5928135585f03a05ae642 corporate/4.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.i586.rpm cd37b5dfe36b72fb482be5abc4bbbba7 corporate/4.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm 9b49e02711849a4babedfa63c6aadefb corporate/4.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.i586.rpm d8293192b06e5a91df8314ecba17880e corporate/4.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.i586.rpm 5839e97fa06cca289121be5f33e9286d corporate/4.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.i586.rpm 34d184e85b53c369a713c08f66e601dc corporate/4.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.i586.rpm ab7b43c629095beee26dbb1381fbff9d corporate/4.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.i586.rpm 79cfc37305b6a3977d7c7333c7e883de corporate/4.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.i586.rpm 7e8f28d446d6e574d8a1521059c03144 corporate/4.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.i586.rpm 0d2dd482cc76fb0df96c0bc5f4fa5844 corporate/4.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.i586.rpm 58959b3a1d43cc2a666361804daa88f1 corporate/4.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.i586.rpm ded59cf4be8835dc0ada86add049ed86 corporate/4.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.i586.rpm 8afd66b33e600714238e360a127df36e corporate/4.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.i586.rpm ef6a89b44e3b120f1bae29217728f196 corporate/4.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.i586.rpm 1532d01d8123e87ee1103292ed95f68d corporate/4.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.i586.rpm 8c0667ab59c15a9b66097f5e86df7220 corporate/4.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.i586.rpm bcec75d2b059d123d6c21dae29baee00 corporate/4.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.i586.rpm f5afdfd15e40f4ec6323a8cac098cb78 corporate/4.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.i586.rpm 1544a7236d6a10521f89234feaff9435 corporate/4.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.i586.rpm 53834f537b0eacd3bb59a2ccc6a40ea6 corporate/4.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.i586.rpm 70171f6ba3c24b51ec29be154e129bce corporate/4.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.i586.rpm 4e64eee4ed44068cb9db5c77730c71b8 corporate/4.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.i586.rpm d990c04de7c285225c51067ff92d8a58 corporate/4.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.i586.rpm 04ee85bd5b28b12466bcd8189d4ae480 corporate/4.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.i586.rpm 222528603f2d88e4e46178620328ac7e corporate/4.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.i586.rpm caacac0ace4c80fbf0d917ea95070114 corporate/4.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.i586.rpm e4aabb47eacf2bcbb517e6890935d4e9 corporate/4.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.i586.rpm e55300aa65e586aba56e5b75c3d0f0d7 corporate/4.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.i586.rpm 8d857f4d255e86e4b1db933ab75a88b5 corporate/4.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.i586.rpm 0d4998a9483e67ad0a484d8535950401 corporate/4.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.i586.rpm 0677248472dd1f219ac4c633b3ae8427 corporate/4.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.i586.rpm 025ee723e8a157de742313163d8199e6 corporate/4.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.i586.rpm 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: e9362e7e9d164dcf20ac2dd178057783 corporate/4.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 27152d5c4d45cfe65038b90014f4b128 corporate/4.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a520a8169e6f7fa9636c7434820263cc corporate/4.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 73fa1146e61ddf2baea07f4e51b247a2 corporate/4.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 77c656121a9efaefb5bf8bea7416a190 corporate/4.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 1353fe3c1c7740891cca051691f2a844 corporate/4.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 6e547a34386d9220269f6971df84459b corporate/4.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 37bd5e53ce8bd1196991a1d48c7d3fc2 corporate/4.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.x86_64.rpm d8efb7b371fa3bc9d7dbda4d82bcea69 corporate/4.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a4eb36d0ed16b308bf8146758468f720 corporate/4.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 1f3f6299c228a51c39dd9036d501baf3 corporate/4.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b7ed3aee73652f317d41612746b7f79e corporate/4.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.x86_64.rpm aa5e7732031b216f6cc4552b7e5bfe22 corporate/4.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b99863ae0bc816222fec7afd596b4b38 corporate/4.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 22b5ef994c3f38b7b5a63808f0ef9c47 corporate/4.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a5033ebf881cab82e063df8ffe29e22b corporate/4.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 387dfb400ed59319e932a19e2dd4fe09 corporate/4.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 2a114b7e832d12fad87f2ad76ed89a7d corporate/4.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm eced7a780c5f758eef5a0f71f43ed261 corporate/4.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 854bc6729675ed8670330f3da1e520b2 corporate/4.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b73ac49803411c5afb96d87cde8a89c9 corporate/4.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.x86_64.rpm ca9a93da5b7f4dfc1eca188267891a66 corporate/4.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 267f8dc1ca9e04115050a311eebd00f1 corporate/4.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 516850fa1de5417fdb96ab50fee1504f corporate/4.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm ec13f241ff41c46590e31fd8339ffae7 corporate/4.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 00eddff4c17ce23c148cbb2bfd27bc59 corporate/4.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 896cc9b5af7e66ddbf67ad819083a9aa corporate/4.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 52a752441fc870f33e792860ec328ecd corporate/4.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b418b4371503ed9502ca7eab01c6d86e corporate/4.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 801a63774bfd94ac7e292b97bc1c88a6 corporate/4.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 4998a34e227bcd0de4c64a08198cda13 corporate/4.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 0f809660f4c1e45133fc01003acee854 corporate/4.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm da3f053868769c3d1705158b925a3312 corporate/4.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b53c13931bdcebb9dec07ccb7512cc0d corporate/4.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 431f220901edaf32f504ee6dfd7d8262 corporate/4.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 45d21d5351be8762640ae3038458c6b8 corporate/4.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 3bb59b3ca297d90181276683db70ceb7 corporate/4.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.x86_64.rpm cce30e727a3dba740a537ec0040248f2 corporate/4.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 7221b6655d4061eb29ed5150f87b3706 corporate/4.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm dd7c39076b8bb01d1b4432ba9cb29f12 corporate/4.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.x86_64.rpm cacf45d88765c0c26d7256e5f392c2df corporate/4.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 703558369cbe9e4920eab509134d3a7e corporate/4.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 817fd873fb5f997916d61b2cf078d2c3 corporate/4.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm fe95060a37a586f98f5c3683131a9ef2 corporate/4.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig38FF09D81E6F0DF2DC736FD8 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: quoted-printable
Gentoo Linux Security Advisory GLSA 200609-19
http://security.gentoo.org/
Severity: Normal Title: Mozilla Firefox: Multiple vulnerabilities Date: September 28, 2006 Bugs: #147652 ID: 200609-19
Synopsis =3D=3D=3D=3D=3D=3D=3D=3D
The Mozilla Foundation has reported numerous vulnerabilities in Mozilla Firefox, including one that may allow execution of arbitrary code.
Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Mozilla Firefox is a redesign of the Mozilla Navigator component. The goal is to produce a cross-platform, stand-alone browser application.
Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/mozilla-firefox < 1.5.0.7 >=3D 1.5.0.7=
2 www-client/mozilla-firefox-bin < 1.5.0.7 >=3D 1.5.0.7=
-------------------------------------------------------------------
2 affected packages on all of their supported architectures.
-------------------------------------------------------------------
Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
A number of vulnerabilities were found and fixed in Mozilla Firefox. For details please consult the references below.
Impact =3D=3D=3D=3D=3D=3D
The most severe vulnerability involves enticing a user to visit a malicious website, crashing the browser and executing arbitrary code with the rights of the user running the application.
Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
There is no known workaround at this time.
Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
All Mozilla Firefox users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose=20
">=3Dwww-client/mozilla-firefox-1.5.0.7"
Users of the binary package should upgrade as well:
# emerge --sync
# emerge --ask --oneshot --verbose=20
">=3Dwww-client/mozilla-firefox-bin-1.5.0.7"
References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
[ 1 ] CVE-2006-4253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4253 [ 2 ] CVE-2006-4340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4340 [ 3 ] CVE-2006-4565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4565 [ 4 ] CVE-2006-4566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4566 [ 5 ] CVE-2006-4567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4567 [ 6 ] CVE-2006-4568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4568 [ 7 ] CVE-2006-4569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4569 [ 8 ] CVE-2006-4571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4571
Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200609-19.xml
Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License =3D=3D=3D=3D=3D=3D=3D
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA06-333A
Apple Releases Security Update to Address Multiple Vulnerabilities
Original release date: November 29, 2006 Last revised: -- Source: US-CERT
Systems Affected
* Apple Mac OS X version 10.3.x and 10.4.x
* Apple Mac OS X Server version 10.3.x and 10.4.x
* Apple Safari web browser
These vulnerabilities affect both Intel-based and PowerPC-based Apple systems.
Overview
Apple has released Security Update 2006-007 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser. Vulnerabilities in OpenSSL, gzip, and other products are also addressed. Attackers may take advantage of the less serious vulnerabilities to bypass security restrictions or cause a denial of service.
I. Description
Apple Security Update 2006-007 addresses a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, and other products. Further details are available in the related vulnerability notes.
This security update also addresses previously known vulnerabilities in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. Information is also available through the OpenSSL vulnerabilities page. Information about the vulnerabilities in gzip is available in a series of vulnerability notes.
II. Impact
The impacts of these vulnerabilities vary. For specific details, see the appropriate vulnerability notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service.
III. Solution
Install updates
Install Apple Security Update 2006-007.
IV. References
* Vulnerability Notes for Apple Security Update 2006-007 -
<http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007>
* Vulnerability Notes for OpenSSL Security Advisory [28th September
2006] -
http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928
* Vulnerability Note VU#845620 -
<http://www.kb.cert.org/vuls/id/845620>
* Vulnerability Note VU#933712 -
<http://www.kb.cert.org/vuls/id/933712>
* Vulnerability Note VU#381508 -
<http://www.kb.cert.org/vuls/id/381508>
* Vulnerability Note VU#554780 -
<http://www.kb.cert.org/vuls/id/554780>
* Vulnerability Note VU#596848 -
<http://www.kb.cert.org/vuls/id/596848>
* Vulnerability Note VU#773548 -
<http://www.kb.cert.org/vuls/id/773548>
* About the security content of Security Update 2006-007 -
<http://docs.info.apple.com/article.html?artnum=304829>
* Mac OS X: Updating your software -
<http://docs.info.apple.com/article.html?artnum=106704>
* Apple Downloads - <http://www.apple.com/support/downloads/>
* OpenSSL: OpenSSL vulnerabilities -
<http://www.openssl.org/news/vulnerabilities.html>
* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/#Safari>
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA06-333A.html>
Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA06-333A Feedback VU#191336" in the subject.
Produced 2006 by US-CERT, a government organization.
Terms of use:
http://www.us-cert.gov/legal.html
Revision History
November 29, 2006: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6 lJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz iN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7 xr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf 8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q A580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg== =f7N+ -----END PGP SIGNATURE----- . Other vulnerabilities include program crashes and the acceptance of forged certificates.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200110-0171", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 2.4, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "ubuntu", "version": null }, { "model": "firefox", "scope": "lte", "trust": 1.8, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "network security services", "scope": "lte", "trust": 1.8, "vendor": "mozilla", "version": "3.11.2" }, { "model": "seamonkey", "scope": "lte", "trust": 1.8, "vendor": "mozilla", "version": "1.0.4" }, { "model": "thunderbird", "scope": "lte", "trust": 1.8, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": null, "scope": null, "trust": 1.6, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "mozilla", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.7 (solaris 10 sparc for )" }, { "model": "mozilla", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.7 (solaris 10 x86 for )" }, { "model": "mozilla", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.7 (solaris 8 sparc for )" }, { "model": "mozilla", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.7 (solaris 8 x86 for )" }, { "model": "mozilla", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.7 (solaris 9 sparc for )" }, { "model": "mozilla", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.7 (solaris 9 x86 for )" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "seamonkey", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.0.4" }, { "model": "network security services", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "3.11.2" }, { "model": "thunderbird", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "firefox", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.11.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4340" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Bleichenbacher", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-270" } ], "trust": 0.6 }, "cve": "CVE-2006-4340", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2006-4340", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2006-4340", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4340", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#773548", "trust": 0.8, "value": "1.57" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" }, { "author": "CARNEGIE MELLON", "id": "VU#547300", "trust": 0.8, "value": "2.53" }, { "author": "CNNVD", "id": "CNNVD-200609-270", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. A buffer overflow vulnerability in an OpenSSL library function could allow a remote attacker to execute code on an affected system. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\ngzip Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA21996\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21996/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\ngzip 1.x\nhttp://secunia.com/product/4220/\n\nDESCRIPTION:\nTavis Ormandy has reported some vulnerabilities in gzip, which can be\nexploited by malicious people to cause a DoS (Denial of Service) and\npotentially compromise a vulnerable system. \n\n1) A boundary error within the \"make_table()\" function in unlzh.c can\nbe used to modify certain stack data. tricking\na user or automated system into unpacking a specially crafted archive\nfile. tricking a user or\nautomated system into unpacking a specially crafted \"pack\" archive\nfile. \n\n3) A buffer overflow within the \"make_table()\" function of gzip\u0027s LZH\nsupport can be exploited to cause a DoS and potentially to compromise\na vulnerable system by e.g. tricking a user or automated system into\nunpacking an archive containing a specially crafted decoding table. \n\n4) A NULL pointer dereference within the \"huft_build()\" function and\nan infinite loop within the LZH handling can be exploited to cause a\nDoS by e.g. tricking a user or automated system into unpacking a\nspecially crafted archive file. \n\nThe vulnerabilities have been reported in version 1.3.5. \n\nSOLUTION:\nDo not unpack untrusted archive files. \n\nPROVIDED AND/OR DISCOVERED BY:\nTavis Ormandy, Google Security Team\n\nORIGINAL ADVISORY:\nhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676\n\nOTHER REFERENCES:\nUS-CERT VU#554780:\nhttp://www.kb.cert.org/vuls/id/554780\n\nUS-CERT VU#381508:\nhttp://www.kb.cert.org/vuls/id/381508\n\nUS-CERT VU#773548:\nhttp://www.kb.cert.org/vuls/id/773548\n\nUS-CERT VU#933712:\nhttp://www.kb.cert.org/vuls/id/933712\n\nUS-CERT VU#596848\nhttp://www.kb.cert.org/vuls/id/596848\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nBackground\n==========\n\nThe Mozilla Network Security Service is a library implementing security\nfeatures like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12,\nS/MIME and X.509 certificates. This impacts any software using the NSS library, like the\nMozilla products Firefox, Thunderbird and Seamonkey. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1192-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nOctober 6th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566\n CVE-2006-4568 CVE-2006-4570 CVE-2006-4571\nBugTraq ID : 20042\n\nSeveral security related problems have been discovered in Mozilla and\nderived products. \n\nCVE-2006-4340\n\n Daniel Bleichenbacher recently described an implementation error\n in RSA signature verification that cause the application to\n incorrectly trust SSL certificates. \n\nCVE-2006-4570\n\n Georgi Guninski demonstrated that even with JavaScript disabled in\n mail (the default) an attacker can still execute JavaScript when a\n mail message is viewed, replied to, or forwarded. \n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.7.8-1sarge7.3.1. \n\nWe recommend that you upgrade your Mozilla package. \n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.dsc\n Size/MD5 checksum: 1131 d15b48d8e6d5bb470cffefdb98fd8c58\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.diff.gz\n Size/MD5 checksum: 565099 9539b911c438e419cee16fdce5ccebb1\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz\n Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 168064 ebdd93280990a822fe619b20d2c5651b\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 147992 527d6cfc2f148b2b57a5710e927d2f7d\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 184944 6b61d08d769e011cbd2c90e8fb45c13b\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 857794 f734aa2ccf548cd02f29c41af248191b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 1038 03fa5f515ce9cf9ee8b6909112e67241\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 11492210 6370fe9a4502211f03d1c556db10a9a9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 403278 be6c2e243d2690311b9ebd3f39d0699d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 158336 6e0d851b64e2eef0a971ec836bf1d8be\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 3358952 739167a1d53ef3fea8d48ac68a0ff985\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 122296 6fdf00b74974a4e264d5ad8cc211d10a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 204154 17bc334d8f76a7f53f4e1bf8487dc47a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 1937186 381885d5a06821864c32f351b37dc906\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_alpha.deb\n Size/MD5 checksum: 212632 bb11ae317c16108ca9320317eef099c7\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 168068 a6ec123adfd2fcbf9408596b5c73b9d4\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 147080 9152fff3ba0fbf2a2bf5460d8c96cb5f\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 184956 524afa513ee220128c8524c1205ef8f5\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 715998 08791e74ecdf20de41e5f19d94a716ca\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 1036 6742c0d8e01ba7280ee2517b02a0692a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 10958842 2dd4d59281c666921689dab18cc97a7f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 403286 ae407a2bc00ed600a3e4381bf4b2f5fa\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 158332 9dc4bdb8e22d6a43a426768e1159465a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 3352976 007632e26f24148508945746e9b38808\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 121182 0b6333f64e2c554b0714ab2300a231f2\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 204176 ddf17971c28fb17165bc67136e899437\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 1936044 5595ca57ce7bad38f20e8d096e263719\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_amd64.deb\n Size/MD5 checksum: 204450 d2da3c40abbd17b414db5eae5075dbd5\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 168072 ff2516439a6a9142f390711efb348ad8\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 125426 a4c096f68b567473cedf980a41b7841e\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 184972 958ce2289c9f9001c05c6fcbcb5c8a71\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 633292 f9ae3102e3e1db4c7193cc647108affc\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 1038 c615211b7d148e6914ccc8206ae72269\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 9220338 f018149aeceba69d07abd6ccf40511f8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 403324 791115daa9842a854c101152b2aa53e8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 158364 ea384cea48bab4655a5b155b670dcbbe\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 3342410 147a1d3e30e68d492d1606d8f5b75e8b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 112668 151c1100ded9a89a7dca01496f657bde\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 204172 ed28f22bc9063cd418041f1212cc3a01\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 1604524 311d5cd9eaab1aaa9bb10ec44f1b43b8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_arm.deb\n Size/MD5 checksum: 169016 e827fe7370f7f3766230765c66e1b9ed\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 168070 64581dd9cc92cd679ee2fc0ee61db9f5\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 157996 716faceb18fb7018141b84f51c6503a7\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 184952 10cf87ce4aac77800d045012455f52b7\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 756042 44e58475246ab2da5fce46332b9bed8f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 1042 5cbd847400e085f61ce114727dc400e6\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 12176912 0d2a27beadca59f8eb2102d1a032b351\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 403290 0640f6da79eab04ce3fb60f52f235763\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 158358 c748bbf13608c462fa51a7c200344324\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 3359202 f9182415beea6800a2799ef66853f001\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 123514 efafd42607f1d4219906f39f1153f56d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 204170 5f500679a2fbb03620fe96e5a9e66615\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 2135248 fbdad52922d54cbbd93b2c07435f114b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_hppa.deb\n Size/MD5 checksum: 216440 bfbe9cda6e01d1f17872512935be0699\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 170352 93c0132757c2f5927cbcd3edbc6c50e1\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 137902 746c7c10db2d40314da82cfbfe68b21b\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 187134 448048f13343dd917bf8e5b4aebc9c6c\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 662738 c6c6a485eddccd6827e459d5a3ef1802\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 1032 7dba2a502de330766b38b3de3415bb96\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 10349414 3433a083e8caf92aeccd640fa8e3051c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 403516 f2bf1fe26de0867f652d0279ee09a2ce\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 158364 5efe6a701d8ec73f9b68c99f6ed8743a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 3595032 20d25e4e398ee8e061023c051202ead0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 116690 832936b80e72faa976f9b88cf7bbce1e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 204166 8232c7007d5674ec81cadb21e1152192\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 1816124 d86ab51a3bae24c0c15812c09a6d5aca\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_i386.deb\n Size/MD5 checksum: 192792 f6aa69247beb6d659fceeda712570211\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 168064 c7e380c8c28cb27c75f0eb4f5308ce0f\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 175418 51df9210069ec76233e987faf7332f73\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 184940 fa8414c133c69fcbc757eb5a973fd619\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 968238 1325acd2d3c6cd55da5862c4cc37c7e7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 1034 7cb96d17eca85528e75571e908eea762\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 12965968 c806fe57cad11be3e517ae32a9bf8a74\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 403278 38b8e1dee5235aba18f4481e8358e17a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 158342 92e3349223f0ce8018df4a5e3dd3d284\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 3378668 afbbe0a2a0388afa336f0fa5b2e9b375\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 125586 f628ec3a2a0e9ffd882349a4748b5bb5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 204164 b64822e5541dbf9ce18c25c3c57a727c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 2302358 89a93b8c9f670c25508881335159d695\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_ia64.deb\n Size/MD5 checksum: 242930 62fc9a87649de2ecef2a39542c470857\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 168078 c3b7aa1b816f29a98e4a111cb8eee55b\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 127086 70b2e18c48d5fa16a42ea2c230841434\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 184992 b243567f7524c97f6d32ef7acfd419cd\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 601300 39d6c017e68ea837f0ce4da5fed30499\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 1044 70236bff1f5c7409fa727dbb9125aaa0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 9717226 5ba4f9b972b837b6007874872dd3b352\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 403386 fff7cf6c197cb493e92daf6d41d26e34\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 158420 701da929538dad73aec9fdc68cdcf749\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 3338098 a046f1d0df0784228383a9e8406d7a65\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 114484 669b9051c0991e44bda2db410c91cb95\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 204216 99c53a9c2f2350a4a1a9d39c78054047\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 1683242 aa2ed286b86606c51481d4a51729b1f9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_m68k.deb\n Size/MD5 checksum: 175022 504150e924b5ad04892b29e06646d9e5\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 168068 986e98f644a1ce7e41c8b66ea64a78d3\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 141958 9d48c8ead5b703ec59e151fe015017a9\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 184944 8c22e740e0f30065e3e2555470a7400e\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 727008 4eb13d18c10aba6970877152605932d6\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 1042 a03a2cb21c195c0be9fddc05bc36ae2a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 10738234 765f082c174e71fcf336a1a05d4da21e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 403294 321aad797e8afc4d201f2e2f5b2aa451\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 158346 83a396e806b4d7d0f488081d0f573adf\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 3358822 e9c2a6ec923da290335ca1251b871ea3\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 117644 1b60a2916cd066c5e8ee1bc615b549ba\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 204164 0b7ec0de758949ede920d1fda470b406\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 1795554 1ecdca7f3d0175d64d1320cccb3e4c97\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mips.deb\n Size/MD5 checksum: 190110 d507d038190177f2a07a236770596b43\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 168076 daeb11c43fcdae32f8107fc870d413ea\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 141908 58052e46884d461b22cf6308183d8104\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 184954 793c3b33874d48779520cbb302ccf07d\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 716464 ca48760ff0f4621ee9562aa839358520\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 1042 9f3f22a5debbcc2e8dfc009d97e35d2e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 10617798 9fde4aa43c30493758af5c0d27248a85\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 403288 15fd9ac211379c4a53d1a00002f1954d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 158330 62e83130300fef744be42b911f872701\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 3359560 9af2ab0f437e08b5936c7cd56a181b63\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 117204 2c2503930b8b58af5e74ad2d1270591d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 204156 0bb224941755465b55ff6df8cec8cfcb\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 1777612 cbcf8085e6ec3a7ba97b0e751b5345c4\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mipsel.deb\n Size/MD5 checksum: 187622 9bc6ba814ade0445aff6d5a9c4d3a696\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 168074 d7b4a7c5bbe3baac5133c3fa1a265e07\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 132428 774701aa5761a72b48719cc3c90b95e7\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 184956 7b79f2e6d9d4cba7c9b8ab88b2232604\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 720214 ef13301949fb2cb87c0f2464220bfad0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 1042 b11e9180cd97514ea791541dc51c6e5d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 9711648 8c107826f2ec6cca249be5f1042dea0e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 403292 12e27826c444ab1f8c5afd88f154fbcb\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 158356 affeb35493057105a7dfd89bba5d40dd\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 3341204 ad03912ca42d8d14ab7b269e30c444b1\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 114582 3c198af3d33673a9d6f2e7c1cec00e4f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 204176 a6d09e9b630d9210a1cf1ffbc81c8569\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 1643154 2d343f903c492177885ee167aa89eb7a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_powerpc.deb\n Size/MD5 checksum: 175816 8e2eddbd5631017cb725b69e1e493143\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 168072 181bd53f98bae36e2c65617f7d19d3dd\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 157706 4841fbcddea3c973c0e58f650b02be0a\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 184944 3676098265fe184b29eeaeb5600fb0b0\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 800404 d59043ee3f8de6109ded310eb2676caa\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 1038 f2edb972286fb96d781b6eedda318047\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 11339772 1d4d0d4737b0da240db0aa3d64f740de\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 403280 4a628c6906de57be839683efc0e75385\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 158330 d948a64b56af65bcef8ea69095d2c7f0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 3353612 fdd6c8b25715b6bd4a19afa9a1f6d6de\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 121366 c9a927eaf8fdd5e81ec5e4ccd65cbfcc\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 204170 db1baf6a69237d2ad992312f7e49e06f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 1944792 7c2ccc266fed2030012e957b1e8468b5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_s390.deb\n Size/MD5 checksum: 213644 610bee894928b26d2b807525e5cae97e\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 168068 6fcfd42726a291edb1cfd61e2f11a984\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 129660 f339731cd85d092184e8d645692b6a46\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 184956 753e6c5c8897c8b295069be4aedcc55b\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 674042 57126ff0e746ea6353e94c9cd12f19de\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 1040 c67300bde176389372c7fc1c165f5976\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 9384000 d747594bfa533f6df4021ec0230289f2\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 403286 4be3db86d8867bb882fee94008bc5246\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 158348 549784d01068073683bc83977403e545\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 3342172 b6572f524ddc2f0a90cb1b57ef53066a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 112514 8dfad0f1400d292cafe84da604f849d8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 204154 a09ecfc644a8bbb0f8a6d333afbc6b59\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 1583764 1d3bca34a075297f04f503831eea979c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_sparc.deb\n Size/MD5 checksum: 168194 ad23c724cea9ef75bde64e0d5565e791\n\n\n These files will probably be moved into the stable distribution on\n its next update. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\n This update provides the latest Firefox to correct these issues. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571\n http://www.mozilla.org/security/announce/2006/mfsa2006-57.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-58.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-59.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-60.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-61.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-62.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-64.html\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2006.0:\n 4e750ef25e44a1b493d2a61ad5f9a7a2 2006.0/i586/devhelp-0.10-7.2.20060mdk.i586.rpm\n e6cd690c11d4e8f352d2ce7bf0f7d4be 2006.0/i586/epiphany-1.8.5-4.2.20060mdk.i586.rpm\n b2f094942eca657f3dc7a8699cb8b776 2006.0/i586/epiphany-devel-1.8.5-4.2.20060mdk.i586.rpm\n c4ae8fc253aa1fe055ec4c1560205fab 2006.0/i586/epiphany-extensions-1.8.2-3.2.20060mdk.i586.rpm\n 08cde29a26e6ac2d0e3b629f660db9fe 2006.0/i586/galeon-2.0.1-1.2.20060mdk.i586.rpm\n 9c94b904a9f2c64090328edd73d0e1fa 2006.0/i586/libdevhelp-1_0-0.10-7.2.20060mdk.i586.rpm\n b5ad67818794371f50d63a611c79b45b 2006.0/i586/libdevhelp-1_0-devel-0.10-7.2.20060mdk.i586.rpm\n fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/i586/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm\n 770e8d6c5643c78f486ae2c115f7c740 2006.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n ffb123d21760cbba92a232dfb1150b7e 2006.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/i586/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm\n 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/i586/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n 2596f8b787cea221c80a85fd0854f766 2006.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mdk.i586.rpm\n c912e48bd5138b8f42b24b3c34653a19 2006.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.i586.rpm\n 1a82466395715237df552070e51f6525 2006.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.i586.rpm\n 514de0cacb2462a8a6a26206ac18b617 2006.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.i586.rpm\n 70415104d0814a6e94c1997c0c464957 2006.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.i586.rpm\n c2b5a360abd1a8a3e78dd8e9df072b4c 2006.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.i586.rpm\n f8dd2e9e5a5e374782d9154b09ca7b7d 2006.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.i586.rpm\n a20a2bee8f26440b13294ef6247f66ec 2006.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.i586.rpm\n c60d356eddf74e8799b239a925b35953 2006.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n 5b4fbc76811530cfc20ef319daf2f577 2006.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.i586.rpm\n fdc7591dc15dce7e373f4e167fb2c769 2006.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.i586.rpm\n 00a17b297ea7b7ee31a3fca5d3109ffc 2006.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.i586.rpm\n 2bee9151bc0e40bf1ff22a9224643dcb 2006.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.i586.rpm\n 03285b22a86c82b8558467befb5fa04b 2006.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.i586.rpm\n f9dbe9c8d7b907e6c1a80f0bce2d9323 2006.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.i586.rpm\n 4e13ea6856a71514c569581e06515ae8 2006.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.i586.rpm\n 81b56a020127b1e9c41facb963e670be 2006.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.i586.rpm\n 3a14f0cee1271d5f4cfedc8967a2be45 2006.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.i586.rpm\n 9612ac69d69114d1da1dc1bfa6530d9b 2006.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.i586.rpm\n 9a47da16333b9c1d839e19420ab5c3a5 2006.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.i586.rpm\n ea5b214a43077114d8adaf184ba6ce61 2006.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.i586.rpm\n ebf899b39e850438dd4cfb1bbab9ba8d 2006.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.i586.rpm\n 18522be12bdda788de662d07d5a07e08 2006.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.i586.rpm\n 19a62453c05c0443aa2999a177d50dac 2006.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.i586.rpm\n 352aa6197b0b79025f5a71a3135d95c9 2006.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.i586.rpm\n 64b460d997ff70bf0ff50400c20a98e1 2006.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.i586.rpm\n 1f67f28a68d57baa96523ef05ccd1bbe 2006.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.i586.rpm\n f5b2681e10e6eb68e4fb9041262b65c5 2006.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.i586.rpm\n 8d47794342c430b50dc04f7d4c65cf9d 2006.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.i586.rpm\n d975c5d5ec3c8fed8846f02105ba4795 2006.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.i586.rpm\n 563d01331a992ec6ded54d5118bc10ad 2006.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.i586.rpm\n 4da569e782da6c5b98eab4862c335600 2006.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.i586.rpm\n 4a77a4d9b22704184694a1a0580440f5 2006.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.i586.rpm\n 0a153e8351a1ffdfadf067cdf9b2ee06 2006.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.i586.rpm\n e7ed42daf0c68890a34422d8f5b7dcf6 2006.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.i586.rpm\n 542ce6ba9713683b8a741ab921cd3e45 2006.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.i586.rpm\n 55c8c83ad72d6289bf1d45ea517b74ba 2006.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.i586.rpm\n 591beaf9e8abf8911f023fb147efe765 2006.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.i586.rpm\n 23b9d2502d7cb24aeea82f358a428ec2 2006.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.i586.rpm\n be8acdc18fe55ea8a9d0afc553bf21d3 2006.0/i586/yelp-2.10.0-6.2.20060mdk.i586.rpm \n 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm\n bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm\n b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm\n 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm\n 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm\n 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm\n 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm\n\n Mandriva Linux 2006.0/X86_64:\n 8f79a25451b9f41d48df89f996869cc7 2006.0/x86_64/devhelp-0.10-7.2.20060mdk.x86_64.rpm\n a9b851ddb7a77ee0f6d73c9a475658e0 2006.0/x86_64/epiphany-1.8.5-4.2.20060mdk.x86_64.rpm\n 606bb2a3ece209a7c260fd81d776c123 2006.0/x86_64/epiphany-devel-1.8.5-4.2.20060mdk.x86_64.rpm\n bb99bf7ed2e5608849cb9b0bcac49041 2006.0/x86_64/epiphany-extensions-1.8.2-3.2.20060mdk.x86_64.rpm\n 6caf5e05026177525d0d04225e5dcc4a 2006.0/x86_64/galeon-2.0.1-1.2.20060mdk.x86_64.rpm\n 2ef32f51f707beff08db88d61aab842d 2006.0/x86_64/lib64devhelp-1_0-0.10-7.2.20060mdk.x86_64.rpm\n 50b6716aa33e6065ce0ba0b107fb3a8c 2006.0/x86_64/lib64devhelp-1_0-devel-0.10-7.2.20060mdk.x86_64.rpm\n 0b3997e3f646af18f684fdce56194ae3 2006.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75e63b4f3785b8c7fa4924d7f30be921 2006.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n cda6b659c2777c44fdde0ac3ab1fb11b 2006.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4f3e6424fa71a629be1b81415fe2b875 2006.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 7bd353454999969148524636267b68c5 2006.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/x86_64/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm\n 770e8d6c5643c78f486ae2c115f7c740 2006.0/x86_64/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/x86_64/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm\n 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/x86_64/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n 561212c426f35a3e2393ad3acbf11bda 2006.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mdk.x86_64.rpm\n a4a76ca919cec68bef5ec0521e4185b2 2006.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.x86_64.rpm\n e23f698f02d78a8d8b2ac056e91f106a 2006.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1e815c45fb57ee56bd4d4258a8cda5ad 2006.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1c348254b80cec87c2b804825cdd8a5d 2006.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 6eac0be09030f9ed629107600bcbf88f 2006.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.x86_64.rpm\n a06b4569f5392501df97fb209315782f 2006.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 98aac82b44a66047d884b95f251cd6c5 2006.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 9479078391f288562b612afff9cb994e 2006.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 247dce39896e7230ffda5ca8bc58d736 2006.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.x86_64.rpm\n a86cb00b8b07cd45a1274ddc318de2bd 2006.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 8ba8f4e4d9fcfef9f3cc4ac71b15c5df 2006.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4c477d0ef8c843b9416185508c9181a1 2006.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 6e9c4c9c6ba8cfefd32e4d135943824d 2006.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.x86_64.rpm\n b8046ef3da338188287fa9a8ebfb9515 2006.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1609e86fa50ef7c5c3ef827bf47090e8 2006.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 5cdf122cafadd7f2125d42246402e29d 2006.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75f82717c62d51d00ba25abcdf3e26a5 2006.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75b03be94bdea20dbbf361a3a295e4c9 2006.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 672f36e40f7c5463b5e771bcaeae31af 2006.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 8cf3e2082d406f71c4c7d3f638792e1e 2006.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4f0f77a0b9fd79a671857fd330933289 2006.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.x86_64.rpm\n b5c00962987efb764ea77e76c9734c79 2006.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.x86_64.rpm\n f788aefcdac5b098d8853a3ef4fe146c 2006.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4afff3966656a65b55290d08d446d864 2006.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.x86_64.rpm\n e63e4db3037a915ac24dca78e5ae8617 2006.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 7e443e15233a3db5b76ae7c299d1e7d9 2006.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75ca84a45213c2d33d66b68c649dd875 2006.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 7a8cd126f5f5c63d45efe79a1e78e94d 2006.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 342155314a7801a1637d807e8ae8754d 2006.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 359e5cb75905f2c08b49ecb1eccdf335 2006.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.x86_64.rpm\n fa480b18d46eaed805f8fe0c92f6a9fe 2006.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 3233bb351b6c89deb25a6722df088e9a 2006.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.x86_64.rpm\n f1347555bb50e32c58ac3edba31f3d1a 2006.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.x86_64.rpm\n c20fd1c8861e74829879a63075fdf2f4 2006.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 8c73daea2686e503d3367d112c4c691e 2006.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 59d920837831e1a165ce19447066b4e5 2006.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 869bea0fbfc6b2c65ab525d80aed03b9 2006.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1b867a3b0b7d8efd86377d0f0dcb67c3 2006.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 12ab7912491456d673058667c8c0dc3a 2006.0/x86_64/yelp-2.10.0-6.2.20060mdk.x86_64.rpm \n 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm\n bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm\n b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm\n 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm\n 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm\n 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm\n 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm\n\n Corporate 3.0:\n c106557de1e045e5840a453d710b63e7 corporate/3.0/i586/libnspr4-1.5.0.7-0.1.C30mdk.i586.rpm\n b5a3de7c01f7a4187f85bc66db242c67 corporate/3.0/i586/libnspr4-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n 8d1cfeaf1cb031bc1ec4519994801b6a corporate/3.0/i586/libnspr4-static-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n d08546a25f6e78701feed1d67d53fabd corporate/3.0/i586/libnss3-1.5.0.7-0.1.C30mdk.i586.rpm\n 3371ded40c0bd1a8e828d9e92aed09fd corporate/3.0/i586/libnss3-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n 6d635b07ba60ed49fe27d4c633204520 corporate/3.0/i586/mozilla-firefox-1.5.0.7-0.1.C30mdk.i586.rpm\n aa83aaff11daa5889c9d36c928075341 corporate/3.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.i586.rpm\n 059c5de9e7a5f658cfbc692c913b3403 corporate/3.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.i586.rpm\n 63b8a1a7db1568964fe4dc1d32552f52 corporate/3.0/i586/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.i586.rpm\n cf48e548709250792e5a87c12db71cf1 corporate/3.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.i586.rpm\n 90c83713c4fd403c9999cf52c56eb282 corporate/3.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.i586.rpm\n 91279bd7d327c1a3bc0855cb06007f82 corporate/3.0/i586/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.i586.rpm\n 1fec2333c2988cc7cb7238d5bcf1812d corporate/3.0/i586/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.i586.rpm\n debf0c0ddd775793cd87fedcaefc5cf7 corporate/3.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n 6e9ec67c3a28bde55146ca1f475cb847 corporate/3.0/i586/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.i586.rpm\n 53c7defd9f6f8168990e4f4d4fa3a495 corporate/3.0/i586/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.i586.rpm\n 5ac67c7e12f4edd0429bc2f085e438e6 corporate/3.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.i586.rpm\n 5d4ac2f2cd3d6aecd52365e54aa85d66 corporate/3.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.i586.rpm\n aad00d0da3781f7165ed63df0276962d corporate/3.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.i586.rpm\n c531c8f33674e476980aa2cf112440bc corporate/3.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.i586.rpm\n 8f33047a9c560757a90831ea415ef814 corporate/3.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.i586.rpm\n ec0a957af4cd462f58c3d846a37d68b4 corporate/3.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.i586.rpm\n 1f8f0a6a7f962c1b1cf9d3dec38af0e2 corporate/3.0/i586/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.i586.rpm\n 354c14637e7df983f16903f46bf81171 corporate/3.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.i586.rpm\n b9fdd2f2db6f74ef240e23ace3a3a0c3 corporate/3.0/i586/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.i586.rpm\n 831a3b7c411cc716527dfe1c97d63de2 corporate/3.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.i586.rpm\n a89843c85143fa62e264f37df634b920 corporate/3.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.i586.rpm\n 382ff5621db369b06e9d76a41a4fa509 corporate/3.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.i586.rpm\n 4181358e7b0b84ff907bd5173be137d2 corporate/3.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.i586.rpm\n 6da617d32c9eb917180eddd62aeabf54 corporate/3.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.i586.rpm\n c0e559c0dc865c97435a918d77d690dd corporate/3.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.i586.rpm\n 05a64d9e97c0ec16b661d93e4c49ba93 corporate/3.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.i586.rpm\n ef2379b44f8e241a7811eee7031e9838 corporate/3.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.i586.rpm\n 08f36ddea8f0b8ad5decc76b6ebf7106 corporate/3.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.i586.rpm\n 9af857fcd8a7e98707ae77fcbd17e25d corporate/3.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.i586.rpm\n 5b23c90450de3a6ee1b879dafb4e0ebb corporate/3.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.i586.rpm\n 646d7d7ca0374da1d90c77ff827b7a3b corporate/3.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.i586.rpm\n 25746d2ce3a97f620f1c098daef474ed corporate/3.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.i586.rpm\n fb12bfb159f9d9a291e838cb6994daa5 corporate/3.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.i586.rpm\n 962b2b084cde62a28341c177d006b755 corporate/3.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.i586.rpm\n 784906446777df1d03ba5ac75e790104 corporate/3.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.i586.rpm\n 543df7658745731ec6341a1d46901e5e corporate/3.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.i586.rpm\n ef4728e96d4c1dadc4e9286022c6fc1a corporate/3.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.i586.rpm\n f974e234f39298065b5a120da2aad80f corporate/3.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.i586.rpm \n da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm\n 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n 38e5d39281cf8fe28ae400ef6880ed82 corporate/3.0/x86_64/lib64nspr4-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 8594d09e78d9ec76bed9bb5bf9065a9d corporate/3.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 88ea20792afc414a8511312fc53c9973 corporate/3.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 0749638fca3fc55a0c84b374c8ddce4c corporate/3.0/x86_64/lib64nss3-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3bd450c319eada8936baad026c0e7edc corporate/3.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 86a6c461d4b783867fbf62dba98b76a0 corporate/3.0/x86_64/mozilla-firefox-1.5.0.7-0.1.C30mdk.x86_64.rpm\n fa3bdb060dc9933093cd59604e0e9770 corporate/3.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.x86_64.rpm\n cf50847d5e76e5a9b0cd9c48a156f919 corporate/3.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 5251818cebcf07fdb025aded5d99f092 corporate/3.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 1ae9e70895e0bfb45034d2cfa4c937b8 corporate/3.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3585c137dc33769069e8961fa5a7ae7b corporate/3.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e10f6d78aa54d325f8a38d7f8729f1ac corporate/3.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 62bd1fd39df7abf0ce81eb9d711f6d14 corporate/3.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e34c011d455b576e4e27b20d4bc057db corporate/3.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n aebe66911dac80623339aee380ec165a corporate/3.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3c5f109ae088242966604dce6338f07b corporate/3.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 17ef425bc7fc131b9de3632fb92317d1 corporate/3.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 15ea134fde2b507f46e6e4faf243135f corporate/3.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.x86_64.rpm\n ce6f4aa7a0fb1ac425afc5d915bb392d corporate/3.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 13b0b693682e7def5e320473342cf4a0 corporate/3.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.x86_64.rpm\n d5fd81f204e46d15b6d1124376ab0930 corporate/3.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.x86_64.rpm\n cb389fc624d1961cf2ab00488bad7cef corporate/3.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3cd572d77c055bf562c3678c513ff3c8 corporate/3.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.x86_64.rpm\n ea7215256650d751ae2ce0d20812fa96 corporate/3.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 57fcf8c6e9f251d3eb4f0096ca55cea3 corporate/3.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.x86_64.rpm\n d7f6310911b7e049876f7b70c16b8ccc corporate/3.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 8c0b97b440922510631400b5aea900ac corporate/3.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 8045c85ca598518aff6c7ead8f3fbf61 corporate/3.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 996d7bb252cf32b3ddce18a90b4bb8d9 corporate/3.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 5a3b346110144f79e05c20d13ac90663 corporate/3.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c56729c0896b11a9e49875fe2b493872 corporate/3.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.x86_64.rpm\n da6306fcba9fba87d98f68208e752bf8 corporate/3.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e94eca882ce53af3086bac6cf70076ea corporate/3.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 810bc3ca66d52d5537ece20a12679fec corporate/3.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c97bcde75d8118bb3d6c38428b811cc9 corporate/3.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 629ec7999ae3fd23e36e2c6722847bbe corporate/3.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.x86_64.rpm\n ad435041d1138f8a38a0a0739cff18d8 corporate/3.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.x86_64.rpm\n f76501363a31bcd388f5edcc80881196 corporate/3.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e400f4b7e77307c8c5ab1bc26691168a corporate/3.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 126f45e769e463182b4ade57183684c1 corporate/3.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 160b09d1c10d0b781d8c1a17779432ed corporate/3.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c5c363d0552c8365bf5dc6a0936d28b2 corporate/3.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c4baf08469f1dbea8924429a7ec7b86e corporate/3.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.x86_64.rpm\n b9ce84c78e92b6f5e75954ada2706722 corporate/3.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.x86_64.rpm \n da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm\n 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm\n\n Corporate 4.0:\n 64a0356cc8f1b1ffcdfdef3d8d146cc5 corporate/4.0/i586/libnspr4-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 3f0b705031d1e95280e8194338b2d381 corporate/4.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 1bba2e76f21b670f44ba65f8c92b67e1 corporate/4.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n cb10e515e0fad365a81273a9b620cbc7 corporate/4.0/i586/libnss3-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 3534b6f0e0b64686aee7b0758ec33daf corporate/4.0/i586/libnss3-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n c3aa90658d2adeb4e6543426c493a0fe corporate/4.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 122e2ce3928dd2898118533f45f851e1 corporate/4.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 3ade855a9fc71980eec72c8dbc107ae3 corporate/4.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.i586.rpm\n c189b7b4b54f4bdf040635750df007f8 corporate/4.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 360d587d53e2a9c47dfff8a9137f1b4c corporate/4.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.i586.rpm\n c2fa5da5d44a5f70bb49d5b4ba7e86e6 corporate/4.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 5df7bf2ff4059259ed0b5ea9f3587cc3 corporate/4.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 278a321f6ee5928135585f03a05ae642 corporate/4.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.i586.rpm\n cd37b5dfe36b72fb482be5abc4bbbba7 corporate/4.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 9b49e02711849a4babedfa63c6aadefb corporate/4.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.i586.rpm\n d8293192b06e5a91df8314ecba17880e corporate/4.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 5839e97fa06cca289121be5f33e9286d corporate/4.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 34d184e85b53c369a713c08f66e601dc corporate/4.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.i586.rpm\n ab7b43c629095beee26dbb1381fbff9d corporate/4.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 79cfc37305b6a3977d7c7333c7e883de corporate/4.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 7e8f28d446d6e574d8a1521059c03144 corporate/4.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 0d2dd482cc76fb0df96c0bc5f4fa5844 corporate/4.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 58959b3a1d43cc2a666361804daa88f1 corporate/4.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.i586.rpm\n ded59cf4be8835dc0ada86add049ed86 corporate/4.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 8afd66b33e600714238e360a127df36e corporate/4.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.i586.rpm\n ef6a89b44e3b120f1bae29217728f196 corporate/4.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 1532d01d8123e87ee1103292ed95f68d corporate/4.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 8c0667ab59c15a9b66097f5e86df7220 corporate/4.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.i586.rpm\n bcec75d2b059d123d6c21dae29baee00 corporate/4.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.i586.rpm\n f5afdfd15e40f4ec6323a8cac098cb78 corporate/4.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 1544a7236d6a10521f89234feaff9435 corporate/4.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 53834f537b0eacd3bb59a2ccc6a40ea6 corporate/4.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 70171f6ba3c24b51ec29be154e129bce corporate/4.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 4e64eee4ed44068cb9db5c77730c71b8 corporate/4.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.i586.rpm\n d990c04de7c285225c51067ff92d8a58 corporate/4.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 04ee85bd5b28b12466bcd8189d4ae480 corporate/4.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 222528603f2d88e4e46178620328ac7e corporate/4.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.i586.rpm\n caacac0ace4c80fbf0d917ea95070114 corporate/4.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.i586.rpm\n e4aabb47eacf2bcbb517e6890935d4e9 corporate/4.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.i586.rpm\n e55300aa65e586aba56e5b75c3d0f0d7 corporate/4.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 8d857f4d255e86e4b1db933ab75a88b5 corporate/4.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 0d4998a9483e67ad0a484d8535950401 corporate/4.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 0677248472dd1f219ac4c633b3ae8427 corporate/4.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 025ee723e8a157de742313163d8199e6 corporate/4.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.i586.rpm \n 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm\n d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n e9362e7e9d164dcf20ac2dd178057783 corporate/4.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 27152d5c4d45cfe65038b90014f4b128 corporate/4.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n a520a8169e6f7fa9636c7434820263cc corporate/4.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 73fa1146e61ddf2baea07f4e51b247a2 corporate/4.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 77c656121a9efaefb5bf8bea7416a190 corporate/4.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 1353fe3c1c7740891cca051691f2a844 corporate/4.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 6e547a34386d9220269f6971df84459b corporate/4.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 37bd5e53ce8bd1196991a1d48c7d3fc2 corporate/4.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n d8efb7b371fa3bc9d7dbda4d82bcea69 corporate/4.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n a4eb36d0ed16b308bf8146758468f720 corporate/4.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 1f3f6299c228a51c39dd9036d501baf3 corporate/4.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b7ed3aee73652f317d41612746b7f79e corporate/4.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n aa5e7732031b216f6cc4552b7e5bfe22 corporate/4.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b99863ae0bc816222fec7afd596b4b38 corporate/4.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 22b5ef994c3f38b7b5a63808f0ef9c47 corporate/4.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n a5033ebf881cab82e063df8ffe29e22b corporate/4.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 387dfb400ed59319e932a19e2dd4fe09 corporate/4.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 2a114b7e832d12fad87f2ad76ed89a7d corporate/4.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n eced7a780c5f758eef5a0f71f43ed261 corporate/4.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 854bc6729675ed8670330f3da1e520b2 corporate/4.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b73ac49803411c5afb96d87cde8a89c9 corporate/4.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n ca9a93da5b7f4dfc1eca188267891a66 corporate/4.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 267f8dc1ca9e04115050a311eebd00f1 corporate/4.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 516850fa1de5417fdb96ab50fee1504f corporate/4.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n ec13f241ff41c46590e31fd8339ffae7 corporate/4.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 00eddff4c17ce23c148cbb2bfd27bc59 corporate/4.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 896cc9b5af7e66ddbf67ad819083a9aa corporate/4.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 52a752441fc870f33e792860ec328ecd corporate/4.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b418b4371503ed9502ca7eab01c6d86e corporate/4.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 801a63774bfd94ac7e292b97bc1c88a6 corporate/4.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 4998a34e227bcd0de4c64a08198cda13 corporate/4.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 0f809660f4c1e45133fc01003acee854 corporate/4.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n da3f053868769c3d1705158b925a3312 corporate/4.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b53c13931bdcebb9dec07ccb7512cc0d corporate/4.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 431f220901edaf32f504ee6dfd7d8262 corporate/4.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 45d21d5351be8762640ae3038458c6b8 corporate/4.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 3bb59b3ca297d90181276683db70ceb7 corporate/4.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n cce30e727a3dba740a537ec0040248f2 corporate/4.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 7221b6655d4061eb29ed5150f87b3706 corporate/4.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n dd7c39076b8bb01d1b4432ba9cb29f12 corporate/4.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n cacf45d88765c0c26d7256e5f392c2df corporate/4.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 703558369cbe9e4920eab509134d3a7e corporate/4.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 817fd873fb5f997916d61b2cf078d2c3 corporate/4.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n fe95060a37a586f98f5c3683131a9ef2 corporate/4.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.x86_64.rpm \n 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm\n d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. This is an OpenPGP/MIME signed message (RFC 2440 and 3156)\n--------------enig38FF09D81E6F0DF2DC736FD8\nContent-Type: text/plain; charset=ISO-8859-1; format=flowed\nContent-Transfer-Encoding: quoted-printable\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200609-19\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Mozilla Firefox: Multiple vulnerabilities\n Date: September 28, 2006\n Bugs: #147652\n ID: 200609-19\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=3D=3D=3D=3D=3D=3D=3D=3D\n\nThe Mozilla Foundation has reported numerous vulnerabilities in Mozilla\nFirefox, including one that may allow execution of arbitrary code. \n\nBackground\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\nMozilla Firefox is a redesign of the Mozilla Navigator component. The\ngoal is to produce a cross-platform, stand-alone browser application. \n\nAffected packages\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/mozilla-firefox \u003c 1.5.0.7 \u003e=3D 1.5.0.7=\n\n 2 www-client/mozilla-firefox-bin \u003c 1.5.0.7 \u003e=3D 1.5.0.7=\n\n -------------------------------------------------------------------\n 2 affected packages on all of their supported architectures. \n -------------------------------------------------------------------\n\nDescription\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\nA number of vulnerabilities were found and fixed in Mozilla Firefox. \nFor details please consult the references below. \n\nImpact\n=3D=3D=3D=3D=3D=3D\n\nThe most severe vulnerability involves enticing a user to visit a\nmalicious website, crashing the browser and executing arbitrary code\nwith the rights of the user running the application. \n\nWorkaround\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\nThere is no known workaround at this time. \n\nResolution\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\nAll Mozilla Firefox users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose=20\n\"\u003e=3Dwww-client/mozilla-firefox-1.5.0.7\"\n\nUsers of the binary package should upgrade as well:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose=20\n\"\u003e=3Dwww-client/mozilla-firefox-bin-1.5.0.7\"\n\nReferences\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\n [ 1 ] CVE-2006-4253\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4253\n [ 2 ] CVE-2006-4340\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4340\n [ 3 ] CVE-2006-4565\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4565\n [ 4 ] CVE-2006-4566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4566\n [ 5 ] CVE-2006-4567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4567\n [ 6 ] CVE-2006-4568\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4568\n [ 7 ] CVE-2006-4569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4569\n [ 8 ] CVE-2006-4571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4571\n\nAvailability\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200609-19.xml\n\nConcerns?\n=3D=3D=3D=3D=3D=3D=3D=3D=3D\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=3D=3D=3D=3D=3D=3D=3D\n\nCopyright 2006 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n National Cyber Alert System\n\n Technical Cyber Security Alert TA06-333A\n\n\nApple Releases Security Update to Address Multiple Vulnerabilities\n\n Original release date: November 29, 2006\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n * Apple Mac OS X version 10.3.x and 10.4.x\n * Apple Mac OS X Server version 10.3.x and 10.4.x\n * Apple Safari web browser\n\n These vulnerabilities affect both Intel-based and PowerPC-based Apple\n systems. \n\n\nOverview\n\n Apple has released Security Update 2006-007 to correct multiple\n vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web\n browser. Vulnerabilities in OpenSSL, gzip, and other products are also\n addressed. Attackers may take\n advantage of the less serious vulnerabilities to bypass security\n restrictions or cause a denial of service. \n\n\nI. Description\n\n Apple Security Update 2006-007 addresses a number of vulnerabilities\n affecting Mac OS X, OS X Server, Safari web browser, and other\n products. Further details are available in the related vulnerability\n notes. \n\n This security update also addresses previously known vulnerabilities\n in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. Information is also available through the OpenSSL\n vulnerabilities page. Information about the vulnerabilities in gzip is\n available in a series of vulnerability notes. \n\n\nII. Impact\n\n The impacts of these vulnerabilities vary. For specific details, see\n the appropriate vulnerability notes. Potential consequences include\n remote execution of arbitrary code or commands, bypass of security\n restrictions, and denial of service. \n\n\nIII. Solution\n\nInstall updates\n\n Install Apple Security Update 2006-007. \n\n\nIV. References\n\n * Vulnerability Notes for Apple Security Update 2006-007 -\n \u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=apple-2006-007\u003e\n\n * Vulnerability Notes for OpenSSL Security Advisory [28th September\n 2006] -\n\u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=openssl_secadv_20060928\u003e\n\n * Vulnerability Note VU#845620 -\n \u003chttp://www.kb.cert.org/vuls/id/845620\u003e\n\n * Vulnerability Note VU#933712 -\n \u003chttp://www.kb.cert.org/vuls/id/933712\u003e\n\n * Vulnerability Note VU#381508 -\n \u003chttp://www.kb.cert.org/vuls/id/381508\u003e\n\n * Vulnerability Note VU#554780 -\n \u003chttp://www.kb.cert.org/vuls/id/554780\u003e\n\n * Vulnerability Note VU#596848 -\n \u003chttp://www.kb.cert.org/vuls/id/596848\u003e\n\n * Vulnerability Note VU#773548 -\n \u003chttp://www.kb.cert.org/vuls/id/773548\u003e\n\n * About the security content of Security Update 2006-007 -\n \u003chttp://docs.info.apple.com/article.html?artnum=304829\u003e\n\n * Mac OS X: Updating your software -\n \u003chttp://docs.info.apple.com/article.html?artnum=106704\u003e\n\n * Apple Downloads - \u003chttp://www.apple.com/support/downloads/\u003e\n\n * OpenSSL: OpenSSL vulnerabilities -\n \u003chttp://www.openssl.org/news/vulnerabilities.html\u003e\n\n * Securing Your Web Browser -\n \u003chttp://www.us-cert.gov/reading_room/securing_browser/#Safari\u003e\n\n _________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA06-333A.html\u003e\n _________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. Please send\n email to \u003ccert@cert.org\u003e with \"TA06-333A Feedback VU#191336\" in the\n subject. \n _________________________________________________________________\n\n Produced 2006 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n\n _________________________________________________________________\n\n Revision History\n\n November 29, 2006: Initial release\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6\nlJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz\niN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7\nxr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf\n8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q\nA580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg==\n=f7N+\n-----END PGP SIGNATURE-----\n. \nOther vulnerabilities include program crashes and the acceptance of\nforged certificates. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4340" }, { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "51021" }, { "db": "PACKETSTORM", "id": "50749" }, { "db": "PACKETSTORM", "id": "52156" }, { "db": "PACKETSTORM", "id": "51167" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "50537" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" } ], "trust": 4.86 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-4340", "trust": 3.4 }, { "db": "SECUNIA", "id": "21906", "trust": 2.4 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 2.0 }, { "db": "BID", "id": "22083", "trust": 1.6 }, { "db": "SECUNIA", "id": "22074", "trust": 1.6 }, { "db": "SECUNIA", "id": "22247", "trust": 1.6 }, { "db": "SECUNIA", "id": "21950", "trust": 1.6 }, { "db": "SECUNIA", "id": "22422", "trust": 1.6 }, { "db": "SECUNIA", "id": "21949", "trust": 1.6 }, { "db": "SECUNIA", "id": "21915", "trust": 1.6 }, { "db": "SECUNIA", "id": "22226", "trust": 1.6 }, { "db": "SECUNIA", "id": "22088", "trust": 1.6 }, { "db": "SECUNIA", "id": "21939", "trust": 1.6 }, { "db": "SECUNIA", "id": "22055", "trust": 1.6 }, { "db": "SECUNIA", "id": "22274", "trust": 1.6 }, { "db": "SECUNIA", "id": "22025", "trust": 1.6 }, { "db": "SECUNIA", "id": "21903", "trust": 1.6 }, { "db": "SECUNIA", "id": "22342", "trust": 1.6 }, { "db": "SECUNIA", "id": "22036", "trust": 1.6 }, { "db": "SECUNIA", "id": "22001", "trust": 1.6 }, { "db": "SECUNIA", "id": "21940", "trust": 1.6 }, { "db": "SECUNIA", "id": "22210", "trust": 1.6 }, { "db": "SECUNIA", "id": "22299", "trust": 1.6 }, { "db": "SECUNIA", "id": "21916", "trust": 1.6 }, { "db": "SECTRACK", "id": "1016860", "trust": 1.6 }, { "db": "SECTRACK", "id": "1016859", "trust": 1.6 }, { "db": "SECTRACK", "id": "1016858", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3622", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3617", "trust": 1.6 }, { "db": "USCERT", "id": "TA06-312A", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#773548", "trust": 1.0 }, { "db": "SECUNIA", "id": "22195", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "23883", "trust": 1.0 }, { "db": "SECUNIA", "id": "22849", "trust": 1.0 }, { "db": "SECUNIA", "id": "24711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22992", "trust": 1.0 }, { "db": "SECUNIA", "id": "22056", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0293", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1198", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0083", "trust": 1.0 }, { "db": "AUSCERT", "id": "ESB-2007.0014", "trust": 0.8 }, { "db": "SECUNIA", "id": "21709", "trust": 0.8 }, { "db": "SECUNIA", "id": "22207", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "SECUNIA", "id": "22212", "trust": 0.8 }, { "db": "SECUNIA", "id": "22116", "trust": 0.8 }, { "db": "SECUNIA", "id": "22216", "trust": 0.8 }, { "db": "SECUNIA", "id": "22220", "trust": 0.8 }, { "db": "SECUNIA", "id": "22330", "trust": 0.8 }, { "db": "SECUNIA", "id": "22130", "trust": 0.8 }, { "db": "SECUNIA", "id": "22240", "trust": 0.8 }, { "db": "SECUNIA", "id": "22259", "trust": 0.8 }, { "db": "SECUNIA", "id": "22260", "trust": 0.8 }, { "db": "SECUNIA", "id": "22165", "trust": 0.8 }, { "db": "SECUNIA", "id": "22166", "trust": 0.8 }, { "db": "SECUNIA", "id": "22172", "trust": 0.8 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "22284", "trust": 0.8 }, { "db": "SECUNIA", "id": "22186", "trust": 0.8 }, { "db": "SECUNIA", "id": "22193", "trust": 0.8 }, { "db": "SECUNIA", "id": "22094", "trust": 0.8 }, { "db": "BID", "id": "20249", "trust": 0.8 }, { "db": "SECTRACK", "id": "1016943", "trust": 0.8 }, { "db": "XF", "id": "29237", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#547300", "trust": 0.8 }, { "db": "BID", "id": "20042", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2006-000557", "trust": 0.8 }, { "db": "GENTOO", "id": "GLSA-200610-06", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200609-19", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200610-01", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-350-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-354-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-351-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-352-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-361-1", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1192", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1191", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0676", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0675", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0677", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2006:055", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2006:054", "trust": 0.6 }, { "db": "SUNALERT", "id": "102648", "trust": 0.6 }, { "db": "MLIST", "id": "[IETF-OPENPGP] 20060827 BLEICHENBACHER\u0027S RSA SIGNATURE FORGERY BASED ON IMPLEMENTATION ERROR", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA06-312A", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:169", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:168", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200609-270", "trust": 0.6 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 0.3 }, { "db": "BID", "id": "19849", "trust": 0.3 }, { "db": "CERT/CC", "id": "VU#554780", "trust": 0.2 }, { "db": "CERT/CC", "id": "VU#933712", "trust": 0.2 }, { "db": "CERT/CC", "id": "VU#596848", "trust": 0.2 }, { "db": "CERT/CC", "id": "VU#381508", "trust": 0.2 }, { "db": "SECUNIA", "id": "21996", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "50178", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "51021", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50749", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52156", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "51167", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50269", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50537", "trust": 0.1 }, { "db": "USCERT", "id": "TA06-333A", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52708", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50630", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "51021" }, { "db": "PACKETSTORM", "id": "50749" }, { "db": "PACKETSTORM", "id": "52156" }, { "db": "PACKETSTORM", "id": "51167" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "50537" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "id": "VAR-200110-0171", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2022-06-29T20:08:15.508000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBUX02156", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00774579" }, { "title": "HPSBUX02153", "trust": 0.8, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "title": "HPSBUX02156", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux02156.html" }, { "title": "HPSBUX02153", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux02153.html" }, { "title": "seamonkey (V2.x)", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=984" }, { "title": "mfsa2006-60", "trust": 0.8, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "title": "mfsa2006-60", "trust": 0.8, "url": "http://www.mozilla-japan.org/security/announce/2006/mfsa2006-60.html" }, { "title": "RHSA-2006:0675", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "title": "RHSA-2006:0676", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "title": "RHSA-2006:0677", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "title": "102781", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "title": "RHSA-2006:0675", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2006-0675j.html" }, { "title": "RHSA-2006:0676", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2006-0676j.html" }, { "title": "RHSA-2006:0677", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2006-0677j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000557" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4340" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 2.4, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 2.0, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 1.9, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200610-01.xml" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 1.6, "url": "http://www.us-cert.gov/cas/techalerts/ta06-312a.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2006-0677.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2006-0676.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21949" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.6, "url": "http://www.us.debian.org/security/2006/dsa-1191" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-361-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-352-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-351-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-350-1" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2006-0675.html" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html" }, { "trust": 1.6, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.6, "url": "http://www.debian.org/security/2006/dsa-1192" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1016860" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1016859" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1016858" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22422" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22342" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22299" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22274" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22247" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22210" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22088" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22074" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22055" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22025" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22001" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21950" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21940" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21939" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21916" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21915" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21903" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2006/3617" }, { "trust": 1.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 1.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4340" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1210" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22849" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22056" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22195" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22992" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-640" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23883" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24711" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:168" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:169" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3617" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3622" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11007" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded" }, { "trust": 0.8, "url": "http://www.gzip.org/" }, { "trust": 0.8, "url": "http://www.auscert.org.au/7179" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23547300/index.html" }, { "trust": 0.8, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-september/049715.html " }, { "trust": 0.8, "url": "https://issues.rpath.com/browse/rpl-613 " }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt " }, { "trust": 0.8, "url": "http://kolab.org/security/kolab-vendor-notice-11.txt " }, { "trust": 0.8, "url": "http://openvpn.net/changelog.html " }, { "trust": 0.8, "url": "http://www.serv-u.com/releasenotes/ " }, { "trust": 0.8, "url": "http://openbsd.org/errata.html#openssl2 " }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20249 " }, { "trust": 0.8, "url": "http://securitytracker.com/id?1016943 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22130 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22094 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22165 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22186 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22193 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22207 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22259 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22260 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22166 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22172 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22212 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22240 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22216 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22116 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22220 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22284 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22330 " }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/29237 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4340" }, { "trust": 0.8, "url": "http://secunia.com/advisories/21906/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20042" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3899" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3622" }, { "trust": 0.6, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:169" }, { "trust": 0.6, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:168" }, { "trust": 0.4, "url": "http://bugs.gentoo.org." }, { "trust": 0.4, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.4, "url": "http://security.gentoo.org/" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 0.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339" }, { "trust": 0.2, "url": "http://security.gentoo.org/glsa/glsa-200610-06.xml" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4568" }, { "trust": 0.2, "url": "http://www.debian.org/security/faq" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4566" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4565" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4340" }, { "trust": 0.2, "url": "http://security.debian.org/" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4571" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2788" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.2, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4566" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4253" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4565" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4571" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4567" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/554780" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/381508" }, { "trust": 0.1, "url": "http://secunia.com/quality_assurance_analyst/" }, { "trust": 0.1, "url": "http://secunia.com/product/4220/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/773548" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/933712" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/596848" }, { "trust": 0.1, "url": "http://secunia.com/advisories/21996/" }, { "trust": 0.1, "url": "http://secunia.com/web_application_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4570" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_mipsel.deb" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-64.html" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-61.html" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4569" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-62.html" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-58.html" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-57.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4568" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-59.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4567" }, { "trust": 0.1, "url": "http://enigmail.mozdev.org" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4566" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4253" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4569" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4565" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4340" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4571" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4568" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/845620\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/773548\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/933712\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/596848\u003e" }, { "trust": 0.1, "url": "http://www.openssl.org/news/vulnerabilities.html\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=304829\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/reading_room/securing_browser/#safari\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=apple-2006-007\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/381508\u003e" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=openssl_secadv_20060928\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=106704\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/554780\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4570" } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "51021" }, { "db": "PACKETSTORM", "id": "50749" }, { "db": "PACKETSTORM", "id": "52156" }, { "db": "PACKETSTORM", "id": "51167" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "50537" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "51021" }, { "db": "PACKETSTORM", "id": "50749" }, { "db": "PACKETSTORM", "id": "52156" }, { "db": "PACKETSTORM", "id": "51167" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "50537" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-19T00:00:00", "db": "CERT/CC", "id": "VU#773548" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#547300" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "date": "2006-09-21T23:56:25", "db": "PACKETSTORM", "id": "50178" }, { "date": "2006-10-20T22:34:17", "db": "PACKETSTORM", "id": "51021" }, { "date": "2006-10-09T04:16:16", "db": "PACKETSTORM", "id": "50749" }, { "date": "2006-11-16T15:41:20", "db": "PACKETSTORM", "id": "52156" }, { "date": "2006-10-20T22:34:17", "db": "PACKETSTORM", "id": "51167" }, { "date": "2006-09-26T19:59:02", "db": "PACKETSTORM", "id": "50269" }, { "date": "2006-10-04T00:43:37", "db": "PACKETSTORM", "id": "50537" }, { "date": "2006-12-06T02:47:36", "db": "PACKETSTORM", "id": "52708" }, { "date": "2006-10-04T22:41:23", "db": "PACKETSTORM", "id": "50630" }, { "date": "2001-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-270" }, { "date": "2006-09-15T18:07:00", "db": "NVD", "id": "CVE-2006-4340" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#773548" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#547300" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2007-04-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000557" }, { "date": "2006-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-270" }, { "date": "2018-10-17T21:36:00", "db": "NVD", "id": "CVE-2006-4340" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "52708" }, { "db": "CNNVD", "id": "CNNVD-200609-270" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "gzip contains a .bss buffer overflow in its LZH handling", "sources": [ { "db": "CERT/CC", "id": "VU#773548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-270" } ], "trust": 0.6 } }
var-200110-0354
Vulnerability from variot
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. A buffer overflow vulnerability in an OpenSSL library function could allow a remote attacker to execute code on an affected system. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: gzip Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA21996
VERIFY ADVISORY: http://secunia.com/advisories/21996/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: gzip 1.x http://secunia.com/product/4220/
DESCRIPTION: Tavis Ormandy has reported some vulnerabilities in gzip, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
1) A boundary error within the "make_table()" function in unlzh.c can be used to modify certain stack data. tricking a user or automated system into unpacking a specially crafted archive file. tricking a user or automated system into unpacking a specially crafted "pack" archive file.
3) A buffer overflow within the "make_table()" function of gzip's LZH support can be exploited to cause a DoS and potentially to compromise a vulnerable system by e.g. tricking a user or automated system into unpacking an archive containing a specially crafted decoding table.
4) A NULL pointer dereference within the "huft_build()" function and an infinite loop within the LZH handling can be exploited to cause a DoS by e.g. tricking a user or automated system into unpacking a specially crafted archive file.
The vulnerabilities have been reported in version 1.3.5.
SOLUTION: Do not unpack untrusted archive files.
PROVIDED AND/OR DISCOVERED BY: Tavis Ormandy, Google Security Team
ORIGINAL ADVISORY: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676
OTHER REFERENCES: US-CERT VU#554780: http://www.kb.cert.org/vuls/id/554780
US-CERT VU#381508: http://www.kb.cert.org/vuls/id/381508
US-CERT VU#773548: http://www.kb.cert.org/vuls/id/773548
US-CERT VU#933712: http://www.kb.cert.org/vuls/id/933712
US-CERT VU#596848 http://www.kb.cert.org/vuls/id/596848
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 1191-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 5th, 2006 http://www.debian.org/security/faq
Package : mozilla-thunderbird Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566 CVE-2006-4568 CVE-2006-4570 CVE-2006-4571 BugTraq ID : 20042
Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird.
CVE-2006-4340
Daniel Bleichenbacher recently described an implementation error
in RSA signature verification that cause the application to
incorrectly trust SSL certificates.
CVE-2006-4570
Georgi Guninski demonstrated that even with JavaScript disabled in
mail (the default) an attacker can still execute JavaScript when a
mail message is viewed, replied to, or forwarded.
For the stable distribution (sarge) these problems have been fixed in version 1.0.2-2.sarge1.0.8c.1.
For the unstable distribution (sid) these problems have been fixed in version 1.5.0.7-1.
We recommend that you upgrade your Mozilla Thunderbird packages.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.dsc
Size/MD5 checksum: 1003 d7261fba347b9876e873f1d424e60190
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.diff.gz
Size/MD5 checksum: 519315 066ed351050722c36274e3e837fd174f
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz
Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4
Alpha architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 12855288 285e55a20445ea5dffe79de01baf788c
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 3280106 0206d9fe08e3da2d4bf919c6b2b54ec7
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 152092 c5c984f0f11f94cb263f5bbef367de09
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 33520 ed7e6d825f630da666e07914527f2c75
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 89492 1e9ed565915dc4327e444ad999cc5daa
AMD64 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 12258904 f40f86252184ce7360b2b9d1e58cef8f
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 3281164 e4e2160d22d4721508f1762804b3b18b
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 151124 a72d17f827929c9189f9ba96ff73c7a1
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 33512 bbe0fe4a7e56a138c220790ab9de97a6
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 89350 f2b7e1d1d4eb5f1abb2522ddbdb46ff5
ARM architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 10345146 4c171699433072d443eb7b35a2550fd2
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 3272118 a52ad3d2cd1806e936374537e135d7db
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 143266 9dedbe9b5f45727a93cfccb5c99bf371
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 33522 14d1c0d0af46731075ea7c35c2900258
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 81318 81219b4c82896fab12427e42df1b2760
HP Precision architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 13570024 3a62ee11075402dfad030e2ede937191
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 3285124 e9cadee2d32b2bcb56b1278043e97da4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 153296 3fecaa707002afb1ba6854da724ad132
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 33520 83e537b9aff4d44fd958043298a1d7f2
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 97390 c3ceeedcf00d99d34c7b5f424da7da63
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 11568436 af1de65bd715970c4432149aec80b2a2
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 3507870 5dab89db24f1443fe782dc931f4ee0af
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 146732 bc52082cd1ab0f026c401204cd63b4a7
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 33518 5d3c9700cce7b9c0261c246ed7b8afd4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 88084 e244c9c8b7224814774bef13f4213d4e
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 14628630 07bfcc171f449b86b9d62f903e29d506
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 3291260 d7186841974796f8f90be26700801a95
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 155452 e17eb664e56fcc0809dd36580f92cc1a
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 33514 fc890529fdea5526a05ffd16b96f5956
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 107220 eb93528d586b050ecc3b60742b4fa344
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 10794842 fa716b92e3c7a9d67fad6fd453c78bb4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 3271690 d95eb910dd6d38de41c17fcb6b1c4696
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 145054 2b7570676e15cea809905c442f91b5e0
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 33550 3db6c520d1c489fb4e17501d19dececf
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 82556 32d25c11844a48ed963e3c5c51ff34fc
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 11948708 4f58ce9668da6a12b823edaa3c8b35b3
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 3279410 e639b2bf43eda95d3ca3bb0b9aec6df7
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 148042 cb6ee4a9bd4dec3166e48e356b9c3465
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 33524 2765555b00f4ed717b34e98c5c0d9c02
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 84748 0e934e90bb6bd47c7500fd665728ba27
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 11817078 4239077894c74444d33063229dd847df
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 3280416 ac165850436e63818da8fffe134628d1
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 147600 ae6d7ff1b34dddab3d0c18d6e38bc77b
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 33518 27bed1b95a4e34a291c7e67c6a9fdd37
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 84650 173fefc8b58b15398b3cccad2c812495
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 10912494 d13ec5b97f5fde0795e5f762330756f6
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 3270108 dbd7eb3154db4a379fcfcda6b7d414b9
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 145048 b9ab45845f58fb064d7d1ae449481db9
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 33526 b5e07e26d215581b4cc0fea6d71beaf3
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 81478 b57b8038afbfd5490a6cf847e740ab60
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 12705708 68195861caccd07a18a379ffe2e88403
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 3280614 38dec996622a4e1762a1ef683bba9c43
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 151436 b54ba7420653e63746d019b979f3ae76
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 33516 e24dafe27c103a8d40de9a905b052311
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 89290 9daa1eb634834e02aefde0a594bcd0f9
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 11181284 adedd4c6302ddb868a531810d226143a
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 3275816 c38922ec47674939277e6984f87c0eb4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 144702 9183a627463aa564a0313d4d361d22f3
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 33528 5f87736faa9ee0a9b10e29c48280798a
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 83122 72966880dc02a1b472dcac7b1404fa58
These files will probably be moved into the stable distribution on its next update.
This update provides the latest Firefox to correct these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571 http://www.mozilla.org/security/announce/2006/mfsa2006-57.html http://www.mozilla.org/security/announce/2006/mfsa2006-58.html http://www.mozilla.org/security/announce/2006/mfsa2006-59.html http://www.mozilla.org/security/announce/2006/mfsa2006-60.html http://www.mozilla.org/security/announce/2006/mfsa2006-61.html http://www.mozilla.org/security/announce/2006/mfsa2006-62.html http://www.mozilla.org/security/announce/2006/mfsa2006-64.html
Updated Packages:
Mandriva Linux 2006.0: 4e750ef25e44a1b493d2a61ad5f9a7a2 2006.0/i586/devhelp-0.10-7.2.20060mdk.i586.rpm e6cd690c11d4e8f352d2ce7bf0f7d4be 2006.0/i586/epiphany-1.8.5-4.2.20060mdk.i586.rpm b2f094942eca657f3dc7a8699cb8b776 2006.0/i586/epiphany-devel-1.8.5-4.2.20060mdk.i586.rpm c4ae8fc253aa1fe055ec4c1560205fab 2006.0/i586/epiphany-extensions-1.8.2-3.2.20060mdk.i586.rpm 08cde29a26e6ac2d0e3b629f660db9fe 2006.0/i586/galeon-2.0.1-1.2.20060mdk.i586.rpm 9c94b904a9f2c64090328edd73d0e1fa 2006.0/i586/libdevhelp-1_0-0.10-7.2.20060mdk.i586.rpm b5ad67818794371f50d63a611c79b45b 2006.0/i586/libdevhelp-1_0-devel-0.10-7.2.20060mdk.i586.rpm fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/i586/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm 770e8d6c5643c78f486ae2c115f7c740 2006.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm ffb123d21760cbba92a232dfb1150b7e 2006.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mdk.i586.rpm fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/i586/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/i586/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm 2596f8b787cea221c80a85fd0854f766 2006.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mdk.i586.rpm c912e48bd5138b8f42b24b3c34653a19 2006.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.i586.rpm 1a82466395715237df552070e51f6525 2006.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.i586.rpm 514de0cacb2462a8a6a26206ac18b617 2006.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.i586.rpm 70415104d0814a6e94c1997c0c464957 2006.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.i586.rpm c2b5a360abd1a8a3e78dd8e9df072b4c 2006.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.i586.rpm f8dd2e9e5a5e374782d9154b09ca7b7d 2006.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.i586.rpm a20a2bee8f26440b13294ef6247f66ec 2006.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.i586.rpm c60d356eddf74e8799b239a925b35953 2006.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.i586.rpm 5b4fbc76811530cfc20ef319daf2f577 2006.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.i586.rpm fdc7591dc15dce7e373f4e167fb2c769 2006.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.i586.rpm 00a17b297ea7b7ee31a3fca5d3109ffc 2006.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.i586.rpm 2bee9151bc0e40bf1ff22a9224643dcb 2006.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.i586.rpm 03285b22a86c82b8558467befb5fa04b 2006.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.i586.rpm f9dbe9c8d7b907e6c1a80f0bce2d9323 2006.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.i586.rpm 4e13ea6856a71514c569581e06515ae8 2006.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.i586.rpm 81b56a020127b1e9c41facb963e670be 2006.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.i586.rpm 3a14f0cee1271d5f4cfedc8967a2be45 2006.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.i586.rpm 9612ac69d69114d1da1dc1bfa6530d9b 2006.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.i586.rpm 9a47da16333b9c1d839e19420ab5c3a5 2006.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.i586.rpm ea5b214a43077114d8adaf184ba6ce61 2006.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.i586.rpm ebf899b39e850438dd4cfb1bbab9ba8d 2006.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.i586.rpm 18522be12bdda788de662d07d5a07e08 2006.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.i586.rpm 19a62453c05c0443aa2999a177d50dac 2006.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.i586.rpm 352aa6197b0b79025f5a71a3135d95c9 2006.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.i586.rpm 64b460d997ff70bf0ff50400c20a98e1 2006.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.i586.rpm 1f67f28a68d57baa96523ef05ccd1bbe 2006.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.i586.rpm f5b2681e10e6eb68e4fb9041262b65c5 2006.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.i586.rpm 8d47794342c430b50dc04f7d4c65cf9d 2006.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.i586.rpm d975c5d5ec3c8fed8846f02105ba4795 2006.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.i586.rpm 563d01331a992ec6ded54d5118bc10ad 2006.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.i586.rpm 4da569e782da6c5b98eab4862c335600 2006.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.i586.rpm 4a77a4d9b22704184694a1a0580440f5 2006.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.i586.rpm 0a153e8351a1ffdfadf067cdf9b2ee06 2006.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.i586.rpm e7ed42daf0c68890a34422d8f5b7dcf6 2006.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.i586.rpm 542ce6ba9713683b8a741ab921cd3e45 2006.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.i586.rpm 55c8c83ad72d6289bf1d45ea517b74ba 2006.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.i586.rpm 591beaf9e8abf8911f023fb147efe765 2006.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.i586.rpm 23b9d2502d7cb24aeea82f358a428ec2 2006.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.i586.rpm be8acdc18fe55ea8a9d0afc553bf21d3 2006.0/i586/yelp-2.10.0-6.2.20060mdk.i586.rpm 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64: 8f79a25451b9f41d48df89f996869cc7 2006.0/x86_64/devhelp-0.10-7.2.20060mdk.x86_64.rpm a9b851ddb7a77ee0f6d73c9a475658e0 2006.0/x86_64/epiphany-1.8.5-4.2.20060mdk.x86_64.rpm 606bb2a3ece209a7c260fd81d776c123 2006.0/x86_64/epiphany-devel-1.8.5-4.2.20060mdk.x86_64.rpm bb99bf7ed2e5608849cb9b0bcac49041 2006.0/x86_64/epiphany-extensions-1.8.2-3.2.20060mdk.x86_64.rpm 6caf5e05026177525d0d04225e5dcc4a 2006.0/x86_64/galeon-2.0.1-1.2.20060mdk.x86_64.rpm 2ef32f51f707beff08db88d61aab842d 2006.0/x86_64/lib64devhelp-1_0-0.10-7.2.20060mdk.x86_64.rpm 50b6716aa33e6065ce0ba0b107fb3a8c 2006.0/x86_64/lib64devhelp-1_0-devel-0.10-7.2.20060mdk.x86_64.rpm 0b3997e3f646af18f684fdce56194ae3 2006.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mdk.x86_64.rpm 75e63b4f3785b8c7fa4924d7f30be921 2006.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm cda6b659c2777c44fdde0ac3ab1fb11b 2006.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm 4f3e6424fa71a629be1b81415fe2b875 2006.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mdk.x86_64.rpm 7bd353454999969148524636267b68c5 2006.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/x86_64/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm 770e8d6c5643c78f486ae2c115f7c740 2006.0/x86_64/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/x86_64/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/x86_64/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm 561212c426f35a3e2393ad3acbf11bda 2006.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mdk.x86_64.rpm a4a76ca919cec68bef5ec0521e4185b2 2006.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.x86_64.rpm e23f698f02d78a8d8b2ac056e91f106a 2006.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.x86_64.rpm 1e815c45fb57ee56bd4d4258a8cda5ad 2006.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.x86_64.rpm 1c348254b80cec87c2b804825cdd8a5d 2006.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.x86_64.rpm 6eac0be09030f9ed629107600bcbf88f 2006.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.x86_64.rpm a06b4569f5392501df97fb209315782f 2006.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.x86_64.rpm 98aac82b44a66047d884b95f251cd6c5 2006.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.x86_64.rpm 9479078391f288562b612afff9cb994e 2006.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm 247dce39896e7230ffda5ca8bc58d736 2006.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.x86_64.rpm a86cb00b8b07cd45a1274ddc318de2bd 2006.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.x86_64.rpm 8ba8f4e4d9fcfef9f3cc4ac71b15c5df 2006.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.x86_64.rpm 4c477d0ef8c843b9416185508c9181a1 2006.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.x86_64.rpm 6e9c4c9c6ba8cfefd32e4d135943824d 2006.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.x86_64.rpm b8046ef3da338188287fa9a8ebfb9515 2006.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.x86_64.rpm 1609e86fa50ef7c5c3ef827bf47090e8 2006.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.x86_64.rpm 5cdf122cafadd7f2125d42246402e29d 2006.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.x86_64.rpm 75f82717c62d51d00ba25abcdf3e26a5 2006.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.x86_64.rpm 75b03be94bdea20dbbf361a3a295e4c9 2006.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.x86_64.rpm 672f36e40f7c5463b5e771bcaeae31af 2006.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.x86_64.rpm 8cf3e2082d406f71c4c7d3f638792e1e 2006.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.x86_64.rpm 4f0f77a0b9fd79a671857fd330933289 2006.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.x86_64.rpm b5c00962987efb764ea77e76c9734c79 2006.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.x86_64.rpm f788aefcdac5b098d8853a3ef4fe146c 2006.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.x86_64.rpm 4afff3966656a65b55290d08d446d864 2006.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.x86_64.rpm e63e4db3037a915ac24dca78e5ae8617 2006.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.x86_64.rpm 7e443e15233a3db5b76ae7c299d1e7d9 2006.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.x86_64.rpm 75ca84a45213c2d33d66b68c649dd875 2006.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.x86_64.rpm 7a8cd126f5f5c63d45efe79a1e78e94d 2006.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.x86_64.rpm 342155314a7801a1637d807e8ae8754d 2006.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.x86_64.rpm 359e5cb75905f2c08b49ecb1eccdf335 2006.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.x86_64.rpm fa480b18d46eaed805f8fe0c92f6a9fe 2006.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.x86_64.rpm 3233bb351b6c89deb25a6722df088e9a 2006.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.x86_64.rpm f1347555bb50e32c58ac3edba31f3d1a 2006.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.x86_64.rpm c20fd1c8861e74829879a63075fdf2f4 2006.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.x86_64.rpm 8c73daea2686e503d3367d112c4c691e 2006.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.x86_64.rpm 59d920837831e1a165ce19447066b4e5 2006.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.x86_64.rpm 869bea0fbfc6b2c65ab525d80aed03b9 2006.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.x86_64.rpm 1b867a3b0b7d8efd86377d0f0dcb67c3 2006.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.x86_64.rpm 12ab7912491456d673058667c8c0dc3a 2006.0/x86_64/yelp-2.10.0-6.2.20060mdk.x86_64.rpm 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm
Corporate 3.0: c106557de1e045e5840a453d710b63e7 corporate/3.0/i586/libnspr4-1.5.0.7-0.1.C30mdk.i586.rpm b5a3de7c01f7a4187f85bc66db242c67 corporate/3.0/i586/libnspr4-devel-1.5.0.7-0.1.C30mdk.i586.rpm 8d1cfeaf1cb031bc1ec4519994801b6a corporate/3.0/i586/libnspr4-static-devel-1.5.0.7-0.1.C30mdk.i586.rpm d08546a25f6e78701feed1d67d53fabd corporate/3.0/i586/libnss3-1.5.0.7-0.1.C30mdk.i586.rpm 3371ded40c0bd1a8e828d9e92aed09fd corporate/3.0/i586/libnss3-devel-1.5.0.7-0.1.C30mdk.i586.rpm 6d635b07ba60ed49fe27d4c633204520 corporate/3.0/i586/mozilla-firefox-1.5.0.7-0.1.C30mdk.i586.rpm aa83aaff11daa5889c9d36c928075341 corporate/3.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.i586.rpm 059c5de9e7a5f658cfbc692c913b3403 corporate/3.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.i586.rpm 63b8a1a7db1568964fe4dc1d32552f52 corporate/3.0/i586/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.i586.rpm cf48e548709250792e5a87c12db71cf1 corporate/3.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.i586.rpm 90c83713c4fd403c9999cf52c56eb282 corporate/3.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.i586.rpm 91279bd7d327c1a3bc0855cb06007f82 corporate/3.0/i586/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.i586.rpm 1fec2333c2988cc7cb7238d5bcf1812d corporate/3.0/i586/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.i586.rpm debf0c0ddd775793cd87fedcaefc5cf7 corporate/3.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.i586.rpm 6e9ec67c3a28bde55146ca1f475cb847 corporate/3.0/i586/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.i586.rpm 53c7defd9f6f8168990e4f4d4fa3a495 corporate/3.0/i586/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.i586.rpm 5ac67c7e12f4edd0429bc2f085e438e6 corporate/3.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.i586.rpm 5d4ac2f2cd3d6aecd52365e54aa85d66 corporate/3.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.i586.rpm aad00d0da3781f7165ed63df0276962d corporate/3.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.i586.rpm c531c8f33674e476980aa2cf112440bc corporate/3.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.i586.rpm 8f33047a9c560757a90831ea415ef814 corporate/3.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.i586.rpm ec0a957af4cd462f58c3d846a37d68b4 corporate/3.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.i586.rpm 1f8f0a6a7f962c1b1cf9d3dec38af0e2 corporate/3.0/i586/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.i586.rpm 354c14637e7df983f16903f46bf81171 corporate/3.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.i586.rpm b9fdd2f2db6f74ef240e23ace3a3a0c3 corporate/3.0/i586/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.i586.rpm 831a3b7c411cc716527dfe1c97d63de2 corporate/3.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.i586.rpm a89843c85143fa62e264f37df634b920 corporate/3.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.i586.rpm 382ff5621db369b06e9d76a41a4fa509 corporate/3.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.i586.rpm 4181358e7b0b84ff907bd5173be137d2 corporate/3.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.i586.rpm 6da617d32c9eb917180eddd62aeabf54 corporate/3.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.i586.rpm c0e559c0dc865c97435a918d77d690dd corporate/3.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.i586.rpm 05a64d9e97c0ec16b661d93e4c49ba93 corporate/3.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.i586.rpm ef2379b44f8e241a7811eee7031e9838 corporate/3.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.i586.rpm 08f36ddea8f0b8ad5decc76b6ebf7106 corporate/3.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.i586.rpm 9af857fcd8a7e98707ae77fcbd17e25d corporate/3.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.i586.rpm 5b23c90450de3a6ee1b879dafb4e0ebb corporate/3.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.i586.rpm 646d7d7ca0374da1d90c77ff827b7a3b corporate/3.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.i586.rpm 25746d2ce3a97f620f1c098daef474ed corporate/3.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.i586.rpm fb12bfb159f9d9a291e838cb6994daa5 corporate/3.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.i586.rpm 962b2b084cde62a28341c177d006b755 corporate/3.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.i586.rpm 784906446777df1d03ba5ac75e790104 corporate/3.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.i586.rpm 543df7658745731ec6341a1d46901e5e corporate/3.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.i586.rpm ef4728e96d4c1dadc4e9286022c6fc1a corporate/3.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.i586.rpm f974e234f39298065b5a120da2aad80f corporate/3.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.i586.rpm da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64: 38e5d39281cf8fe28ae400ef6880ed82 corporate/3.0/x86_64/lib64nspr4-1.5.0.7-0.1.C30mdk.x86_64.rpm 8594d09e78d9ec76bed9bb5bf9065a9d corporate/3.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 88ea20792afc414a8511312fc53c9973 corporate/3.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 0749638fca3fc55a0c84b374c8ddce4c corporate/3.0/x86_64/lib64nss3-1.5.0.7-0.1.C30mdk.x86_64.rpm 3bd450c319eada8936baad026c0e7edc corporate/3.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 86a6c461d4b783867fbf62dba98b76a0 corporate/3.0/x86_64/mozilla-firefox-1.5.0.7-0.1.C30mdk.x86_64.rpm fa3bdb060dc9933093cd59604e0e9770 corporate/3.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.x86_64.rpm cf50847d5e76e5a9b0cd9c48a156f919 corporate/3.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.x86_64.rpm 5251818cebcf07fdb025aded5d99f092 corporate/3.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.x86_64.rpm 1ae9e70895e0bfb45034d2cfa4c937b8 corporate/3.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.x86_64.rpm 3585c137dc33769069e8961fa5a7ae7b corporate/3.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.x86_64.rpm e10f6d78aa54d325f8a38d7f8729f1ac corporate/3.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.x86_64.rpm 62bd1fd39df7abf0ce81eb9d711f6d14 corporate/3.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.x86_64.rpm e34c011d455b576e4e27b20d4bc057db corporate/3.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm aebe66911dac80623339aee380ec165a corporate/3.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.x86_64.rpm 3c5f109ae088242966604dce6338f07b corporate/3.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.x86_64.rpm 17ef425bc7fc131b9de3632fb92317d1 corporate/3.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.x86_64.rpm 15ea134fde2b507f46e6e4faf243135f corporate/3.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.x86_64.rpm ce6f4aa7a0fb1ac425afc5d915bb392d corporate/3.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.x86_64.rpm 13b0b693682e7def5e320473342cf4a0 corporate/3.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.x86_64.rpm d5fd81f204e46d15b6d1124376ab0930 corporate/3.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.x86_64.rpm cb389fc624d1961cf2ab00488bad7cef corporate/3.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.x86_64.rpm 3cd572d77c055bf562c3678c513ff3c8 corporate/3.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.x86_64.rpm ea7215256650d751ae2ce0d20812fa96 corporate/3.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.x86_64.rpm 57fcf8c6e9f251d3eb4f0096ca55cea3 corporate/3.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.x86_64.rpm d7f6310911b7e049876f7b70c16b8ccc corporate/3.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.x86_64.rpm 8c0b97b440922510631400b5aea900ac corporate/3.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.x86_64.rpm 8045c85ca598518aff6c7ead8f3fbf61 corporate/3.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.x86_64.rpm 996d7bb252cf32b3ddce18a90b4bb8d9 corporate/3.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.x86_64.rpm 5a3b346110144f79e05c20d13ac90663 corporate/3.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.x86_64.rpm c56729c0896b11a9e49875fe2b493872 corporate/3.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.x86_64.rpm da6306fcba9fba87d98f68208e752bf8 corporate/3.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.x86_64.rpm e94eca882ce53af3086bac6cf70076ea corporate/3.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.x86_64.rpm 810bc3ca66d52d5537ece20a12679fec corporate/3.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.x86_64.rpm c97bcde75d8118bb3d6c38428b811cc9 corporate/3.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.x86_64.rpm 629ec7999ae3fd23e36e2c6722847bbe corporate/3.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.x86_64.rpm ad435041d1138f8a38a0a0739cff18d8 corporate/3.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.x86_64.rpm f76501363a31bcd388f5edcc80881196 corporate/3.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.x86_64.rpm e400f4b7e77307c8c5ab1bc26691168a corporate/3.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.x86_64.rpm 126f45e769e463182b4ade57183684c1 corporate/3.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.x86_64.rpm 160b09d1c10d0b781d8c1a17779432ed corporate/3.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.x86_64.rpm c5c363d0552c8365bf5dc6a0936d28b2 corporate/3.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.x86_64.rpm c4baf08469f1dbea8924429a7ec7b86e corporate/3.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.x86_64.rpm b9ce84c78e92b6f5e75954ada2706722 corporate/3.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.x86_64.rpm da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm
Corporate 4.0: 64a0356cc8f1b1ffcdfdef3d8d146cc5 corporate/4.0/i586/libnspr4-1.5.0.7-0.1.20060mlcs4.i586.rpm 3f0b705031d1e95280e8194338b2d381 corporate/4.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm 1bba2e76f21b670f44ba65f8c92b67e1 corporate/4.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm cb10e515e0fad365a81273a9b620cbc7 corporate/4.0/i586/libnss3-1.5.0.7-0.1.20060mlcs4.i586.rpm 3534b6f0e0b64686aee7b0758ec33daf corporate/4.0/i586/libnss3-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm c3aa90658d2adeb4e6543426c493a0fe corporate/4.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.i586.rpm 122e2ce3928dd2898118533f45f851e1 corporate/4.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.i586.rpm 3ade855a9fc71980eec72c8dbc107ae3 corporate/4.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.i586.rpm c189b7b4b54f4bdf040635750df007f8 corporate/4.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.i586.rpm 360d587d53e2a9c47dfff8a9137f1b4c corporate/4.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.i586.rpm c2fa5da5d44a5f70bb49d5b4ba7e86e6 corporate/4.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.i586.rpm 5df7bf2ff4059259ed0b5ea9f3587cc3 corporate/4.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.i586.rpm 278a321f6ee5928135585f03a05ae642 corporate/4.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.i586.rpm cd37b5dfe36b72fb482be5abc4bbbba7 corporate/4.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm 9b49e02711849a4babedfa63c6aadefb corporate/4.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.i586.rpm d8293192b06e5a91df8314ecba17880e corporate/4.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.i586.rpm 5839e97fa06cca289121be5f33e9286d corporate/4.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.i586.rpm 34d184e85b53c369a713c08f66e601dc corporate/4.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.i586.rpm ab7b43c629095beee26dbb1381fbff9d corporate/4.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.i586.rpm 79cfc37305b6a3977d7c7333c7e883de corporate/4.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.i586.rpm 7e8f28d446d6e574d8a1521059c03144 corporate/4.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.i586.rpm 0d2dd482cc76fb0df96c0bc5f4fa5844 corporate/4.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.i586.rpm 58959b3a1d43cc2a666361804daa88f1 corporate/4.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.i586.rpm ded59cf4be8835dc0ada86add049ed86 corporate/4.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.i586.rpm 8afd66b33e600714238e360a127df36e corporate/4.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.i586.rpm ef6a89b44e3b120f1bae29217728f196 corporate/4.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.i586.rpm 1532d01d8123e87ee1103292ed95f68d corporate/4.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.i586.rpm 8c0667ab59c15a9b66097f5e86df7220 corporate/4.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.i586.rpm bcec75d2b059d123d6c21dae29baee00 corporate/4.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.i586.rpm f5afdfd15e40f4ec6323a8cac098cb78 corporate/4.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.i586.rpm 1544a7236d6a10521f89234feaff9435 corporate/4.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.i586.rpm 53834f537b0eacd3bb59a2ccc6a40ea6 corporate/4.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.i586.rpm 70171f6ba3c24b51ec29be154e129bce corporate/4.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.i586.rpm 4e64eee4ed44068cb9db5c77730c71b8 corporate/4.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.i586.rpm d990c04de7c285225c51067ff92d8a58 corporate/4.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.i586.rpm 04ee85bd5b28b12466bcd8189d4ae480 corporate/4.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.i586.rpm 222528603f2d88e4e46178620328ac7e corporate/4.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.i586.rpm caacac0ace4c80fbf0d917ea95070114 corporate/4.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.i586.rpm e4aabb47eacf2bcbb517e6890935d4e9 corporate/4.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.i586.rpm e55300aa65e586aba56e5b75c3d0f0d7 corporate/4.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.i586.rpm 8d857f4d255e86e4b1db933ab75a88b5 corporate/4.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.i586.rpm 0d4998a9483e67ad0a484d8535950401 corporate/4.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.i586.rpm 0677248472dd1f219ac4c633b3ae8427 corporate/4.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.i586.rpm 025ee723e8a157de742313163d8199e6 corporate/4.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.i586.rpm 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: e9362e7e9d164dcf20ac2dd178057783 corporate/4.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 27152d5c4d45cfe65038b90014f4b128 corporate/4.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a520a8169e6f7fa9636c7434820263cc corporate/4.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 73fa1146e61ddf2baea07f4e51b247a2 corporate/4.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 77c656121a9efaefb5bf8bea7416a190 corporate/4.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 1353fe3c1c7740891cca051691f2a844 corporate/4.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 6e547a34386d9220269f6971df84459b corporate/4.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 37bd5e53ce8bd1196991a1d48c7d3fc2 corporate/4.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.x86_64.rpm d8efb7b371fa3bc9d7dbda4d82bcea69 corporate/4.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a4eb36d0ed16b308bf8146758468f720 corporate/4.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 1f3f6299c228a51c39dd9036d501baf3 corporate/4.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b7ed3aee73652f317d41612746b7f79e corporate/4.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.x86_64.rpm aa5e7732031b216f6cc4552b7e5bfe22 corporate/4.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b99863ae0bc816222fec7afd596b4b38 corporate/4.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 22b5ef994c3f38b7b5a63808f0ef9c47 corporate/4.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a5033ebf881cab82e063df8ffe29e22b corporate/4.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 387dfb400ed59319e932a19e2dd4fe09 corporate/4.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 2a114b7e832d12fad87f2ad76ed89a7d corporate/4.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm eced7a780c5f758eef5a0f71f43ed261 corporate/4.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 854bc6729675ed8670330f3da1e520b2 corporate/4.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b73ac49803411c5afb96d87cde8a89c9 corporate/4.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.x86_64.rpm ca9a93da5b7f4dfc1eca188267891a66 corporate/4.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 267f8dc1ca9e04115050a311eebd00f1 corporate/4.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 516850fa1de5417fdb96ab50fee1504f corporate/4.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm ec13f241ff41c46590e31fd8339ffae7 corporate/4.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 00eddff4c17ce23c148cbb2bfd27bc59 corporate/4.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 896cc9b5af7e66ddbf67ad819083a9aa corporate/4.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 52a752441fc870f33e792860ec328ecd corporate/4.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b418b4371503ed9502ca7eab01c6d86e corporate/4.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 801a63774bfd94ac7e292b97bc1c88a6 corporate/4.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 4998a34e227bcd0de4c64a08198cda13 corporate/4.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 0f809660f4c1e45133fc01003acee854 corporate/4.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm da3f053868769c3d1705158b925a3312 corporate/4.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b53c13931bdcebb9dec07ccb7512cc0d corporate/4.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 431f220901edaf32f504ee6dfd7d8262 corporate/4.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 45d21d5351be8762640ae3038458c6b8 corporate/4.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 3bb59b3ca297d90181276683db70ceb7 corporate/4.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.x86_64.rpm cce30e727a3dba740a537ec0040248f2 corporate/4.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 7221b6655d4061eb29ed5150f87b3706 corporate/4.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm dd7c39076b8bb01d1b4432ba9cb29f12 corporate/4.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.x86_64.rpm cacf45d88765c0c26d7256e5f392c2df corporate/4.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 703558369cbe9e4920eab509134d3a7e corporate/4.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 817fd873fb5f997916d61b2cf078d2c3 corporate/4.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm fe95060a37a586f98f5c3683131a9ef2 corporate/4.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFFEdnKmqjQ0CJFipgRAhScAJ0RtvKW8TDID20kGA742yYkfDv3WQCfViA3 9+1bS5rPZJ+d2lgArDu9umE= =7N0A -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA06-333A
Apple Releases Security Update to Address Multiple Vulnerabilities
Original release date: November 29, 2006 Last revised: -- Source: US-CERT
Systems Affected
* Apple Mac OS X version 10.3.x and 10.4.x
* Apple Mac OS X Server version 10.3.x and 10.4.x
* Apple Safari web browser
These vulnerabilities affect both Intel-based and PowerPC-based Apple systems.
Overview
Apple has released Security Update 2006-007 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser. Vulnerabilities in OpenSSL, gzip, and other products are also addressed. Attackers may take advantage of the less serious vulnerabilities to bypass security restrictions or cause a denial of service.
I. Description
Apple Security Update 2006-007 addresses a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, and other products. Further details are available in the related vulnerability notes.
This security update also addresses previously known vulnerabilities in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. Information is also available through the OpenSSL vulnerabilities page. Information about the vulnerabilities in gzip is available in a series of vulnerability notes.
II. Impact
The impacts of these vulnerabilities vary. For specific details, see the appropriate vulnerability notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service.
III. Solution
Install updates
Install Apple Security Update 2006-007.
IV. References
* Vulnerability Notes for Apple Security Update 2006-007 -
<http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007>
* Vulnerability Notes for OpenSSL Security Advisory [28th September
2006] -
http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928
* Vulnerability Note VU#845620 -
<http://www.kb.cert.org/vuls/id/845620>
* Vulnerability Note VU#933712 -
<http://www.kb.cert.org/vuls/id/933712>
* Vulnerability Note VU#381508 -
<http://www.kb.cert.org/vuls/id/381508>
* Vulnerability Note VU#554780 -
<http://www.kb.cert.org/vuls/id/554780>
* Vulnerability Note VU#596848 -
<http://www.kb.cert.org/vuls/id/596848>
* Vulnerability Note VU#773548 -
<http://www.kb.cert.org/vuls/id/773548>
* About the security content of Security Update 2006-007 -
<http://docs.info.apple.com/article.html?artnum=304829>
* Mac OS X: Updating your software -
<http://docs.info.apple.com/article.html?artnum=106704>
* Apple Downloads - <http://www.apple.com/support/downloads/>
* OpenSSL: OpenSSL vulnerabilities -
<http://www.openssl.org/news/vulnerabilities.html>
* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/#Safari>
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA06-333A.html>
Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA06-333A Feedback VU#191336" in the subject.
Produced 2006 by US-CERT, a government organization.
Terms of use:
http://www.us-cert.gov/legal.html
Revision History
November 29, 2006: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6 lJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz iN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7 xr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf 8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q A580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg== =f7N+ -----END PGP SIGNATURE----- . For details please consult the references below. Other vulnerabilities include program crashes and the acceptance of forged certificates.
Workaround
There is no known workaround at this time.
Resolution
All Mozilla Thunderbird users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=mail-client/mozilla-thunderbird-1.5.0.7"
All Mozilla Thunderbird binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=mail-client/mozilla-thunderbird-bin-1.5.0.7"
References
[ 1 ] CVE-2006-4253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253 [ 2 ] CVE-2006-4340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340 [ 3 ] CVE-2006-4565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565 [ 4 ] CVE-2006-4566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566 [ 5 ] CVE-2006-4567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567 [ 6 ] CVE-2006-4570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570 [ 7 ] CVE-2006-4571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200610-01.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200110-0354", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 2.4, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "rpath", "version": null }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 010", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "seamonkey", "scope": "lte", "trust": 1.0, "vendor": "mozilla", "version": "1.0.4" }, { "model": "network security services", "scope": "lte", "trust": 1.0, "vendor": "mozilla", "version": "3.11.2" }, { "model": "firefox", "scope": "lte", "trust": 1.0, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "thunderbird", "scope": "lte", "trust": 1.0, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 012", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 014", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmatewrq", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gnutls", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "iaik java group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intoto", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rsa security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sybase", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vandyke", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "sdk 13", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "appeon", "scope": "eq", "trust": 0.6, "vendor": "sybase", "version": "3.1" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "sdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "sdk 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "sdk 013", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "seamonkey", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.0.4" }, { "model": "network security services", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "3.11.2" }, { "model": "thunderbird", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "firefox", "scope": "eq", "trust": 0.6, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "security agent", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.79" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "computing snapgear sg565", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "ciscoworks common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(1)" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.1.0" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.9" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "s8300 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "communications security ssh tectia k", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.10" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154548.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "6.0.380004" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "securecrt", "scope": "eq", "trust": 0.3, "vendor": "vandyke", "version": "5.2.2" }, { "model": "hardware management console for iseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.334685" }, { "model": "ffi global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java web proxy server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.6" }, { "model": "2-stable-20061018", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "95000" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "6.2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "sdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "one application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "java system web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "sdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.6" }, { "model": "thunderbird", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "access registrar", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.6" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "one web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "one web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "one web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.1" }, { "model": "java system web server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "www-client/opera", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "9.0.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3(5)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.2" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.4" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "call manager es56", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "sdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.1" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "jre 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "reflection ftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "12.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.3" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "ffi global fix", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "communications security ssh tectia", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "call manager es33", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.5" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "beta11", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.1" }, { "model": "jsse 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.1" }, { "model": "java system web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "bind b", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.3" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.444386" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "java web proxy server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "3.0.2" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.639" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.342958" }, { "model": "jsse 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "8.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3.728" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3(1)" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.0.8" }, { "model": "international cryptographic infrastructure", "scope": "ne", "trust": 0.3, "vendor": "novell", "version": "2.7.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "risk analytics platform", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "computing snapgear u2", "scope": "ne", "trust": 0.3, "vendor": "secure", "version": "3.1.4" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "computing snapgear sg580", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "ons 15454e optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.3" }, { "model": "openoffice", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ons mstp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "ssl360", "scope": "ne", "trust": 0.3, "vendor": "arkoon", "version": "2.0/3" }, { "model": "java system application server 2004q2 r1standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "hardware management console for pseries", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3.7" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.5" }, { "model": "secure acs solution engine", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(0)" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "data direct odbc/ole-db drivers for ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "communications security tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "bind a5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "global fix lite", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "works common services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.6(1)" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.1" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.4.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "hardware management console for iseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.4" }, { "model": "virtualvault a.04.50", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.14" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "bind a4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "computing snapgear sg560", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "one web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2.1" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "call manager es07", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.1" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "java system web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.5" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "one application server platform edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x0" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1" }, { "model": "bind rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.4" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.4" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.1" }, { "model": "one web server sp9", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia connector", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.0.3" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.4" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.42" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "call manager es50", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.7" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "workspace", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.4" }, { "model": "ecda", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "sdk 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "java web proxy server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3)4.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "security mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.2" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "sdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "reflection sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.2.3" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.1" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "current pre20010701", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.0" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.6" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "corp banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.4" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "java system application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "tomboy", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.5.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.1.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.9" }, { "model": "one web server sp8", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "java system application server 2004q2 r1enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "5.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "bind a6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.3" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(0)" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "seamonkey", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.1" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "call manager es24", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "9.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0.4" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44910" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "data integration suite di", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "1.0" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "13.0" }, { "model": "rtds", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "3.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "java web proxy server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "java system application server platform edition q1 ur1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "data auditing", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.5.2" }, { "model": "communications security ssh tectia j", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "4.3.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "reflection for secure it sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "6.1" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.4" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0.2" }, { "model": "stable", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "java system web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "sdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "4.10-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "java enterprise system 2005q1", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection sftp client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "hat red hat network satellite server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "s8700 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "java system application server platform edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.680404" }, { "model": "s8710 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "iq extended enterpirse edition", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "java system application server standard 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.2.0" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.1" }, { "model": "sdk 07a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "call manager es32", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "interactive response", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.0" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.1" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "6.1" }, { "model": "java system application server enterprise edition 2005q1rhel2.1/rhel3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.1.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.3" }, { "model": "international cryptographic infostructure", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "2.6.1" }, { "model": "communications security ssh tectia k", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.8" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "workstation build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5.680404" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "project openssl k", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.0" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.7" }, { "model": "java system application server standard 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "bind rc3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "call manager sr2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "call manager sr2b", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "java system application server 2004q2 r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java system web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "current august", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "232006" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(0)" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "sdk 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "one web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.x" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.2" }, { "model": "reflection for secure it", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.3" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "java system application server 2004q2 r3 enterprise", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "java enterprise system 2003q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "java system application server 2004q2 r3 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "bind a2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "java system application server 2004q2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.6" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "bind a3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "3.1 rc3", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.5" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "11.5" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.12" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0" }, { "model": "java system application server enterprise 2004q2 r5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "unwired accelerator and enterprise portal", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "8.0" }, { "model": "one web server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.5" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "bind b3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "mach desktop", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure global desktop", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "communications security ssh tectia manager", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1.4" }, { "model": "ipcop", "scope": "ne", "trust": 0.3, "vendor": "ipcop", "version": "1.4.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.1" }, { "model": "one web server sp10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.0" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "7.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "java system application server standard platform q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "red hat network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3)4.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "2.0/2" }, { "model": "webproxy a.02.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.4.2" }, { "model": "java system application server enterprise 2004q2 r4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0.0" }, { "model": "java system web server sp3", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "computing snapgear sg710", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "0" }, { "model": "call manager es62", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java system web server sp4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "secure acs build", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)23" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "one web server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "project openssl c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "openvms secure web server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2" }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "s8500", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "powerbuilder", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "10.2.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "webproxy a.02.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "virtualvault a.04.70", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)5.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "hardware management console for pseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "e-biz impact", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4.5" }, { "model": "java system application server enterprise edition q1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.12005" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "bind -p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.3" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154542.3(5)" }, { "model": "ssl360", "scope": "eq", "trust": 0.3, "vendor": "arkoon", "version": "1.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3-1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ffi uofx", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44920" }, { "model": "network satellite (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4)4.2" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "wide area file services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "call manager sr2c", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "java web proxy server sp2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "13.0.5" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "seamonkey", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "ase", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5.2" }, { "model": "unwired orchestrator", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.0" }, { "model": "systems weblogic express for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.4" }, { "model": "jsse 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "one web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "e1.0-solid", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "server", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "hardware management console for pseries r5.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "netscape", "scope": "eq", "trust": 0.3, "vendor": "netscape", "version": "7.2" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "ffi bptw", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "java web proxy server sp6", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.5" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.4" }, { "model": "java system application server 2004q2 r2 standard", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "communications security ssh tectia j", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3.2" }, { "model": "call manager 4.1 sr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "virtualvault a.04.60", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "afaria", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "10.0" }, { "model": "java enterprise system 2005q4", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "hat fedora core5", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.10" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0.3" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "one web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "communications security ssh tectia manager", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154543.4" }, { "model": "ace", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "1.0.5" }, { "model": "network security services", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "3.11.3" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.8" }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "rfid enterprise", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0" }, { "model": "systems weblogic server for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "financials server", "scope": "eq", "trust": 0.3, "vendor": "navision", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "8.1" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "eq", "trust": 0.3, "vendor": "the", "version": "1.37" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.2" }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "unified presence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(2)" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.0" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.2" }, { "model": "communications security ssh tectia connector", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "5.1" }, { "model": "thunderbird", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.8" }, { "model": "ffi cons banking", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "call manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "java enterprise system 2004q2", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "securefx", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "4.0.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "java system web server sp7", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "ciscoworks common management foundation", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "call manager es40", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "jre 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "2.0.3" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "secure acs for windows server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "ids", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "appeon", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "bpi for healthcare", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.2.1" }, { "model": "java web proxy server sp5", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "sdk .0 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0x86" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "bind -p1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.2" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "hardware management console for iseries r1.0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "communications security ssh tectia server", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.1.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.193" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "call manager sr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server for win32", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.7" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "ace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "systems weblogic express for win32 sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.3.1" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.3" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.3.1" }, { "model": "secure acs for windows nt", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "mfolio", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "2.0" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "communications security ssh tectia server for ibm z/os", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "5.2.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "bind rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "bind b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3" }, { "model": "communications security ssh tectia", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.3" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.2" }, { "model": "sip proxy server", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "secure acs for unix", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.6.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "6.0" }, { "model": "bind b2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.4" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "secure acs solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3.2" }, { "model": "systems weblogic express", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "2.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.6" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(2)" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "s8500 cm", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "network security services", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.11" }, { "model": "hat enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.0.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "ons mspp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154540" }, { "model": "jsse", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.3" }, { "model": "current pre20010805", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "java web proxy server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "call manager es55", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "eii avaki sdf", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "player build", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.0.380004" }, { "model": "legion of the bouncy castle java cryptography api", "scope": "ne", "trust": 0.3, "vendor": "the", "version": "1.38" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.1" }, { "model": "security agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5.1.657" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "java system web server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "java web proxy server sp1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.6" }, { "model": "solaris update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "solonde etl", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "4.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2006.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "12.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "vshell", "scope": "eq", "trust": 0.3, "vendor": "van dyke", "version": "3.0" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "systems weblogic express sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "easerver", "scope": "eq", "trust": 0.3, "vendor": "sybase", "version": "5.1" }, { "model": "java system web server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "6.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "communications security ssh tectia server", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "4.4.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.11.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0.6", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4340" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Bleichenbacher", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-270" } ], "trust": 0.6 }, "cve": "CVE-2006-4340", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-4340", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#773548", "trust": 0.8, "value": "1.57" }, { "author": "CARNEGIE MELLON", "id": "VU#845620", "trust": 0.8, "value": "7.56" }, { "author": "CARNEGIE MELLON", "id": "VU#547300", "trust": 0.8, "value": "2.53" }, { "author": "CNNVD", "id": "CNNVD-200609-270", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. A buffer overflow vulnerability in an OpenSSL library function could allow a remote attacker to execute code on an affected system. \nAn attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. \nAll versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\ngzip Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA21996\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21996/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\ngzip 1.x\nhttp://secunia.com/product/4220/\n\nDESCRIPTION:\nTavis Ormandy has reported some vulnerabilities in gzip, which can be\nexploited by malicious people to cause a DoS (Denial of Service) and\npotentially compromise a vulnerable system. \n\n1) A boundary error within the \"make_table()\" function in unlzh.c can\nbe used to modify certain stack data. tricking\na user or automated system into unpacking a specially crafted archive\nfile. tricking a user or\nautomated system into unpacking a specially crafted \"pack\" archive\nfile. \n\n3) A buffer overflow within the \"make_table()\" function of gzip\u0027s LZH\nsupport can be exploited to cause a DoS and potentially to compromise\na vulnerable system by e.g. tricking a user or automated system into\nunpacking an archive containing a specially crafted decoding table. \n\n4) A NULL pointer dereference within the \"huft_build()\" function and\nan infinite loop within the LZH handling can be exploited to cause a\nDoS by e.g. tricking a user or automated system into unpacking a\nspecially crafted archive file. \n\nThe vulnerabilities have been reported in version 1.3.5. \n\nSOLUTION:\nDo not unpack untrusted archive files. \n\nPROVIDED AND/OR DISCOVERED BY:\nTavis Ormandy, Google Security Team\n\nORIGINAL ADVISORY:\nhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676\n\nOTHER REFERENCES:\nUS-CERT VU#554780:\nhttp://www.kb.cert.org/vuls/id/554780\n\nUS-CERT VU#381508:\nhttp://www.kb.cert.org/vuls/id/381508\n\nUS-CERT VU#773548:\nhttp://www.kb.cert.org/vuls/id/773548\n\nUS-CERT VU#933712:\nhttp://www.kb.cert.org/vuls/id/933712\n\nUS-CERT VU#596848\nhttp://www.kb.cert.org/vuls/id/596848\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1191-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nOctober 5th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla-thunderbird\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566\n CVE-2006-4568 CVE-2006-4570 CVE-2006-4571\nBugTraq ID : 20042\n\nSeveral security related problems have been discovered in Mozilla and\nderived products such as Mozilla Thunderbird. \n\nCVE-2006-4340\n\n Daniel Bleichenbacher recently described an implementation error\n in RSA signature verification that cause the application to\n incorrectly trust SSL certificates. \n\nCVE-2006-4570\n\n Georgi Guninski demonstrated that even with JavaScript disabled in\n mail (the default) an attacker can still execute JavaScript when a\n mail message is viewed, replied to, or forwarded. \n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.0.2-2.sarge1.0.8c.1. \n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.0.7-1. \n\nWe recommend that you upgrade your Mozilla Thunderbird packages. \n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.dsc\n Size/MD5 checksum: 1003 d7261fba347b9876e873f1d424e60190\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.diff.gz\n Size/MD5 checksum: 519315 066ed351050722c36274e3e837fd174f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz\n Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_alpha.deb\n Size/MD5 checksum: 12855288 285e55a20445ea5dffe79de01baf788c\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_alpha.deb\n Size/MD5 checksum: 3280106 0206d9fe08e3da2d4bf919c6b2b54ec7\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_alpha.deb\n Size/MD5 checksum: 152092 c5c984f0f11f94cb263f5bbef367de09\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_alpha.deb\n Size/MD5 checksum: 33520 ed7e6d825f630da666e07914527f2c75\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_alpha.deb\n Size/MD5 checksum: 89492 1e9ed565915dc4327e444ad999cc5daa\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_amd64.deb\n Size/MD5 checksum: 12258904 f40f86252184ce7360b2b9d1e58cef8f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_amd64.deb\n Size/MD5 checksum: 3281164 e4e2160d22d4721508f1762804b3b18b\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_amd64.deb\n Size/MD5 checksum: 151124 a72d17f827929c9189f9ba96ff73c7a1\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_amd64.deb\n Size/MD5 checksum: 33512 bbe0fe4a7e56a138c220790ab9de97a6\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_amd64.deb\n Size/MD5 checksum: 89350 f2b7e1d1d4eb5f1abb2522ddbdb46ff5\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_arm.deb\n Size/MD5 checksum: 10345146 4c171699433072d443eb7b35a2550fd2\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_arm.deb\n Size/MD5 checksum: 3272118 a52ad3d2cd1806e936374537e135d7db\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_arm.deb\n Size/MD5 checksum: 143266 9dedbe9b5f45727a93cfccb5c99bf371\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_arm.deb\n Size/MD5 checksum: 33522 14d1c0d0af46731075ea7c35c2900258\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_arm.deb\n Size/MD5 checksum: 81318 81219b4c82896fab12427e42df1b2760\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_hppa.deb\n Size/MD5 checksum: 13570024 3a62ee11075402dfad030e2ede937191\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_hppa.deb\n Size/MD5 checksum: 3285124 e9cadee2d32b2bcb56b1278043e97da4\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_hppa.deb\n Size/MD5 checksum: 153296 3fecaa707002afb1ba6854da724ad132\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_hppa.deb\n Size/MD5 checksum: 33520 83e537b9aff4d44fd958043298a1d7f2\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_hppa.deb\n Size/MD5 checksum: 97390 c3ceeedcf00d99d34c7b5f424da7da63\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_i386.deb\n Size/MD5 checksum: 11568436 af1de65bd715970c4432149aec80b2a2\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_i386.deb\n Size/MD5 checksum: 3507870 5dab89db24f1443fe782dc931f4ee0af\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_i386.deb\n Size/MD5 checksum: 146732 bc52082cd1ab0f026c401204cd63b4a7\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_i386.deb\n Size/MD5 checksum: 33518 5d3c9700cce7b9c0261c246ed7b8afd4\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_i386.deb\n Size/MD5 checksum: 88084 e244c9c8b7224814774bef13f4213d4e\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_ia64.deb\n Size/MD5 checksum: 14628630 07bfcc171f449b86b9d62f903e29d506\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_ia64.deb\n Size/MD5 checksum: 3291260 d7186841974796f8f90be26700801a95\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_ia64.deb\n Size/MD5 checksum: 155452 e17eb664e56fcc0809dd36580f92cc1a\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_ia64.deb\n Size/MD5 checksum: 33514 fc890529fdea5526a05ffd16b96f5956\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_ia64.deb\n Size/MD5 checksum: 107220 eb93528d586b050ecc3b60742b4fa344\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_m68k.deb\n Size/MD5 checksum: 10794842 fa716b92e3c7a9d67fad6fd453c78bb4\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_m68k.deb\n Size/MD5 checksum: 3271690 d95eb910dd6d38de41c17fcb6b1c4696\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_m68k.deb\n Size/MD5 checksum: 145054 2b7570676e15cea809905c442f91b5e0\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_m68k.deb\n Size/MD5 checksum: 33550 3db6c520d1c489fb4e17501d19dececf\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_m68k.deb\n Size/MD5 checksum: 82556 32d25c11844a48ed963e3c5c51ff34fc\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mips.deb\n Size/MD5 checksum: 11948708 4f58ce9668da6a12b823edaa3c8b35b3\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mips.deb\n Size/MD5 checksum: 3279410 e639b2bf43eda95d3ca3bb0b9aec6df7\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mips.deb\n Size/MD5 checksum: 148042 cb6ee4a9bd4dec3166e48e356b9c3465\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mips.deb\n Size/MD5 checksum: 33524 2765555b00f4ed717b34e98c5c0d9c02\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mips.deb\n Size/MD5 checksum: 84748 0e934e90bb6bd47c7500fd665728ba27\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mipsel.deb\n Size/MD5 checksum: 11817078 4239077894c74444d33063229dd847df\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mipsel.deb\n Size/MD5 checksum: 3280416 ac165850436e63818da8fffe134628d1\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mipsel.deb\n Size/MD5 checksum: 147600 ae6d7ff1b34dddab3d0c18d6e38bc77b\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mipsel.deb\n Size/MD5 checksum: 33518 27bed1b95a4e34a291c7e67c6a9fdd37\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mipsel.deb\n Size/MD5 checksum: 84650 173fefc8b58b15398b3cccad2c812495\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_powerpc.deb\n Size/MD5 checksum: 10912494 d13ec5b97f5fde0795e5f762330756f6\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_powerpc.deb\n Size/MD5 checksum: 3270108 dbd7eb3154db4a379fcfcda6b7d414b9\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_powerpc.deb\n Size/MD5 checksum: 145048 b9ab45845f58fb064d7d1ae449481db9\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_powerpc.deb\n Size/MD5 checksum: 33526 b5e07e26d215581b4cc0fea6d71beaf3\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_powerpc.deb\n Size/MD5 checksum: 81478 b57b8038afbfd5490a6cf847e740ab60\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_s390.deb\n Size/MD5 checksum: 12705708 68195861caccd07a18a379ffe2e88403\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_s390.deb\n Size/MD5 checksum: 3280614 38dec996622a4e1762a1ef683bba9c43\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_s390.deb\n Size/MD5 checksum: 151436 b54ba7420653e63746d019b979f3ae76\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_s390.deb\n Size/MD5 checksum: 33516 e24dafe27c103a8d40de9a905b052311\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_s390.deb\n Size/MD5 checksum: 89290 9daa1eb634834e02aefde0a594bcd0f9\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_sparc.deb\n Size/MD5 checksum: 11181284 adedd4c6302ddb868a531810d226143a\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_sparc.deb\n Size/MD5 checksum: 3275816 c38922ec47674939277e6984f87c0eb4\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_sparc.deb\n Size/MD5 checksum: 144702 9183a627463aa564a0313d4d361d22f3\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_sparc.deb\n Size/MD5 checksum: 33528 5f87736faa9ee0a9b10e29c48280798a\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_sparc.deb\n Size/MD5 checksum: 83122 72966880dc02a1b472dcac7b1404fa58\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n This update provides the latest Firefox to correct these issues. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571\n http://www.mozilla.org/security/announce/2006/mfsa2006-57.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-58.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-59.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-60.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-61.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-62.html\n http://www.mozilla.org/security/announce/2006/mfsa2006-64.html\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2006.0:\n 4e750ef25e44a1b493d2a61ad5f9a7a2 2006.0/i586/devhelp-0.10-7.2.20060mdk.i586.rpm\n e6cd690c11d4e8f352d2ce7bf0f7d4be 2006.0/i586/epiphany-1.8.5-4.2.20060mdk.i586.rpm\n b2f094942eca657f3dc7a8699cb8b776 2006.0/i586/epiphany-devel-1.8.5-4.2.20060mdk.i586.rpm\n c4ae8fc253aa1fe055ec4c1560205fab 2006.0/i586/epiphany-extensions-1.8.2-3.2.20060mdk.i586.rpm\n 08cde29a26e6ac2d0e3b629f660db9fe 2006.0/i586/galeon-2.0.1-1.2.20060mdk.i586.rpm\n 9c94b904a9f2c64090328edd73d0e1fa 2006.0/i586/libdevhelp-1_0-0.10-7.2.20060mdk.i586.rpm\n b5ad67818794371f50d63a611c79b45b 2006.0/i586/libdevhelp-1_0-devel-0.10-7.2.20060mdk.i586.rpm\n fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/i586/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm\n 770e8d6c5643c78f486ae2c115f7c740 2006.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n ffb123d21760cbba92a232dfb1150b7e 2006.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/i586/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm\n 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/i586/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n 2596f8b787cea221c80a85fd0854f766 2006.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mdk.i586.rpm\n c912e48bd5138b8f42b24b3c34653a19 2006.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.i586.rpm\n 1a82466395715237df552070e51f6525 2006.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.i586.rpm\n 514de0cacb2462a8a6a26206ac18b617 2006.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.i586.rpm\n 70415104d0814a6e94c1997c0c464957 2006.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.i586.rpm\n c2b5a360abd1a8a3e78dd8e9df072b4c 2006.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.i586.rpm\n f8dd2e9e5a5e374782d9154b09ca7b7d 2006.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.i586.rpm\n a20a2bee8f26440b13294ef6247f66ec 2006.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.i586.rpm\n c60d356eddf74e8799b239a925b35953 2006.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n 5b4fbc76811530cfc20ef319daf2f577 2006.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.i586.rpm\n fdc7591dc15dce7e373f4e167fb2c769 2006.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.i586.rpm\n 00a17b297ea7b7ee31a3fca5d3109ffc 2006.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.i586.rpm\n 2bee9151bc0e40bf1ff22a9224643dcb 2006.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.i586.rpm\n 03285b22a86c82b8558467befb5fa04b 2006.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.i586.rpm\n f9dbe9c8d7b907e6c1a80f0bce2d9323 2006.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.i586.rpm\n 4e13ea6856a71514c569581e06515ae8 2006.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.i586.rpm\n 81b56a020127b1e9c41facb963e670be 2006.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.i586.rpm\n 3a14f0cee1271d5f4cfedc8967a2be45 2006.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.i586.rpm\n 9612ac69d69114d1da1dc1bfa6530d9b 2006.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.i586.rpm\n 9a47da16333b9c1d839e19420ab5c3a5 2006.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.i586.rpm\n ea5b214a43077114d8adaf184ba6ce61 2006.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.i586.rpm\n ebf899b39e850438dd4cfb1bbab9ba8d 2006.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.i586.rpm\n 18522be12bdda788de662d07d5a07e08 2006.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.i586.rpm\n 19a62453c05c0443aa2999a177d50dac 2006.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.i586.rpm\n 352aa6197b0b79025f5a71a3135d95c9 2006.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.i586.rpm\n 64b460d997ff70bf0ff50400c20a98e1 2006.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.i586.rpm\n 1f67f28a68d57baa96523ef05ccd1bbe 2006.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.i586.rpm\n f5b2681e10e6eb68e4fb9041262b65c5 2006.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.i586.rpm\n 8d47794342c430b50dc04f7d4c65cf9d 2006.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.i586.rpm\n d975c5d5ec3c8fed8846f02105ba4795 2006.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.i586.rpm\n 563d01331a992ec6ded54d5118bc10ad 2006.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.i586.rpm\n 4da569e782da6c5b98eab4862c335600 2006.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.i586.rpm\n 4a77a4d9b22704184694a1a0580440f5 2006.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.i586.rpm\n 0a153e8351a1ffdfadf067cdf9b2ee06 2006.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.i586.rpm\n e7ed42daf0c68890a34422d8f5b7dcf6 2006.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.i586.rpm\n 542ce6ba9713683b8a741ab921cd3e45 2006.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.i586.rpm\n 55c8c83ad72d6289bf1d45ea517b74ba 2006.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.i586.rpm\n 591beaf9e8abf8911f023fb147efe765 2006.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.i586.rpm\n 23b9d2502d7cb24aeea82f358a428ec2 2006.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.i586.rpm\n be8acdc18fe55ea8a9d0afc553bf21d3 2006.0/i586/yelp-2.10.0-6.2.20060mdk.i586.rpm \n 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm\n bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm\n b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm\n 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm\n 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm\n 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm\n 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm\n\n Mandriva Linux 2006.0/X86_64:\n 8f79a25451b9f41d48df89f996869cc7 2006.0/x86_64/devhelp-0.10-7.2.20060mdk.x86_64.rpm\n a9b851ddb7a77ee0f6d73c9a475658e0 2006.0/x86_64/epiphany-1.8.5-4.2.20060mdk.x86_64.rpm\n 606bb2a3ece209a7c260fd81d776c123 2006.0/x86_64/epiphany-devel-1.8.5-4.2.20060mdk.x86_64.rpm\n bb99bf7ed2e5608849cb9b0bcac49041 2006.0/x86_64/epiphany-extensions-1.8.2-3.2.20060mdk.x86_64.rpm\n 6caf5e05026177525d0d04225e5dcc4a 2006.0/x86_64/galeon-2.0.1-1.2.20060mdk.x86_64.rpm\n 2ef32f51f707beff08db88d61aab842d 2006.0/x86_64/lib64devhelp-1_0-0.10-7.2.20060mdk.x86_64.rpm\n 50b6716aa33e6065ce0ba0b107fb3a8c 2006.0/x86_64/lib64devhelp-1_0-devel-0.10-7.2.20060mdk.x86_64.rpm\n 0b3997e3f646af18f684fdce56194ae3 2006.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75e63b4f3785b8c7fa4924d7f30be921 2006.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n cda6b659c2777c44fdde0ac3ab1fb11b 2006.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4f3e6424fa71a629be1b81415fe2b875 2006.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 7bd353454999969148524636267b68c5 2006.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/x86_64/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm\n 770e8d6c5643c78f486ae2c115f7c740 2006.0/x86_64/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/x86_64/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm\n 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/x86_64/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm\n 561212c426f35a3e2393ad3acbf11bda 2006.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mdk.x86_64.rpm\n a4a76ca919cec68bef5ec0521e4185b2 2006.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.x86_64.rpm\n e23f698f02d78a8d8b2ac056e91f106a 2006.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1e815c45fb57ee56bd4d4258a8cda5ad 2006.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1c348254b80cec87c2b804825cdd8a5d 2006.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 6eac0be09030f9ed629107600bcbf88f 2006.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.x86_64.rpm\n a06b4569f5392501df97fb209315782f 2006.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 98aac82b44a66047d884b95f251cd6c5 2006.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 9479078391f288562b612afff9cb994e 2006.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 247dce39896e7230ffda5ca8bc58d736 2006.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.x86_64.rpm\n a86cb00b8b07cd45a1274ddc318de2bd 2006.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 8ba8f4e4d9fcfef9f3cc4ac71b15c5df 2006.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4c477d0ef8c843b9416185508c9181a1 2006.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 6e9c4c9c6ba8cfefd32e4d135943824d 2006.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.x86_64.rpm\n b8046ef3da338188287fa9a8ebfb9515 2006.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1609e86fa50ef7c5c3ef827bf47090e8 2006.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 5cdf122cafadd7f2125d42246402e29d 2006.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75f82717c62d51d00ba25abcdf3e26a5 2006.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75b03be94bdea20dbbf361a3a295e4c9 2006.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 672f36e40f7c5463b5e771bcaeae31af 2006.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 8cf3e2082d406f71c4c7d3f638792e1e 2006.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4f0f77a0b9fd79a671857fd330933289 2006.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.x86_64.rpm\n b5c00962987efb764ea77e76c9734c79 2006.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.x86_64.rpm\n f788aefcdac5b098d8853a3ef4fe146c 2006.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 4afff3966656a65b55290d08d446d864 2006.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.x86_64.rpm\n e63e4db3037a915ac24dca78e5ae8617 2006.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 7e443e15233a3db5b76ae7c299d1e7d9 2006.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 75ca84a45213c2d33d66b68c649dd875 2006.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 7a8cd126f5f5c63d45efe79a1e78e94d 2006.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 342155314a7801a1637d807e8ae8754d 2006.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 359e5cb75905f2c08b49ecb1eccdf335 2006.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.x86_64.rpm\n fa480b18d46eaed805f8fe0c92f6a9fe 2006.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 3233bb351b6c89deb25a6722df088e9a 2006.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.x86_64.rpm\n f1347555bb50e32c58ac3edba31f3d1a 2006.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.x86_64.rpm\n c20fd1c8861e74829879a63075fdf2f4 2006.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 8c73daea2686e503d3367d112c4c691e 2006.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 59d920837831e1a165ce19447066b4e5 2006.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 869bea0fbfc6b2c65ab525d80aed03b9 2006.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 1b867a3b0b7d8efd86377d0f0dcb67c3 2006.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.x86_64.rpm\n 12ab7912491456d673058667c8c0dc3a 2006.0/x86_64/yelp-2.10.0-6.2.20060mdk.x86_64.rpm \n 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm\n bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm\n b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm\n 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm\n 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm\n 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm\n 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm\n\n Corporate 3.0:\n c106557de1e045e5840a453d710b63e7 corporate/3.0/i586/libnspr4-1.5.0.7-0.1.C30mdk.i586.rpm\n b5a3de7c01f7a4187f85bc66db242c67 corporate/3.0/i586/libnspr4-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n 8d1cfeaf1cb031bc1ec4519994801b6a corporate/3.0/i586/libnspr4-static-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n d08546a25f6e78701feed1d67d53fabd corporate/3.0/i586/libnss3-1.5.0.7-0.1.C30mdk.i586.rpm\n 3371ded40c0bd1a8e828d9e92aed09fd corporate/3.0/i586/libnss3-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n 6d635b07ba60ed49fe27d4c633204520 corporate/3.0/i586/mozilla-firefox-1.5.0.7-0.1.C30mdk.i586.rpm\n aa83aaff11daa5889c9d36c928075341 corporate/3.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.i586.rpm\n 059c5de9e7a5f658cfbc692c913b3403 corporate/3.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.i586.rpm\n 63b8a1a7db1568964fe4dc1d32552f52 corporate/3.0/i586/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.i586.rpm\n cf48e548709250792e5a87c12db71cf1 corporate/3.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.i586.rpm\n 90c83713c4fd403c9999cf52c56eb282 corporate/3.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.i586.rpm\n 91279bd7d327c1a3bc0855cb06007f82 corporate/3.0/i586/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.i586.rpm\n 1fec2333c2988cc7cb7238d5bcf1812d corporate/3.0/i586/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.i586.rpm\n debf0c0ddd775793cd87fedcaefc5cf7 corporate/3.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.i586.rpm\n 6e9ec67c3a28bde55146ca1f475cb847 corporate/3.0/i586/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.i586.rpm\n 53c7defd9f6f8168990e4f4d4fa3a495 corporate/3.0/i586/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.i586.rpm\n 5ac67c7e12f4edd0429bc2f085e438e6 corporate/3.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.i586.rpm\n 5d4ac2f2cd3d6aecd52365e54aa85d66 corporate/3.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.i586.rpm\n aad00d0da3781f7165ed63df0276962d corporate/3.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.i586.rpm\n c531c8f33674e476980aa2cf112440bc corporate/3.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.i586.rpm\n 8f33047a9c560757a90831ea415ef814 corporate/3.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.i586.rpm\n ec0a957af4cd462f58c3d846a37d68b4 corporate/3.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.i586.rpm\n 1f8f0a6a7f962c1b1cf9d3dec38af0e2 corporate/3.0/i586/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.i586.rpm\n 354c14637e7df983f16903f46bf81171 corporate/3.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.i586.rpm\n b9fdd2f2db6f74ef240e23ace3a3a0c3 corporate/3.0/i586/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.i586.rpm\n 831a3b7c411cc716527dfe1c97d63de2 corporate/3.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.i586.rpm\n a89843c85143fa62e264f37df634b920 corporate/3.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.i586.rpm\n 382ff5621db369b06e9d76a41a4fa509 corporate/3.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.i586.rpm\n 4181358e7b0b84ff907bd5173be137d2 corporate/3.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.i586.rpm\n 6da617d32c9eb917180eddd62aeabf54 corporate/3.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.i586.rpm\n c0e559c0dc865c97435a918d77d690dd corporate/3.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.i586.rpm\n 05a64d9e97c0ec16b661d93e4c49ba93 corporate/3.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.i586.rpm\n ef2379b44f8e241a7811eee7031e9838 corporate/3.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.i586.rpm\n 08f36ddea8f0b8ad5decc76b6ebf7106 corporate/3.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.i586.rpm\n 9af857fcd8a7e98707ae77fcbd17e25d corporate/3.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.i586.rpm\n 5b23c90450de3a6ee1b879dafb4e0ebb corporate/3.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.i586.rpm\n 646d7d7ca0374da1d90c77ff827b7a3b corporate/3.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.i586.rpm\n 25746d2ce3a97f620f1c098daef474ed corporate/3.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.i586.rpm\n fb12bfb159f9d9a291e838cb6994daa5 corporate/3.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.i586.rpm\n 962b2b084cde62a28341c177d006b755 corporate/3.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.i586.rpm\n 784906446777df1d03ba5ac75e790104 corporate/3.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.i586.rpm\n 543df7658745731ec6341a1d46901e5e corporate/3.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.i586.rpm\n ef4728e96d4c1dadc4e9286022c6fc1a corporate/3.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.i586.rpm\n f974e234f39298065b5a120da2aad80f corporate/3.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.i586.rpm \n da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm\n 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n 38e5d39281cf8fe28ae400ef6880ed82 corporate/3.0/x86_64/lib64nspr4-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 8594d09e78d9ec76bed9bb5bf9065a9d corporate/3.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 88ea20792afc414a8511312fc53c9973 corporate/3.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 0749638fca3fc55a0c84b374c8ddce4c corporate/3.0/x86_64/lib64nss3-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3bd450c319eada8936baad026c0e7edc corporate/3.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 86a6c461d4b783867fbf62dba98b76a0 corporate/3.0/x86_64/mozilla-firefox-1.5.0.7-0.1.C30mdk.x86_64.rpm\n fa3bdb060dc9933093cd59604e0e9770 corporate/3.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.x86_64.rpm\n cf50847d5e76e5a9b0cd9c48a156f919 corporate/3.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 5251818cebcf07fdb025aded5d99f092 corporate/3.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 1ae9e70895e0bfb45034d2cfa4c937b8 corporate/3.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3585c137dc33769069e8961fa5a7ae7b corporate/3.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e10f6d78aa54d325f8a38d7f8729f1ac corporate/3.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 62bd1fd39df7abf0ce81eb9d711f6d14 corporate/3.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e34c011d455b576e4e27b20d4bc057db corporate/3.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm\n aebe66911dac80623339aee380ec165a corporate/3.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3c5f109ae088242966604dce6338f07b corporate/3.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 17ef425bc7fc131b9de3632fb92317d1 corporate/3.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 15ea134fde2b507f46e6e4faf243135f corporate/3.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.x86_64.rpm\n ce6f4aa7a0fb1ac425afc5d915bb392d corporate/3.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 13b0b693682e7def5e320473342cf4a0 corporate/3.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.x86_64.rpm\n d5fd81f204e46d15b6d1124376ab0930 corporate/3.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.x86_64.rpm\n cb389fc624d1961cf2ab00488bad7cef corporate/3.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 3cd572d77c055bf562c3678c513ff3c8 corporate/3.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.x86_64.rpm\n ea7215256650d751ae2ce0d20812fa96 corporate/3.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 57fcf8c6e9f251d3eb4f0096ca55cea3 corporate/3.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.x86_64.rpm\n d7f6310911b7e049876f7b70c16b8ccc corporate/3.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 8c0b97b440922510631400b5aea900ac corporate/3.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 8045c85ca598518aff6c7ead8f3fbf61 corporate/3.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 996d7bb252cf32b3ddce18a90b4bb8d9 corporate/3.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 5a3b346110144f79e05c20d13ac90663 corporate/3.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c56729c0896b11a9e49875fe2b493872 corporate/3.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.x86_64.rpm\n da6306fcba9fba87d98f68208e752bf8 corporate/3.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e94eca882ce53af3086bac6cf70076ea corporate/3.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 810bc3ca66d52d5537ece20a12679fec corporate/3.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c97bcde75d8118bb3d6c38428b811cc9 corporate/3.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 629ec7999ae3fd23e36e2c6722847bbe corporate/3.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.x86_64.rpm\n ad435041d1138f8a38a0a0739cff18d8 corporate/3.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.x86_64.rpm\n f76501363a31bcd388f5edcc80881196 corporate/3.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.x86_64.rpm\n e400f4b7e77307c8c5ab1bc26691168a corporate/3.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 126f45e769e463182b4ade57183684c1 corporate/3.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.x86_64.rpm\n 160b09d1c10d0b781d8c1a17779432ed corporate/3.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c5c363d0552c8365bf5dc6a0936d28b2 corporate/3.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.x86_64.rpm\n c4baf08469f1dbea8924429a7ec7b86e corporate/3.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.x86_64.rpm\n b9ce84c78e92b6f5e75954ada2706722 corporate/3.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.x86_64.rpm \n da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm\n 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm\n\n Corporate 4.0:\n 64a0356cc8f1b1ffcdfdef3d8d146cc5 corporate/4.0/i586/libnspr4-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 3f0b705031d1e95280e8194338b2d381 corporate/4.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 1bba2e76f21b670f44ba65f8c92b67e1 corporate/4.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n cb10e515e0fad365a81273a9b620cbc7 corporate/4.0/i586/libnss3-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 3534b6f0e0b64686aee7b0758ec33daf corporate/4.0/i586/libnss3-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n c3aa90658d2adeb4e6543426c493a0fe corporate/4.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 122e2ce3928dd2898118533f45f851e1 corporate/4.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 3ade855a9fc71980eec72c8dbc107ae3 corporate/4.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.i586.rpm\n c189b7b4b54f4bdf040635750df007f8 corporate/4.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 360d587d53e2a9c47dfff8a9137f1b4c corporate/4.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.i586.rpm\n c2fa5da5d44a5f70bb49d5b4ba7e86e6 corporate/4.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 5df7bf2ff4059259ed0b5ea9f3587cc3 corporate/4.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 278a321f6ee5928135585f03a05ae642 corporate/4.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.i586.rpm\n cd37b5dfe36b72fb482be5abc4bbbba7 corporate/4.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 9b49e02711849a4babedfa63c6aadefb corporate/4.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.i586.rpm\n d8293192b06e5a91df8314ecba17880e corporate/4.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 5839e97fa06cca289121be5f33e9286d corporate/4.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 34d184e85b53c369a713c08f66e601dc corporate/4.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.i586.rpm\n ab7b43c629095beee26dbb1381fbff9d corporate/4.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 79cfc37305b6a3977d7c7333c7e883de corporate/4.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 7e8f28d446d6e574d8a1521059c03144 corporate/4.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 0d2dd482cc76fb0df96c0bc5f4fa5844 corporate/4.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 58959b3a1d43cc2a666361804daa88f1 corporate/4.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.i586.rpm\n ded59cf4be8835dc0ada86add049ed86 corporate/4.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 8afd66b33e600714238e360a127df36e corporate/4.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.i586.rpm\n ef6a89b44e3b120f1bae29217728f196 corporate/4.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 1532d01d8123e87ee1103292ed95f68d corporate/4.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 8c0667ab59c15a9b66097f5e86df7220 corporate/4.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.i586.rpm\n bcec75d2b059d123d6c21dae29baee00 corporate/4.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.i586.rpm\n f5afdfd15e40f4ec6323a8cac098cb78 corporate/4.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 1544a7236d6a10521f89234feaff9435 corporate/4.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 53834f537b0eacd3bb59a2ccc6a40ea6 corporate/4.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 70171f6ba3c24b51ec29be154e129bce corporate/4.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 4e64eee4ed44068cb9db5c77730c71b8 corporate/4.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.i586.rpm\n d990c04de7c285225c51067ff92d8a58 corporate/4.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 04ee85bd5b28b12466bcd8189d4ae480 corporate/4.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 222528603f2d88e4e46178620328ac7e corporate/4.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.i586.rpm\n caacac0ace4c80fbf0d917ea95070114 corporate/4.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.i586.rpm\n e4aabb47eacf2bcbb517e6890935d4e9 corporate/4.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.i586.rpm\n e55300aa65e586aba56e5b75c3d0f0d7 corporate/4.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 8d857f4d255e86e4b1db933ab75a88b5 corporate/4.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 0d4998a9483e67ad0a484d8535950401 corporate/4.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 0677248472dd1f219ac4c633b3ae8427 corporate/4.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.i586.rpm\n 025ee723e8a157de742313163d8199e6 corporate/4.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.i586.rpm \n 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm\n d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n e9362e7e9d164dcf20ac2dd178057783 corporate/4.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 27152d5c4d45cfe65038b90014f4b128 corporate/4.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n a520a8169e6f7fa9636c7434820263cc corporate/4.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 73fa1146e61ddf2baea07f4e51b247a2 corporate/4.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 77c656121a9efaefb5bf8bea7416a190 corporate/4.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 1353fe3c1c7740891cca051691f2a844 corporate/4.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 6e547a34386d9220269f6971df84459b corporate/4.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 37bd5e53ce8bd1196991a1d48c7d3fc2 corporate/4.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n d8efb7b371fa3bc9d7dbda4d82bcea69 corporate/4.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n a4eb36d0ed16b308bf8146758468f720 corporate/4.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 1f3f6299c228a51c39dd9036d501baf3 corporate/4.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b7ed3aee73652f317d41612746b7f79e corporate/4.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n aa5e7732031b216f6cc4552b7e5bfe22 corporate/4.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b99863ae0bc816222fec7afd596b4b38 corporate/4.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 22b5ef994c3f38b7b5a63808f0ef9c47 corporate/4.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n a5033ebf881cab82e063df8ffe29e22b corporate/4.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 387dfb400ed59319e932a19e2dd4fe09 corporate/4.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 2a114b7e832d12fad87f2ad76ed89a7d corporate/4.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n eced7a780c5f758eef5a0f71f43ed261 corporate/4.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 854bc6729675ed8670330f3da1e520b2 corporate/4.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b73ac49803411c5afb96d87cde8a89c9 corporate/4.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n ca9a93da5b7f4dfc1eca188267891a66 corporate/4.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 267f8dc1ca9e04115050a311eebd00f1 corporate/4.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 516850fa1de5417fdb96ab50fee1504f corporate/4.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n ec13f241ff41c46590e31fd8339ffae7 corporate/4.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 00eddff4c17ce23c148cbb2bfd27bc59 corporate/4.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 896cc9b5af7e66ddbf67ad819083a9aa corporate/4.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 52a752441fc870f33e792860ec328ecd corporate/4.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b418b4371503ed9502ca7eab01c6d86e corporate/4.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 801a63774bfd94ac7e292b97bc1c88a6 corporate/4.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 4998a34e227bcd0de4c64a08198cda13 corporate/4.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 0f809660f4c1e45133fc01003acee854 corporate/4.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n da3f053868769c3d1705158b925a3312 corporate/4.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n b53c13931bdcebb9dec07ccb7512cc0d corporate/4.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 431f220901edaf32f504ee6dfd7d8262 corporate/4.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 45d21d5351be8762640ae3038458c6b8 corporate/4.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 3bb59b3ca297d90181276683db70ceb7 corporate/4.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n cce30e727a3dba740a537ec0040248f2 corporate/4.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 7221b6655d4061eb29ed5150f87b3706 corporate/4.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n dd7c39076b8bb01d1b4432ba9cb29f12 corporate/4.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n cacf45d88765c0c26d7256e5f392c2df corporate/4.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 703558369cbe9e4920eab509134d3a7e corporate/4.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n 817fd873fb5f997916d61b2cf078d2c3 corporate/4.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm\n fe95060a37a586f98f5c3683131a9ef2 corporate/4.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.x86_64.rpm \n 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm\n d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.2.2 (GNU/Linux)\n\niD8DBQFFEdnKmqjQ0CJFipgRAhScAJ0RtvKW8TDID20kGA742yYkfDv3WQCfViA3\n9+1bS5rPZJ+d2lgArDu9umE=\n=7N0A\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n National Cyber Alert System\n\n Technical Cyber Security Alert TA06-333A\n\n\nApple Releases Security Update to Address Multiple Vulnerabilities\n\n Original release date: November 29, 2006\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n * Apple Mac OS X version 10.3.x and 10.4.x\n * Apple Mac OS X Server version 10.3.x and 10.4.x\n * Apple Safari web browser\n\n These vulnerabilities affect both Intel-based and PowerPC-based Apple\n systems. \n\n\nOverview\n\n Apple has released Security Update 2006-007 to correct multiple\n vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web\n browser. Vulnerabilities in OpenSSL, gzip, and other products are also\n addressed. Attackers may take\n advantage of the less serious vulnerabilities to bypass security\n restrictions or cause a denial of service. \n\n\nI. Description\n\n Apple Security Update 2006-007 addresses a number of vulnerabilities\n affecting Mac OS X, OS X Server, Safari web browser, and other\n products. Further details are available in the related vulnerability\n notes. \n\n This security update also addresses previously known vulnerabilities\n in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. Information is also available through the OpenSSL\n vulnerabilities page. Information about the vulnerabilities in gzip is\n available in a series of vulnerability notes. \n\n\nII. Impact\n\n The impacts of these vulnerabilities vary. For specific details, see\n the appropriate vulnerability notes. Potential consequences include\n remote execution of arbitrary code or commands, bypass of security\n restrictions, and denial of service. \n\n\nIII. Solution\n\nInstall updates\n\n Install Apple Security Update 2006-007. \n\n\nIV. References\n\n * Vulnerability Notes for Apple Security Update 2006-007 -\n \u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=apple-2006-007\u003e\n\n * Vulnerability Notes for OpenSSL Security Advisory [28th September\n 2006] -\n\u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=openssl_secadv_20060928\u003e\n\n * Vulnerability Note VU#845620 -\n \u003chttp://www.kb.cert.org/vuls/id/845620\u003e\n\n * Vulnerability Note VU#933712 -\n \u003chttp://www.kb.cert.org/vuls/id/933712\u003e\n\n * Vulnerability Note VU#381508 -\n \u003chttp://www.kb.cert.org/vuls/id/381508\u003e\n\n * Vulnerability Note VU#554780 -\n \u003chttp://www.kb.cert.org/vuls/id/554780\u003e\n\n * Vulnerability Note VU#596848 -\n \u003chttp://www.kb.cert.org/vuls/id/596848\u003e\n\n * Vulnerability Note VU#773548 -\n \u003chttp://www.kb.cert.org/vuls/id/773548\u003e\n\n * About the security content of Security Update 2006-007 -\n \u003chttp://docs.info.apple.com/article.html?artnum=304829\u003e\n\n * Mac OS X: Updating your software -\n \u003chttp://docs.info.apple.com/article.html?artnum=106704\u003e\n\n * Apple Downloads - \u003chttp://www.apple.com/support/downloads/\u003e\n\n * OpenSSL: OpenSSL vulnerabilities -\n \u003chttp://www.openssl.org/news/vulnerabilities.html\u003e\n\n * Securing Your Web Browser -\n \u003chttp://www.us-cert.gov/reading_room/securing_browser/#Safari\u003e\n\n _________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA06-333A.html\u003e\n _________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. Please send\n email to \u003ccert@cert.org\u003e with \"TA06-333A Feedback VU#191336\" in the\n subject. \n _________________________________________________________________\n\n Produced 2006 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n\n _________________________________________________________________\n\n Revision History\n\n November 29, 2006: Initial release\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6\nlJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz\niN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7\nxr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf\n8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q\nA580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg==\n=f7N+\n-----END PGP SIGNATURE-----\n. For details please consult the references below. \nOther vulnerabilities include program crashes and the acceptance of\nforged certificates. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Mozilla Thunderbird users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \n\"\u003e=mail-client/mozilla-thunderbird-1.5.0.7\"\n\nAll Mozilla Thunderbird binary users should upgrade to the latest\nversion:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \n\"\u003e=mail-client/mozilla-thunderbird-bin-1.5.0.7\"\n\nReferences\n==========\n\n [ 1 ] CVE-2006-4253\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253\n [ 2 ] CVE-2006-4340\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340\n [ 3 ] CVE-2006-4565\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565\n [ 4 ] CVE-2006-4566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566\n [ 5 ] CVE-2006-4567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567\n [ 6 ] CVE-2006-4570\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570\n [ 7 ] CVE-2006-4571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200610-01.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2006 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4340" }, { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "50366" }, { "db": "PACKETSTORM", "id": "50727" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" } ], "trust": 3.87 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-4340", "trust": 2.3 }, { "db": "BID", "id": "22083", "trust": 1.6 }, { "db": "SECUNIA", "id": "22074", "trust": 1.6 }, { "db": "SECUNIA", "id": "22247", "trust": 1.6 }, { "db": "SECUNIA", "id": "21950", "trust": 1.6 }, { "db": "SECUNIA", "id": "22422", "trust": 1.6 }, { "db": "SECUNIA", "id": "21949", "trust": 1.6 }, { "db": "SECUNIA", "id": "21915", "trust": 1.6 }, { "db": "SECUNIA", "id": "22226", "trust": 1.6 }, { "db": "SECUNIA", "id": "22088", "trust": 1.6 }, { "db": "SECUNIA", "id": "21939", "trust": 1.6 }, { "db": "SECUNIA", "id": "22055", "trust": 1.6 }, { "db": "SECUNIA", "id": "22274", "trust": 1.6 }, { "db": "SECUNIA", "id": "22025", "trust": 1.6 }, { "db": "SECUNIA", "id": "21903", "trust": 1.6 }, { "db": "SECUNIA", "id": "22342", "trust": 1.6 }, { "db": "SECUNIA", "id": "22036", "trust": 1.6 }, { "db": "SECUNIA", "id": "22001", "trust": 1.6 }, { "db": "SECUNIA", "id": "21940", "trust": 1.6 }, { "db": "SECUNIA", "id": "22210", "trust": 1.6 }, { "db": "SECUNIA", "id": "22299", "trust": 1.6 }, { "db": "SECUNIA", "id": "21906", "trust": 1.6 }, { "db": "SECUNIA", "id": "21916", "trust": 1.6 }, { "db": "SECTRACK", "id": "1016860", "trust": 1.6 }, { "db": "SECTRACK", "id": "1016859", "trust": 1.6 }, { "db": "SECTRACK", "id": "1016858", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3899", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3622", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3617", "trust": 1.6 }, { "db": "USCERT", "id": "TA06-312A", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#845620", "trust": 1.2 }, { "db": "CERT/CC", "id": "VU#773548", "trust": 1.0 }, { "db": "SECUNIA", "id": "22992", "trust": 1.0 }, { "db": "SECUNIA", "id": "22044", "trust": 1.0 }, { "db": "SECUNIA", "id": "22195", "trust": 1.0 }, { "db": "SECUNIA", "id": "22446", "trust": 1.0 }, { "db": "SECUNIA", "id": "24711", "trust": 1.0 }, { "db": "SECUNIA", "id": "22849", "trust": 1.0 }, { "db": "SECUNIA", "id": "22066", "trust": 1.0 }, { "db": "SECUNIA", "id": "22056", "trust": 1.0 }, { "db": "SECUNIA", "id": "23883", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-1198", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2006-3748", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2007-0293", "trust": 1.0 }, { "db": "VUPEN", "id": "ADV-2008-0083", "trust": 1.0 }, { "db": "AUSCERT", "id": "ESB-2007.0014", "trust": 0.8 }, { "db": "SECUNIA", "id": "21709", "trust": 0.8 }, { "db": "SECUNIA", "id": "22207", "trust": 0.8 }, { "db": "SECUNIA", "id": "23309", "trust": 0.8 }, { "db": "SECUNIA", "id": "22212", "trust": 0.8 }, { "db": "SECUNIA", "id": "22116", "trust": 0.8 }, { "db": "SECUNIA", "id": "22216", "trust": 0.8 }, { "db": "SECUNIA", "id": "22220", "trust": 0.8 }, { "db": "SECUNIA", "id": "22330", "trust": 0.8 }, { "db": "SECUNIA", "id": "22130", "trust": 0.8 }, { "db": "SECUNIA", "id": "22240", "trust": 0.8 }, { "db": "SECUNIA", "id": "22259", "trust": 0.8 }, { "db": "SECUNIA", "id": "22260", "trust": 0.8 }, { "db": "SECUNIA", "id": "22165", "trust": 0.8 }, { "db": "SECUNIA", "id": "22166", "trust": 0.8 }, { "db": "SECUNIA", "id": "22172", "trust": 0.8 }, { "db": "SECUNIA", "id": "23280", "trust": 0.8 }, { "db": "SECUNIA", "id": "22284", "trust": 0.8 }, { "db": "SECUNIA", "id": "22186", "trust": 0.8 }, { "db": "SECUNIA", "id": "22193", "trust": 0.8 }, { "db": "SECUNIA", "id": "22094", "trust": 0.8 }, { "db": "BID", "id": "20249", "trust": 0.8 }, { "db": "SECTRACK", "id": "1016943", "trust": 0.8 }, { "db": "XF", "id": "29237", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#547300", "trust": 0.8 }, { "db": "GENTOO", "id": "GLSA-200610-06", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200609-19", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200610-01", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-350-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-354-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-351-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-352-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-361-1", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1192", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1191", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0676", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0675", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2006:0677", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2006:055", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2006:054", "trust": 0.6 }, { "db": "SUNALERT", "id": "102648", "trust": 0.6 }, { "db": "MLIST", "id": "[IETF-OPENPGP] 20060827 BLEICHENBACHER\u0027S RSA SIGNATURE FORGERY BASED ON IMPLEMENTATION ERROR", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA06-312A", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:169", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2006:168", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200609-270", "trust": 0.6 }, { "db": "CERT/CC", "id": "VU#594904", "trust": 0.3 }, { "db": "BID", "id": "19849", "trust": 0.3 }, { "db": "CERT/CC", "id": "VU#554780", "trust": 0.2 }, { "db": "CERT/CC", "id": "VU#933712", "trust": 0.2 }, { "db": "CERT/CC", "id": "VU#596848", "trust": 0.2 }, { "db": "CERT/CC", "id": "VU#381508", "trust": 0.2 }, { "db": "SECUNIA", "id": "21996", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "50178", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50366", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50727", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50269", "trust": 0.1 }, { "db": "USCERT", "id": "TA06-333A", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "52708", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50630", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "50366" }, { "db": "PACKETSTORM", "id": "50727" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "id": "VAR-200110-0354", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.32525984999999996 }, "last_update_date": "2024-06-17T11:30:28.835000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4340" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "trust": 2.4, "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/" }, { "trust": 2.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "trust": 1.9, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-224.htm" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200610-01.xml" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/22083" }, { "trust": 1.6, "url": "http://www.us-cert.gov/cas/techalerts/ta06-312a.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2006-0677.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2006-0676.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21949" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21906" }, { "trust": 1.6, "url": "http://www.us.debian.org/security/2006/dsa-1191" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-361-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-352-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-351-1" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-350-1" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2006-0675.html" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html" }, { "trust": 1.6, "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "trust": 1.6, "url": "http://www.debian.org/security/2006/dsa-1192" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1016860" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1016859" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1016858" }, { "trust": 1.6, "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22422" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22342" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22299" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22274" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22247" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22226" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22210" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22088" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22074" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22055" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22036" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22025" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22001" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21950" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21940" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21939" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21916" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21915" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21903" }, { "trust": 1.3, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "trust": 1.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-250.htm" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22044" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22056" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22066" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22195" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22849" }, { "trust": 1.0, "url": "http://secunia.com/advisories/22992" }, { "trust": 1.0, "url": "http://secunia.com/advisories/23883" }, { "trust": 1.0, "url": "http://secunia.com/advisories/24711" }, { "trust": 1.0, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "trust": 1.0, "url": "http://www.debian.org/security/2006/dsa-1210" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:168" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2006:169" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3617" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3622" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "trust": 1.0, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "trust": 1.0, "url": "https://issues.rpath.com/browse/rpl-640" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11007" }, { "trust": 0.8, "url": "http://www.gzip.org/" }, { "trust": 0.8, "url": "http://www.auscert.org.au/7179" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060905.txt " }, { "trust": 0.8, "url": "http://secunia.com/advisories/21709/" }, { "trust": 0.8, "url": "http://www.rsasecurity.com/rsalabs/node.asp?id=2125" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3447.txt" }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu%23547300/index.html" }, { "trust": 0.8, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-september/049715.html " }, { "trust": 0.8, "url": "https://issues.rpath.com/browse/rpl-613 " }, { "trust": 0.8, "url": "http://www.openssl.org/news/secadv_20060928.txt " }, { "trust": 0.8, "url": "http://kolab.org/security/kolab-vendor-notice-11.txt " }, { "trust": 0.8, "url": "http://openvpn.net/changelog.html " }, { "trust": 0.8, "url": "http://www.serv-u.com/releasenotes/ " }, { "trust": 0.8, "url": "http://openbsd.org/errata.html#openssl2 " }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20249 " }, { "trust": 0.8, "url": "http://securitytracker.com/id?1016943 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22130 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22094 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22165 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22186 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22193 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22207 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22259 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22260 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22166 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22172 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22212 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22240 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22216 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22116 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22220 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22284 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/22330 " }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/29237 " }, { "trust": 0.8, "url": "http://secunia.com/advisories/23280/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23309/" }, { "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1" }, { "trust": 0.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1\u0026searchclause=" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3899" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3622" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3617" }, { "trust": 0.6, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:169" }, { "trust": 0.6, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:168" }, { "trust": 0.3, "url": "http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580" }, { "trust": 0.3, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=3117" }, { "trust": 0.3, "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-188.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-196.htm" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-246.htm" }, { "trust": 0.3, "url": "http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php" }, { "trust": 0.3, "url": "http://marc.theaimsgroup.com/?l=bind-announce\u0026m=116253119512445\u0026w=2" }, { "trust": 0.3, "url": "http://www.bluecoat.com" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html" }, { "trust": 0.3, "url": "http://www.cdc.informatik.tu-darmstadt.de/securebrowser/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=31\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2137.html" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote-451.php" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0735.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0661.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0675.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0676.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0677.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0733.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2006-0734.html" }, { "trust": 0.3, "url": "http://www.openssl.org/news/secadv_20060905.txt" }, { "trust": 0.3, "url": "http://www.ssh.com/company/news/2006/english/security/article/786/" }, { "trust": 0.3, "url": "http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf" }, { "trust": 0.3, "url": "http://www1.vandyke.com/support/advisory/2007/01/845620.html" }, { "trust": 0.3, "url": "http://www.openoffice.org/security/cves/cve-2006-4339.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html" }, { "trust": 0.3, "url": "http://www.slackware.com/security/list.php?l=slackware-security\u0026y=2006" }, { "trust": 0.3, "url": "http://www.cyberguard.info/snapgear/releases.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/845620" }, { "trust": 0.3, "url": "/archive/1/446038" }, { "trust": 0.3, "url": "http://docs.info.apple.com/article.html?artnum=307177" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2007-091.htm" }, { "trust": 0.3, "url": "https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475\u0026docid=c00774579" }, { "trust": 0.3, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0062.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2007-0072.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0264.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0525.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0629.html" }, { "trust": 0.3, "url": "https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1\u0026searchclause=" }, { "trust": 0.3, "url": "http://www.sybase.com/detail?id=1047991" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/594904" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4340" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4565" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4566" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4571" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4253" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4567" }, { "trust": 0.2, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-64.html" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/" }, { "trust": 0.2, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-57.html" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4570" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.2, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-59.html" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.2, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-58.html" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/554780" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/381508" }, { "trust": 0.1, "url": "http://secunia.com/quality_assurance_analyst/" }, { "trust": 0.1, "url": "http://secunia.com/product/4220/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/773548" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/933712" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/596848" }, { "trust": 0.1, "url": "http://secunia.com/advisories/21996/" }, { "trust": 0.1, "url": "http://secunia.com/web_application_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-63.html" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mipsel.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4571" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_powerpc.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_powerpc.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4566" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_amd64.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-2788" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_sparc.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4340" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_alpha.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4565" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_sparc.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4568" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mips.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-4570" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_m68k.deb" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-61.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4569" }, { "trust": 0.1, "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-62.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4568" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/845620\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/773548\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/933712\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta06-333a.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/596848\u003e" }, { "trust": 0.1, "url": "http://www.openssl.org/news/vulnerabilities.html\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=304829\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/reading_room/securing_browser/#safari\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=apple-2006-007\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/381508\u003e" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=openssl_secadv_20060928\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=106704\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/554780\u003e" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "50366" }, { "db": "PACKETSTORM", "id": "50727" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#773548" }, { "db": "CERT/CC", "id": "VU#845620" }, { "db": "CERT/CC", "id": "VU#547300" }, { "db": "BID", "id": "19849" }, { "db": "PACKETSTORM", "id": "50178" }, { "db": "PACKETSTORM", "id": "50366" }, { "db": "PACKETSTORM", "id": "50727" }, { "db": "PACKETSTORM", "id": "50269" }, { "db": "PACKETSTORM", "id": "52708" }, { "db": "PACKETSTORM", "id": "50630" }, { "db": "CNNVD", "id": "CNNVD-200609-270" }, { "db": "NVD", "id": "CVE-2006-4340" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-19T00:00:00", "db": "CERT/CC", "id": "VU#773548" }, { "date": "2006-09-11T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2006-09-28T00:00:00", "db": "CERT/CC", "id": "VU#547300" }, { "date": "2006-09-05T00:00:00", "db": "BID", "id": "19849" }, { "date": "2006-09-21T23:56:25", "db": "PACKETSTORM", "id": "50178" }, { "date": "2006-10-02T23:40:01", "db": "PACKETSTORM", "id": "50366" }, { "date": "2006-10-09T03:08:57", "db": "PACKETSTORM", "id": "50727" }, { "date": "2006-09-26T19:59:02", "db": "PACKETSTORM", "id": "50269" }, { "date": "2006-12-06T02:47:36", "db": "PACKETSTORM", "id": "52708" }, { "date": "2006-10-04T22:41:23", "db": "PACKETSTORM", "id": "50630" }, { "date": "2001-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-270" }, { "date": "2006-09-15T18:07:00", "db": "NVD", "id": "CVE-2006-4340" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#773548" }, { "date": "2007-02-08T00:00:00", "db": "CERT/CC", "id": "VU#845620" }, { "date": "2011-07-22T00:00:00", "db": "CERT/CC", "id": "VU#547300" }, { "date": "2015-03-19T08:19:00", "db": "BID", "id": "19849" }, { "date": "2006-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-270" }, { "date": "2023-11-07T01:59:16.680000", "db": "NVD", "id": "CVE-2006-4340" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "52708" }, { "db": "CNNVD", "id": "CNNVD-200609-270" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "gzip contains a .bss buffer overflow in its LZH handling", "sources": [ { "db": "CERT/CC", "id": "VU#773548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-270" } ], "trust": 0.6 } }
ghsa-q7vf-rjwh-chxv
Vulnerability from github
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.
{ "affected": [], "aliases": [ "CVE-2006-4340" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-09-15T18:07:00Z", "severity": "MODERATE" }, "details": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.", "id": "GHSA-q7vf-rjwh-chxv", "modified": "2022-05-03T03:16:25Z", "published": "2022-05-03T03:16:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4340" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-640" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007" }, { "type": "WEB", "url": "http://secunia.com/advisories/21903" }, { "type": "WEB", "url": "http://secunia.com/advisories/21906" }, { "type": "WEB", "url": "http://secunia.com/advisories/21915" }, { "type": "WEB", "url": "http://secunia.com/advisories/21916" }, { "type": "WEB", "url": "http://secunia.com/advisories/21939" }, { "type": "WEB", "url": "http://secunia.com/advisories/21940" }, { "type": "WEB", "url": "http://secunia.com/advisories/21949" }, { "type": "WEB", "url": "http://secunia.com/advisories/21950" }, { "type": "WEB", "url": "http://secunia.com/advisories/22001" }, { "type": "WEB", "url": "http://secunia.com/advisories/22025" }, { "type": "WEB", "url": "http://secunia.com/advisories/22036" }, { "type": "WEB", "url": "http://secunia.com/advisories/22044" }, { "type": "WEB", "url": "http://secunia.com/advisories/22055" }, { "type": "WEB", "url": "http://secunia.com/advisories/22056" }, { "type": "WEB", "url": "http://secunia.com/advisories/22066" }, { "type": "WEB", "url": "http://secunia.com/advisories/22074" }, { "type": "WEB", "url": "http://secunia.com/advisories/22088" }, { "type": "WEB", "url": "http://secunia.com/advisories/22195" }, { "type": "WEB", "url": "http://secunia.com/advisories/22210" }, { "type": "WEB", "url": "http://secunia.com/advisories/22226" }, { "type": "WEB", "url": "http://secunia.com/advisories/22247" }, { "type": "WEB", "url": "http://secunia.com/advisories/22274" }, { "type": "WEB", "url": "http://secunia.com/advisories/22299" }, { "type": "WEB", "url": "http://secunia.com/advisories/22342" }, { "type": "WEB", "url": "http://secunia.com/advisories/22422" }, { "type": "WEB", "url": "http://secunia.com/advisories/22446" }, { "type": "WEB", "url": "http://secunia.com/advisories/22849" }, { "type": "WEB", "url": "http://secunia.com/advisories/22992" }, { "type": "WEB", "url": "http://secunia.com/advisories/23883" }, { "type": "WEB", "url": "http://secunia.com/advisories/24711" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200610-01.xml" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016858" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016859" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016860" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1192" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1210" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml" }, { "type": "WEB", "url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169" }, { "type": "WEB", "url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0675.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0676.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0677.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-350-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-351-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-352-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-354-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-361-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html" }, { "type": "WEB", "url": "http://www.us.debian.org/security/2006/dsa-1191" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3617" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3622" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3748" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3899" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0293" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/1198" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0083" }, { "type": "WEB", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.