seamonkey-dom-inspector-2.0.14-0.2.1 > t
D H ` p M?/= U M6mM@ nc^b7nKA#ܐ I]̄WRYBq)`Q Kc'JUzi f *fJSV|GB)sDc$'k^-_SR._P(,fgi%dR{D;K7?տҌRb4pЅ6qgUhD=
ou%˲ g~Z!Bj"
W)njf8fac32a0112c019c19266e69090fc891af93f5d S M?/=_3V;};y/(#WČa yRהUt>J j.NjEqCCT{<)k5O~~^<"ɶрG"XܱeVSZF풙m9@!hF09@| MbAg6WB5s{m[y4$&,Da'.H);zyP=YB湔j8OmpqD<2_ȇ]D'QN]Z > 5 T? ? T/ d ! ' C : S p
0 t e
x f ( 8 @ 9 @ :
@ F NT G Nh H N I N X O Y O \ O( ] Ol ^ PE b S c S d T e T f T
l T z T C seamonkey-dom-inspector 2.0.14 0.2.1 The SeaMonkey DOM Inspector This is a tool that allows you to inspect the DOM for web pages in
SeaMonkey. This is of great use to people who are doing SeaMonkey
chrome development or web page development. M8build20 openSUSE 11.2 openSUSE MPLv1.1 or GPLv2+ or LGPLv2.1+ http://bugs.opensuse.org Development/Tools/Navigators http://www.mozilla.org/projects/seamonkey linux i586
n AA큤A큤AA큤AAAAA큤 M>M>M>M>M>M>M>M>M>M>M>M>M>M>M>M>M> 44ae63a91cee67a3ea4dd9fef0a73136 81dc377a06ff0039f565c77739fc7a18 a726886ec456d5493b3f0a1227d1a04d a505580f12e6ebbd7796d7038d795ca9 02f5acedf7aca07ad85e89400777d7a1 b3051b3f69a32134dc14db589d17c643 755cbca139a6bb171d3e22e093fd8fe3 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root seamonkey-2.0.14-0.2.1.src.rpm seamonkey-dom-inspector seamonkey-dom-inspector(x86-32)
rpmlib(VersionedDependencies) seamonkey rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 3.0.3-1 2.0.14 4.0-1 3.0.4-1 4.4.6-1 4.7.1 MmM@MM=iM*LOL@L@L@LvW@L@IK K@KK{@KTM@KC)K JTJ@J0@J:Jn@JeJUJ8I@I3IHIFFI!\IsH@H@H@H-w@GGu@GG8GC@G9G@F&@FF@FFFFzh@FyFw@Fg@F8}@E%E\RE[@EK/@E:E@DDDMDȪpcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org vuntz@opensuse.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org @rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org hfiguiere@suse.de wr@rosenauer.org maw@suse.de wr@rosenauer.org maw@suse.de wr@rosenauer.org mauro@suse.de schwab@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de cthiel@suse.de maw@suse.de maw@suse.de maw@suse.de aj@suse.de maw@suse.de adrian@suse.de maw@suse.de maw@suse.de sbrabec@suse.cz stbinner@suse.de mkoenig@suse.de mkoenig@suse.de sbrabec@suse.cz sbrabec@suse.cz aj@suse.de stark@suse.de stark@suse.de aj@suse.de stark@suse.de stark@suse.de - fixed hunspell patch - security update to version 2.0.14 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - security update to version 2.0.13 (bnc#680771)
* MFSA 2011-11 (bmo#642395)
Update HTTPS certificate blacklist - security update to version 2.0.12 (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - add x-scheme-handlers to desktop files as needed by newer Gnome
environment - security update to version 2.0.11 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to version 2.0.10 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion - security update to version 2.0.9 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753, bnc#642502)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
* removed upstreamed mozilla-helper-app.patch
- require mozilla-nss >= 3.12.8 - update to 2.0.8
* fixing startup topcrash (bmo#594699)
* add "face" to the list of white-listed attributes (bmo#592601)
- added Cairo LCD filter patch to enable subpixel hinting where
supported (bnc#638186) (mozilla-cairo-lcd.patch) - security upate to 2.0.7 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-60/CVE-2010-2763 (bmo#585284)
XSS using SJOW scripted function
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using