seamonkey-irc-2.13.2-41.1>t  DH`pP=/=„]iÑ;pm*t;L2]9,TeWXNo,d<î9Jt19҄*Aۨʇ$PS?MrSujqˡo&. \k#c0)I_oߘίhU;\6zrw'@gQK6=_v[*i:/< @ZA=%OGK]{Wv7 û#]nZsus#f5986692a8df0b55b07f4369918e9b562407b9aa,P=/=„&Hc<_c0_MŲsaO =@pt oBC?.H{nOS_2:[SE$'.J'Џ)F[u `@, yTD=G0߫D'"'qqz.yC%!MH|rziɹQF<L:,y֖~h =k!fSdn7rߟOԞ+(~ySn'{Xd[󄟃rn#bDZ7WfA+Go4U҅>5l?l{d  .X\dhv     ! $(-2PTx(*8079 7:7FjGjHjIjXjYj\j]j^kbk?ckdlOelTflYll[zlkCseamonkey-irc2.13.241.1IRC for SeaMonkeyAn IRC Client (Chatzilla) for SeaMonkey.P) build13openSUSE 11.4openSUSEMPL-2.0http://bugs.opensuse.orgProductivity/Networking/IRChttp://www.mozilla.org/projects/seamonkeylinuxi586ᗁP&d7def9e1f284950f1adeee8418b8fff3rootrootseamonkey-2.13.2-41.1.src.rpmseamonkey-ircseamonkey-irc(x86-32)    rpmlib(VersionedDependencies)seamonkeyrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-12.13.24.0-13.0.4-14.4.6-14.8.0PPx@Pr@PM@P;a@P%P@O#Ọ@O~O@OD@O@O_6O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- update to Seamonkey 2.6.1 * (strongparent) parentNode of element gets lost (bmo#335998)- update to 2.6 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling