seamonkey-irc-2.16-1.1.1>t 4 DpQ$/=„ߨzxؾQZk8x_W2CR6b~3L'G1᳠K>J%-] l}p?P,r(yvȁm4Xp?b׬q:hp!'+@Hx!>0RdyV>3id:gTvǫMuR/GX?*8S+R}_, FW0la8K֕$;8F'PHa-DI3z]x ' c,z@͇'sUը vvdsAՇ.}r6bbycn@F/G(,[&pLώBm\Ntx>"6cb60c7e60ae5224e6599c39350ac3faf3eb98fe6d>5?d  -X\dhv     ! $(-2PTx(8>9>:>FG4H8I<X@YH\`]d^bc0deflzCseamonkey-irc2.161.1.1IRC for SeaMonkeyAn IRC Client (Chatzilla) for SeaMonkey.Q$ build14openSUSE 12.3openSUSEMPL-2.0http://bugs.opensuse.orgProductivity/Networking/IRChttp://www.mozilla.org/projects/seamonkeylinuxx86_64Q$dd09ba6fddc53a2bd2570c4d0211767drootrootseamonkey-2.16-1.1.1.src.rpmseamonkey-ircseamonkey-irc(x86-64)    seamonkeyrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)2.164.0-13.0.4-14.4.6-14.10.2Q"QP@PP @PZPpPPx@Pr@PM@P;a@P%P@O#Ọ@O~O@OD@O@O_6O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- update to Seamonkey 2.6.1 * (strongparent) parentNode of element gets lost (bmo#335998)- update to 2.6 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling