diff --git a/accessible/tests/browser/events/browser.ini b/accessible/tests/browser/events/browser.ini index a313958766ae..157ed76252c0 100644 --- a/accessible/tests/browser/events/browser.ini +++ b/accessible/tests/browser/events/browser.ini @@ -12,3 +12,4 @@ skip-if = e10s [browser_test_focus_browserui.js] [browser_test_focus_dialog.js] [browser_test_focus_urlbar.js] +skip-if = true # Skipping temporarily, tracked in bug 1522440. diff --git a/browser/app/blocklist.xml b/browser/app/blocklist.xml index aa90438d288f..e1bca03c83e3 100644 --- a/browser/app/blocklist.xml +++ b/browser/app/blocklist.xml @@ -1,5 +1,5 @@ - + @@ -2860,6 +2860,26 @@ + + + + + + + + + + + + + + + + + + + + diff --git a/browser/app/profile/firefox.js b/browser/app/profile/firefox.js index 8ac9c1718382..4e7c955df2be 100644 --- a/browser/app/profile/firefox.js +++ b/browser/app/profile/firefox.js @@ -336,8 +336,13 @@ pref("browser.urlbar.openintab", false); pref("browser.urlbar.usepreloadedtopurls.enabled", false); pref("browser.urlbar.usepreloadedtopurls.expire_days", 14); -// Toggle the new work in progress Address Bar code. +// Toggle the new work in progress Address Bar code. Enable it on Nightly and Beta, +// not on Release yet. +#ifdef EARLY_BETA_OR_EARLIER +pref("browser.urlbar.quantumbar", true); +#else pref("browser.urlbar.quantumbar", false); +#endif pref("browser.altClickSave", false); diff --git a/browser/components/customizableui/PanelMultiView.jsm b/browser/components/customizableui/PanelMultiView.jsm index 116d56b9b9d7..bb9292eb1159 100644 --- a/browser/components/customizableui/PanelMultiView.jsm +++ b/browser/components/customizableui/PanelMultiView.jsm @@ -1411,7 +1411,9 @@ var PanelView = class extends AssociatedToNode { _isNavigableWithTabOnly(element) { let tag = element.localName; return tag == "menulist" || tag == "textbox" || tag == "input" - || tag == "textarea"; + || tag == "textarea" + // Allow tab to reach embedded documents in extension panels. + || tag == "browser"; } /** @@ -1565,6 +1567,24 @@ var PanelView = class extends AssociatedToNode { return; } + let focus = this.document.activeElement; + // Make sure the focus is actually inside the panel. (It might not be if + // the panel was opened with the mouse.) If it isn't, we don't care + // about it for our purposes. + // We use Node.compareDocumentPosition because Node.contains doesn't + // behave as expected for anonymous content; e.g. the input inside a + // textbox. + if (focus && !(this.node.compareDocumentPosition(focus) + & Node.DOCUMENT_POSITION_CONTAINED_BY)) { + focus = null; + } + + // Extension panels contain embedded documents. We can't manage + // keyboard navigation within those. + if (focus && focus.tagName == "browser") { + return; + } + let stop = () => { event.stopPropagation(); event.preventDefault(); @@ -1578,20 +1598,7 @@ var PanelView = class extends AssociatedToNode { // We use the real focus rather than this.selectedElement because focus // might have been moved without keyboard navigation (e.g. mouse click) // and this.selectedElement is only updated for keyboard navigation. - let focus = this.document.activeElement; - if (!focus) { - return false; - } - // Make sure the focus is actually inside the panel. - // (It might not be if the panel was opened with the mouse.) - // We use Node.compareDocumentPosition because Node.contains doesn't - // behave as expected for anonymous content; e.g. the input inside a - // textbox. - if (!(this.node.compareDocumentPosition(focus) - & Node.DOCUMENT_POSITION_CONTAINED_BY)) { - return false; - } - return this._isNavigableWithTabOnly(focus); + return focus && this._isNavigableWithTabOnly(focus); }; let keyCode = event.code; @@ -1657,12 +1664,17 @@ var PanelView = class extends AssociatedToNode { this._doingKeyboardActivation = true; // Unfortunately, 'tabindex' doesn't execute the default action, so // we explicitly do this here. - // We are sending a command event and then a click event. - // This is done in order to mimic a "real" mouse click event. - // The command event executes the action, then the click event closes the menu. + // We are sending a command event, a mousedown event and then a click + // event. This is done in order to mimic a "real" mouse click event. + // Normally, the command event executes the action, then the click event + // closes the menu. However, in some cases (e.g. the Library button), + // there is no command event handler and the mousedown event executes the + // action instead. button.doCommand(); - let clickEvent = new event.target.ownerGlobal.MouseEvent("click", {"bubbles": true}); - button.dispatchEvent(clickEvent); + let dispEvent = new event.target.ownerGlobal.MouseEvent("mousedown", {"bubbles": true}); + button.dispatchEvent(dispEvent); + dispEvent = new event.target.ownerGlobal.MouseEvent("click", {"bubbles": true}); + button.dispatchEvent(dispEvent); this._doingKeyboardActivation = false; break; } diff --git a/browser/components/customizableui/test/browser_PanelMultiView_keyboard.js b/browser/components/customizableui/test/browser_PanelMultiView_keyboard.js index 26d8d6fccc22..0bf3bc09df69 100644 --- a/browser/components/customizableui/test/browser_PanelMultiView_keyboard.js +++ b/browser/components/customizableui/test/browser_PanelMultiView_keyboard.js @@ -23,6 +23,8 @@ let gMainArrowOrder; let gSubView; let gSubButton; let gSubTextarea; +let gDocView; +let gDocBrowser; async function openPopup() { let shown = BrowserTestUtils.waitForEvent(gMainView, "ViewShown"); @@ -36,9 +38,10 @@ async function hidePopup() { await hidden; } -async function showSubView() { - let shown = BrowserTestUtils.waitForEvent(gSubView, "ViewShown"); - gPanelMultiView.showSubView(gSubView); +async function showSubView(view = gSubView) { + let shown = BrowserTestUtils.waitForEvent(view, "ViewShown"); + // We must show with an anchor so the Back button is generated. + gPanelMultiView.showSubView(view, gMainButton1); await shown; } @@ -74,6 +77,8 @@ add_task(async function setup() { gMainButton1 = document.createXULElement("button"); gMainButton1.id = "gMainButton1"; gMainView.appendChild(gMainButton1); + // We use this for anchoring subviews, so it must have a label. + gMainButton1.setAttribute("label", "gMainButton1"); gMainMenulist = document.createXULElement("menulist"); gMainMenulist.id = "gMainMenulist"; gMainView.appendChild(gMainMenulist); @@ -111,6 +116,18 @@ add_task(async function setup() { gSubView.appendChild(gSubTextarea); gSubTextarea.value = "value"; + gDocView = document.createXULElement("panelview"); + gDocView.id = "testDocView"; + gPanelMultiView.appendChild(gDocView); + gDocBrowser = document.createXULElement("browser"); + gDocBrowser.id = "gDocBrowser"; + gDocBrowser.setAttribute("type", "content"); + gDocBrowser.setAttribute("src", + 'data:text/html,'); + gDocBrowser.setAttribute("width", 100); + gDocBrowser.setAttribute("height", 100); + gDocView.appendChild(gDocBrowser); + registerCleanupFunction(() => { gAnchor.remove(); gPanel.remove(); @@ -270,3 +287,49 @@ add_task(async function testActivation() { checkActivated(gMainButton1, () => EventUtils.synthesizeKey("KEY_Enter", {code: "NumpadEnter"}), "pressing numpad enter"); await hidePopup(); }); + +// Test that keyboard activation works for buttons responding to mousedown +// events (instead of command or click). The Library button does this, for +// example. +add_task(async function testActivationMousedown() { + await openPopup(); + await expectFocusAfterKey("ArrowDown", gMainButton1); + let activated = false; + gMainButton1.onmousedown = function() { activated = true; }; + EventUtils.synthesizeKey(" "); + ok(activated, "mousedown activated after space"); + gMainButton1.onmousedown = null; + await hidePopup(); +}); + +// Test that tab and the arrow keys aren't overridden in embedded documents. +add_task(async function testTabArrowsBrowser() { + await openPopup(); + await showSubView(gDocView); + let backButton = gDocView.querySelector(".subviewbutton-back"); + backButton.id = "docBack"; + await expectFocusAfterKey("Tab", backButton); + let doc = gDocBrowser.contentDocument; + // Documents don't have an id property, but expectFocusAfterKey wants one. + doc.id = "doc"; + await expectFocusAfterKey("Tab", doc); + // Make sure tab/arrows aren't overridden within the embedded document. + let textarea = doc.getElementById("docTextarea"); + // Tab should really focus the textarea, but default tab handling seems to + // skip everything inside the browser element when run in this test. This + // behaves as expected in real panels, though. Force focus to the textarea + // and then test from there. + textarea.focus(); + is(doc.activeElement, textarea, "textarea focused"); + is(textarea.selectionStart, 0, "selectionStart initially 0"); + EventUtils.synthesizeKey("KEY_ArrowRight"); + is(textarea.selectionStart, 1, "selectionStart 1 after ArrowRight"); + EventUtils.synthesizeKey("KEY_ArrowLeft"); + is(textarea.selectionStart, 0, "selectionStart 0 after ArrowLeft"); + is(doc.activeElement, textarea, "textarea still focused"); + let docButton = doc.getElementById("docButton"); + expectFocusAfterKey("Tab", docButton); + // Make sure tab leaves the document and reaches the Back button. + expectFocusAfterKey("Tab", backButton); + await hidePopup(); +}); diff --git a/devtools/client/aboutdebugging-new/src/components/CompatibilityWarning.js b/devtools/client/aboutdebugging-new/src/components/CompatibilityWarning.js index 06a6b2f85e7b..5c43d283f420 100644 --- a/devtools/client/aboutdebugging-new/src/components/CompatibilityWarning.js +++ b/devtools/client/aboutdebugging-new/src/components/CompatibilityWarning.js @@ -37,15 +37,15 @@ class CompatibilityWarning extends PureComponent { let localizationId, statusClassName; switch (status) { case COMPATIBILITY_STATUS.TOO_OLD: - statusClassName = "js-compatibility-warning-too-old"; + statusClassName = "qa-compatibility-warning-too-old"; localizationId = "about-debugging-browser-version-too-old"; break; case COMPATIBILITY_STATUS.TOO_RECENT: - statusClassName = "js-compatibility-warning-too-recent"; + statusClassName = "qa-compatibility-warning-too-recent"; localizationId = "about-debugging-browser-version-too-recent"; break; case COMPATIBILITY_STATUS.TOO_OLD_67_DEBUGGER: - statusClassName = "js-compatibility-warning-too-old-67-debugger"; + statusClassName = "qa-compatibility-warning-too-old-67-debugger"; localizationId = "about-debugging-browser-version-too-old-67-debugger"; break; } @@ -70,7 +70,7 @@ class CompatibilityWarning extends PureComponent { }, dom.p( { - className: `js-compatibility-warning ${statusClassName}`, + className: `qa-compatibility-warning ${statusClassName}`, }, localizationId, ), diff --git a/devtools/client/aboutdebugging-new/src/components/ConnectionPromptSetting.js b/devtools/client/aboutdebugging-new/src/components/ConnectionPromptSetting.js index fadd9b6d62b7..650ebeea7d54 100644 --- a/devtools/client/aboutdebugging-new/src/components/ConnectionPromptSetting.js +++ b/devtools/client/aboutdebugging-new/src/components/ConnectionPromptSetting.js @@ -40,7 +40,7 @@ class ConnectionPromptSetting extends PureComponent { }, dom.button( { - className: `${ className } default-button js-connection-prompt-toggle-button`, + className: `${ className } default-button qa-connection-prompt-toggle-button`, onClick: () => this.onToggleClick(), }, localizedState diff --git a/devtools/client/aboutdebugging-new/src/components/ExtensionDebugSetting.js b/devtools/client/aboutdebugging-new/src/components/ExtensionDebugSetting.js index 0b9461a735a6..2dfd307bc7f8 100644 --- a/devtools/client/aboutdebugging-new/src/components/ExtensionDebugSetting.js +++ b/devtools/client/aboutdebugging-new/src/components/ExtensionDebugSetting.js @@ -37,7 +37,7 @@ class ExtensionDebugSetting extends PureComponent { { type: "checkbox", id: "extension-debug-setting-input", - className: "default-checkbox js-extension-debug-checkbox", + className: "default-checkbox qa-extension-debug-checkbox", checked: extensionDebugEnabled, onChange: () => this.onToggle(), } diff --git a/devtools/client/aboutdebugging-new/src/components/ProfilerDialog.js b/devtools/client/aboutdebugging-new/src/components/ProfilerDialog.js index b86be79cbbfa..f994eb7bc5f0 100644 --- a/devtools/client/aboutdebugging-new/src/components/ProfilerDialog.js +++ b/devtools/client/aboutdebugging-new/src/components/ProfilerDialog.js @@ -34,12 +34,12 @@ class ProfilerDialog extends PureComponent { return dom.div( { - className: "profiler-dialog__mask js-profiler-dialog-mask", + className: "profiler-dialog__mask qa-profiler-dialog-mask", onClick: () => this.hide(), }, dom.article( { - className: "profiler-dialog__inner js-profiler-dialog", + className: "profiler-dialog__inner qa-profiler-dialog", onClick: e => e.stopPropagation(), }, dom.header( @@ -59,7 +59,7 @@ class ProfilerDialog extends PureComponent { ), dom.button( { - className: "ghost-button js-profiler-dialog-close", + className: "ghost-button qa-profiler-dialog-close", onClick: () => this.hide(), }, dom.img( diff --git a/devtools/client/aboutdebugging-new/src/components/RuntimeActions.js b/devtools/client/aboutdebugging-new/src/components/RuntimeActions.js index 0755e113e28b..88381340c656 100644 --- a/devtools/client/aboutdebugging-new/src/components/RuntimeActions.js +++ b/devtools/client/aboutdebugging-new/src/components/RuntimeActions.js @@ -66,7 +66,7 @@ class RuntimeActions extends PureComponent { }, dom.button( { - className: "default-button js-profile-runtime-button", + className: "default-button qa-profile-runtime-button", onClick: () => this.onProfilerButtonClick(), }, "about-debugging-runtime-profile-button2" diff --git a/devtools/client/aboutdebugging-new/src/components/RuntimeInfo.js b/devtools/client/aboutdebugging-new/src/components/RuntimeInfo.js index 710468cb7a89..bb3978818a1e 100644 --- a/devtools/client/aboutdebugging-new/src/components/RuntimeInfo.js +++ b/devtools/client/aboutdebugging-new/src/components/RuntimeInfo.js @@ -49,7 +49,7 @@ class RuntimeInfo extends PureComponent { }, dom.label( { - className: "js-runtime-name runtime-info__title", + className: "qa-runtime-name runtime-info__title", }, `${ name } (${ version })` ) diff --git a/devtools/client/aboutdebugging-new/src/components/RuntimePage.js b/devtools/client/aboutdebugging-new/src/components/RuntimePage.js index 1d1f3f30372d..ca8fb7f209b2 100644 --- a/devtools/client/aboutdebugging-new/src/components/RuntimePage.js +++ b/devtools/client/aboutdebugging-new/src/components/RuntimePage.js @@ -147,7 +147,7 @@ class RuntimePage extends PureComponent { return dom.article( { - className: "page js-runtime-page", + className: "page qa-runtime-page", }, RuntimeInfo({ ...runtimeDetails.info, runtimeId, dispatch }), RuntimeActions({ dispatch, runtimeId, runtimeDetails }), diff --git a/devtools/client/aboutdebugging-new/src/components/ServiceWorkersWarning.js b/devtools/client/aboutdebugging-new/src/components/ServiceWorkersWarning.js index ca69b232a4ed..212ec9f2403e 100644 --- a/devtools/client/aboutdebugging-new/src/components/ServiceWorkersWarning.js +++ b/devtools/client/aboutdebugging-new/src/components/ServiceWorkersWarning.js @@ -32,7 +32,7 @@ class ServiceWorkersWarning extends PureComponent { }, dom.p( { - className: "js-service-workers-warning", + className: "qa-service-workers-warning", }, "about-debugging-runtime-service-workers-not-compatible", ), diff --git a/devtools/client/aboutdebugging-new/src/components/connect/ConnectPage.js b/devtools/client/aboutdebugging-new/src/components/connect/ConnectPage.js index afbd24c6e672..f7ea30b534f4 100644 --- a/devtools/client/aboutdebugging-new/src/components/connect/ConnectPage.js +++ b/devtools/client/aboutdebugging-new/src/components/connect/ConnectPage.js @@ -108,7 +108,7 @@ class ConnectPage extends PureComponent { { className: "default-button connect-page__usb-section__heading__toggle " + - "js-connect-usb-toggle-button", + "qa-connect-usb-toggle-button", disabled, onClick: () => this.onToggleUSBClick(), }, @@ -166,7 +166,7 @@ class ConnectPage extends PureComponent { }, dom.aside( { - className: "js-connect-usb-disabled-message", + className: "qa-connect-usb-disabled-message", }, "Enabling this will download and add the required Android USB debugging " + "components to Firefox." @@ -199,7 +199,7 @@ class ConnectPage extends PureComponent { render() { return dom.article( { - className: "page connect-page js-connect-page", + className: "page connect-page qa-connect-page", }, Localized( { diff --git a/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsForm.js b/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsForm.js index 945e69c9218c..e16a233d42c9 100644 --- a/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsForm.js +++ b/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsForm.js @@ -108,7 +108,7 @@ class NetworkLocationsForm extends PureComponent { ), dom.input({ id: "about-debugging-network-locations-host-input", - className: "default-input js-network-form-input", + className: "default-input qa-network-form-input", placeholder: "localhost:6080", type: "text", value: this.state.value, @@ -123,7 +123,7 @@ class NetworkLocationsForm extends PureComponent { }, dom.button( { - className: "primary-button js-network-form-submit-button", + className: "primary-button qa-network-form-submit-button", }, "Add" ) diff --git a/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsList.js b/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsList.js index 89004b2872c1..2197548aa50a 100644 --- a/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsList.js +++ b/devtools/client/aboutdebugging-new/src/components/connect/NetworkLocationsList.js @@ -28,12 +28,12 @@ class NetworkLocationsList extends PureComponent { this.props.networkLocations.map(location => dom.li( { - className: "network-location js-network-location", + className: "network-location qa-network-location", key: location, }, dom.span( { - className: "ellipsis-text js-network-location-value", + className: "ellipsis-text qa-network-location-value", }, location ), @@ -43,7 +43,7 @@ class NetworkLocationsList extends PureComponent { }, dom.button( { - className: "default-button js-network-location-remove-button", + className: "default-button qa-network-location-remove-button", onClick: () => { this.props.dispatch(Actions.removeNetworkLocation(location)); }, diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetItem.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetItem.js index 99cf4b83ac11..bfbdb3369062 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetItem.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetItem.js @@ -56,7 +56,7 @@ class DebugTargetItem extends PureComponent { renderIcon() { return dom.img({ - className: "debug-target-item__icon js-debug-target-item-icon", + className: "debug-target-item__icon qa-debug-target-item-icon", src: this.props.target.icon, }); } @@ -74,7 +74,7 @@ class DebugTargetItem extends PureComponent { render() { return dom.li( { - className: "card debug-target-item js-debug-target-item", + className: "card debug-target-item qa-debug-target-item", }, this.renderIcon(), this.renderName(), diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetList.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetList.js index 4dddece62ec8..8d8396212477 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetList.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetList.js @@ -37,7 +37,7 @@ class DebugTargetList extends PureComponent { }, dom.p( { - className: "js-debug-target-list-empty", + className: "qa-debug-target-list-empty", }, "Nothing yet." ) @@ -57,7 +57,7 @@ class DebugTargetList extends PureComponent { ? this.renderEmptyList() : dom.ul( { - className: "debug-target-list js-debug-target-list", + className: "debug-target-list qa-debug-target-list", }, targets.map((target, key) => DebugTargetItem({ diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetPane.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetPane.js index e6f1ed48028b..5c5a4ce605d5 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetPane.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/DebugTargetPane.js @@ -88,12 +88,12 @@ class DebugTargetPane extends PureComponent { return dom.section( { - className: "js-debug-target-pane", + className: "qa-debug-target-pane", }, dom.a( { className: "undecorated-link debug-target-pane__title " + - "js-debug-target-pane-title", + "qa-debug-target-pane-title", title, onClick: e => this.toggleCollapsibility(), }, @@ -117,7 +117,7 @@ class DebugTargetPane extends PureComponent { ), dom.div( { - className: "debug-target-pane__collapsable js-debug-target-pane__collapsable" + + className: "debug-target-pane__collapsable qa-debug-target-pane__collapsable" + (isCollapsed ? " debug-target-pane__collapsable--collapsed" : ""), ref: this.collapsableRef, }, diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/ExtensionDetail.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/ExtensionDetail.js index b0b7d1f9344d..d4ac82f49024 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/ExtensionDetail.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/ExtensionDetail.js @@ -124,7 +124,7 @@ class ExtensionDetail extends PureComponent { const link = dom.a( { - className: "js-manifest-url", + className: "qa-manifest-url", href: manifestURL, target: "_blank", }, diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/InspectAction.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/InspectAction.js index dc7b92fc566b..79388fdc6a6e 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/InspectAction.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/InspectAction.js @@ -41,7 +41,7 @@ class InspectAction extends PureComponent { dom.button( { onClick: e => this.inspect(), - className: "default-button js-debug-target-inspect-button", + className: "default-button qa-debug-target-inspect-button", disabled, }, "Inspect" diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAction.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAction.js index cec05af75e21..51695ca6d609 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAction.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAction.js @@ -74,7 +74,7 @@ class ServiceWorkerAction extends PureComponent { dom.span( { className: - `service-worker-action__status js-worker-status ${ statusClassName }`, + `service-worker-action__status qa-worker-status ${ statusClassName }`, }, status ) diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAdditionalActions.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAdditionalActions.js index 6cd2bae6f628..2ec2e8ac6f3c 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAdditionalActions.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/ServiceWorkerAdditionalActions.js @@ -67,7 +67,7 @@ class ServiceWorkerAdditionalActions extends PureComponent { _renderPushButton() { return this._renderButton({ - className: "default-button default-button--micro js-push-button", + className: "default-button default-button--micro qa-push-button", disabled: this.props.runtimeDetails.isMultiE10s, key: "service-worker-push-button", labelId: "about-debugging-worker-action-push", @@ -77,7 +77,7 @@ class ServiceWorkerAdditionalActions extends PureComponent { _renderStartButton() { return this._renderButton({ - className: "default-button default-button--micro js-start-button", + className: "default-button default-button--micro qa-start-button", disabled: this.props.runtimeDetails.isMultiE10s, key: "service-worker-start-button", labelId: "about-debugging-worker-action-start", @@ -87,7 +87,7 @@ class ServiceWorkerAdditionalActions extends PureComponent { _renderUnregisterButton() { return this._renderButton({ - className: "default-button default-button--micro js-unregister-button", + className: "default-button default-button--micro qa-unregister-button", key: "service-worker-unregister-button", labelId: "about-debugging-worker-action-unregister", onClick: this.unregister.bind(this), diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionAdditionalActions.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionAdditionalActions.js index bb8225ae14ae..9aff7c6efd0a 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionAdditionalActions.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionAdditionalActions.js @@ -68,7 +68,7 @@ class TemporaryExtensionAdditionalActions extends PureComponent { dom.button( { className: "default-button default-button--micro " + - "js-temporary-extension-reload-button", + "qa-temporary-extension-reload-button", onClick: e => this.reload(), }, "Reload", @@ -81,7 +81,7 @@ class TemporaryExtensionAdditionalActions extends PureComponent { dom.button( { className: "default-button default-button--micro " + - "js-temporary-extension-remove-button", + "qa-temporary-extension-remove-button", onClick: e => this.remove(), }, "Remove", diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionDetail.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionDetail.js index b51d88ec973f..b4f21031ef8e 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionDetail.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionDetail.js @@ -36,13 +36,13 @@ class TemporaryExtensionDetail extends PureComponent { { id: "about-debugging-tmp-extension-temporary-id", a: dom.a({ - className: "js-temporary-id-link", + className: "qa-temporary-id-link", href: TEMP_ID_DOC_URL, target: "_blank", }), }, dom.div({ - className: "js-temporary-id-message", + className: "qa-temporary-id-message", }), ); } diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstallSection.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstallSection.js index 0318c2fa197c..42797b3b4a6a 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstallSection.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstallSection.js @@ -53,7 +53,7 @@ class TemporaryExtensionInstallSection extends PureComponent { return Message( { level: MESSAGE_LEVEL.ERROR, - className: "js-tmp-extension-install-error", + className: "qa-tmp-extension-install-error", isCloseable: true, }, Localized( diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstaller.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstaller.js index 30a3edac210e..c5537610986d 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstaller.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/TemporaryExtensionInstaller.js @@ -38,7 +38,7 @@ class TemporaryExtensionInstaller extends PureComponent { dom.button( { className: - `${ className } default-button js-temporary-extension-install-button`, + `${ className } default-button qa-temporary-extension-install-button`, onClick: e => this.install(), }, "Load Temporary Add-on…" diff --git a/devtools/client/aboutdebugging-new/src/components/debugtarget/WorkerDetail.js b/devtools/client/aboutdebugging-new/src/components/debugtarget/WorkerDetail.js index a9cdd736ad55..b0ba81185c1d 100644 --- a/devtools/client/aboutdebugging-new/src/components/debugtarget/WorkerDetail.js +++ b/devtools/client/aboutdebugging-new/src/components/debugtarget/WorkerDetail.js @@ -49,7 +49,7 @@ class WorkerDetail extends PureComponent { FieldPair( { className: isListening ? - "js-worker-fetch-listening" : "js-worker-fetch-not-listening", + "qa-worker-fetch-listening" : "qa-worker-fetch-not-listening", label: "Fetch", slug: "fetch", value: "about-debugging-worker-fetch-value", @@ -72,7 +72,7 @@ class WorkerDetail extends PureComponent { label: "Push Service", value: dom.span( { - className: "js-worker-push-service-value", + className: "qa-worker-push-service-value", }, pushServiceEndpoint, ), diff --git a/devtools/client/aboutdebugging-new/src/components/shared/Message.js b/devtools/client/aboutdebugging-new/src/components/shared/Message.js index ca4f9e440e13..fba0e4a0a63f 100644 --- a/devtools/client/aboutdebugging-new/src/components/shared/Message.js +++ b/devtools/client/aboutdebugging-new/src/components/shared/Message.js @@ -79,7 +79,7 @@ class Message extends PureComponent { return dom.aside( { - className: `message message--level-${level} js-message` + + className: `message message--level-${level} qa-message` + (className ? ` ${ className }` : ""), }, dom.img( diff --git a/devtools/client/aboutdebugging-new/src/components/sidebar/RefreshDevicesButton.js b/devtools/client/aboutdebugging-new/src/components/sidebar/RefreshDevicesButton.js index 7c9dc4a27485..7f22f397563c 100644 --- a/devtools/client/aboutdebugging-new/src/components/sidebar/RefreshDevicesButton.js +++ b/devtools/client/aboutdebugging-new/src/components/sidebar/RefreshDevicesButton.js @@ -30,7 +30,7 @@ class RefreshDevicesButton extends PureComponent { { id: "about-debugging-refresh-usb-devices-button" }, dom.button( { - className: "default-button js-refresh-devices-button", + className: "default-button qa-refresh-devices-button", disabled: this.props.isScanning, onClick: () => this.refreshDevices(), }, diff --git a/devtools/client/aboutdebugging-new/src/components/sidebar/Sidebar.js b/devtools/client/aboutdebugging-new/src/components/sidebar/Sidebar.js index 1f2ec3b5c009..032e4abb6de2 100644 --- a/devtools/client/aboutdebugging-new/src/components/sidebar/Sidebar.js +++ b/devtools/client/aboutdebugging-new/src/components/sidebar/Sidebar.js @@ -55,7 +55,7 @@ class Sidebar extends PureComponent { }, dom.span( { - className: "js-sidebar-usb-status", + className: "qa-sidebar-usb-status", }, localizationId ) @@ -72,7 +72,7 @@ class Sidebar extends PureComponent { }, dom.aside( { - className: "sidebar__label js-sidebar-no-devices", + className: "sidebar__label qa-sidebar-no-devices", }, "No devices discovered" ) diff --git a/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarItem.js b/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarItem.js index 20154ec67f6d..7be4e489f178 100644 --- a/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarItem.js +++ b/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarItem.js @@ -45,7 +45,7 @@ class SidebarItem extends PureComponent { ) : Link( { - className: "sidebar-item__link js-sidebar-link", + className: "sidebar-item__link qa-sidebar-link", to, }, children, @@ -60,10 +60,10 @@ class SidebarItem extends PureComponent { return dom.li( { - className: "sidebar-item js-sidebar-item" + + className: "sidebar-item qa-sidebar-item" + (className ? ` ${className}` : "") + (isSelected ? - " sidebar-item--selected js-sidebar-item-selected" : + " sidebar-item--selected qa-sidebar-item-selected" : "" ) + (to ? " sidebar-item--selectable" : ""), diff --git a/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarRuntimeItem.js b/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarRuntimeItem.js index ddfd69af7a46..0b28c7d73ee8 100644 --- a/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarRuntimeItem.js +++ b/devtools/client/aboutdebugging-new/src/components/sidebar/SidebarRuntimeItem.js @@ -51,7 +51,7 @@ class SidebarRuntimeItem extends PureComponent { }, dom.button( { - className: "default-button default-button--micro js-connect-button", + className: "default-button default-button--micro qa-connect-button", disabled: isConnecting, onClick: () => { const { dispatch, runtimeId } = this.props; diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_thisfirefox.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_thisfirefox.js index d3732ab784d1..41f4c88386e9 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_thisfirefox.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_thisfirefox.js @@ -59,7 +59,7 @@ async function testState({ chromeEnabled, debuggerRemoteEnable, isEnabledAtIniti await installExtensions(document); info("Check the status of extension debug setting checkbox and inspect buttons"); - const checkbox = document.querySelector(".js-extension-debug-checkbox"); + const checkbox = document.querySelector(".qa-extension-debug-checkbox"); ok(checkbox, "Extension debug setting checkbox exists"); is(checkbox.checked, isEnabledAtInitial, "The state of checkbox is correct"); assertInspectButtons(isEnabledAtInitial, document); @@ -90,7 +90,7 @@ function assertInspectButtons(shouldBeEnabled, document) { function assertInspectButtonsOnCategory(shouldBeEnabled, category, document) { const pane = getDebugTargetPane(category, document); - const buttons = pane.querySelectorAll(".js-debug-target-inspect-button"); + const buttons = pane.querySelectorAll(".qa-debug-target-inspect-button"); ok([...buttons].every(b => b.disabled !== shouldBeEnabled), `disabled attribute should be ${ !shouldBeEnabled } on ${ category }`); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_usb.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_usb.js index 26d423672c84..1e79ffdc16c1 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_usb.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_debug_setting_usb.js @@ -32,9 +32,9 @@ add_task(async function() { info("Check the status of extension debug setting checkbox and inspect buttons"); await connectToRuntime("Fancy Phone", document); await selectRuntime("Fancy Phone", "Lorem ipsum", document); - ok(!document.querySelector(".js-extension-debug-checkbox"), + ok(!document.querySelector(".qa-extension-debug-checkbox"), "Extension debug setting checkbox should not exist"); - const buttons = document.querySelectorAll(".js-debug-target-inspect-button"); + const buttons = document.querySelectorAll(".qa-debug-target-inspect-button"); ok([...buttons].every(b => !b.disabled), "All inspect buttons should be enabled"); await removeTab(tab); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_manifest_url.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_manifest_url.js index 151a0c5efaac..c9ff59e35250 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_manifest_url.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_manifest_url.js @@ -19,7 +19,7 @@ add_task(async function() { const { document, tab, window } = await openAboutDebugging(); await selectThisFirefoxPage(document, window.AboutDebugging.store); - const usbStatusElement = document.querySelector(".js-sidebar-usb-status"); + const usbStatusElement = document.querySelector(".qa-sidebar-usb-status"); info("Install ADB"); adbAddon.install("internal"); @@ -30,7 +30,7 @@ add_task(async function() { await waitUntil(() => findDebugTargetByText(ABD_ADDON_NAME, document)); const adbExtensionItem = findDebugTargetByText(ABD_ADDON_NAME, document); - const manifestUrlElement = adbExtensionItem.querySelector(".js-manifest-url"); + const manifestUrlElement = adbExtensionItem.querySelector(".qa-manifest-url"); ok(manifestUrlElement, "A link to the manifest is displayed"); info("Click on the manifest URL and wait for the new tab to open"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_remote_runtime.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_remote_runtime.js index 963c03b2ddd0..89dbf257ab55 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_remote_runtime.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_remote_runtime.js @@ -47,7 +47,7 @@ add_task(async function() { async function testAddonsOnMockedRemoteClient(remoteClient, firefoxClient, document) { const extensionPane = getDebugTargetPane("Extensions", document); info("Check an empty target pane message is displayed"); - ok(extensionPane.querySelector(".js-debug-target-list-empty"), + ok(extensionPane.querySelector(".qa-debug-target-list-empty"), "Extensions list is empty"); info("Add an extension to the remote client"); @@ -56,7 +56,7 @@ async function testAddonsOnMockedRemoteClient(remoteClient, firefoxClient, docum remoteClient._eventEmitter.emit("addonListChanged"); info("Wait until the extension appears"); - await waitUntil(() => !extensionPane.querySelector(".js-debug-target-list-empty")); + await waitUntil(() => !extensionPane.querySelector(".qa-debug-target-list-empty")); const extensionTarget = findDebugTargetByText("Test extension name", document); ok(extensionTarget, "Extension target appeared for the remote runtime"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_addon_buttons.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_addon_buttons.js index 30e63b6dba89..b11b47664fa7 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_addon_buttons.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_addon_buttons.js @@ -27,7 +27,7 @@ add_task(async function() { info("Click on the reload button for the temporary extension"); const reloadButton = - originalTarget.querySelector(".js-temporary-extension-reload-button"); + originalTarget.querySelector(".qa-temporary-extension-reload-button"); reloadButton.click(); info("Wait until the debug target with the original extension name disappears"); @@ -41,7 +41,7 @@ add_task(async function() { info("Click on the remove button for the temporary extension"); const removeButton = - updatedTarget.querySelector(".js-temporary-extension-remove-button"); + updatedTarget.querySelector(".qa-temporary-extension-remove-button"); removeButton.click(); info("Wait until the debug target with the updated extension name disappears"); @@ -63,10 +63,10 @@ add_task(async function() { await waitUntil(() => findDebugTargetByText(PACKAGED_EXTENSION_NAME, document)); const target = findDebugTargetByText(PACKAGED_EXTENSION_NAME, document); - const reloadButton = target.querySelector(".js-temporary-extension-reload-button"); + const reloadButton = target.querySelector(".qa-temporary-extension-reload-button"); ok(!reloadButton, "No reload button displayed for a regularly installed extension"); - const removeButton = target.querySelector(".js-temporary-extension-remove-button"); + const removeButton = target.querySelector(".qa-temporary-extension-remove-button"); ok(!removeButton, "No remove button displayed for a regularly installed extension"); await removeExtension(PACKAGED_EXTENSION_ID, PACKAGED_EXTENSION_NAME, document); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_id_message.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_id_message.js index 44b203686d80..f29a1a1c6c4f 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_id_message.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_id_message.js @@ -24,10 +24,10 @@ add_task(async function() { const target = findDebugTargetByText(EXTENSION_NAME, document); - const message = target.querySelector(".js-temporary-id-message"); + const message = target.querySelector(".qa-temporary-id-message"); ok(!!message, "Temporary id message is displayed for temporary extensions"); - const link = target.querySelector(".js-temporary-id-link"); + const link = target.querySelector(".qa-temporary-id-link"); ok(!!link, "Temporary id link is displayed for temporary extensions"); await removeTemporaryExtension(EXTENSION_NAME, document); @@ -48,7 +48,7 @@ add_task(async function() { await waitUntil(() => findDebugTargetByText(PACKAGED_EXTENSION_NAME, document)); const target = findDebugTargetByText(PACKAGED_EXTENSION_NAME, document); - const tmpIdMessage = target.querySelector(".js-temporary-id-message"); + const tmpIdMessage = target.querySelector(".qa-temporary-id-message"); ok(!tmpIdMessage, "No temporary id message is displayed for a regular extension"); await removeExtension(PACKAGED_EXTENSION_ID, PACKAGED_EXTENSION_NAME, document); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_install_error.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_install_error.js index 60acf2c2c62e..b72e1ab014a1 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_install_error.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_install_error.js @@ -31,7 +31,7 @@ add_task(async function testInvalidJsonExtension() { await installTemporaryExtension(EXTENSION_PATH, EXTENSION_NAME, document); info("Wait until the error message disappears"); - await waitUntil(() => !document.querySelector(".js-tmp-extension-install-error")); + await waitUntil(() => !document.querySelector(".qa-tmp-extension-install-error")); info("Wait for the temporary addon to be displayed as a debug target"); await waitUntil(() => findDebugTargetByText(EXTENSION_NAME, document)); @@ -62,9 +62,9 @@ async function installBadExtension(path, document) { info("Install a bad extension at path: " + path); // Do not use installTemporaryAddon here since the install will fail. prepareMockFilePicker(path); - document.querySelector(".js-temporary-extension-install-button").click(); + document.querySelector(".qa-temporary-extension-install-button").click(); info("Wait until the install error message appears"); - await waitUntil(() => document.querySelector(".js-tmp-extension-install-error")); - return document.querySelector(".js-tmp-extension-install-error"); + await waitUntil(() => document.querySelector(".qa-tmp-extension-install-error")); + return document.querySelector(".qa-tmp-extension-install-error"); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_reload_error.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_reload_error.js index fe67fd679075..d63f13ab2cda 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_reload_error.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_temporary_reload_error.js @@ -27,7 +27,7 @@ add_task(async function() { info("Click on the reload button for the invalid temporary extension"); const waitForError = waitForDispatch(window.AboutDebugging.store, "TEMPORARY_EXTENSION_RELOAD_FAILURE"); - const reloadButton = target.querySelector(".js-temporary-extension-reload-button"); + const reloadButton = target.querySelector(".qa-temporary-extension-reload-button"); reloadButton.click(); await waitForError; ok(target.querySelector(".qa-temporary-extension-reload-error"), @@ -43,7 +43,7 @@ add_task(async function() { "The error message of reloading disappears"); info("Click on the remove button for the temporary extension"); - const removeButton = target.querySelector(".js-temporary-extension-remove-button"); + const removeButton = target.querySelector(".qa-temporary-extension-remove-button"); removeButton.click(); info("Wait until the debug target with the extension disappears"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_warnings.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_warnings.js index da7e7b349b1e..7e4333fdb1a7 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_warnings.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_addons_warnings.js @@ -27,7 +27,7 @@ add_task(async function() { await waitUntil(() => findDebugTargetByText(EXTENSION_NAME, document)); const target = findDebugTargetByText(EXTENSION_NAME, document); - const warningMessage = target.querySelector(".js-message"); + const warningMessage = target.querySelector(".qa-message"); ok(!!warningMessage, "A warning message is displayed for the installed addon"); const warningText = warningMessage.textContent; diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_networklocations.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_networklocations.js index 465e0a180420..9651e53fd130 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_networklocations.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_networklocations.js @@ -16,7 +16,7 @@ add_task(async function() { await selectConnectPage(document); - let networkLocations = document.querySelectorAll(".js-network-location"); + let networkLocations = document.querySelectorAll(".qa-network-location"); is(networkLocations.length, 0, "By default, no network locations are displayed"); info("Check whether error message should show if the input value is invalid"); @@ -26,13 +26,13 @@ add_task(async function() { info("Wait until the new network location is visible in the list"); addNetworkLocation(TEST_NETWORK_LOCATION, document); - await waitUntil(() => document.querySelectorAll(".js-network-location").length === 1); + await waitUntil(() => document.querySelectorAll(".qa-network-location").length === 1); await waitUntil(() => !document.querySelector(".qa-connect-page__network-form__error-message")); - networkLocations = document.querySelectorAll(".js-network-location"); + networkLocations = document.querySelectorAll(".qa-network-location"); const networkLocationValue = - networkLocations[0].querySelector(".js-network-location-value"); + networkLocations[0].querySelector(".qa-network-location-value"); is(networkLocationValue.textContent, TEST_NETWORK_LOCATION, "Added network location has the expected value"); @@ -43,7 +43,7 @@ add_task(async function() { info("Wait until the new network location is removed from the list"); removeNetworkLocation(TEST_NETWORK_LOCATION, document); - await waitUntil(() => document.querySelectorAll(".js-network-location").length === 0); + await waitUntil(() => document.querySelectorAll(".qa-network-location").length === 0); await removeTab(tab); }); @@ -51,14 +51,14 @@ add_task(async function() { function addNetworkLocation(location, document) { info("Setting a value in the network form input"); const networkLocationInput = - document.querySelector(".js-network-form-input"); + document.querySelector(".qa-network-form-input"); networkLocationInput.value = ""; networkLocationInput.focus(); EventUtils.sendString(location, networkLocationInput.ownerGlobal); info("Click on network form submit button"); const networkLocationSubmitButton = - document.querySelector(".js-network-form-submit-button"); + document.querySelector(".qa-network-form-submit-button"); networkLocationSubmitButton.click(); } @@ -68,14 +68,14 @@ function removeNetworkLocation(location, document) { info("Click on the remove button for the provided network location"); const removeButton = - networkLocation.querySelector(".js-network-location-remove-button"); + networkLocation.querySelector(".qa-network-location-remove-button"); removeButton.click(); } function getNetworkLocation(location, document) { info("Find the container for network location: " + location); - const networkLocations = document.querySelectorAll(".js-network-location"); + const networkLocations = document.querySelectorAll(".qa-network-location"); return [...networkLocations].find(element => { - return element.querySelector(".js-network-location-value").textContent === location; + return element.querySelector(".qa-network-location-value").textContent === location; }); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_toggle_usb_devices.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_toggle_usb_devices.js index 45430b0a8a92..f0747d186c07 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_toggle_usb_devices.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connect_toggle_usb_devices.js @@ -21,13 +21,13 @@ add_task(async function() { await selectConnectPage(document); info("Wait until Connect page is displayed"); - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); info("Check that by default USB devices are disabled"); - const usbDisabledMessage = document.querySelector(".js-connect-usb-disabled-message"); + const usbDisabledMessage = document.querySelector(".qa-connect-usb-disabled-message"); ok(usbDisabledMessage, "A message about enabling USB devices is rendered"); - const usbToggleButton = document.querySelector(".js-connect-usb-toggle-button"); + const usbToggleButton = document.querySelector(".qa-connect-usb-toggle-button"); ok(usbToggleButton, "The button to toggle USB devices debugging is rendered"); ok(usbToggleButton.textContent.includes("Enable"), "The text of the toggle USB button is correct"); @@ -37,7 +37,7 @@ add_task(async function() { info("Wait until the toggle button text is updated"); await waitUntil(() => usbToggleButton.textContent.includes("Disable")); - ok(!document.querySelector(".js-connect-usb-disabled-message"), + ok(!document.querySelector(".qa-connect-usb-disabled-message"), "The message about enabling USB devices is no longer rendered"); info("Check that the addon was installed with the proper source"); @@ -57,7 +57,7 @@ add_task(async function() { info("Wait until the toggle button text is updated"); await waitUntil(() => usbToggleButton.textContent.includes("Enable")); - ok(document.querySelector(".js-connect-usb-disabled-message"), + ok(document.querySelector(".qa-connect-usb-disabled-message"), "The message about enabling USB devices is rendered again"); await stopAdbProcess(); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connection_prompt_setting.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connection_prompt_setting.js index 7c9b2989e654..5cfbeb4d4f0a 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connection_prompt_setting.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_connection_prompt_setting.js @@ -31,14 +31,14 @@ add_task(async function() { info("Check whether connection prompt toggle button exists"); let connectionPromptToggleButton = - document.querySelector(".js-connection-prompt-toggle-button"); + document.querySelector(".qa-connection-prompt-toggle-button"); ok(connectionPromptToggleButton, "Toggle button existed"); ok(connectionPromptToggleButton.textContent.includes("Disable"), "Toggle button shows 'Disable'"); info("Click on the toggle button"); connectionPromptToggleButton = - document.querySelector(".js-connection-prompt-toggle-button"); + document.querySelector(".qa-connection-prompt-toggle-button"); connectionPromptToggleButton.click(); info("Wait until the toggle button text is updated"); await waitUntil(() => connectionPromptToggleButton.textContent.includes("Enable")); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_collapsibilities_interaction.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_collapsibilities_interaction.js index f5d506d6a5a3..79c9392bffe6 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_collapsibilities_interaction.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_collapsibilities_interaction.js @@ -33,12 +33,12 @@ async function assertDebugTargetCollapsed(paneEl, title) { info("Check debug target is collapsed"); // check list height - const targetEl = paneEl.querySelector(".js-debug-target-pane__collapsable"); + const targetEl = paneEl.querySelector(".qa-debug-target-pane__collapsable"); is(targetEl.clientHeight, 0, "Height of list element is zero"); // check title - const titleEl = paneEl.querySelector(".js-debug-target-pane-title"); + const titleEl = paneEl.querySelector(".qa-debug-target-pane-title"); const expectedTitle = - `${ title } (${ targetEl.querySelectorAll(".js-debug-target-item").length })`; + `${ title } (${ targetEl.querySelectorAll(".qa-debug-target-item").length })`; is(titleEl.textContent, expectedTitle, "Collapsed title is correct"); } @@ -46,12 +46,12 @@ async function assertDebugTargetExpanded(paneEl, title) { info("Check debug target is expanded"); // check list height - const targetEl = paneEl.querySelector(".js-debug-target-pane__collapsable"); + const targetEl = paneEl.querySelector(".qa-debug-target-pane__collapsable"); await waitUntil(() => targetEl.clientHeight > 0); ok(true, "Height of list element is greater than zero"); // check title - const titleEl = paneEl.querySelector(".js-debug-target-pane-title"); + const titleEl = paneEl.querySelector(".qa-debug-target-pane-title"); const expectedTitle = - `${ title } (${ targetEl.querySelectorAll(".js-debug-target-item").length })`; + `${ title } (${ targetEl.querySelectorAll(".qa-debug-target-item").length })`; is(titleEl.textContent, expectedTitle, "Expanded title is correct"); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_empty.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_empty.js index 2899ea0a1b64..2250c3003b0b 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_empty.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_debug-target-pane_empty.js @@ -24,35 +24,35 @@ add_task(async function() { info("Check that the temporary extensions pane is empty"); const temporaryExtensionPane = getDebugTargetPane("Temporary Extensions", document); - ok(!temporaryExtensionPane.querySelector(".js-debug-target-item"), + ok(!temporaryExtensionPane.querySelector(".qa-debug-target-item"), "Temporary Extensions pane contains no debug target"); info("Check an empty target pane message is displayed"); - ok(temporaryExtensionPane.querySelector(".js-debug-target-list-empty"), + ok(temporaryExtensionPane.querySelector(".qa-debug-target-list-empty"), "An empty target list message is displayed"); info("Install a temporary extension"); await installTemporaryExtension(EXTENSION_PATH, EXTENSION_NAME, document); info("Wait until a debug target item appears"); - await waitUntil(() => temporaryExtensionPane.querySelector(".js-debug-target-item")); + await waitUntil(() => temporaryExtensionPane.querySelector(".qa-debug-target-item")); info("Check the empty target pane message is no longer displayed"); - ok(!temporaryExtensionPane.querySelector(".js-debug-target-list-empty"), + ok(!temporaryExtensionPane.querySelector(".qa-debug-target-list-empty"), "The empty target list message is no longer displayed"); const temporaryExtensionItem = - temporaryExtensionPane.querySelector(".js-debug-target-item"); + temporaryExtensionPane.querySelector(".qa-debug-target-item"); ok(temporaryExtensionItem, "Temporary Extensions pane now shows debug target"); info("Remove the temporary extension"); - temporaryExtensionItem.querySelector(".js-temporary-extension-remove-button").click(); + temporaryExtensionItem.querySelector(".qa-temporary-extension-remove-button").click(); info("Wait until the debug target item disappears"); - await waitUntil(() => !temporaryExtensionPane.querySelector(".js-debug-target-item")); + await waitUntil(() => !temporaryExtensionPane.querySelector(".qa-debug-target-item")); info("Check the empty target pane message is displayed again"); - ok(temporaryExtensionPane.querySelector(".js-debug-target-list-empty"), + ok(temporaryExtensionPane.querySelector(".qa-debug-target-list-empty"), "An empty target list message is displayed again"); await removeTab(tab); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtools.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtools.js index cf59c6c6690e..be50110e0683 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtools.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtools.js @@ -18,7 +18,7 @@ add_task(async function() { await selectThisFirefoxPage(document, window.AboutDebugging.store); const connectSidebarItem = findSidebarItemByText("Setup", document); - const connectLink = connectSidebarItem.querySelector(".js-sidebar-link"); + const connectLink = connectSidebarItem.querySelector(".qa-sidebar-link"); ok(connectSidebarItem, "Found the Connect sidebar item"); info("Open devtools on the current about:debugging tab"); @@ -34,7 +34,7 @@ add_task(async function() { await waitForDispatch(store, "UNWATCH_RUNTIME_SUCCESS"); info("Wait until Connect page is displayed"); - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); const markupViewElement = inspector.panelDoc.getElementById("markup-box"); ok(markupViewElement, "Inspector is still rendered"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_focus.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_focus.js index 6bed5fdaa9c7..75d9cc791b97 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_focus.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_focus.js @@ -60,7 +60,7 @@ add_task(async function() { function clickInspectButton(inspectionTarget, doc) { const target = findDebugTargetByText(inspectionTarget, doc); - const button = target.querySelector(".js-debug-target-inspect-button"); + const button = target.querySelector(".qa-debug-target-inspect-button"); button.click(); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_target_destroyed.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_target_destroyed.js index 9458683350cd..aede01025441 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_target_destroyed.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_devtoolstoolbox_target_destroyed.js @@ -14,14 +14,14 @@ add_task(async function() { await selectThisFirefoxPage(document, window.AboutDebugging.store); const { devtoolsDocument, devtoolsTab, devtoolsWindow } = await openAboutDevtoolsToolbox(document, tab, window, "about:home"); - const targetInfoHeader = devtoolsDocument.querySelector(".js-debug-target-info"); + const targetInfoHeader = devtoolsDocument.querySelector(".qa-debug-target-info"); ok(targetInfoHeader.textContent.includes("about:home"), "about:devtools-toolbox is open for the target"); // close the inspected tab and check that error page is shown info("removing the inspected tab"); await removeTab(targetTab); - await waitUntil(() => devtoolsWindow.document.querySelector(".js-error-page")); + await waitUntil(() => devtoolsWindow.document.querySelector(".qa-error-page")); info("closing the toolbox"); await removeTab(devtoolsTab); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_message_close.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_message_close.js index d9d87607f202..c2e758cb2978 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_message_close.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_message_close.js @@ -27,7 +27,7 @@ add_task(async function() { await waitUntil(() => findDebugTargetByText(EXTENSION_NAME, document)); const target = findDebugTargetByText(EXTENSION_NAME, document); - const warningMessage = target.querySelector(".js-message"); + const warningMessage = target.querySelector(".qa-message"); ok(!!warningMessage, "A warning message is displayed for the installed addon"); const button = warningMessage.querySelector(".qa-message-button-close"); @@ -36,7 +36,7 @@ add_task(async function() { info("Closing the message and waiting for it to disappear"); button.click(); await waitUntil(() => { - return target.querySelector(".js-message") === null; + return target.querySelector(".qa-message") === null; }); await removeTemporaryExtension(EXTENSION_NAME, document); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_navigate.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_navigate.js index 25ce0a30aab9..c7b0586ac006 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_navigate.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_navigate.js @@ -23,12 +23,12 @@ add_task(async function() { await selectThisFirefoxPage(document, AboutDebugging.store); const connectSidebarItem = findSidebarItemByText("Setup", document); - const connectLink = connectSidebarItem.querySelector(".js-sidebar-link"); + const connectLink = connectSidebarItem.querySelector(".qa-sidebar-link"); ok(connectSidebarItem, "Found the Connect sidebar item"); const thisFirefoxString = getThisFirefoxString(window); const thisFirefoxSidebarItem = findSidebarItemByText(thisFirefoxString, document); - const thisFirefoxLink = thisFirefoxSidebarItem.querySelector(".js-sidebar-link"); + const thisFirefoxLink = thisFirefoxSidebarItem.querySelector(".qa-sidebar-link"); ok(thisFirefoxSidebarItem, "Found the ThisFirefox sidebar item"); ok(isSidebarItemSelected(thisFirefoxSidebarItem), "ThisFirefox sidebar item is selected by default"); @@ -44,11 +44,11 @@ add_task(async function() { connectLink.click(); info("Wait until Connect page is displayed"); - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); // we need to wait here because the sidebar isn't updated after mounting the page info("Wait until Connect sidebar item is selected"); await waitUntil(() => isSidebarItemSelected(connectSidebarItem)); - ok(!document.querySelector(".js-runtime-page"), "Runtime page no longer rendered"); + ok(!document.querySelector(".qa-runtime-page"), "Runtime page no longer rendered"); info("Open a new tab which should be listed when we go back to This Firefox"); const backgroundTab2 = await addTab(TAB_URL_2, { background: true }); @@ -61,10 +61,10 @@ add_task(async function() { await requestsSuccess; info("Wait until ThisFirefox page is displayed"); - await waitUntil(() => document.querySelector(".js-runtime-page")); + await waitUntil(() => document.querySelector(".qa-runtime-page")); ok(isSidebarItemSelected(thisFirefoxSidebarItem), "ThisFirefox sidebar item is selected again"); - ok(!document.querySelector(".js-connect-page"), "Connect page no longer rendered"); + ok(!document.querySelector(".qa-connect-page"), "Connect page no longer rendered"); info("TAB2 should already be displayed in the debug targets"); await waitUntil(() => findDebugTargetByText("TAB2", document)); @@ -87,5 +87,5 @@ add_task(async function() { }); function isSidebarItemSelected(item) { - return item.classList.contains("js-sidebar-item-selected"); + return item.classList.contains("qa-sidebar-item-selected"); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_persist_connection.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_persist_connection.js index 6ce2bb33a55e..9c5b2307c148 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_persist_connection.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_persist_connection.js @@ -56,12 +56,12 @@ async function testRemoteClientPersistConnection(mocks, info("Wait until the remote runtime appears as connected"); await waitUntil(() => { const sidebarItem = findSidebarItemByText(sidebarName, document); - return sidebarItem && !sidebarItem.querySelector(".js-connect-button"); + return sidebarItem && !sidebarItem.querySelector(".qa-connect-button"); }); info("Wait until the remote runtime page is selected"); await waitUntil(() => { - const runtimeInfo = document.querySelector(".js-runtime-name"); + const runtimeInfo = document.querySelector(".qa-runtime-name"); return runtimeInfo && runtimeInfo.textContent.includes(runtimeName); }); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_profiler_dialog.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_profiler_dialog.js index fcd7d67d43cc..81dfccf82f07 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_profiler_dialog.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_profiler_dialog.js @@ -25,9 +25,9 @@ add_task(async function() { assertDialogVisible(document); info("Click on the close button and wait until the dialog disappears"); - const closeDialogButton = document.querySelector(".js-profiler-dialog-close"); + const closeDialogButton = document.querySelector(".qa-profiler-dialog-close"); closeDialogButton.click(); - await waitUntil(() => !document.querySelector(".js-profiler-dialog")); + await waitUntil(() => !document.querySelector(".qa-profiler-dialog")); assertDialogHidden(document); info("Open the profiler dialog again"); @@ -35,9 +35,9 @@ add_task(async function() { assertDialogVisible(document); info("Click on the mask element and wait until the dialog disappears"); - const mask = document.querySelector(".js-profiler-dialog-mask"); + const mask = document.querySelector(".qa-profiler-dialog-mask"); EventUtils.synthesizeMouse(mask, 5, 5, {}, window); - await waitUntil(() => !document.querySelector(".js-profiler-dialog")); + await waitUntil(() => !document.querySelector(".qa-profiler-dialog")); assertDialogHidden(document); info("Open the profiler dialog again"); @@ -46,7 +46,7 @@ add_task(async function() { info("Navigate to this-firefox and wait until the dialog disappears"); document.location.hash = "#/runtime/this-firefox"; - await waitUntil(() => !document.querySelector(".js-profiler-dialog")); + await waitUntil(() => !document.querySelector(".qa-profiler-dialog")); assertDialogHidden(document); info("Select the remote runtime again, check the dialog is still hidden"); @@ -57,11 +57,11 @@ add_task(async function() { }); function assertDialogVisible(doc) { - ok(doc.querySelector(".js-profiler-dialog"), "Dialog is displayed"); - ok(doc.querySelector(".js-profiler-dialog-mask"), "Dialog mask is displayed"); + ok(doc.querySelector(".qa-profiler-dialog"), "Dialog is displayed"); + ok(doc.querySelector(".qa-profiler-dialog-mask"), "Dialog mask is displayed"); } function assertDialogHidden(doc) { - ok(!document.querySelector(".js-profiler-dialog"), "Dialog is removed"); - ok(!document.querySelector(".js-profiler-dialog-mask"), "Dialog mask is removed"); + ok(!document.querySelector(".qa-profiler-dialog"), "Dialog is removed"); + ok(!document.querySelector(".qa-profiler-dialog-mask"), "Dialog mask is removed"); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_real_usb_runtime_page_runtime_info.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_real_usb_runtime_page_runtime_info.js index a7a2051f8c6c..6dce46ba81db 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_real_usb_runtime_page_runtime_info.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_real_usb_runtime_page_runtime_info.js @@ -35,7 +35,7 @@ add_task(async function() { await selectRuntime(sidebarInfo.deviceName, runtimeDetails.info.name, document); info("Check that runtime info is properly displayed"); - const runtimeInfo = document.querySelector(".js-runtime-name"); + const runtimeInfo = document.querySelector(".qa-runtime-name"); ok(runtimeInfo, "Runtime info is displayed"); const runtimeInfoText = runtimeInfo.textContent; ok(runtimeInfoText.includes(runtimeDetails.info.name), diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_routes.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_routes.js index 13a8d0819d1d..6ba34f5e9d75 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_routes.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_routes.js @@ -25,8 +25,8 @@ add_task(async function() { info("Check 'This Firefox' route"); document.location.hash = "#/runtime/this-firefox"; - await waitUntil(() => document.querySelector(".js-runtime-page")); - const infoLabel = document.querySelector(".js-runtime-name").textContent; + await waitUntil(() => document.querySelector(".qa-runtime-page")); + const infoLabel = document.querySelector(".qa-runtime-name").textContent; // NOTE: when using USB Mocks, we see only "Firefox" as the device name ok(infoLabel.includes("Firefox"), "Runtime is displayed as Firefox"); ok(!infoLabel.includes(" on "), "Runtime is not associated to any device"); @@ -38,7 +38,7 @@ add_task(async function() { info("Check 'Setup' page"); document.location.hash = "#/setup"; - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); ok(true, "Setup page has been shown"); is( document.title, @@ -56,8 +56,8 @@ add_task(async function() { await connectToRuntime("Fancy Phone", document); // navigate to it via URL document.location.hash = "#/runtime/1337id"; - await waitUntil(() => document.querySelector(".js-runtime-page")); - const runtimeLabel = document.querySelector(".js-runtime-name").textContent; + await waitUntil(() => document.querySelector(".qa-runtime-page")); + const runtimeLabel = document.querySelector(".qa-runtime-name").textContent; is( document.title, "Debugging - Runtime / 1337id", @@ -77,11 +77,11 @@ add_task(async function() { info("Waiting for a non setup page to load"); document.location.hash = "#/runtime/this-firefox"; - await waitUntil(() => document.querySelector(".js-runtime-page")); + await waitUntil(() => document.querySelector(".qa-runtime-page")); info("Update hash & wait for a redirect to root (connect page)"); document.location.hash = "#/lorem-ipsum"; - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); is( document.title, "Debugging - Setup", @@ -103,11 +103,11 @@ add_task(async function testOldAboutDebuggingRoutes() { for (const route of routes) { info("Move to setup page before testing the route"); document.location.hash = "#/setup"; - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); info(`Check that navigating to ${route} redirects to This Firefox`); document.location.hash = route; - await waitUntil(() => document.querySelector(".js-runtime-page")); + await waitUntil(() => document.querySelector(".qa-runtime-page")); is(document.location.hash, "#/runtime/this-firefox", `${route} was redirected to This Firefox`); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_compatibility_warning.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_compatibility_warning.js index 28240ea03d5c..2cc4ff2f1c75 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_compatibility_warning.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_compatibility_warning.js @@ -36,23 +36,23 @@ add_task(async function() { info("Select the compatible runtime and check that no warning is displayed"); await selectRuntime(COMPATIBLE_DEVICE, COMPATIBLE_RUNTIME, document); - ok(!document.querySelector(".js-compatibility-warning"), + ok(!document.querySelector(".qa-compatibility-warning"), "Compatibility warning is not displayed"); info("Select the old runtime and check that the too-old warning is displayed"); await selectRuntime(OLD_DEVICE, OLD_RUNTIME, document); - ok(document.querySelector(".js-compatibility-warning-too-old"), + ok(document.querySelector(".qa-compatibility-warning-too-old"), "Expected compatibility warning is displayed (too-old)"); info("Select the recent runtime and check that the too-recent warning is displayed"); await selectRuntime(RECENT_DEVICE, RECENT_RUNTIME, document); - ok(document.querySelector(".js-compatibility-warning-too-recent"), + ok(document.querySelector(".qa-compatibility-warning-too-recent"), "Expected compatibility warning is displayed (too-recent)"); info("Select the runtime incompatible with Fx 67 " + "and check that the debugger 67 warning is displayed"); await selectRuntime(DEBUGGER_67_DEVICE, DEBUGGER_67_RUNTIME, document); - ok(document.querySelector(".js-compatibility-warning-too-old-67-debugger")); + ok(document.querySelector(".qa-compatibility-warning-too-old-67-debugger")); await removeTab(tab); }); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_disconnect_remote_runtime.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_disconnect_remote_runtime.js index 7b2c396720bb..d5098677fc04 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_disconnect_remote_runtime.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_disconnect_remote_runtime.js @@ -39,7 +39,7 @@ add_task(async function() { disconnectRemoteRuntimeButton.click(); info("Wait until the runtime is disconnected"); - await waitUntil(() => document.querySelector(".js-connect-button")); + await waitUntil(() => document.querySelector(".qa-connect-button")); is(document.location.hash, DEFAULT_PAGE, "Redirection to the default page (this-firefox)"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_remote_runtime_buttons.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_remote_runtime_buttons.js index 787e58a84eb4..10f97e9fa3d9 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_remote_runtime_buttons.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_remote_runtime_buttons.js @@ -22,9 +22,9 @@ add_task(async function() { await selectThisFirefoxPage(document, window.AboutDebugging.store); info("Checking This Firefox"); - ok(!document.querySelector(".js-connection-prompt-toggle-button"), + ok(!document.querySelector(".qa-connection-prompt-toggle-button"), "This Firefox does not contain the connection prompt button"); - ok(!document.querySelector(".js-profile-runtime-button"), + ok(!document.querySelector(".qa-profile-runtime-button"), "This Firefox does not contain the profile runtime button"); ok(!document.querySelector(".qa-runtime-info__action"), "This Firefox does not contain the disconnect button"); @@ -33,9 +33,9 @@ add_task(async function() { mocks.emitUSBUpdate(); await connectToRuntime(USB_DEVICE_NAME, document); await selectRuntime(USB_DEVICE_NAME, USB_APP_NAME, document); - ok(!!document.querySelector(".js-connection-prompt-toggle-button"), + ok(!!document.querySelector(".qa-connection-prompt-toggle-button"), "Runtime contains the connection prompt button"); - ok(!!document.querySelector(".js-profile-runtime-button"), + ok(!!document.querySelector(".qa-profile-runtime-button"), "Remote runtime contains the profile runtime button"); ok(!!document.querySelector(".qa-runtime-info__action"), "Runtime contains the disconnect button"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_usbclient_closed.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_usbclient_closed.js index b0cfca143821..d377e49a5451 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_usbclient_closed.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_runtime_usbclient_closed.js @@ -61,7 +61,7 @@ add_task(async function testUsbClientDisconnected() { info("Wait until the connect button for this runtime appears"); await waitUntil(() => { const item = findSidebarItemByText(USB_DEVICE_NAME, document); - return item && item.querySelector(".js-connect-button"); + return item && item.querySelector(".qa-connect-button"); }); is(document.location.hash, `#/runtime/this-firefox`, @@ -91,7 +91,7 @@ add_task(async function testNetworkClientDisconnected() { info("Wait until the connect button for this runtime appears"); await waitUntil(() => { const item = findSidebarItemByText(NETWORK_RUNTIME_HOST, document); - return item && item.querySelector(".js-connect-button"); + return item && item.querySelector(".qa-connect-button"); }); is(document.location.hash, `#/runtime/this-firefox`, diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_network_runtime.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_network_runtime.js index 5fc102198c5c..a565fd4ddda3 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_network_runtime.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_network_runtime.js @@ -32,7 +32,7 @@ add_task(async function() { await selectRuntime(NETWORK_RUNTIME_HOST, NETWORK_RUNTIME_APP_NAME, document); info("Check that the network runtime mock is properly displayed"); - const thisFirefoxRuntimeInfo = document.querySelector(".js-runtime-name"); + const thisFirefoxRuntimeInfo = document.querySelector(".qa-runtime-name"); ok(thisFirefoxRuntimeInfo, "Runtime info for this-firefox runtime is displayed"); const runtimeInfoText = thisFirefoxRuntimeInfo.textContent; diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_page_with_serviceworker.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_page_with_serviceworker.js index 03137de845ee..a910543067f1 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_page_with_serviceworker.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_select_page_with_serviceworker.js @@ -46,7 +46,7 @@ add_task(async function() { info("Go to This Firefox again"); const thisFirefoxString = getThisFirefoxString(window); const thisFirefoxSidebarItem = findSidebarItemByText(thisFirefoxString, document); - const thisFirefoxLink = thisFirefoxSidebarItem.querySelector(".js-sidebar-link"); + const thisFirefoxLink = thisFirefoxSidebarItem.querySelector(".qa-sidebar-link"); info("Click on the ThisFirefox item in the sidebar"); const requestsSuccess = waitForRequestsSuccess(window.AboutDebugging.store); thisFirefoxLink.click(); @@ -55,7 +55,7 @@ add_task(async function() { await requestsSuccess; info("Check that the runtime info is rendered for This Firefox"); - const thisFirefoxRuntimeInfo = document.querySelector(".js-runtime-name"); + const thisFirefoxRuntimeInfo = document.querySelector(".qa-runtime-name"); ok(thisFirefoxRuntimeInfo, "Runtime info for this-firefox runtime is displayed"); const text = thisFirefoxRuntimeInfo.textContent; diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_fetch_flag.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_fetch_flag.js index 346e1a15d705..4bc7f27ae84b 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_fetch_flag.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_fetch_flag.js @@ -38,8 +38,8 @@ async function testServiceWorkerFetchStatus(doc, url, workerUrl, isListening) { const targetElement = await waitForServiceWorkerRunning(workerUrl, doc); const expectedClassName = isListening ? - ".js-worker-fetch-listening" : - ".js-worker-fetch-not-listening"; + ".qa-worker-fetch-listening" : + ".qa-worker-fetch-not-listening"; const fetchStatus = targetElement.querySelector(expectedClassName); ok(!!fetchStatus, "Found the expected fetch status: " + expectedClassName); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_multie10s.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_multie10s.js index 68bfa907d3d4..1a4ee354c685 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_multie10s.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_multie10s.js @@ -55,14 +55,14 @@ async function testDebuggingSW(enableMultiE10sFn, disableMultiE10sFn) { info("Wait until the service worker appears and is running"); await waitUntil(() => { const target = findDebugTargetByText(SERVICE_WORKER, document); - const status = target && target.querySelector(".js-worker-status"); + const status = target && target.querySelector(".qa-worker-status"); return status && status.textContent === "Running"; }); let targetElement = findDebugTargetByText(SERVICE_WORKER, document); - let pushButton = targetElement.querySelector(".js-push-button"); + let pushButton = targetElement.querySelector(".qa-push-button"); ok(!pushButton.disabled, "Push button is not disabled"); - let inspectButton = targetElement.querySelector(".js-debug-target-inspect-button"); + let inspectButton = targetElement.querySelector(".qa-debug-target-inspect-button"); ok(!inspectButton.disabled, "Inspect button is not disabled"); // enable multi e10s @@ -72,12 +72,12 @@ async function testDebuggingSW(enableMultiE10sFn, disableMultiE10sFn) { info("Wait for debug target to re-render"); await waitUntil(() => { targetElement = findDebugTargetByText(SERVICE_WORKER, document); - pushButton = targetElement.querySelector(".js-push-button"); + pushButton = targetElement.querySelector(".qa-push-button"); return pushButton.disabled; }); ok(pushButton.disabled, "Push button is disabled"); - inspectButton = targetElement.querySelector(".js-debug-target-inspect-button"); + inspectButton = targetElement.querySelector(".qa-debug-target-inspect-button"); ok(inspectButton.disabled, "Inspect button is disabled"); info("Unregister the service worker"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_not_compatible.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_not_compatible.js index 0b27e555aacb..0e5496fbda57 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_not_compatible.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_not_compatible.js @@ -94,7 +94,7 @@ add_task(async function testRemoteRuntime() { }); function assertWarningMessage(doc, expectedMessage) { - const hasMessage = !!doc.querySelector(".js-service-workers-warning"); + const hasMessage = !!doc.querySelector(".qa-service-workers-warning"); ok(hasMessage === expectedMessage, expectedMessage ? "Warning message is displayed" : "Warning message is not displayed"); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_push.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_push.js index a63563738b91..dd6c0218ece0 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_push.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_push.js @@ -30,7 +30,7 @@ add_task(async function() { const targetElement = await waitForServiceWorkerRunning(SERVICE_WORKER, document); // Retrieve the Push button for the worker. - const pushButton = targetElement.querySelector(".js-push-button"); + const pushButton = targetElement.querySelector(".qa-push-button"); ok(pushButton, "Found its push button"); info("Click on the Push button and wait for the push notification"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_pushservice_url.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_pushservice_url.js index fb2759fc0bea..5daf762b0e3e 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_pushservice_url.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_pushservice_url.js @@ -41,8 +41,8 @@ add_task(async function() { }); info("Wait until the push service appears"); - await waitUntil(() => targetElement.querySelector(".js-worker-push-service-value")); - const pushUrl = targetElement.querySelector(".js-worker-push-service-value"); + await waitUntil(() => targetElement.querySelector(".qa-worker-push-service-value")); + const pushUrl = targetElement.querySelector(".qa-worker-push-service-value"); ok(!!pushUrl, "Push URL is displayed for the serviceworker"); is(pushUrl.textContent, FAKE_ENDPOINT, "Push URL shows the expected content"); @@ -53,7 +53,7 @@ add_task(async function() { }); info("Wait until the push service disappears"); - await waitUntil(() => !targetElement.querySelector(".js-worker-push-service-value")); + await waitUntil(() => !targetElement.querySelector(".qa-worker-push-service-value")); info("Unregister the service worker"); await unregisterServiceWorker(swTab); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_runtime-page.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_runtime-page.js index b86075fe20bd..0a0c71fab092 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_runtime-page.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_runtime-page.js @@ -30,7 +30,7 @@ add_task(async function() { // check that SW list is empty info("Check that the SW pane is empty"); let swPane = getDebugTargetPane("Service Workers", document); - ok(!swPane.querySelector(".js-debug-target-item"), + ok(!swPane.querySelector(".qa-debug-target-item"), "SW list is empty"); // open a tab and register service worker @@ -42,9 +42,9 @@ add_task(async function() { await waitForServiceWorkerRunning(SW_URL, document); swPane = getDebugTargetPane("Service Workers", document); - ok(swPane.querySelectorAll(".js-debug-target-item").length === 1, + ok(swPane.querySelectorAll(".qa-debug-target-item").length === 1, "Service worker list has one element"); - ok(swPane.querySelector(".js-debug-target-item").textContent.includes(SW_URL), + ok(swPane.querySelector(".qa-debug-target-item").textContent.includes(SW_URL), "Service worker list is the one we registered"); // unregister the service worker @@ -54,7 +54,7 @@ add_task(async function() { info("Wait for service worker to disappear"); await waitUntil(() => { swPane = getDebugTargetPane("Service Workers", document); - return swPane.querySelectorAll(".js-debug-target-item").length === 0; + return swPane.querySelectorAll(".qa-debug-target-item").length === 0; }); info("Remove tabs"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_start.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_start.js index 7a91de906de0..f5eeb3ac9fc0 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_start.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_start.js @@ -40,7 +40,7 @@ add_task(async function() { const targetElement = await waitForServiceWorkerStopped(SW_URL, document); // Retrieve the Start button for the worker. - const startButton = targetElement.querySelector(".js-start-button"); + const startButton = targetElement.querySelector(".qa-start-button"); ok(startButton, "Found its start button"); info("Click on the start button and wait for the service worker to be running"); @@ -49,8 +49,8 @@ add_task(async function() { const updatedTarget = await onServiceWorkerRunning; // Check that the buttons are displayed as expected. - const hasInspectButton = updatedTarget.querySelector(".js-debug-target-inspect-button"); - const hasStartButton = updatedTarget.querySelector(".js-start-button"); + const hasInspectButton = updatedTarget.querySelector(".qa-debug-target-inspect-button"); + const hasStartButton = updatedTarget.querySelector(".qa-start-button"); ok(hasInspectButton, "Service worker has an inspect button"); ok(!hasStartButton, "Service worker does not have a start button"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_status.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_status.js index c65246503018..5d01bc0fcd88 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_status.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_status.js @@ -58,10 +58,10 @@ add_task(async function() { function checkButtons({ inspect, push, start, unregister }, workerText, document) { const targetElement = findDebugTargetByText(SW_URL, document); - const inspectButton = targetElement.querySelector(".js-debug-target-inspect-button"); - const pushButton = targetElement.querySelector(".js-push-button"); - const startButton = targetElement.querySelector(".js-start-button"); - const unregisterButton = targetElement.querySelector(".js-unregister-button"); + const inspectButton = targetElement.querySelector(".qa-debug-target-inspect-button"); + const pushButton = targetElement.querySelector(".qa-push-button"); + const startButton = targetElement.querySelector(".qa-start-button"); + const unregisterButton = targetElement.querySelector(".qa-unregister-button"); is(!!inspectButton, inspect, "Inspect button should be " + (inspect ? "visible" : "hidden")); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_timeout.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_timeout.js index 9762b52e726f..c1f5d06cb6e1 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_timeout.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_timeout.js @@ -90,10 +90,10 @@ add_task(async function() { function getStartButton(workerText, doc) { const target = findDebugTargetByText(workerText, doc); - return target ? target.querySelector(".js-start-button") : null; + return target ? target.querySelector(".qa-start-button") : null; } function getInspectButton(workerText, doc) { const target = findDebugTargetByText(workerText, doc); - return target ? target.querySelector(".js-debug-target-inspect-button") : null; + return target ? target.querySelector(".qa-debug-target-inspect-button") : null; } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_unregister.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_unregister.js index d81a10837e34..ffb8446d8b29 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_unregister.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_serviceworker_unregister.js @@ -29,7 +29,7 @@ add_task(async function() { const targetElement = await waitForServiceWorkerRunning(SW_URL, document); // Retrieve the Start button for the worker. - const unregisterButton = targetElement.querySelector(".js-unregister-button"); + const unregisterButton = targetElement.querySelector(".qa-unregister-button"); ok(unregisterButton, "Found its unregister button"); info("Click on the unregister button and wait for the service worker to disappear"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_connection_state.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_connection_state.js index 0eaf6c9b9c81..5218a0d1d3ff 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_connection_state.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_connection_state.js @@ -32,7 +32,7 @@ add_task(async function() { info("Wait until the USB sidebar item appears"); await waitUntil(() => findSidebarItemByText(RUNTIME_DEVICE_NAME, document)); const usbRuntimeSidebarItem = findSidebarItemByText(RUNTIME_DEVICE_NAME, document); - const connectButton = usbRuntimeSidebarItem.querySelector(".js-connect-button"); + const connectButton = usbRuntimeSidebarItem.querySelector(".qa-connect-button"); info("Simulate to happen connection error"); mocks.runtimeClientFactoryMock.createClientForRuntime = async (runtime) => { @@ -67,7 +67,7 @@ add_task(async function() { info("Unblock the connection and check the message and connect button disappear"); resumeConnection(); - await waitUntil(() => !usbRuntimeSidebarItem.querySelector(".js-connect-button")); + await waitUntil(() => !usbRuntimeSidebarItem.querySelector(".qa-connect-button")); ok(!document.querySelector(".qa-connection-error"), "Error disappears"); ok(!document.querySelector(".qa-connection-not-responding"), "Warning disappears"); @@ -98,7 +98,7 @@ add_task(async function() { info("Wait until the USB sidebar item appears"); await waitUntil(() => findSidebarItemByText(RUNTIME_DEVICE_NAME, document)); const usbRuntimeSidebarItem = findSidebarItemByText(RUNTIME_DEVICE_NAME, document); - const connectButton = usbRuntimeSidebarItem.querySelector(".js-connect-button"); + const connectButton = usbRuntimeSidebarItem.querySelector(".qa-connect-button"); let resumeConnection; const resumeConnectionPromise = new Promise(r => { diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_network_runtimes.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_network_runtimes.js index 620c16bf8c36..76d9063c3156 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_network_runtimes.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_network_runtimes.js @@ -17,14 +17,14 @@ add_task(async function() { const { document, tab } = await openAboutDebugging(); - const noDevicesElement = document.querySelector(".js-sidebar-no-devices"); + const noDevicesElement = document.querySelector(".qa-sidebar-no-devices"); ok(noDevicesElement, "Sidebar shows the 'no devices' element"); info("Add a network location"); networkLocationsModule.addNetworkLocation("localhost:6080"); info("Wait for 'no devices' element to disappear"); - waitUntil(() => !document.querySelector(".js-sidebar-no-devices")); + waitUntil(() => !document.querySelector(".qa-sidebar-no-devices")); ok(findSidebarItemByText("localhost:6080", document), "Found a sidebar item for localhost:6080"); @@ -32,7 +32,7 @@ add_task(async function() { networkLocationsModule.removeNetworkLocation("localhost:6080"); info("Wait for 'no devices' element to reappear"); - waitUntil(() => document.querySelector(".js-sidebar-no-devices")); + waitUntil(() => document.querySelector(".qa-sidebar-no-devices")); ok(!findSidebarItemByText("localhost:6080", document), "Sidebar item for localhost:6080 removed"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_connect.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_connect.js index 3782dca1a294..b2bebbc8644b 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_connect.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_connect.js @@ -26,12 +26,12 @@ add_task(async function() { info("Wait until the USB sidebar item appears"); await waitUntil(() => findSidebarItemByText(RUNTIME_DEVICE_NAME, document)); const usbRuntimeSidebarItem = findSidebarItemByText(RUNTIME_DEVICE_NAME, document); - const connectButton = usbRuntimeSidebarItem.querySelector(".js-connect-button"); + const connectButton = usbRuntimeSidebarItem.querySelector(".qa-connect-button"); ok(connectButton, "Connect button is displayed for the USB runtime"); info("Click on the connect button and wait until it disappears"); connectButton.click(); - await waitUntil(() => !usbRuntimeSidebarItem.querySelector(".js-connect-button")); + await waitUntil(() => !usbRuntimeSidebarItem.querySelector(".qa-connect-button")); info("Check whether the label of item is updated after connecting"); ok(usbRuntimeSidebarItem.textContent.includes(RUNTIME_NAME), "Label of item updated"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_refresh.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_refresh.js index 7e2f4ede7826..740676f72696 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_refresh.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_refresh.js @@ -33,13 +33,13 @@ add_task(async function() { // adb.updateRuntimes should ultimately fire the "runtime-list-updated" event. mocks.adbMock.adb.updateRuntimes = () => mocks.emitUSBUpdate(); - document.querySelector(".js-refresh-devices-button").click(); + document.querySelector(".qa-refresh-devices-button").click(); info(`Wait until the sidebar item for ${OTHER_RUNTIME_APP_NAME} appears`); await waitUntil(() => findSidebarItemByText(OTHER_RUNTIME_APP_NAME, document)); const sidebarItem = findSidebarItemByText(RUNTIME_DEVICE_NAME, document); - ok(!sidebarItem.querySelector(".js-connect-button"), + ok(!sidebarItem.querySelector(".qa-connect-button"), "Original USB runtime is still connected"); await removeTab(tab); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_select.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_select.js index 4bab6297a905..29f88d9da0e0 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_select.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_runtime_select.js @@ -18,7 +18,7 @@ add_task(async function() { info("Wait until the USB sidebar item appears"); await waitUntil(() => findSidebarItemByText(RUNTIME_DEVICE_NAME, document)); const sidebarItem = findSidebarItemByText(RUNTIME_DEVICE_NAME, document); - const connectButton = sidebarItem.querySelector(".js-connect-button"); + const connectButton = sidebarItem.querySelector(".qa-connect-button"); ok(connectButton, "Connect button is displayed for the USB runtime"); info("Click on the connect button and wait until the sidebar displays a link"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_status.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_status.js index 4e8a6a37bcd8..091f6500be8e 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_status.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_status.js @@ -16,7 +16,7 @@ add_task(async function() { CHROME_URL_ROOT + "resources/test-adb-extension/adb-extension-#OS#.xpi"); const { document, tab } = await openAboutDebugging(); - const usbStatusElement = document.querySelector(".js-sidebar-usb-status"); + const usbStatusElement = document.querySelector(".qa-sidebar-usb-status"); ok(usbStatusElement, "Sidebar shows the USB status element"); ok(usbStatusElement.textContent.includes("USB disabled"), "USB status element has 'disabled' content"); @@ -29,14 +29,14 @@ add_task(async function() { info("Wait till the USB status element has 'enabled' content"); await waitUntil(() => { - const el = document.querySelector(".js-sidebar-usb-status"); + const el = document.querySelector(".qa-sidebar-usb-status"); return el.textContent.includes("USB enabled"); }); info("Uninstall the adb extension and wait for USB status element to update"); adbAddon.uninstall(); await waitUntil(() => { - const el = document.querySelector(".js-sidebar-usb-status"); + const el = document.querySelector(".qa-sidebar-usb-status"); return el.textContent.includes("USB disabled"); }); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_unavailable_runtime.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_unavailable_runtime.js index 0228aad3eda4..4c5b50eb9119 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_unavailable_runtime.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_sidebar_usb_unavailable_runtime.js @@ -28,10 +28,10 @@ add_task(async function() { ok(usbRuntimeSidebarItem.querySelector(".qa-runtime-item-waiting-for-browser"), "Sidebar item shows as `Waiting for browser`"); - const hasConnectButton = usbRuntimeSidebarItem.querySelector(".js-connect-button"); + const hasConnectButton = usbRuntimeSidebarItem.querySelector(".qa-connect-button"); ok(!hasConnectButton, "Connect button is not displayed"); - const hasLink = usbRuntimeSidebarItem.querySelector(".js-sidebar-link"); + const hasLink = usbRuntimeSidebarItem.querySelector(".qa-sidebar-link"); ok(!hasLink, "Unavailable runtime is not selectable"); info("Add a valid runtime for the same device id and emit update event"); @@ -47,7 +47,7 @@ add_task(async function() { let updatedSidebarItem = null; await waitUntil(() => { updatedSidebarItem = findSidebarItemByText(DEVICE_NAME, document); - return updatedSidebarItem && updatedSidebarItem.querySelector(".js-connect-button"); + return updatedSidebarItem && updatedSidebarItem.querySelector(".qa-connect-button"); }); ok(updatedSidebarItem.querySelector(".qa-runtime-item-standard"), diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_tab_favicons.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_tab_favicons.js index 4d4e5ee647e8..730196a0fa3b 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_tab_favicons.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_tab_favicons.js @@ -26,7 +26,7 @@ add_task(async function() { await waitUntil(() => findDebugTargetByText("Favicon tab", document)); const faviconTabTarget = findDebugTargetByText("Favicon tab", document); - const faviconTabIcon = faviconTabTarget.querySelector(".js-debug-target-item-icon"); + const faviconTabIcon = faviconTabTarget.querySelector(".qa-debug-target-item-icon"); // Note this relies on PlaceUtils.promiseFaviconData returning the same data-url as the // one provided in the test page. If the implementation changes and PlaceUtils returns a diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_inspect.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_inspect.js index 304b1c5f67c7..151bff4dab25 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_inspect.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_inspect.js @@ -27,7 +27,7 @@ add_task(async function() { await waitUntil(() => findDebugTargetByText("TEST_TAB", document)); const tabTarget = findDebugTargetByText("TEST_TAB", document); - const inspectButton = tabTarget.querySelector(".js-debug-target-inspect-button"); + const inspectButton = tabTarget.querySelector(".qa-debug-target-inspect-button"); ok(inspectButton, "Inspect button for the tab is available"); info("Click on the inspect button for the test tab"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_navigate.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_navigate.js index a7432f766b59..c22db61e8b29 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_navigate.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_navigate.js @@ -23,7 +23,7 @@ add_task(async function() { info("Navigate to 'Connect' page"); document.location.hash = "#/connect"; - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); checkSelectPageEvent("connect", sessionId); info("Navigate to 'USB device runtime' page"); @@ -51,5 +51,5 @@ async function navigateToUSBRuntime(mocks, doc) { await connectToRuntime("Fancy Phone", doc); // navigate to it via URL doc.location.hash = "#/runtime/1337id"; - await waitUntil(() => doc.querySelector(".js-runtime-page")); + await waitUntil(() => doc.querySelector(".qa-runtime-page")); } diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_runtime_actions.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_runtime_actions.js index 47e6f86b36dd..9ee00e829d73 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_runtime_actions.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_telemetry_runtime_actions.js @@ -42,7 +42,7 @@ add_task(async function testUsbRuntimeUpdates() { const telemetryRuntimeId = runtimeAddedEvent.extras.runtime_id; info("Click on the toggle button and wait until the text is updated"); - const promptButton = document.querySelector(".js-connection-prompt-toggle-button"); + const promptButton = document.querySelector(".qa-connection-prompt-toggle-button"); promptButton.click(); await waitUntil(() => promptButton.textContent.includes("Enable")); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox.js index 385213625057..c472aa2eef61 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox.js @@ -44,14 +44,14 @@ add_task(async function testThisFirefoxWithoutLocalTab() { async function checkThisFirefoxTargetPanes(doc, expectedTargetPanes) { const win = doc.ownerGlobal; // Check that the selected sidebar item is "This Firefox"/"This Nightly"/... - const selectedSidebarItem = doc.querySelector(".js-sidebar-item-selected"); + const selectedSidebarItem = doc.querySelector(".qa-sidebar-item-selected"); ok(selectedSidebarItem, "An item is selected in the sidebar"); const thisFirefoxString = getThisFirefoxString(win); is(selectedSidebarItem.textContent, thisFirefoxString, "The selected sidebar item is " + thisFirefoxString); - const paneTitlesEls = doc.querySelectorAll(".js-debug-target-pane-title"); + const paneTitlesEls = doc.querySelectorAll(".qa-debug-target-pane-title"); is(paneTitlesEls.length, expectedTargetPanes.length, "This Firefox has the expected number of debug target categories"); diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox_runtime_info.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox_runtime_info.js index 37310da62a70..71dacf0b9696 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox_runtime_info.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_thisfirefox_runtime_info.js @@ -31,7 +31,7 @@ add_task(async function() { await selectThisFirefoxPage(document, window.AboutDebugging.store); info("Check that the 'This Firefox' mock is properly displayed"); - const thisFirefoxRuntimeInfo = document.querySelector(".js-runtime-name"); + const thisFirefoxRuntimeInfo = document.querySelector(".qa-runtime-name"); ok(thisFirefoxRuntimeInfo, "Runtime info for this-firefox runtime is displayed"); const runtimeInfoText = thisFirefoxRuntimeInfo.textContent; ok(runtimeInfoText.includes("Firefox"), diff --git a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_workers_remote_runtime.js b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_workers_remote_runtime.js index 683b3031a589..52396f71719c 100644 --- a/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_workers_remote_runtime.js +++ b/devtools/client/aboutdebugging-new/test/browser/browser_aboutdebugging_workers_remote_runtime.js @@ -81,7 +81,7 @@ async function testWorkerOnMockedRemoteClient(testData, remoteClient, firefoxCli const workersPane = getDebugTargetPane(category, document); info("Check an empty target pane message is displayed"); - ok(workersPane.querySelector(".js-debug-target-list-empty"), + ok(workersPane.querySelector(".qa-debug-target-list-empty"), "Workers list is empty"); info(`Add a worker of type [${propertyName}] to the remote client`); @@ -97,7 +97,7 @@ async function testWorkerOnMockedRemoteClient(testData, remoteClient, firefoxCli remoteClient._eventEmitter.emit("workersUpdated"); info("Wait until the worker appears"); - await waitUntil(() => !workersPane.querySelector(".js-debug-target-list-empty")); + await waitUntil(() => !workersPane.querySelector(".qa-debug-target-list-empty")); const workerTarget = findDebugTargetByText(workerName, document); ok(workerTarget, "Worker target appeared for the remote runtime"); diff --git a/devtools/client/aboutdebugging-new/test/browser/head.js b/devtools/client/aboutdebugging-new/test/browser/head.js index b193b73bea0d..7c439224c0ba 100644 --- a/devtools/client/aboutdebugging-new/test/browser/head.js +++ b/devtools/client/aboutdebugging-new/test/browser/head.js @@ -62,7 +62,7 @@ async function openAboutDebugging({ enableWorkerUpdates, enableLocalTabs = true const window = browser.contentWindow; info("Wait until Connect page is displayed"); - await waitUntil(() => document.querySelector(".js-connect-page")); + await waitUntil(() => document.querySelector(".qa-connect-page")); return { tab, document, window }; } @@ -72,7 +72,7 @@ async function openAboutDevtoolsToolbox(doc, tab, win, targetText = "about:debug info("Open about:devtools-toolbox page"); const target = findDebugTargetByText(targetText, doc); ok(target, `${ targetText } tab target appeared`); - const inspectButton = target.querySelector(".js-debug-target-inspect-button"); + const inspectButton = target.querySelector(".qa-debug-target-inspect-button"); ok(inspectButton, `Inspect button for ${ targetText } appeared`); inspectButton.click(); await Promise.all([ @@ -91,7 +91,7 @@ async function openAboutDevtoolsToolbox(doc, tab, win, targetText = "about:debug if (!shouldWaitToolboxReady) { // Wait for show error page. await waitUntil(() => - devtoolsBrowser.contentDocument.querySelector(".js-error-page")); + devtoolsBrowser.contentDocument.querySelector(".qa-error-page")); } return { @@ -206,26 +206,26 @@ async function selectThisFirefoxPage(doc, store) { info("Wait for requests to be complete"); await onRequestSuccess; info("Wait for runtime page to be rendered"); - await waitUntil(() => doc.querySelector(".js-runtime-page")); + await waitUntil(() => doc.querySelector(".qa-runtime-page")); } /** * Navigate to the Connect page. Resolves when the Connect page is rendered. */ async function selectConnectPage(doc) { - const sidebarItems = doc.querySelectorAll(".js-sidebar-item"); + const sidebarItems = doc.querySelectorAll(".qa-sidebar-item"); const connectSidebarItem = [...sidebarItems].find(element => { return element.textContent === "Setup"; }); ok(connectSidebarItem, "Sidebar contains a Connect item"); - const connectLink = connectSidebarItem.querySelector(".js-sidebar-link"); + const connectLink = connectSidebarItem.querySelector(".qa-sidebar-link"); ok(connectLink, "Sidebar contains a Connect link"); info("Click on the Connect link in the sidebar"); connectLink.click(); info("Wait until Connect page is displayed"); - await waitUntil(() => doc.querySelector(".js-connect-page")); + await waitUntil(() => doc.querySelector(".qa-connect-page")); } function getDebugTargetPane(title, document) { @@ -235,31 +235,31 @@ function getDebugTargetPane(title, document) { }; const targetTitle = sanitizeTitle(title); - for (const titleEl of document.querySelectorAll(".js-debug-target-pane-title")) { + for (const titleEl of document.querySelectorAll(".qa-debug-target-pane-title")) { if (sanitizeTitle(titleEl.textContent) !== targetTitle) { continue; } - return titleEl.closest(".js-debug-target-pane"); + return titleEl.closest(".qa-debug-target-pane"); } return null; } function findDebugTargetByText(text, document) { - const targets = [...document.querySelectorAll(".js-debug-target-item")]; + const targets = [...document.querySelectorAll(".qa-debug-target-item")]; return targets.find(target => target.textContent.includes(text)); } function findSidebarItemByText(text, document) { - const sidebarItems = document.querySelectorAll(".js-sidebar-item"); + const sidebarItems = document.querySelectorAll(".qa-sidebar-item"); return [...sidebarItems].find(element => { return element.textContent.includes(text); }); } function findSidebarItemLinkByText(text, document) { - const links = document.querySelectorAll(".js-sidebar-link"); + const links = document.querySelectorAll(".qa-sidebar-link"); return [...links].find(element => { return element.textContent.includes(text); }); @@ -269,20 +269,20 @@ async function connectToRuntime(deviceName, document) { info(`Wait until the sidebar item for ${deviceName} appears`); await waitUntil(() => findSidebarItemByText(deviceName, document)); const sidebarItem = findSidebarItemByText(deviceName, document); - const connectButton = sidebarItem.querySelector(".js-connect-button"); + const connectButton = sidebarItem.querySelector(".qa-connect-button"); ok(connectButton, `Connect button is displayed for the runtime ${deviceName}`); info("Click on the connect button and wait until it disappears"); connectButton.click(); - await waitUntil(() => !sidebarItem.querySelector(".js-connect-button")); + await waitUntil(() => !sidebarItem.querySelector(".qa-connect-button")); } async function selectRuntime(deviceName, name, document) { const sidebarItem = findSidebarItemByText(deviceName, document); - sidebarItem.querySelector(".js-sidebar-link").click(); + sidebarItem.querySelector(".qa-sidebar-link").click(); await waitUntil(() => { - const runtimeInfo = document.querySelector(".js-runtime-name"); + const runtimeInfo = document.querySelector(".qa-runtime-name"); return runtimeInfo && runtimeInfo.textContent.includes(name); }); } @@ -301,7 +301,7 @@ async function openProfilerDialog(client, doc) { }); info("Click on the Profile Runtime button"); - const profileButton = doc.querySelector(".js-profile-runtime-button"); + const profileButton = doc.querySelector(".qa-profile-runtime-button"); profileButton.click(); info("Wait for the loadPerformanceProfiler callback to be executed on client-wrapper"); diff --git a/devtools/client/aboutdebugging-new/test/browser/helper-addons.js b/devtools/client/aboutdebugging-new/test/browser/helper-addons.js index ad21c0719072..cb0fb90968d5 100644 --- a/devtools/client/aboutdebugging-new/test/browser/helper-addons.js +++ b/devtools/client/aboutdebugging-new/test/browser/helper-addons.js @@ -70,7 +70,7 @@ async function installTemporaryExtension(pathOrFile, name, document) { }); // Trigger the file picker by clicking on the button - document.querySelector(".js-temporary-extension-install-button").click(); + document.querySelector(".qa-temporary-extension-install-button").click(); info("Wait for addon to be installed"); await onAddonInstalled; @@ -136,7 +136,7 @@ async function installTemporaryExtensionFromXPI(xpiData, document) { async function removeTemporaryExtension(name, document) { info(`Remove the temporary extension with name: '${name}'`); const temporaryExtensionItem = findDebugTargetByText(name, document); - temporaryExtensionItem.querySelector(".js-temporary-extension-remove-button").click(); + temporaryExtensionItem.querySelector(".qa-temporary-extension-remove-button").click(); info("Wait until the debug target item disappears"); await waitUntil(() => !findDebugTargetByText(name, document)); diff --git a/devtools/client/aboutdebugging-new/test/browser/helper-collapsibilities.js b/devtools/client/aboutdebugging-new/test/browser/helper-collapsibilities.js index 5c42dd23ecd2..0f0d28da1db6 100644 --- a/devtools/client/aboutdebugging-new/test/browser/helper-collapsibilities.js +++ b/devtools/client/aboutdebugging-new/test/browser/helper-collapsibilities.js @@ -40,7 +40,7 @@ function prepareCollapsibilitiesTest() { /* exported prepareCollapsibilitiesTest */ async function toggleCollapsibility(debugTargetPane) { - debugTargetPane.querySelector(".js-debug-target-pane-title").click(); + debugTargetPane.querySelector(".qa-debug-target-pane-title").click(); // Wait for animation of collapse/expand. const animations = debugTargetPane.ownerDocument.getAnimations(); await Promise.all(animations.map(animation => animation.finished)); diff --git a/devtools/client/aboutdebugging-new/test/browser/helper-real-usb.js b/devtools/client/aboutdebugging-new/test/browser/helper-real-usb.js index 41316ace7d8f..2ba21d1d69ab 100644 --- a/devtools/client/aboutdebugging-new/test/browser/helper-real-usb.js +++ b/devtools/client/aboutdebugging-new/test/browser/helper-real-usb.js @@ -37,7 +37,7 @@ async function openAboutDebuggingWithADB() { const { adbAddon } = require("devtools/shared/adb/adb-addon"); adbAddon.install("internal"); - const usbStatusElement = document.querySelector(".js-sidebar-usb-status"); + const usbStatusElement = document.querySelector(".qa-sidebar-usb-status"); await waitUntil(() => usbStatusElement.textContent.includes("USB enabled")); await waitForAdbStart(); diff --git a/devtools/client/aboutdebugging-new/test/browser/helper-serviceworker.js b/devtools/client/aboutdebugging-new/test/browser/helper-serviceworker.js index 6239b8753f75..ac1602d421c1 100644 --- a/devtools/client/aboutdebugging-new/test/browser/helper-serviceworker.js +++ b/devtools/client/aboutdebugging-new/test/browser/helper-serviceworker.js @@ -43,7 +43,7 @@ function onTabMessage(tab, message) { async function _waitForServiceWorkerStatus(workerText, status, document) { await waitUntil(() => { const target = findDebugTargetByText(workerText, document); - const statusElement = target && target.querySelector(".js-worker-status"); + const statusElement = target && target.querySelector(".qa-worker-status"); return statusElement && statusElement.textContent === status; }); diff --git a/devtools/client/framework/components/DebugTargetErrorPage.js b/devtools/client/framework/components/DebugTargetErrorPage.js index f683973e59c4..33c80e5b0b20 100644 --- a/devtools/client/framework/components/DebugTargetErrorPage.js +++ b/devtools/client/framework/components/DebugTargetErrorPage.js @@ -25,7 +25,7 @@ class DebugTargetErrorPage extends PureComponent { return dom.article( { - className: "error-page js-error-page", + className: "error-page qa-error-page", }, dom.h1( { diff --git a/devtools/client/framework/components/DebugTargetInfo.js b/devtools/client/framework/components/DebugTargetInfo.js index 6b3cad1b72b7..0f6f41546de0 100644 --- a/devtools/client/framework/components/DebugTargetInfo.js +++ b/devtools/client/framework/components/DebugTargetInfo.js @@ -135,7 +135,7 @@ class DebugTargetInfo extends PureComponent { return dom.span( { - className: "iconized-label js-connection-info", + className: "iconized-label qa-connection-info", }, dom.img({ src: image, alt: `${connectionType} icon`}), this.props.L10N.getStr(l10nId), @@ -171,7 +171,7 @@ class DebugTargetInfo extends PureComponent { className: "iconized-label", }, dom.img({ src: image, alt: this.props.L10N.getStr(l10nId)}), - title ? dom.b({ className: "devtools-ellipsis-text js-target-title"}, title) : null, + title ? dom.b({ className: "devtools-ellipsis-text qa-target-title"}, title) : null, dom.span({ className: "devtools-ellipsis-text" }, url), ); } @@ -179,7 +179,7 @@ class DebugTargetInfo extends PureComponent { render() { return dom.header( { - className: "debug-target-info js-debug-target-info", + className: "debug-target-info qa-debug-target-info", }, this.shallRenderConnection() ? this.renderConnection() : null, this.renderRuntime(), diff --git a/devtools/client/framework/test/browser_about-devtools-toolbox_load.js b/devtools/client/framework/test/browser_about-devtools-toolbox_load.js index 20c6ec93a78d..951f493152f7 100644 --- a/devtools/client/framework/test/browser_about-devtools-toolbox_load.js +++ b/devtools/client/framework/test/browser_about-devtools-toolbox_load.js @@ -22,7 +22,7 @@ add_task(async function() { await removeTab(tab); async function assertErrorIsShown(doc) { - await waitUntil(() => doc.querySelector(".js-error-page")); - ok(doc.querySelector(".js-error-page"), "Error page is rendered"); + await waitUntil(() => doc.querySelector(".qa-error-page")); + ok(doc.querySelector(".qa-error-page"), "Error page is rendered"); } }); diff --git a/devtools/client/framework/test/jest/components/__snapshots__/debug-target-info.test.js.snap b/devtools/client/framework/test/jest/components/__snapshots__/debug-target-info.test.js.snap index e3c2d90c280e..9a04088030ac 100644 --- a/devtools/client/framework/test/jest/components/__snapshots__/debug-target-info.test.js.snap +++ b/devtools/client/framework/test/jest/components/__snapshots__/debug-target-info.test.js.snap @@ -2,10 +2,10 @@ exports[`DebugTargetInfo component Connection info renders the expected snapshot for USB Release target 1`] = `
usb icon Test Tab Name @@ -54,10 +54,10 @@ exports[`DebugTargetInfo component Connection info renders the expected snapshot exports[`DebugTargetInfo component Target icon renders the expected snapshot for a process target 1`] = `
usb icon Test Tab Name @@ -106,10 +106,10 @@ exports[`DebugTargetInfo component Target icon renders the expected snapshot for exports[`DebugTargetInfo component Target icon renders the expected snapshot for a tab target 1`] = `
usb icon Test Tab Name @@ -158,10 +158,10 @@ exports[`DebugTargetInfo component Target icon renders the expected snapshot for exports[`DebugTargetInfo component Target icon renders the expected snapshot for a worker target 1`] = `
usb icon Test Tab Name @@ -210,10 +210,10 @@ exports[`DebugTargetInfo component Target icon renders the expected snapshot for exports[`DebugTargetInfo component Target icon renders the expected snapshot for an extension target 1`] = `
usb icon Test Tab Name @@ -262,7 +262,7 @@ exports[`DebugTargetInfo component Target icon renders the expected snapshot for exports[`DebugTargetInfo component Target title renders the expected snapshot for This Firefox target 1`] = `
Test Tab Name @@ -303,7 +303,7 @@ exports[`DebugTargetInfo component Target title renders the expected snapshot fo exports[`DebugTargetInfo component Target title renders the expected snapshot for a Toolbox with an unnamed target 1`] = `
{ describe("Connection info", () => { it("displays connection info for USB Release target", () => { const component = renderer.create(DebugTargetInfo(USB_TARGET_INFO)); - expect(findByClassName(component.root, "js-connection-info").length).toEqual(1); + expect(findByClassName(component.root, "qa-connection-info").length).toEqual(1); }); it("renders the expected snapshot for USB Release target", () => { @@ -97,14 +97,14 @@ describe("DebugTargetInfo component", () => { it("hides the connection info for This Firefox target", () => { const component = renderer.create(DebugTargetInfo(THIS_FIREFOX_TARGET_INFO)); - expect(findByClassName(component.root, "js-connection-info").length).toEqual(0); + expect(findByClassName(component.root, "qa-connection-info").length).toEqual(0); }); }); describe("Target title", () => { it("displays the target title if the target of the Toolbox has a name", () => { const component = renderer.create(DebugTargetInfo(THIS_FIREFOX_TARGET_INFO)); - expect(findByClassName(component.root, "js-target-title").length).toEqual(1); + expect(findByClassName(component.root, "qa-target-title").length).toEqual(1); }); it("renders the expected snapshot for This Firefox target", () => { @@ -114,7 +114,7 @@ describe("DebugTargetInfo component", () => { it("doesn't display the target title if the target of the Toolbox has no name", () => { const component = renderer.create(DebugTargetInfo(THIS_FIREFOX_NO_NAME_TARGET_INFO)); - expect(findByClassName(component.root, "js-target-title").length).toEqual(0); + expect(findByClassName(component.root, "qa-target-title").length).toEqual(0); }); it("renders the expected snapshot for a Toolbox with an unnamed target", () => { diff --git a/dom/base/Element.cpp b/dom/base/Element.cpp index 203ba5d73b2a..4e7b3d4a49d3 100644 --- a/dom/base/Element.cpp +++ b/dom/base/Element.cpp @@ -3452,11 +3452,7 @@ already_AddRefed Element::Animate( // Animation constructor follows the standard Xray calling convention and // needs to be called in the target element's realm. - Maybe ar; - if (js::GetContextCompartment(aContext) != - js::GetObjectCompartment(ownerGlobal->GetGlobalJSObject())) { - ar.emplace(aContext, ownerGlobal->GetGlobalJSObject()); - } + JSAutoRealm ar(aContext, global.Get()); AnimationTimeline* timeline = referenceElement->OwnerDoc()->Timeline(); RefPtr animation = Animation::Constructor( diff --git a/dom/base/PopupBlocker.cpp b/dom/base/PopupBlocker.cpp index 10a66338eb57..29078cea2601 100644 --- a/dom/base/PopupBlocker.cpp +++ b/dom/base/PopupBlocker.cpp @@ -185,7 +185,7 @@ PopupBlocker::PopupControlState PopupBlocker::GetEventPopupControlState( case eBasicEventClass: // For these following events only allow popups if they're // triggered while handling user input. See - // nsPresShell::HandleEventInternal() for details. + // PresShell::EventHandler::PrepareToDispatchEvent() for details. if (EventStateManager::IsHandlingUserInput()) { abuse = PopupBlocker::openBlocked; switch (aEvent->mMessage) { @@ -207,7 +207,7 @@ PopupBlocker::PopupControlState PopupBlocker::GetEventPopupControlState( case eEditorInputEventClass: // For this following event only allow popups if it's triggered // while handling user input. See - // nsPresShell::HandleEventInternal() for details. + // PresShell::EventHandler::PrepareToDispatchEvent() for details. if (EventStateManager::IsHandlingUserInput()) { abuse = PopupBlocker::openBlocked; switch (aEvent->mMessage) { @@ -224,7 +224,7 @@ PopupBlocker::PopupControlState PopupBlocker::GetEventPopupControlState( case eInputEventClass: // For this following event only allow popups if it's triggered // while handling user input. See - // nsPresShell::HandleEventInternal() for details. + // PresShell::EventHandler::PrepareToDispatchEvent() for details. if (EventStateManager::IsHandlingUserInput()) { abuse = PopupBlocker::openBlocked; switch (aEvent->mMessage) { @@ -370,7 +370,7 @@ PopupBlocker::PopupControlState PopupBlocker::GetEventPopupControlState( case eFormEventClass: // For these following events only allow popups if they're // triggered while handling user input. See - // nsPresShell::HandleEventInternal() for details. + // PresShell::EventHandler::PrepareToDispatchEvent() for details. if (EventStateManager::IsHandlingUserInput()) { abuse = PopupBlocker::openBlocked; switch (aEvent->mMessage) { diff --git a/dom/base/nsGlobalWindowOuter.h b/dom/base/nsGlobalWindowOuter.h index e5acac286bfb..2631a029bc76 100644 --- a/dom/base/nsGlobalWindowOuter.h +++ b/dom/base/nsGlobalWindowOuter.h @@ -1140,7 +1140,7 @@ class nsGlobalWindowOuter final : public mozilla::dom::EventTarget, // All accesses to this field should be guarded by a check of mIsChrome. struct ChromeFields { nsCOMPtr mBrowserDOMWindow; - // A weak pointer to the nsPresShell that we are doing fullscreen for. + // A weak pointer to the PresShell that we are doing fullscreen for. // The pointer being set indicates we've set the IsInFullscreenChange // flag on this pres shell. nsWeakPtr mFullscreenPresShell; diff --git a/dom/canvas/CanvasUtils.cpp b/dom/canvas/CanvasUtils.cpp index 47cc342f45a5..c49d02a6c3db 100644 --- a/dom/canvas/CanvasUtils.cpp +++ b/dom/canvas/CanvasUtils.cpp @@ -25,6 +25,7 @@ #include "mozilla/gfx/Matrix.h" #include "WebGL2Context.h" +#include "nsIScriptError.h" #include "nsIScriptObjectPrincipal.h" #include "nsIPermissionManager.h" #include "nsIObserverService.h" @@ -80,17 +81,11 @@ bool IsImageExtractionAllowed(Document* aDocument, JSContext* aCx, return true; } - // Get calling script file and line for logging. + // Don't show canvas prompt for PDF.js JS::AutoFilename scriptFile; - unsigned scriptLine = 0; - bool isScriptKnown = false; - if (JS::DescribeScriptedCaller(aCx, &scriptFile, &scriptLine)) { - isScriptKnown = true; - // Don't show canvas prompt for PDF.js - if (scriptFile.get() && - strcmp(scriptFile.get(), "resource://pdf.js/build/pdf.js") == 0) { - return true; - } + if (JS::DescribeScriptedCaller(aCx, &scriptFile) && scriptFile.get() && + strcmp(scriptFile.get(), "resource://pdf.js/build/pdf.js") == 0) { + return true; } Document* topLevelDocument = aDocument->GetTopLevelContentDocument(); @@ -112,14 +107,12 @@ bool IsImageExtractionAllowed(Document* aDocument, JSContext* aCx, rv = thirdPartyUtil->IsThirdPartyURI(topLevelDocURI, docURI, &isThirdParty); NS_ENSURE_SUCCESS(rv, false); if (isThirdParty) { - nsAutoCString message; - message.AppendPrintf( - "Blocked third party %s in page %s from extracting canvas data.", - docURISpec.get(), topLevelDocURISpec.get()); - if (isScriptKnown) { - message.AppendPrintf(" %s:%u.", scriptFile.get(), scriptLine); - } - nsContentUtils::LogMessageToConsole(message.get()); + nsAutoString message; + message.AppendPrintf("Blocked third party %s from extracting canvas data.", + docURISpec.get()); + nsContentUtils::ReportToConsoleNonLocalized( + message, nsIScriptError::warningFlag, NS_LITERAL_CSTRING("Security"), + aDocument); return false; } @@ -153,26 +146,23 @@ bool IsImageExtractionAllowed(Document* aDocument, JSContext* aCx, !EventStateManager::IsHandlingUserInput(); if (isAutoBlockCanvas) { - nsAutoCString message; + nsAutoString message; message.AppendPrintf( - "Blocked %s in page %s from extracting canvas data because no user " - "input was detected.", - docURISpec.get(), topLevelDocURISpec.get()); - if (isScriptKnown) { - message.AppendPrintf(" %s:%u.", scriptFile.get(), scriptLine); - } - nsContentUtils::LogMessageToConsole(message.get()); + "Blocked %s from extracting canvas data because no user input was " + "detected.", + docURISpec.get()); + nsContentUtils::ReportToConsoleNonLocalized( + message, nsIScriptError::warningFlag, NS_LITERAL_CSTRING("Security"), + aDocument); } else { // It was in response to user input, so log and display the prompt. - nsAutoCString message; + nsAutoString message; message.AppendPrintf( - "Blocked %s in page %s from extracting canvas data, but prompting the " - "user.", - docURISpec.get(), topLevelDocURISpec.get()); - if (isScriptKnown) { - message.AppendPrintf(" %s:%u.", scriptFile.get(), scriptLine); - } - nsContentUtils::LogMessageToConsole(message.get()); + "Blocked %s from extracting canvas data, but prompting the user.", + docURISpec.get()); + nsContentUtils::ReportToConsoleNonLocalized( + message, nsIScriptError::warningFlag, NS_LITERAL_CSTRING("Security"), + aDocument); } // Prompt the user (asynchronous). diff --git a/dom/events/EventDispatcher.h b/dom/events/EventDispatcher.h index 9a10360e6975..bf52dc57ffc2 100644 --- a/dom/events/EventDispatcher.h +++ b/dom/events/EventDispatcher.h @@ -303,7 +303,7 @@ class EventChainPostVisitor : public mozilla::EventChainVisitor { * If an EventDispatchingCallback object is passed to Dispatch, * its HandleEvent method is called after handling the default event group, * before handling the system event group. - * This is used in nsPresShell. + * This is used in PresShell. */ class MOZ_STACK_CLASS EventDispatchingCallback { public: diff --git a/dom/interfaces/base/nsIDOMWindowUtils.idl b/dom/interfaces/base/nsIDOMWindowUtils.idl index 217c037f1afe..0cee1f8f2ebd 100644 --- a/dom/interfaces/base/nsIDOMWindowUtils.idl +++ b/dom/interfaces/base/nsIDOMWindowUtils.idl @@ -841,7 +841,7 @@ interface nsIDOMWindowUtils : nsISupports { * Note: this does not take effect right away. Rather, the visual scroll * request is sent to APZ with the next transaction, and will be * reflected in the main thread with the subsequent APZ repaint request. - * Please see the caveats mentioned at nsIPresShell::ScrollToVisual(), and + * Please see the caveats mentioned at PresShell::ScrollToVisual(), and * request APZ review if adding a new call to this. */ const long UPDATE_TYPE_RESTORE = 0; diff --git a/dom/ipc/tests/test_force_oop_iframe.html b/dom/ipc/tests/test_force_oop_iframe.html index a133cf4f6832..a38fdea55f02 100644 --- a/dom/ipc/tests/test_force_oop_iframe.html +++ b/dom/ipc/tests/test_force_oop_iframe.html @@ -13,7 +13,9 @@ add_task(async function() { await SpecialPowers.pushPrefEnv({"set": [["fission.oopif.attribute", true], - ["dom.ipc.processCount", 10000]]}); + ["dom.ipc.processCount", 10000], + // Temporarily allow use of eval() in ChromeTask.js. + ["security.allow_eval_with_system_principal", true]]}); // This iframe should be loaded out of process. Unfortunately as of the time // of this test's creation, many different events which we could use to detect diff --git a/dom/media/webaudio/AudioBuffer.cpp b/dom/media/webaudio/AudioBuffer.cpp index 003ab33eec9e..f9511dff41fc 100644 --- a/dom/media/webaudio/AudioBuffer.cpp +++ b/dom/media/webaudio/AudioBuffer.cpp @@ -303,10 +303,7 @@ void AudioBuffer::CopyFromChannel(const Float32Array& aDestination, aDestination.ComputeLengthAndData(); uint32_t length = aDestination.Length(); - CheckedInt end = aStartInChannel; - end += length; - if (aChannelNumber >= NumberOfChannels() || !end.isValid() || - end.value() > Length()) { + if (aChannelNumber >= NumberOfChannels() || aStartInChannel > Length()) { aRv.Throw(NS_ERROR_DOM_INDEX_SIZE_ERR); return; } @@ -326,7 +323,8 @@ void AudioBuffer::CopyFromChannel(const Float32Array& aDestination, // The sourceData arrays should all have originated in // RestoreJSChannelData, where they are created unshared. MOZ_ASSERT(!isShared); - PodMove(aDestination.Data(), sourceData + aStartInChannel, length); + PodMove(aDestination.Data(), sourceData + aStartInChannel, + std::min(Length() - aStartInChannel, length)); return; } @@ -346,10 +344,7 @@ void AudioBuffer::CopyToChannel(JSContext* aJSContext, aSource.ComputeLengthAndData(); uint32_t length = aSource.Length(); - CheckedInt end = aStartInChannel; - end += length; - if (aChannelNumber >= NumberOfChannels() || !end.isValid() || - end.value() > Length()) { + if (aChannelNumber >= NumberOfChannels() || aStartInChannel > Length()) { aRv.Throw(NS_ERROR_DOM_INDEX_SIZE_ERR); return; } @@ -372,7 +367,8 @@ void AudioBuffer::CopyToChannel(JSContext* aJSContext, // The channelData arrays should all have originated in // RestoreJSChannelData, where they are created unshared. MOZ_ASSERT(!isShared); - PodMove(channelData + aStartInChannel, aSource.Data(), length); + PodMove(channelData + aStartInChannel, aSource.Data(), + std::min(Length() - aStartInChannel, length)); } void AudioBuffer::GetChannelData(JSContext* aJSContext, uint32_t aChannel, diff --git a/dom/network/TCPServerSocketParent.cpp b/dom/network/TCPServerSocketParent.cpp index 2644cdafbcb3..e914eeeb1642 100644 --- a/dom/network/TCPServerSocketParent.cpp +++ b/dom/network/TCPServerSocketParent.cpp @@ -52,8 +52,6 @@ void TCPServerSocketParent::Init() { } nsresult TCPServerSocketParent::SendCallbackAccept(TCPSocketParent* socket) { - socket->AddIPDLReference(); - nsresult rv; nsString host; @@ -72,6 +70,10 @@ nsresult TCPServerSocketParent::SendCallbackAccept(TCPSocketParent* socket) { if (mNeckoParent) { if (mNeckoParent->SendPTCPSocketConstructor(socket, host, port)) { + // Call |AddIPDLReference| after the consructor message is sent + // successfully, otherwise |socket| could be leaked. + socket->AddIPDLReference(); + mozilla::Unused << PTCPServerSocketParent::SendCallbackAccept(socket); } else { NS_ERROR("Sending data from PTCPSocketParent was failed."); diff --git a/dom/network/TCPSocket.cpp b/dom/network/TCPSocket.cpp index 3bf3d4be0b2a..0a4866cc8b50 100644 --- a/dom/network/TCPSocket.cpp +++ b/dom/network/TCPSocket.cpp @@ -386,7 +386,7 @@ void TCPSocket::NotifyCopyComplete(nsresult aStatus) { } mBufferedAmount = bufferedAmount; - if (mSocketBridgeParent) { + if (mSocketBridgeParent && mSocketBridgeParent->IPCOpen()) { mozilla::Unused << mSocketBridgeParent->SendUpdateBufferedAmount( BufferedAmount(), mTrackingNumber); } @@ -1006,6 +1006,8 @@ TCPSocket::OnStopRequest(nsIRequest* aRequest, nsresult aStatus) { } void TCPSocket::SetSocketBridgeParent(TCPSocketParent* aBridgeParent) { + MOZ_ASSERT(NS_IsMainThread()); + mSocketBridgeParent = aBridgeParent; } diff --git a/dom/network/TCPSocketParent.cpp b/dom/network/TCPSocketParent.cpp index dce9de0e5091..0c7577878aa7 100644 --- a/dom/network/TCPSocketParent.cpp +++ b/dom/network/TCPSocketParent.cpp @@ -43,8 +43,10 @@ using namespace net; namespace dom { -static void FireInteralError(mozilla::net::PTCPSocketParent* aActor, +static void FireInteralError(TCPSocketParent* aActor, uint32_t aLineNo) { + MOZ_ASSERT(aActor->IPCOpen()); + mozilla::Unused << aActor->SendCallback( NS_LITERAL_STRING("onerror"), TCPError(NS_LITERAL_STRING("InvalidStateError"), diff --git a/dom/network/TCPSocketParent.h b/dom/network/TCPSocketParent.h index e12db78eac56..4dbc1f1af022 100644 --- a/dom/network/TCPSocketParent.h +++ b/dom/network/TCPSocketParent.h @@ -34,6 +34,8 @@ class TCPSocketParentBase : public nsISupports { void AddIPDLReference(); void ReleaseIPDLReference(); + bool IPCOpen() const { return mIPCOpen; } + protected: TCPSocketParentBase(); virtual ~TCPSocketParentBase(); diff --git a/gfx/thebes/gfxSVGGlyphs.h b/gfx/thebes/gfxSVGGlyphs.h index 0350ee448e01..01d7a9c33298 100644 --- a/gfx/thebes/gfxSVGGlyphs.h +++ b/gfx/thebes/gfxSVGGlyphs.h @@ -17,10 +17,10 @@ #include "nsRefreshDriver.h" class nsIContentViewer; -class nsIPresShell; class gfxSVGGlyphs; namespace mozilla { +class PresShell; class SVGContextPaint; namespace dom { class Document; diff --git a/gfx/thebes/gfxUtils.cpp b/gfx/thebes/gfxUtils.cpp index 546ae1375b99..c9debcc497bc 100644 --- a/gfx/thebes/gfxUtils.cpp +++ b/gfx/thebes/gfxUtils.cpp @@ -38,7 +38,6 @@ #include "nsIClipboardHelper.h" #include "nsIFile.h" #include "nsIGfxInfo.h" -#include "nsIPresShell.h" #include "nsMimeTypes.h" #include "nsPresContext.h" #include "nsRegion.h" @@ -1228,24 +1227,6 @@ void gfxUtils::WriteAsPNG(DrawTarget* aDT, const char* aFile) { } } -/* static */ -void gfxUtils::WriteAsPNG(nsIPresShell* aShell, const char* aFile) { - int32_t width = 1000, height = 1000; - nsRect r(0, 0, aShell->GetPresContext()->DevPixelsToAppUnits(width), - aShell->GetPresContext()->DevPixelsToAppUnits(height)); - - RefPtr dt = - gfxPlatform::GetPlatform()->CreateOffscreenContentDrawTarget( - IntSize(width, height), SurfaceFormat::B8G8R8A8); - NS_ENSURE_TRUE(dt && dt->IsValid(), /*void*/); - - RefPtr context = gfxContext::CreateOrNull(dt); - MOZ_ASSERT(context); // already checked the draw target above - aShell->RenderDocument(r, RenderDocumentFlags::None, NS_RGB(255, 255, 0), - context); - WriteAsPNG(dt.get(), aFile); -} - /* static */ void gfxUtils::DumpAsDataURI(SourceSurface* aSurface, FILE* aFile) { EncodeSourceSurface(aSurface, ImageType::PNG, EmptyString(), eDataURIEncode, diff --git a/gfx/thebes/gfxUtils.h b/gfx/thebes/gfxUtils.h index d72941790fdc..99ed067a2e05 100644 --- a/gfx/thebes/gfxUtils.h +++ b/gfx/thebes/gfxUtils.h @@ -24,7 +24,6 @@ class gfxDrawable; struct gfxQuad; class nsIInputStream; class nsIGfxInfo; -class nsIPresShell; namespace mozilla { namespace dom { @@ -267,7 +266,6 @@ class gfxUtils { static void WriteAsPNG(SourceSurface* aSurface, const char* aFile); static void WriteAsPNG(DrawTarget* aDT, const nsAString& aFile); static void WriteAsPNG(DrawTarget* aDT, const char* aFile); - static void WriteAsPNG(nsIPresShell* aShell, const char* aFile); /** * Dump as a PNG encoded Data URL to a FILE stream (using stdout by diff --git a/js/src/frontend/BytecodeEmitter.cpp b/js/src/frontend/BytecodeEmitter.cpp index c6fb39400748..a4a15ea7191f 100644 --- a/js/src/frontend/BytecodeEmitter.cpp +++ b/js/src/frontend/BytecodeEmitter.cpp @@ -250,13 +250,10 @@ bool BytecodeEmitter::emitCheck(JSOp op, ptrdiff_t delta, ptrdiff_t* offset) { } if (BytecodeOpHasIC(op)) { - // Because numICEntries also includes entries for formal arguments, we have - // to check for overflow here. - if (MOZ_UNLIKELY(bytecodeSection().numICEntries() == UINT32_MAX)) { - reportError(nullptr, JSMSG_NEED_DIET, js_script_str); - return false; - } - + // Even if every bytecode op is a JOF_IC op and the function has ARGC_LIMIT + // arguments, numICEntries cannot overflow. + static_assert(MaxBytecodeLength + 1 /* this */ + ARGC_LIMIT <= UINT32_MAX, + "numICEntries must not overflow"); bytecodeSection().incrementNumICEntries(); } diff --git a/js/src/jit/BaselineDebugModeOSR.cpp b/js/src/jit/BaselineDebugModeOSR.cpp index b0e1757a3f12..298610cb26ff 100644 --- a/js/src/jit/BaselineDebugModeOSR.cpp +++ b/js/src/jit/BaselineDebugModeOSR.cpp @@ -166,7 +166,11 @@ static bool CollectJitStackScripts(JSContext* cx, break; } + // Baseline Interpreter frames don't need recompilation. BaselineFrame* baselineFrame = frame.baselineFrame(); + if (baselineFrame->runningInInterpreter()) { + break; + } if (BaselineDebugModeOSRInfo* info = baselineFrame->getDebugModeOSRInfo()) { @@ -358,6 +362,12 @@ static void PatchBaselineFramesForDebugMode( break; } + // Baseline Interpreter frames don't need recompilation. + BaselineFrame* baselineFrame = frame.baselineFrame(); + if (baselineFrame->runningInInterpreter()) { + break; + } + DebugModeOSREntry& entry = entries[entryIndex]; if (!entry.recompiled()) { diff --git a/js/src/jit/BaselineFrame.cpp b/js/src/jit/BaselineFrame.cpp index 3441955a59c1..d251e7acdcba 100644 --- a/js/src/jit/BaselineFrame.cpp +++ b/js/src/jit/BaselineFrame.cpp @@ -136,14 +136,15 @@ bool BaselineFrame::initForOsr(InterpreterFrame* fp, uint32_t numStackValues) { JSContext* cx = fp->script()->runtimeFromMainThread()->mainContextFromOwnThread(); + Activation* interpActivation = cx->activation()->prev(); + jsbytecode* pc = interpActivation->asInterpreter()->regs().pc; + MOZ_ASSERT(fp->script()->containsPC(pc)); + if (!fp->script()->hasBaselineScript()) { // If we don't have a BaselineScript, we are doing OSR into the Baseline // Interpreter. Initialize Baseline Interpreter fields. We can get the pc // from the C++ interpreter's activation, we just have to skip the // JitActivation. - Activation* interpActivation = cx->activation()->prev(); - jsbytecode* pc = interpActivation->asInterpreter()->regs().pc; - MOZ_ASSERT(fp->script()->containsPC(pc)); flags_ |= BaselineFrame::RUNNING_IN_INTERPRETER; interpreterScript_ = fp->script(); setInterpreterPC(pc); @@ -162,21 +163,16 @@ bool BaselineFrame::initForOsr(InterpreterFrame* fp, uint32_t numStackValues) { // For debuggee frames, update any Debugger.Frame objects for the // InterpreterFrame to point to the BaselineFrame. - // The caller pushed a fake return address. ScriptFrameIter, used by the - // debugger, wants a valid return address, but it's okay to just pick one. - // In debug mode there's always at least one RetAddrEntry (since there are - // always debug prologue/epilogue calls). - JSJitFrameIter frame(cx->activation()->asJit()); - MOZ_ASSERT(frame.returnAddress() == nullptr); - BaselineScript* baseline = fp->script()->baselineScript(); - uint8_t* retAddr = - baseline->returnAddressForEntry(baseline->retAddrEntry(0)); - frame.current()->setReturnAddress(retAddr); + // The caller pushed a fake (nullptr) return address, so ScriptFrameIter + // can't use it to determine the frame's bytecode pc. Set an override pc so + // frame iteration can use that. + setOverridePc(pc); if (!Debugger::handleBaselineOsr(cx, fp, this)) { return false; } + clearOverridePc(); setIsDebuggee(); } diff --git a/js/src/jit/VMFunctions.cpp b/js/src/jit/VMFunctions.cpp index 061373fc4e81..c6253a85ebac 100644 --- a/js/src/jit/VMFunctions.cpp +++ b/js/src/jit/VMFunctions.cpp @@ -1122,9 +1122,13 @@ bool HandleDebugTrap(JSContext* cx, BaselineFrame* frame, uint8_t* retAddr, *mustReturn = false; RootedScript script(cx, frame->script()); - jsbytecode* pc = - script->baselineScript()->retAddrEntryFromReturnAddress(retAddr).pc( - script); + jsbytecode* pc; + if (frame->runningInInterpreter()) { + pc = frame->interpreterPC(); + } else { + BaselineScript* blScript = script->baselineScript(); + pc = blScript->retAddrEntryFromReturnAddress(retAddr).pc(script); + } if (*pc == JSOP_AFTERYIELD) { // JSOP_AFTERYIELD will set the frame's debuggee flag and call the @@ -1141,7 +1145,15 @@ bool HandleDebugTrap(JSContext* cx, BaselineFrame* frame, uint8_t* retAddr, } MOZ_ASSERT(frame->isDebuggee()); - MOZ_ASSERT(script->stepModeEnabled() || script->hasBreakpointsAt(pc)); + + // The Baseline Interpreter calls HandleDebugTrap for every op when the script + // is in step mode or has breakpoints. The Baseline Compiler can toggle + // breakpoints more granularly for specific bytecode PCs. + if (frame->runningInInterpreter()) { + MOZ_ASSERT(script->hasAnyBreakpointsOrStepMode()); + } else { + MOZ_ASSERT(script->stepModeEnabled() || script->hasBreakpointsAt(pc)); + } RootedValue rval(cx); ResumeMode resumeMode = ResumeMode::Continue; diff --git a/js/src/shell/js.cpp b/js/src/shell/js.cpp index 8be5ea6232d2..1f1df4b09461 100644 --- a/js/src/shell/js.cpp +++ b/js/src/shell/js.cpp @@ -9432,30 +9432,12 @@ static FILE* ErrorFilePointer() { return stderr; } -static bool PrintStackTrace(JSContext* cx, HandleValue exn) { - if (!exn.isObject()) { - return false; - } - - Maybe ar; - RootedObject exnObj(cx, &exn.toObject()); - if (IsCrossCompartmentWrapper(exnObj)) { - exnObj = UncheckedUnwrap(exnObj); - ar.emplace(cx, exnObj); - } - - // Ignore non-ErrorObject thrown by |throw| statement. - if (!exnObj->is()) { +static bool PrintStackTrace(JSContext* cx, HandleObject stackObj) { + if (!stackObj || !stackObj->is()) { return true; } - // Exceptions thrown while compiling top-level script have no stack. - RootedObject stackObj(cx, exnObj->as().stack()); - if (!stackObj) { - return true; - } - - JSPrincipals* principals = exnObj->as().realm()->principals(); + JSPrincipals* principals = stackObj->nonCCWRealm()->principals(); RootedString stackStr(cx); if (!BuildStackString(cx, principals, stackObj, &stackStr, 2)) { return false; @@ -9478,9 +9460,10 @@ js::shell::AutoReportException::~AutoReportException() { return; } - // Get exception object before printing and clearing exception. + // Get exception object and stack before printing and clearing exception. RootedValue exn(cx); (void)JS_GetPendingException(cx, &exn); + RootedObject stack(cx, GetPendingExceptionStack(cx)); JS_ClearPendingException(cx); @@ -9498,16 +9481,11 @@ js::shell::AutoReportException::~AutoReportException() { FILE* fp = ErrorFilePointer(); PrintError(cx, fp, report.toStringResult(), report.report(), reportWarnings); - { - JS::AutoSaveExceptionState savedExc(cx); - if (!PrintStackTrace(cx, exn)) { - fputs("(Unable to print stack trace)\n", fp); - } - savedExc.restore(); + if (!PrintStackTrace(cx, stack)) { + fputs("(Unable to print stack trace)\n", fp); + JS_ClearPendingException(cx); } - JS_ClearPendingException(cx); - #if defined(DEBUG) || defined(JS_OOM_BREAKPOINT) // Don't quit the shell if an unhandled exception is reported during OOM // testing. diff --git a/js/src/vm/Debugger.cpp b/js/src/vm/Debugger.cpp index c38b5aab8eba..5d1dfb1c4342 100644 --- a/js/src/vm/Debugger.cpp +++ b/js/src/vm/Debugger.cpp @@ -51,6 +51,7 @@ #include "wasm/WasmInstance.h" #include "gc/GC-inl.h" +#include "jit/JSJitFrameIter-inl.h" #include "vm/BytecodeUtil-inl.h" #include "vm/Compartment-inl.h" #include "vm/GeckoProfiler-inl.h" @@ -2924,7 +2925,15 @@ static bool UpdateExecutionObservabilityOfScriptsInZone( const JSJitFrameIter& frame = iter.frame(); switch (frame.type()) { case FrameType::BaselineJS: - MarkTypeScriptActiveIfObservable(frame.script(), obs); + // BaselineScripts that are active on the stack get recompiled and + // other (affected) BaselineScripts are discarded. If we're running in + // the Baseline Interpreter don't mark the script as active here to + // prevent BaselineScripts from falling through the cracks: when we + // don't dicard them here (because active) and also don't recompile + // them (because recompilation skips interpreter frames). + if (!frame.baselineFrame()->runningInInterpreter()) { + MarkTypeScriptActiveIfObservable(frame.script(), obs); + } break; case FrameType::IonJS: MarkTypeScriptActiveIfObservable(frame.script(), obs); diff --git a/js/src/vm/Interpreter.cpp b/js/src/vm/Interpreter.cpp index 50d739f83217..d9c995f4051c 100644 --- a/js/src/vm/Interpreter.cpp +++ b/js/src/vm/Interpreter.cpp @@ -1970,8 +1970,10 @@ static MOZ_NEVER_INLINE JS_HAZ_JSNATIVE_CALLER bool Interpret(JSContext* cx, script->incWarmUpCounter(); using Tier = jit::BaselineTier; + bool tryBaselineInterpreter = (jit::JitOptions.baselineInterpreter && + !script->hasBaselineScript()); jit::MethodStatus status = - jit::JitOptions.baselineInterpreter + tryBaselineInterpreter ? jit::CanEnterBaselineAtBranch(cx, REGS.fp()) : jit::CanEnterBaselineAtBranch(cx, REGS.fp()); diff --git a/js/src/vm/Realm.cpp b/js/src/vm/Realm.cpp index b0c4a33800bf..30a24c226ca8 100644 --- a/js/src/vm/Realm.cpp +++ b/js/src/vm/Realm.cpp @@ -66,9 +66,10 @@ Realm::~Realm() { runtime_->lcovOutput().writeLCovResult(lcovOutput); } - // We cannot have a debuggee realm here so we don't have to call - // runtime->decrementNumDebuggeeRealms(). - MOZ_ASSERT(!isDebuggee()); + // We can have a debuggee realm here only if we are destroying the runtime and + // leaked GC things. + MOZ_ASSERT_IF(runtime_->gc.shutdownCollectedEverything(), !isDebuggee()); + unsetIsDebuggee(); MOZ_ASSERT(runtime_->numRealms > 0); runtime_->numRealms--; diff --git a/layout/base/PresShell.cpp b/layout/base/PresShell.cpp index af865d7a21b7..6110721086de 100644 --- a/layout/base/PresShell.cpp +++ b/layout/base/PresShell.cpp @@ -427,18 +427,18 @@ struct nsCallbackEventRequest { // bfcache, but font pref changes don't care about that, and maybe / probably // shouldn't. #ifdef DEBUG -# define ASSERT_REFLOW_SCHEDULED_STATE() \ - { \ - if (ObservingLayoutFlushes()) { \ - MOZ_ASSERT(mDocument->GetBFCacheEntry() || \ - mPresContext->RefreshDriver()->IsLayoutFlushObserver( \ - static_cast(this)), \ - "Unexpected state"); \ - } else { \ - MOZ_ASSERT(!mPresContext->RefreshDriver()->IsLayoutFlushObserver( \ - static_cast(this)), \ - "Unexpected state"); \ - } \ +# define ASSERT_REFLOW_SCHEDULED_STATE() \ + { \ + if (ObservingLayoutFlushes()) { \ + MOZ_ASSERT( \ + mDocument->GetBFCacheEntry() || \ + mPresContext->RefreshDriver()->IsLayoutFlushObserver(this), \ + "Unexpected state"); \ + } else { \ + MOZ_ASSERT( \ + !mPresContext->RefreshDriver()->IsLayoutFlushObserver(this), \ + "Unexpected state"); \ + } \ } #else # define ASSERT_REFLOW_SCHEDULED_STATE() /* nothing */ @@ -569,7 +569,7 @@ class MOZ_STACK_CLASS AutoPointerEventTargetUpdater final { nsIContent** mTargetContent; }; -void nsIPresShell::DirtyRootsList::Add(nsIFrame* aFrame) { +void PresShell::DirtyRootsList::Add(nsIFrame* aFrame) { // Is this root already scheduled for reflow? // FIXME: This could possibly be changed to a uniqueness assertion, with some // work in ResizeReflowIgnoreOverride (and maybe others?) @@ -585,11 +585,11 @@ void nsIPresShell::DirtyRootsList::Add(nsIFrame* aFrame) { FrameAndDepth::CompareByReverseDepth{}); } -void nsIPresShell::DirtyRootsList::Remove(nsIFrame* aFrame) { +void PresShell::DirtyRootsList::Remove(nsIFrame* aFrame) { mList.RemoveElement(aFrame); } -nsIFrame* nsIPresShell::DirtyRootsList::PopShallowestRoot() { +nsIFrame* PresShell::DirtyRootsList::PopShallowestRoot() { // List is sorted in order of decreasing depth, so there are no deeper // frames than the last one. const FrameAndDepth& lastFAD = mList.LastElement(); @@ -600,15 +600,15 @@ nsIFrame* nsIPresShell::DirtyRootsList::PopShallowestRoot() { return frame; } -void nsIPresShell::DirtyRootsList::Clear() { mList.Clear(); } +void PresShell::DirtyRootsList::Clear() { mList.Clear(); } -bool nsIPresShell::DirtyRootsList::Contains(nsIFrame* aFrame) const { +bool PresShell::DirtyRootsList::Contains(nsIFrame* aFrame) const { return mList.Contains(aFrame); } -bool nsIPresShell::DirtyRootsList::IsEmpty() const { return mList.IsEmpty(); } +bool PresShell::DirtyRootsList::IsEmpty() const { return mList.IsEmpty(); } -bool nsIPresShell::DirtyRootsList::FrameIsAncestorOfDirtyRoot( +bool PresShell::DirtyRootsList::FrameIsAncestorOfDirtyRoot( nsIFrame* aFrame) const { MOZ_ASSERT(aFrame); @@ -629,17 +629,17 @@ bool nsIPresShell::DirtyRootsList::FrameIsAncestorOfDirtyRoot( bool PresShell::sDisableNonTestMouseEvents = false; -mozilla::LazyLogModule nsIPresShell::gLog("PresShell"); +LazyLogModule PresShell::gLog("PresShell"); -mozilla::TimeStamp PresShell::EventHandler::sLastInputCreated; -mozilla::TimeStamp PresShell::EventHandler::sLastInputProcessed; +TimeStamp PresShell::EventHandler::sLastInputCreated; +TimeStamp PresShell::EventHandler::sLastInputProcessed; StaticRefPtr PresShell::EventHandler::sLastKeyDownEventTargetElement; bool PresShell::sProcessInteractable = false; static bool gVerifyReflowEnabled; -bool nsIPresShell::GetVerifyReflowEnable() { +bool PresShell::GetVerifyReflowEnable() { #ifdef DEBUG static bool firstTime = true; if (firstTime) { @@ -701,11 +701,11 @@ bool nsIPresShell::GetVerifyReflowEnable() { return gVerifyReflowEnabled; } -void nsIPresShell::SetVerifyReflowEnable(bool aEnabled) { +void PresShell::SetVerifyReflowEnable(bool aEnabled) { gVerifyReflowEnabled = aEnabled; } -void nsIPresShell::AddAutoWeakFrame(AutoWeakFrame* aWeakFrame) { +void PresShell::AddAutoWeakFrame(AutoWeakFrame* aWeakFrame) { if (aWeakFrame->GetFrame()) { aWeakFrame->GetFrame()->AddStateBits(NS_FRAME_EXTERNAL_REFERENCE); } @@ -713,7 +713,7 @@ void nsIPresShell::AddAutoWeakFrame(AutoWeakFrame* aWeakFrame) { mAutoWeakFrames = aWeakFrame; } -void nsIPresShell::AddWeakFrame(WeakFrame* aWeakFrame) { +void PresShell::AddWeakFrame(WeakFrame* aWeakFrame) { if (aWeakFrame->GetFrame()) { aWeakFrame->GetFrame()->AddStateBits(NS_FRAME_EXTERNAL_REFERENCE); } @@ -721,7 +721,7 @@ void nsIPresShell::AddWeakFrame(WeakFrame* aWeakFrame) { mWeakFrames.PutEntry(aWeakFrame); } -void nsIPresShell::RemoveAutoWeakFrame(AutoWeakFrame* aWeakFrame) { +void PresShell::RemoveAutoWeakFrame(AutoWeakFrame* aWeakFrame) { if (mAutoWeakFrames == aWeakFrame) { mAutoWeakFrames = aWeakFrame->GetPreviousWeakFrame(); return; @@ -735,12 +735,12 @@ void nsIPresShell::RemoveAutoWeakFrame(AutoWeakFrame* aWeakFrame) { } } -void nsIPresShell::RemoveWeakFrame(WeakFrame* aWeakFrame) { +void PresShell::RemoveWeakFrame(WeakFrame* aWeakFrame) { MOZ_ASSERT(mWeakFrames.GetEntry(aWeakFrame)); mWeakFrames.RemoveEntry(aWeakFrame); } -already_AddRefed nsIPresShell::FrameSelection() { +already_AddRefed PresShell::FrameSelection() { RefPtr ret = mSelection; return ret.forget(); } @@ -766,15 +766,33 @@ bool PresShell::AccessibleCaretEnabled(nsIDocShell* aDocShell) { return false; } -nsIPresShell::nsIPresShell() +PresShell::PresShell() : mViewManager(nullptr), mFrameManager(nullptr), - mPaintCount(0), mAutoWeakFrames(nullptr), +#ifdef ACCESSIBILITY + mDocAccessible(nullptr), +#endif // #ifdef ACCESSIBILITY + mCurrentEventFrame(nullptr), + mMouseLocation(NS_UNCONSTRAINEDSIZE, NS_UNCONSTRAINEDSIZE), + mPaintCount(0), + mAPZFocusSequenceNumber(0), mCanvasBackgroundColor(NS_RGBA(0, 0, 0, 0)), - mSelectionFlags(0), + mActiveSuppressDisplayport(0), + mPresShellId(sNextPresShellId++), + mFontSizeInflationEmPerLine(0), + mFontSizeInflationMinTwips(0), + mFontSizeInflationLineThreshold(0), + mSelectionFlags(nsISelectionDisplay::DISPLAY_TEXT | + nsISelectionDisplay::DISPLAY_IMAGES), mChangeNestCount(0), - mRenderFlags(0), + mRenderingStateFlags(RenderingStateFlags::None), + mInFlush(false), + mCaretEnabled(false), + mNeedLayoutFlush(true), + mNeedStyleFlush(true), + mNeedThrottledAnimationFlush(true), + mVisualViewportSizeSet(false), mDidInitialize(false), mIsDestroying(false), mIsReflowing(false), @@ -786,9 +804,9 @@ nsIPresShell::nsIPresShell() mLastRootReflowHadUnconstrainedBSize(false), mShouldUnsuppressPainting(false), mIgnoreFrameDestruction(false), - mIsActive(false), + mIsActive(true), mFrozen(false), - mIsFirstPaint(false), + mIsFirstPaint(true), // FIXME/bug 735029: find a better solution mObservesMutationsForPrint(false), mWasLastReflowInterrupted(false), mObservingStyleFlushes(false), @@ -801,32 +819,12 @@ nsIPresShell::nsIPresShell() mIsNeverPainting(false), mResolutionUpdated(false), mResolutionUpdatedByApz(false), - mPresShellId(0), - mFontSizeInflationEmPerLine(0), - mFontSizeInflationMinTwips(0), - mFontSizeInflationLineThreshold(0), - mInFlush(false), - mCurrentEventFrame(nullptr) { -} - -PresShell::PresShell() - : mCaretEnabled(false), - mMouseLocation(NS_UNCONSTRAINEDSIZE, NS_UNCONSTRAINEDSIZE), -#ifdef ACCESSIBILITY - mDocAccessible(nullptr), -#endif // #ifdef ACCESSIBILITY - mAPZFocusSequenceNumber(0), - mActiveSuppressDisplayport(0), - mNeedLayoutFlush(true), - mNeedStyleFlush(true), - mNeedThrottledAnimationFlush(true), - mVisualViewportSizeSet(false), mDocumentLoading(false), mNoDelayedMouseEvents(false), mNoDelayedKeyEvents(false), mApproximateFrameVisibilityVisited(false), mNextPaintCompressed(false), - mHasCSSBackgroundColor(false), + mHasCSSBackgroundColor(true), mIsLastChromeOnlyEscapeKeyConsumed(false), mHasReceivedPaintMessage(false), mIsLastKeyDownCanceled(false), @@ -845,15 +843,6 @@ PresShell::PresShell() #endif mLastOSWake = mLoadBegin = TimeStamp::Now(); - mSelectionFlags = - nsISelectionDisplay::DISPLAY_TEXT | nsISelectionDisplay::DISPLAY_IMAGES; - mIsActive = true; - // FIXME/bug 735029: find a better solution to this problem - mIsFirstPaint = true; - mPresShellId = sNextPresShellId++; - mFrozen = false; - mRenderFlags = 0; - static bool addedSynthMouseMove = false; if (!addedSynthMouseMove) { Preferences::AddBoolVarCache(&sSynthMouseMove, @@ -861,10 +850,6 @@ PresShell::PresShell() addedSynthMouseMove = true; } PointerEventHandler::Initialize(); - mPaintingIsFrozen = false; - mHasCSSBackgroundColor = true; - mIsLastChromeOnlyEscapeKeyConsumed = false; - mHasReceivedPaintMessage = false; } NS_INTERFACE_TABLE_HEAD(PresShell) @@ -873,7 +858,6 @@ NS_INTERFACE_TABLE_HEAD(PresShell) // QI for weak reference. Therefore, the case needed by do_QueryReferent() // should be tested first. NS_INTERFACE_TABLE_ENTRY(PresShell, PresShell) - NS_INTERFACE_TABLE_ENTRY(PresShell, nsIPresShell) NS_INTERFACE_TABLE_ENTRY(PresShell, nsIDocumentObserver) NS_INTERFACE_TABLE_ENTRY(PresShell, nsISelectionController) NS_INTERFACE_TABLE_ENTRY(PresShell, nsISelectionDisplay) @@ -895,7 +879,7 @@ PresShell::~PresShell() { MOZ_LOG(gLog, LogLevel::Debug, ("PresShell::~PresShell this=%p", this)); if (!mHaveShutDown) { - MOZ_ASSERT_UNREACHABLE("Someone did not call nsIPresShell::destroy"); + MOZ_ASSERT_UNREACHABLE("Someone did not call PresShell::Destroy()"); Destroy(); } @@ -1381,33 +1365,33 @@ void PresShell::Destroy() { mTouchManager.Destroy(); } -void nsIPresShell::StopObservingRefreshDriver() { +void PresShell::StopObservingRefreshDriver() { nsRefreshDriver* rd = mPresContext->RefreshDriver(); if (mResizeEventPending) { - rd->RemoveResizeEventFlushObserver(static_cast(this)); + rd->RemoveResizeEventFlushObserver(this); } if (mObservingLayoutFlushes) { - rd->RemoveLayoutFlushObserver(static_cast(this)); + rd->RemoveLayoutFlushObserver(this); } if (mObservingStyleFlushes) { - rd->RemoveStyleFlushObserver(static_cast(this)); + rd->RemoveStyleFlushObserver(this); } } -void nsIPresShell::StartObservingRefreshDriver() { +void PresShell::StartObservingRefreshDriver() { nsRefreshDriver* rd = mPresContext->RefreshDriver(); if (mResizeEventPending) { - rd->AddResizeEventFlushObserver(static_cast(this)); + rd->AddResizeEventFlushObserver(this); } if (mObservingLayoutFlushes) { - rd->AddLayoutFlushObserver(static_cast(this)); + rd->AddLayoutFlushObserver(this); } if (mObservingStyleFlushes) { - rd->AddStyleFlushObserver(static_cast(this)); + rd->AddStyleFlushObserver(this); } } -nsRefreshDriver* nsIPresShell::GetRefreshDriver() const { +nsRefreshDriver* PresShell::GetRefreshDriver() const { return mPresContext ? mPresContext->RefreshDriver() : nullptr; } @@ -1640,7 +1624,7 @@ PresShell::RepaintSelection(RawSelectionType aRawSelectionType) { } // Make shell be a document observer -void nsIPresShell::BeginObservingDocument() { +void PresShell::BeginObservingDocument() { if (mDocument && !mIsDestroying) { mIsObservingDocument = true; if (mIsDocumentGone) { @@ -1653,7 +1637,7 @@ void nsIPresShell::BeginObservingDocument() { } // Make shell stop being a document observer -void nsIPresShell::EndObservingDocument() { +void PresShell::EndObservingDocument() { // XXXbz do we need to tell the frame constructor that the document // is gone, perhaps? Except for printing it's NOT gone, sometimes. mIsDocumentGone = true; @@ -2052,7 +2036,7 @@ static nsIContent* GetNativeAnonymousSubtreeRoot(nsIContent* aContent) { return current; } -void nsIPresShell::NativeAnonymousContentRemoved(nsIContent* aAnonContent) { +void PresShell::NativeAnonymousContentRemoved(nsIContent* aAnonContent) { MOZ_ASSERT(aAnonContent->IsRootOfNativeAnonymousSubtree()); if (nsIContent* root = GetNativeAnonymousSubtreeRoot(mCurrentEventContent)) { if (aAnonContent == root) { @@ -2072,7 +2056,7 @@ void nsIPresShell::NativeAnonymousContentRemoved(nsIContent* aAnonContent) { } } -void nsIPresShell::SetIgnoreFrameDestruction(bool aIgnore) { +void PresShell::SetIgnoreFrameDestruction(bool aIgnore) { if (mDocument) { // We need to tell the ImageLoader to drop all its references to frames // because they're about to go away and it won't get notifications of that. @@ -2130,20 +2114,20 @@ void PresShell::NotifyDestroyingFrame(nsIFrame* aFrame) { } } -already_AddRefed nsIPresShell::GetCaret() const { +already_AddRefed PresShell::GetCaret() const { RefPtr caret = mCaret; return caret.forget(); } already_AddRefed -nsIPresShell::GetAccessibleCaretEventHub() const { +PresShell::GetAccessibleCaretEventHub() const { RefPtr eventHub = mAccessibleCaretEventHub; return eventHub.forget(); } -void nsIPresShell::SetCaret(nsCaret* aNewCaret) { mCaret = aNewCaret; } +void PresShell::SetCaret(nsCaret* aNewCaret) { mCaret = aNewCaret; } -void nsIPresShell::RestoreCaret() { mCaret = mOriginalCaret; } +void PresShell::RestoreCaret() { mCaret = mOriginalCaret; } NS_IMETHODIMP PresShell::SetCaretEnabled(bool aInEnable) { bool oldEnabled = mCaretEnabled; @@ -2415,7 +2399,7 @@ nsresult PresShell::CheckVisibilityContent(nsIContent* aNode, // end implementations nsISelectionController -nsIFrame* nsIPresShell::GetRootScrollFrame() const { +nsIFrame* PresShell::GetRootScrollFrame() const { nsIFrame* rootFrame = mFrameConstructor->GetRootFrame(); // Ensure root frame is a viewport frame if (!rootFrame || !rootFrame->IsViewportFrame()) return nullptr; @@ -2424,7 +2408,7 @@ nsIFrame* nsIPresShell::GetRootScrollFrame() const { return theFrame; } -nsIScrollableFrame* nsIPresShell::GetRootScrollFrameAsScrollable() const { +nsIScrollableFrame* PresShell::GetRootScrollFrameAsScrollable() const { nsIFrame* frame = GetRootScrollFrame(); if (!frame) return nullptr; nsIScrollableFrame* scrollableFrame = do_QueryFrame(frame); @@ -2433,12 +2417,12 @@ nsIScrollableFrame* nsIPresShell::GetRootScrollFrameAsScrollable() const { return scrollableFrame; } -nsIPageSequenceFrame* nsIPresShell::GetPageSequenceFrame() const { +nsIPageSequenceFrame* PresShell::GetPageSequenceFrame() const { nsIFrame* frame = mFrameConstructor->GetPageSequenceFrame(); return do_QueryFrame(frame); } -nsCanvasFrame* nsIPresShell::GetCanvasFrame() const { +nsCanvasFrame* PresShell::GetCanvasFrame() const { nsIFrame* frame = mFrameConstructor->GetDocElementContainingBlock(); return do_QueryFrame(frame); } @@ -2550,12 +2534,12 @@ void PresShell::VerifyHasDirtyRootAncestor(nsIFrame* aFrame) { } #endif -void nsIPresShell::PostPendingScrollAnchorSelection( +void PresShell::PostPendingScrollAnchorSelection( mozilla::layout::ScrollAnchorContainer* aContainer) { mPendingScrollAnchorSelection.PutEntry(aContainer->ScrollableFrame()); } -void nsIPresShell::FlushPendingScrollAnchorSelections() { +void PresShell::FlushPendingScrollAnchorSelections() { for (auto iter = mPendingScrollAnchorSelection.Iter(); !iter.Done(); iter.Next()) { nsIScrollableFrame* scroll = iter.Get()->GetKey(); @@ -2564,12 +2548,12 @@ void nsIPresShell::FlushPendingScrollAnchorSelections() { mPendingScrollAnchorSelection.Clear(); } -void nsIPresShell::PostPendingScrollAnchorAdjustment( +void PresShell::PostPendingScrollAnchorAdjustment( ScrollAnchorContainer* aContainer) { mPendingScrollAnchorAdjustment.PutEntry(aContainer->ScrollableFrame()); } -void nsIPresShell::FlushPendingScrollAnchorAdjustments() { +void PresShell::FlushPendingScrollAnchorAdjustments() { for (auto iter = mPendingScrollAnchorAdjustment.Iter(); !iter.Done(); iter.Next()) { nsIScrollableFrame* scroll = iter.Get()->GetKey(); @@ -2756,15 +2740,14 @@ void PresShell::FrameNeedsToContinueReflow(nsIFrame* aFrame) { mFramesToDirty.PutEntry(aFrame); } -already_AddRefed nsIPresShell::GetContentForScrolling() const { +already_AddRefed PresShell::GetContentForScrolling() const { if (nsCOMPtr focused = GetFocusedContentInOurWindow()) { return focused.forget(); } return GetSelectedContentForScrolling(); } -already_AddRefed nsIPresShell::GetSelectedContentForScrolling() - const { +already_AddRefed PresShell::GetSelectedContentForScrolling() const { nsCOMPtr selectedContent; if (mSelection) { Selection* domSelection = mSelection->GetSelection(SelectionType::eNormal); @@ -2776,7 +2759,7 @@ already_AddRefed nsIPresShell::GetSelectedContentForScrolling() return selectedContent.forget(); } -nsIScrollableFrame* nsIPresShell::GetNearestScrollableFrame( +nsIScrollableFrame* PresShell::GetNearestScrollableFrame( nsIFrame* aFrame, ScrollableDirection aDirection) { if (aDirection == ScrollableDirection::Either) { return nsLayoutUtils::GetNearestScrollableFrame(aFrame); @@ -2788,7 +2771,7 @@ nsIScrollableFrame* nsIPresShell::GetNearestScrollableFrame( : nsLayoutUtils::eHorizontal); } -nsIScrollableFrame* nsIPresShell::GetScrollableFrameToScrollForContent( +nsIScrollableFrame* PresShell::GetScrollableFrameToScrollForContent( nsIContent* aContent, ScrollableDirection aDirection) { nsIScrollableFrame* scrollFrame = nullptr; if (aContent) { @@ -2812,18 +2795,17 @@ nsIScrollableFrame* nsIPresShell::GetScrollableFrameToScrollForContent( return scrollFrame; } -nsIScrollableFrame* nsIPresShell::GetScrollableFrameToScroll( +nsIScrollableFrame* PresShell::GetScrollableFrameToScroll( ScrollableDirection aDirection) { nsCOMPtr content = GetContentForScrolling(); return GetScrollableFrameToScrollForContent(content.get(), aDirection); } -void nsIPresShell::CancelAllPendingReflows() { +void PresShell::CancelAllPendingReflows() { mDirtyRoots.Clear(); if (mObservingLayoutFlushes) { - GetPresContext()->RefreshDriver()->RemoveLayoutFlushObserver( - static_cast(this)); + GetPresContext()->RefreshDriver()->RemoveLayoutFlushObserver(this); mObservingLayoutFlushes = false; } @@ -2839,9 +2821,9 @@ static bool DestroyFramesAndStyleDataFor( return didReconstruct; } -void nsIPresShell::SlotAssignmentWillChange(Element& aElement, - HTMLSlotElement* aOldSlot, - HTMLSlotElement* aNewSlot) { +void PresShell::SlotAssignmentWillChange(Element& aElement, + HTMLSlotElement* aOldSlot, + HTMLSlotElement* aNewSlot) { MOZ_ASSERT(aOldSlot != aNewSlot); if (MOZ_UNLIKELY(!mDidInitialize)) { @@ -2902,7 +2884,7 @@ static void AssertNoFramesInSubtree(nsIContent* aContent) { } #endif -void nsIPresShell::DestroyFramesForAndRestyle(Element* aElement) { +void PresShell::DestroyFramesForAndRestyle(Element* aElement) { #ifdef DEBUG auto postCondition = mozilla::MakeScopeExit([&]() { AssertNoFramesInSubtree(aElement); }); @@ -2939,7 +2921,7 @@ void nsIPresShell::DestroyFramesForAndRestyle(Element* aElement) { --mChangeNestCount; } -void nsIPresShell::PostRecreateFramesFor(Element* aElement) { +void PresShell::PostRecreateFramesFor(Element* aElement) { if (MOZ_UNLIKELY(!mDidInitialize)) { // Nothing to do here. In fact, if we proceed and aElement is the root, we // will crash. @@ -2950,7 +2932,7 @@ void nsIPresShell::PostRecreateFramesFor(Element* aElement) { aElement, RestyleHint{0}, nsChangeHint_ReconstructFrame); } -void nsIPresShell::RestyleForAnimation(Element* aElement, RestyleHint aHint) { +void PresShell::RestyleForAnimation(Element* aElement, RestyleHint aHint) { // Now that we no longer have separate non-animation and animation // restyles, this method having a distinct identity is less important, // but it still seems useful to offer as a "more public" API and as a @@ -2959,12 +2941,11 @@ void nsIPresShell::RestyleForAnimation(Element* aElement, RestyleHint aHint) { nsChangeHint(0)); } -void nsIPresShell::SetForwardingContainer( - const WeakPtr& aContainer) { +void PresShell::SetForwardingContainer(const WeakPtr& aContainer) { mForwardingContainer = aContainer; } -void nsIPresShell::ClearFrameRefs(nsIFrame* aFrame) { +void PresShell::ClearFrameRefs(nsIFrame* aFrame) { mPresContext->EventStateManager()->ClearFrameRefs(aFrame); AutoWeakFrame* weakFrame = mAutoWeakFrames; @@ -2972,7 +2953,7 @@ void nsIPresShell::ClearFrameRefs(nsIFrame* aFrame) { AutoWeakFrame* prev = weakFrame->GetPreviousWeakFrame(); if (weakFrame->GetFrame() == aFrame) { // This removes weakFrame from mAutoWeakFrames. - weakFrame->Clear(static_cast(this)); + weakFrame->Clear(this); } weakFrame = prev; } @@ -2985,11 +2966,11 @@ void nsIPresShell::ClearFrameRefs(nsIFrame* aFrame) { } } for (WeakFrame* weakFrame : toRemove) { - weakFrame->Clear(static_cast(this)); + weakFrame->Clear(this); } } -already_AddRefed nsIPresShell::CreateReferenceRenderingContext() { +already_AddRefed PresShell::CreateReferenceRenderingContext() { nsDeviceContext* devCtx = mPresContext->DeviceContext(); RefPtr rc; if (mPresContext->IsScreen()) { @@ -3518,11 +3499,10 @@ void PresShell::DoScrollContentIntoView() { data->mContentToScrollToFlags); } -bool nsIPresShell::ScrollFrameRectIntoView(nsIFrame* aFrame, - const nsRect& aRect, - ScrollAxis aVertical, - ScrollAxis aHorizontal, - ScrollFlags aScrollFlags) { +bool PresShell::ScrollFrameRectIntoView(nsIFrame* aFrame, const nsRect& aRect, + ScrollAxis aVertical, + ScrollAxis aHorizontal, + ScrollFlags aScrollFlags) { bool didScroll = false; // This function needs to work even if rect has a width or height of 0. nsRect rect = aRect; @@ -3703,7 +3683,7 @@ void PresShell::ScheduleViewManagerFlush(PaintType aType) { SetNeedLayoutFlush(); } -void nsIPresShell::DispatchSynthMouseMove(WidgetGUIEvent* aEvent) { +void PresShell::DispatchSynthMouseMove(WidgetGUIEvent* aEvent) { AUTO_PROFILER_TRACING_DOCSHELL("Paint", "DispatchSynthMouseMove", GRAPHICS, mPresContext->GetDocShell()); nsEventStatus status = nsEventStatus_eIgnore; @@ -3808,7 +3788,7 @@ nsresult PresShell::CaptureHistoryState(nsILayoutHistoryState** aState) { return NS_OK; } -void nsIPresShell::ScheduleBeforeFirstPaint() { +void PresShell::ScheduleBeforeFirstPaint() { if (!mDocument->IsResourceDoc()) { // Notify observers that a new page is about to be drawn. Execute this // as soon as it is safe to run JS, which is guaranteed to be before we @@ -3821,7 +3801,7 @@ void nsIPresShell::ScheduleBeforeFirstPaint() { } } -void nsIPresShell::UnsuppressAndInvalidate() { +void PresShell::UnsuppressAndInvalidate() { // Note: We ignore the EnsureVisible check for resource documents, because // they won't have a docshell, so they'll always fail EnsureVisible. if ((!mDocument->IsResourceDoc() && !mPresContext->EnsureVisible()) || @@ -3867,7 +3847,7 @@ void PresShell::UnsuppressPainting() { } // Post a request to handle an arbitrary callback after reflow has finished. -nsresult nsIPresShell::PostReflowCallback(nsIReflowCallback* aCallback) { +nsresult PresShell::PostReflowCallback(nsIReflowCallback* aCallback) { void* result = AllocateByObjectID(eArenaObjectID_nsCallbackEventRequest, sizeof(nsCallbackEventRequest)); nsCallbackEventRequest* request = (nsCallbackEventRequest*)result; @@ -3885,7 +3865,7 @@ nsresult nsIPresShell::PostReflowCallback(nsIReflowCallback* aCallback) { return NS_OK; } -void nsIPresShell::CancelReflowCallback(nsIReflowCallback* aCallback) { +void PresShell::CancelReflowCallback(nsIReflowCallback* aCallback) { nsCallbackEventRequest* before = nullptr; nsCallbackEventRequest* node = mFirstCallbackEventRequest; while (node) { @@ -3914,7 +3894,7 @@ void nsIPresShell::CancelReflowCallback(nsIReflowCallback* aCallback) { } } -void nsIPresShell::CancelPostedReflowCallbacks() { +void PresShell::CancelPostedReflowCallbacks() { while (mFirstCallbackEventRequest) { nsCallbackEventRequest* node = mFirstCallbackEventRequest; mFirstCallbackEventRequest = node->next; @@ -3954,7 +3934,7 @@ void PresShell::HandlePostedReflowCallbacks(bool aInterruptible) { } } -bool nsIPresShell::IsSafeToFlush() const { +bool PresShell::IsSafeToFlush() const { // Not safe if we are getting torn down, reflowing, or in the middle of frame // construction. if (mIsReflowing || mChangeNestCount || mIsDestroying) { @@ -3973,7 +3953,7 @@ bool nsIPresShell::IsSafeToFlush() const { return true; } -void nsIPresShell::NotifyFontFaceSetOnRefresh() { +void PresShell::NotifyFontFaceSetOnRefresh() { if (FontFaceSet* set = mDocument->GetFonts()) { set->DidRefresh(); } @@ -4395,12 +4375,12 @@ void PresShell::ContentRemoved(nsIContent* aChild, mPresContext->RestyleManager()->ContentRemoved(aChild, oldNextSibling); } -void nsIPresShell::NotifyCounterStylesAreDirty() { - nsAutoCauseReflowNotifier reflowNotifier(static_cast(this)); +void PresShell::NotifyCounterStylesAreDirty() { + nsAutoCauseReflowNotifier reflowNotifier(this); mFrameConstructor->NotifyCounterStylesAreDirty(); } -bool nsIPresShell::FrameIsAncestorOfDirtyRoot(nsIFrame* aFrame) const { +bool PresShell::FrameIsAncestorOfDirtyRoot(nsIFrame* aFrame) const { return mDirtyRoots.FrameIsAncestorOfDirtyRoot(aFrame); } @@ -4516,12 +4496,10 @@ nsresult PresShell::RenderDocument(const nsRect& aRect, } if (aFlags & RenderDocumentFlags::IgnoreViewportScrolling) { wouldFlushRetainedLayers = !IgnoringViewportScrolling(); - mRenderFlags = - ChangeFlag(mRenderFlags, true, STATE_IGNORING_VIEWPORT_SCROLLING); + mRenderingStateFlags |= RenderingStateFlags::IgnoringViewportScrolling; } if (aFlags & RenderDocumentFlags::DrawWindowNotFlushing) { - mRenderFlags = - ChangeFlag(mRenderFlags, true, STATE_DRAWWINDOW_NOT_FLUSHING); + mRenderingStateFlags |= RenderingStateFlags::DrawWindowNotFlushing; } if (aFlags & RenderDocumentFlags::DocumentRelative) { // XXX be smarter about this ... drawWindow might want a rect @@ -5197,8 +5175,13 @@ void PresShell::SetIgnoreViewportScrolling(bool aIgnore) { return; } RenderingState state(this); - state.mRenderFlags = ChangeFlag(state.mRenderFlags, aIgnore, - STATE_IGNORING_VIEWPORT_SCROLLING); + if (aIgnore) { + state.mRenderingStateFlags |= + RenderingStateFlags::IgnoringViewportScrolling; + } else { + state.mRenderingStateFlags &= + ~RenderingStateFlags::IgnoringViewportScrolling; + } SetRenderingState(state); } @@ -5265,7 +5248,7 @@ void PresShell::SetRestoreResolution(float aResolution, } void PresShell::SetRenderingState(const RenderingState& aState) { - if (mRenderFlags != aState.mRenderFlags) { + if (mRenderingStateFlags != aState.mRenderingStateFlags) { // Rendering state changed in a way that forces us to flush any // retained layers we might already have. LayerManager* manager = GetLayerManager(); @@ -5289,7 +5272,7 @@ void PresShell::SetRenderingState(const RenderingState& aState) { } } - mRenderFlags = aState.mRenderFlags; + mRenderingStateFlags = aState.mRenderingStateFlags; mResolution = aState.mResolution; } @@ -6162,7 +6145,7 @@ void PresShell::SetCapturingContent(nsIContent* aContent, CaptureFlags aFlags) { } } -nsIContent* nsIPresShell::GetCurrentEventContent() { +nsIContent* PresShell::GetCurrentEventContent() { if (mCurrentEventContent && mCurrentEventContent->GetComposedDoc() != mDocument) { mCurrentEventContent = nullptr; @@ -6171,7 +6154,7 @@ nsIContent* nsIPresShell::GetCurrentEventContent() { return mCurrentEventContent; } -nsIFrame* nsIPresShell::GetCurrentEventFrame() { +nsIFrame* PresShell::GetCurrentEventFrame() { if (MOZ_UNLIKELY(mIsDestroying)) { return nullptr; } @@ -6189,7 +6172,7 @@ nsIFrame* nsIPresShell::GetCurrentEventFrame() { return mCurrentEventFrame; } -already_AddRefed nsIPresShell::GetEventTargetContent( +already_AddRefed PresShell::GetEventTargetContent( WidgetEvent* aEvent) { nsCOMPtr content = GetCurrentEventContent(); if (!content) { @@ -6203,8 +6186,7 @@ already_AddRefed nsIPresShell::GetEventTargetContent( return content.forget(); } -void nsIPresShell::PushCurrentEventInfo(nsIFrame* aFrame, - nsIContent* aContent) { +void PresShell::PushCurrentEventInfo(nsIFrame* aFrame, nsIContent* aContent) { if (mCurrentEventFrame || mCurrentEventContent) { mCurrentEventFrameStack.InsertElementAt(0, mCurrentEventFrame); mCurrentEventContentStack.InsertObjectAt(mCurrentEventContent, 0); @@ -6213,7 +6195,7 @@ void nsIPresShell::PushCurrentEventInfo(nsIFrame* aFrame, mCurrentEventContent = aContent; } -void nsIPresShell::PopCurrentEventInfo() { +void PresShell::PopCurrentEventInfo() { mCurrentEventFrame = nullptr; mCurrentEventContent = nullptr; @@ -6270,8 +6252,7 @@ PresShell::GetFocusedDOMWindowInOurWindow() { return focusedWindow.forget(); } -already_AddRefed nsIPresShell::GetFocusedContentInOurWindow() - const { +already_AddRefed PresShell::GetFocusedContentInOurWindow() const { nsIFocusManager* fm = nsFocusManager::GetFocusManager(); if (fm && mDocument) { RefPtr focusedElement; @@ -8950,7 +8931,7 @@ void PresShell::Thaw() { // Start of protected and private methods on the PresShell //-------------------------------------------------------- -void nsIPresShell::MaybeScheduleReflow() { +void PresShell::MaybeScheduleReflow() { ASSERT_REFLOW_SCHEDULED_STATE(); if (mObservingLayoutFlushes || mIsDestroying || mIsReflowing || mDirtyRoots.IsEmpty()) @@ -8963,24 +8944,24 @@ void nsIPresShell::MaybeScheduleReflow() { ASSERT_REFLOW_SCHEDULED_STATE(); } -void nsIPresShell::ScheduleReflow() { +void PresShell::ScheduleReflow() { ASSERT_REFLOW_SCHEDULED_STATE(); DoObserveLayoutFlushes(); ASSERT_REFLOW_SCHEDULED_STATE(); } -void nsIPresShell::WillCauseReflow() { +void PresShell::WillCauseReflow() { nsContentUtils::AddScriptBlocker(); ++mChangeNestCount; } -void nsIPresShell::DidCauseReflow() { +void PresShell::DidCauseReflow() { NS_ASSERTION(mChangeNestCount != 0, "Unexpected call to DidCauseReflow()"); --mChangeNestCount; nsContentUtils::RemoveScriptBlocker(); } -void nsIPresShell::WillDoReflow() { +void PresShell::WillDoReflow() { mDocument->FlushUserFontSet(); mPresContext->FlushCounterStyles(); @@ -9010,7 +8991,7 @@ void PresShell::DidDoReflow(bool aInterruptible) { mPresContext->NotifyMissingFonts(); } -DOMHighResTimeStamp nsIPresShell::GetPerformanceNowUnclamped() { +DOMHighResTimeStamp PresShell::GetPerformanceNowUnclamped() { DOMHighResTimeStamp now = 0; if (nsPIDOMWindowInner* window = mDocument->GetInnerWindow()) { @@ -9024,7 +9005,7 @@ DOMHighResTimeStamp nsIPresShell::GetPerformanceNowUnclamped() { return now; } -void nsIPresShell::sReflowContinueCallback(nsITimer* aTimer, void* aPresShell) { +void PresShell::sReflowContinueCallback(nsITimer* aTimer, void* aPresShell) { RefPtr self = static_cast(aPresShell); MOZ_ASSERT(aTimer == self->mReflowContinueTimer, "Unexpected timer"); @@ -9032,7 +9013,7 @@ void nsIPresShell::sReflowContinueCallback(nsITimer* aTimer, void* aPresShell) { self->ScheduleReflow(); } -bool nsIPresShell::ScheduleReflowOffTimer() { +bool PresShell::ScheduleReflowOffTimer() { MOZ_ASSERT(!mObservingLayoutFlushes, "Shouldn't get here"); ASSERT_REFLOW_SCHEDULED_STATE(); @@ -9269,8 +9250,8 @@ bool PresShell::DoReflow(nsIFrame* target, bool aInterruptible, if (tp) { if (tp->current.numChars > 100) { TimeDuration reflowTime = TimeStamp::Now() - timeStart; - LogTextPerfStats(tp, static_cast(this), tp->current, - reflowTime.ToMilliseconds(), eLog_reflow, nullptr); + LogTextPerfStats(tp, this, tp->current, reflowTime.ToMilliseconds(), + eLog_reflow, nullptr); } tp->Accumulate(); } @@ -9460,8 +9441,8 @@ PresShell::Observe(nsISupports* aSubject, const char* aTopic, return NS_ERROR_FAILURE; } -bool nsIPresShell::AddRefreshObserver(nsARefreshObserver* aObserver, - FlushType aFlushType) { +bool PresShell::AddRefreshObserver(nsARefreshObserver* aObserver, + FlushType aFlushType) { nsPresContext* presContext = GetPresContext(); if (MOZ_UNLIKELY(!presContext)) { return false; @@ -9470,15 +9451,14 @@ bool nsIPresShell::AddRefreshObserver(nsARefreshObserver* aObserver, return true; } -bool nsIPresShell::RemoveRefreshObserver(nsARefreshObserver* aObserver, - FlushType aFlushType) { +bool PresShell::RemoveRefreshObserver(nsARefreshObserver* aObserver, + FlushType aFlushType) { nsPresContext* presContext = GetPresContext(); return presContext && presContext->RefreshDriver()->RemoveRefreshObserver( aObserver, aFlushType); } -/* virtual */ -bool nsIPresShell::AddPostRefreshObserver(nsAPostRefreshObserver* aObserver) { +bool PresShell::AddPostRefreshObserver(nsAPostRefreshObserver* aObserver) { nsPresContext* presContext = GetPresContext(); if (!presContext) { return false; @@ -9487,9 +9467,7 @@ bool nsIPresShell::AddPostRefreshObserver(nsAPostRefreshObserver* aObserver) { return true; } -/* virtual */ -bool nsIPresShell::RemovePostRefreshObserver( - nsAPostRefreshObserver* aObserver) { +bool PresShell::RemovePostRefreshObserver(nsAPostRefreshObserver* aObserver) { nsPresContext* presContext = GetPresContext(); if (!presContext) { return false; @@ -9498,23 +9476,21 @@ bool nsIPresShell::RemovePostRefreshObserver( return true; } -void nsIPresShell::DoObserveStyleFlushes() { +void PresShell::DoObserveStyleFlushes() { MOZ_ASSERT(!ObservingStyleFlushes()); mObservingStyleFlushes = true; if (MOZ_LIKELY(!mDocument->GetBFCacheEntry())) { - mPresContext->RefreshDriver()->AddStyleFlushObserver( - static_cast(this)); + mPresContext->RefreshDriver()->AddStyleFlushObserver(this); } } -void nsIPresShell::DoObserveLayoutFlushes() { +void PresShell::DoObserveLayoutFlushes() { MOZ_ASSERT(!ObservingLayoutFlushes()); mObservingLayoutFlushes = true; if (MOZ_LIKELY(!mDocument->GetBFCacheEntry())) { - mPresContext->RefreshDriver()->AddLayoutFlushObserver( - static_cast(this)); + mPresContext->RefreshDriver()->AddLayoutFlushObserver(this); } } @@ -9834,7 +9810,7 @@ bool PresShell::VerifyIncrementalReflow() { // reflowing the test frame tree vm->SetPresShell(presShell); { - nsAutoCauseReflowNotifier crNotifier(static_cast(this)); + nsAutoCauseReflowNotifier crNotifier(this); presShell->Initialize(); } mDocument->BindingManager()->ProcessAttachedQueue(); @@ -10340,7 +10316,7 @@ void ReflowCountMgr::DisplayDiffsInTotals() { #endif // MOZ_REFLOW_PERF -nsIFrame* nsIPresShell::GetAbsoluteContainingBlock(nsIFrame* aFrame) { +nsIFrame* PresShell::GetAbsoluteContainingBlock(nsIFrame* aFrame) { return FrameConstructor()->GetAbsoluteContainingBlock( aFrame, nsCSSFrameConstructor::ABS_POS); } @@ -10637,9 +10613,9 @@ bool PresShell::SetVisualViewportOffset(const nsPoint& aScrollOffset, return didChange; } -void nsIPresShell::ScrollToVisual( - const nsPoint& aVisualViewportOffset, - FrameMetrics::ScrollOffsetUpdateType aUpdateType, ScrollMode aMode) { +void PresShell::ScrollToVisual(const nsPoint& aVisualViewportOffset, + FrameMetrics::ScrollOffsetUpdateType aUpdateType, + ScrollMode aMode) { MOZ_ASSERT(aMode == ScrollMode::Instant || aMode == ScrollMode::SmoothMsd); if (aMode == ScrollMode::SmoothMsd) { @@ -10655,11 +10631,11 @@ void nsIPresShell::ScrollToVisual( SetPendingVisualScrollUpdate(aVisualViewportOffset, aUpdateType); } -void nsIPresShell::SetPendingVisualScrollUpdate( +void PresShell::SetPendingVisualScrollUpdate( const nsPoint& aVisualViewportOffset, FrameMetrics::ScrollOffsetUpdateType aUpdateType) { mPendingVisualScrollUpdate = - mozilla::Some(VisualScrollUpdate{aVisualViewportOffset, aUpdateType}); + Some(VisualScrollUpdate{aVisualViewportOffset, aUpdateType}); // The pending update is picked up during the next paint. // Schedule a paint to make sure one will happen. @@ -10668,13 +10644,13 @@ void nsIPresShell::SetPendingVisualScrollUpdate( } } -void nsIPresShell::ClearPendingVisualScrollUpdate() { +void PresShell::ClearPendingVisualScrollUpdate() { if (mPendingVisualScrollUpdate && mPendingVisualScrollUpdate->mAcknowledged) { mPendingVisualScrollUpdate = mozilla::Nothing(); } } -void nsIPresShell::AcknowledgePendingVisualScrollUpdate() { +void PresShell::AcknowledgePendingVisualScrollUpdate() { MOZ_ASSERT(mPendingVisualScrollUpdate); mPendingVisualScrollUpdate->mAcknowledged = true; } @@ -10683,7 +10659,7 @@ nsPoint PresShell::GetVisualViewportOffsetRelativeToLayoutViewport() const { return GetVisualViewportOffset() - GetLayoutViewportOffset(); } -nsPoint nsIPresShell::GetLayoutViewportOffset() const { +nsPoint PresShell::GetLayoutViewportOffset() const { nsPoint result; if (nsIScrollableFrame* sf = GetRootScrollFrameAsScrollable()) { result = sf->GetScrollPosition(); @@ -10691,7 +10667,7 @@ nsPoint nsIPresShell::GetLayoutViewportOffset() const { return result; } -nsSize nsIPresShell::GetLayoutViewportSize() const { +nsSize PresShell::GetLayoutViewportSize() const { nsSize result; if (nsIScrollableFrame* sf = GetRootScrollFrameAsScrollable()) { result = sf->GetScrollPortRect().Size(); @@ -10699,7 +10675,7 @@ nsSize nsIPresShell::GetLayoutViewportSize() const { return result; } -void nsIPresShell::RecomputeFontSizeInflationEnabled() { +void PresShell::RecomputeFontSizeInflationEnabled() { mFontSizeInflationEnabled = DetermineFontSizeInflationState(); float fontScale = nsLayoutUtils::SystemFontScale(); @@ -10716,7 +10692,7 @@ void nsIPresShell::RecomputeFontSizeInflationEnabled() { } } -bool nsIPresShell::DetermineFontSizeInflationState() { +bool PresShell::DetermineFontSizeInflationState() { MOZ_ASSERT(mPresContext, "our pres context should not be null"); if (mPresContext->IsChrome()) { return false; @@ -10728,8 +10704,7 @@ bool nsIPresShell::DetermineFontSizeInflationState() { // Force-enabling font inflation always trumps the heuristics here. if (!FontSizeInflationForceEnabled()) { - if (BrowserChild* tab = - BrowserChild::GetFrom(static_cast(this))) { + if (BrowserChild* tab = BrowserChild::GetFrom(this)) { // We're in a child process. Cancel inflation if we're not // async-pan zoomed. if (!tab->AsyncPanZoomEnabled()) { @@ -10801,7 +10776,7 @@ void PresShell::ResumePainting() { GetPresContext()->RefreshDriver()->Thaw(); } -void nsIPresShell::SyncWindowProperties(nsView* aView) { +void PresShell::SyncWindowProperties(nsView* aView) { nsIFrame* frame = aView->GetFrame(); if (frame && mPresContext) { // CreateReferenceRenderingContext can return nullptr @@ -10825,8 +10800,8 @@ static StyleOrigin ToOrigin(uint32_t aServiceSheetType) { } } -nsresult nsIPresShell::HasRuleProcessorUsedByMultipleStyleSets( - uint32_t aSheetType, bool* aRetVal) { +nsresult PresShell::HasRuleProcessorUsedByMultipleStyleSets(uint32_t aSheetType, + bool* aRetVal) { *aRetVal = false; return NS_OK; } diff --git a/layout/base/PresShell.h b/layout/base/PresShell.h index 99b76048d223..d5e370a3c875 100644 --- a/layout/base/PresShell.h +++ b/layout/base/PresShell.h @@ -10,49 +10,134 @@ #define mozilla_PresShell_h #include "mozilla/PresShellForwards.h" -#include "nsIPresShell.h" +#include // for FILE definition +#include "FrameMetrics.h" +#include "GeckoProfiler.h" +#include "TouchManager.h" +#include "Units.h" +#include "ZoomConstraintsClient.h" +#include "gfxPoint.h" +#include "mozilla/ArenaObjectID.h" #include "mozilla/Attributes.h" #include "mozilla/EventForwards.h" -#include "mozilla/dom/HTMLDocumentBinding.h" -#include "mozilla/layers/FocusTarget.h" +#include "mozilla/FlushType.h" #include "mozilla/MemoryReporting.h" #include "mozilla/ScrollTypes.h" #include "mozilla/ServoStyleSet.h" +#include "mozilla/ServoStyleConsts.h" #include "mozilla/StaticPtr.h" +#include "mozilla/StyleSheet.h" #include "mozilla/UniquePtr.h" -#include "nsContentUtils.h" // For AddScriptBlocker(). -#include "nsCRT.h" +#include "mozilla/WeakPtr.h" +#include "mozilla/dom/HTMLDocumentBinding.h" +#include "mozilla/layers/FocusTarget.h" +#include "nsChangeHint.h" +#include "nsClassHashtable.h" +#include "nsColor.h" +#include "nsCOMArray.h" +#include "nsCoord.h" +#include "nsDOMNavigationTiming.h" +#include "nsFrameManager.h" +#include "nsFrameState.h" +#include "nsHashKeys.h" +#include "nsIContent.h" +#include "nsIImageLoadingContent.h" #include "nsIObserver.h" #include "nsISelectionController.h" #include "nsIWidget.h" +#include "nsQueryFrame.h" +#include "nsMargin.h" +#include "nsPresArena.h" #include "nsPresContext.h" +#include "nsRect.h" +#include "nsRefPtrHashtable.h" #include "nsRefreshDriver.h" +#include "nsRegionFwd.h" +#include "nsStringFwd.h" #include "nsStubDocumentObserver.h" +#include "nsTHashtable.h" #include "nsThreadUtils.h" #include "nsWeakReference.h" -#include "TouchManager.h" -#include "ZoomConstraintsClient.h" -class nsIDocShell; -class nsRange; - -struct RangePaintInfo; - -class nsPresShellEventCB; class AutoPointerEventTargetUpdater; +class AutoWeakFrame; +class gfxContext; class MobileViewportManager; +#ifdef ACCESSIBILITY +class nsAccessibilityService; +#endif +class nsARefreshObserver; +class nsAutoCauseReflowNotifier; +class nsCanvasFrame; +class nsCaret; +class nsCSSFrameConstructor; +class nsDisplayList; +class nsDisplayListBuilder; +class nsDocShell; +class nsFrameSelection; +class nsIDocShell; +class nsIFrame; +class nsILayoutHistoryState; +class nsINode; +class nsIPageSequenceFrame; +class nsIReflowCallback; +class nsIScrollableFrame; +class nsITimer; +class nsPIDOMWindowOuter; +class nsAPostRefreshObserver; +class nsPresShellEventCB; +class nsRange; +class nsRefreshDriver; +class nsRegion; +class nsView; +class nsViewManager; +class nsWindowSizes; +struct RangePaintInfo; +#ifdef MOZ_REFLOW_PERF +class ReflowCountMgr; +#endif +class WeakFrame; + +template +class nsCOMArray; + +struct nsCallbackEventRequest; +struct nsPoint; +struct nsRect; namespace mozilla { +class AccessibleCaretEventHub; +class EventStates; +class GeckoMVMContext; +class OverflowChangedTracker; +class StyleSheet; + +#ifdef ACCESSIBILITY +namespace a11y { +class DocAccessible; +} // namespace a11y +#endif namespace dom { +class Document; class Element; +class Event; +class HTMLSlotElement; class Selection; } // namespace dom -class EventDispatchingCallback; -class GeckoMVMContext; -class OverflowChangedTracker; +namespace gfx { +class SourceSurface; +} // namespace gfx + +namespace layers { +class LayerManager; +} // namespace layers + +namespace layout { +class ScrollAnchorContainer; +} // namespace layout // 039d8ffc-fa55-42d7-a53a-388cb129b052 #define NS_PRESSHELL_IID \ @@ -62,12 +147,28 @@ class OverflowChangedTracker; } \ } -class PresShell final : public nsIPresShell, +#undef NOISY_INTERRUPTIBLE_REFLOW + +/** + * Presentation shell. Presentation shells are the controlling point for + * managing the presentation of a document. The presentation shell holds a + * live reference to the document, the presentation context, the style + * manager, the style set and the root frame. + * + * When this object is Release'd, it will release the document, the + * presentation context, the style manager, the style set and the root frame. + */ + +class PresShell final : public nsStubDocumentObserver, public nsISelectionController, public nsIObserver, public nsSupportsWeakReference { - typedef layers::FocusTarget FocusTarget; + typedef dom::Document Document; typedef dom::Element Element; + typedef gfx::SourceSurface SourceSurface; + typedef layers::FocusTarget FocusTarget; + typedef layers::FrameMetrics FrameMetrics; + typedef layers::LayerManager LayerManager; // A set type for tracking visible frames, for use by the visibility code in // PresShell. The set contains nsIFrame* pointers. @@ -136,51 +237,413 @@ class PresShell final : public nsIPresShell, #endif // #ifdef ACCESSIBILITY void Init(Document*, nsPresContext*, nsViewManager*); - void Destroy() override; - NS_IMETHOD GetSelectionFromScript(RawSelectionType aRawSelectionType, - dom::Selection** aSelection) override; - dom::Selection* GetSelection(RawSelectionType aRawSelectionType) override; + /** + * All callers are responsible for calling |Destroy| after calling + * |EndObservingDocument|. It needs to be separate only because form + * controls incorrectly store their data in the frames rather than the + * content model and printing calls |EndObservingDocument| multiple + * times to make form controls behave nicely when printed. + */ + void Destroy(); - dom::Selection* GetCurrentSelection(SelectionType aSelectionType) override; + bool IsDestroying() { return mIsDestroying; } - already_AddRefed - GetSelectionControllerForFocusedContent( - nsIContent** aFocusedContent = nullptr) override; + /** + * All frames owned by the shell are allocated from an arena. They + * are also recycled using free lists. Separate free lists are + * maintained for each frame type (aID), which must always correspond + * to the same aSize value. AllocateFrame is infallible and will abort + * on out-of-memory. + */ + void* AllocateFrame(nsQueryFrame::FrameIID aID, size_t aSize) { + void* result = mFrameArena.AllocateByFrameID(aID, aSize); + RecordAlloc(result); + return result; + } - NS_IMETHOD SetDisplaySelection(int16_t aToggle) override; - NS_IMETHOD GetDisplaySelection(int16_t* aToggle) override; - NS_IMETHOD ScrollSelectionIntoView(RawSelectionType aRawSelectionType, - SelectionRegion aRegion, - int16_t aFlags) override; - NS_IMETHOD RepaintSelection(RawSelectionType aRawSelectionType) override; + void FreeFrame(nsQueryFrame::FrameIID aID, void* aPtr) { + RecordFree(aPtr); + if (!mIsDestroying) { + mFrameArena.FreeByFrameID(aID, aPtr); + } + } - nsresult Initialize() override; - MOZ_CAN_RUN_SCRIPT nsresult ResizeReflow( - nscoord aWidth, nscoord aHeight, nscoord aOldWidth = 0, - nscoord aOldHeight = 0, - ResizeReflowOptions aOptions = ResizeReflowOptions::NoOption) override; + /** + * This is for allocating other types of objects (not frames). Separate free + * lists are maintained for each type (aID), which must always correspond to + * the same aSize value. AllocateByObjectID is infallible and will abort on + * out-of-memory. + */ + void* AllocateByObjectID(ArenaObjectID aID, size_t aSize) { + void* result = mFrameArena.AllocateByObjectID(aID, aSize); + RecordAlloc(result); + return result; + } + + void FreeByObjectID(ArenaObjectID aID, void* aPtr) { + RecordFree(aPtr); + if (!mIsDestroying) { + mFrameArena.FreeByObjectID(aID, aPtr); + } + } + + Document* GetDocument() const { return mDocument; } + + nsPresContext* GetPresContext() const { return mPresContext; } + + nsViewManager* GetViewManager() const { return mViewManager; } + + nsRefreshDriver* GetRefreshDriver() const; + + nsCSSFrameConstructor* FrameConstructor() const { + return mFrameConstructor.get(); + } + + /** + * FrameSelection will return the Frame based selection API. + * You cannot go back and forth anymore with QI between nsIDOM sel and + * nsIFrame sel. + */ + already_AddRefed FrameSelection(); + + /** + * ConstFrameSelection returns an object which methods are safe to use for + * example in nsIFrame code. + */ + const nsFrameSelection* ConstFrameSelection() const { return mSelection; } + + // Start receiving notifications from our document. If called after Destroy, + // this will be ignored. + void BeginObservingDocument(); + + // Stop receiving notifications from our document. If called after Destroy, + // this will be ignored. + void EndObservingDocument(); + + bool IsObservingDocument() const { return mIsObservingDocument; } + + /** + * Return whether Initialize() was previously called. + */ + bool DidInitialize() const { return mDidInitialize; } + + /** + * Perform initialization. Constructs the frame for the root content + * object and then enqueues a reflow of the frame model. + * + * Callers of this method must hold a reference to this shell that + * is guaranteed to survive through arbitrary script execution. + * Calling Initialize can execute arbitrary script. + */ + nsresult Initialize(); + + /** + * Reflow the frame model into a new width and height. The + * coordinates for aWidth and aHeight must be in standard nscoord's. + */ + MOZ_CAN_RUN_SCRIPT nsresult + ResizeReflow(nscoord aWidth, nscoord aHeight, nscoord aOldWidth = 0, + nscoord aOldHeight = 0, + ResizeReflowOptions aOptions = ResizeReflowOptions::NoOption); MOZ_CAN_RUN_SCRIPT nsresult ResizeReflowIgnoreOverride( nscoord aWidth, nscoord aHeight, nscoord aOldWidth, nscoord aOldHeight, - ResizeReflowOptions aOptions = ResizeReflowOptions::NoOption) override; + ResizeReflowOptions aOptions = ResizeReflowOptions::NoOption); + /** + * Returns true if the platform/pref or docshell require a meta viewport. + */ + bool GetIsViewportOverridden() { return (mMobileViewportManager != nullptr); } + + /** + * Note that the assumptions that determine the need for a meta viewport + * may have changed. + */ + void UpdateViewportOverridden(bool aAfterInitialization); + + /** + * Get the MobileViewportManager used to manage the document's mobile + * viewport. Will return null in situations where we don't have a mobile + * viewport, and for documents that are not the root content document. + */ + RefPtr GetMobileViewportManager() const; + + /** + * Return true if the presshell expects layout flush. + */ + bool IsLayoutFlushObserver() { + return GetPresContext()->RefreshDriver()->IsLayoutFlushObserver(this); + } + + /** + * Called when document load completes. + */ + void LoadComplete(); + /** + * This calls through to the frame manager to get the root frame. + */ + nsIFrame* GetRootFrame() const { return mFrameManager->GetRootFrame(); } + + /* + * Get root scroll frame from FrameManager()->GetRootFrame(). + */ + nsIFrame* GetRootScrollFrame() const; + + /* + * The same as GetRootScrollFrame, but returns an nsIScrollableFrame + */ + nsIScrollableFrame* GetRootScrollFrameAsScrollable() const; + + /** + * Get the current focused content or DOM selection that should be the + * target for scrolling. + */ + already_AddRefed GetContentForScrolling() const; + + /** + * Get the DOM selection that should be the target for scrolling, if there + * is no focused content. + */ + already_AddRefed GetSelectedContentForScrolling() const; + + /** + * Gets nearest scrollable frame from the specified content node. The frame + * is scrollable with overflow:scroll or overflow:auto in some direction when + * aDirection is eEither. Otherwise, this returns a nearest frame that is + * scrollable in the specified direction. + */ + nsIScrollableFrame* GetScrollableFrameToScrollForContent( + nsIContent* aContent, ScrollableDirection aDirection); + + /** + * Gets nearest scrollable frame from current focused content or DOM + * selection if there is no focused content. The frame is scrollable with + * overflow:scroll or overflow:auto in some direction when aDirection is + * eEither. Otherwise, this returns a nearest frame that is scrollable in + * the specified direction. + */ + nsIScrollableFrame* GetScrollableFrameToScroll( + ScrollableDirection aDirection); + + /** + * Gets nearest ancestor scrollable frame from aFrame. The frame is + * scrollable with overflow:scroll or overflow:auto in some direction when + * aDirection is eEither. Otherwise, this returns a nearest frame that is + * scrollable in the specified direction. + */ + nsIScrollableFrame* GetNearestScrollableFrame(nsIFrame* aFrame, + ScrollableDirection aDirection); + + /** + * Returns the page sequence frame associated with the frame hierarchy. + * Returns nullptr if not a paginated view. + */ + nsIPageSequenceFrame* GetPageSequenceFrame() const; + + /** + * Returns the canvas frame associated with the frame hierarchy. + * Returns nullptr if is XUL document. + */ + nsCanvasFrame* GetCanvasFrame() const; + + void PostPendingScrollAnchorSelection( + layout::ScrollAnchorContainer* aContainer); + void FlushPendingScrollAnchorSelections(); + void PostPendingScrollAnchorAdjustment( + layout::ScrollAnchorContainer* aContainer); + + void CancelAllPendingReflows(); + + void NotifyCounterStylesAreDirty(); + + bool FrameIsAncestorOfDirtyRoot(nsIFrame* aFrame) const; + + /** + * Destroy the frames for aElement, and reconstruct them asynchronously if + * needed. + * + * Note that this may destroy frames for an ancestor instead. + */ + void DestroyFramesForAndRestyle(Element* aElement); + + /** + * Handles all the layout stuff needed when the slot assignment for an element + * is about to change. + * + * Only called when the slot attribute of the element changes, the rest of + * the changes should be handled in ShadowRoot. + */ + void SlotAssignmentWillChange(Element& aElement, + dom::HTMLSlotElement* aOldSlot, + dom::HTMLSlotElement* aNewSlot); + + void PostRecreateFramesFor(Element*); + void RestyleForAnimation(Element*, RestyleHint); + + /** + * Determine if it is safe to flush all pending notifications. + */ + bool IsSafeToFlush() const; + + /** + * Informs the document's FontFaceSet that the refresh driver ticked, + * flushing style and layout. + */ + void NotifyFontFaceSetOnRefresh(); + + // Removes ourself from the list of layout / style / and resize refresh driver + // observers. + // + // Right now this is only used for documents in the BFCache, so if you want to + // use this for anything else you need to ensure we don't end up in those + // lists after calling this, but before calling StartObservingRefreshDriver + // again. + // + // That is handled by the mDocument->GetBFCacheEntry checks in + // DoObserve*Flushes functions, though that could conceivably become a boolean + // member in the shell if needed. + // + // Callers are responsible of manually calling StartObservingRefreshDriver + // again. + void StopObservingRefreshDriver(); + void StartObservingRefreshDriver(); + + bool ObservingStyleFlushes() const { return mObservingStyleFlushes; } + bool ObservingLayoutFlushes() const { return mObservingLayoutFlushes; } + + void ObserveStyleFlushes() { + if (!ObservingStyleFlushes()) { + DoObserveStyleFlushes(); + } + } + + /** + * Callbacks will be called even if reflow itself fails for + * some reason. + */ + nsresult PostReflowCallback(nsIReflowCallback* aCallback); + void CancelReflowCallback(nsIReflowCallback* aCallback); + + void ScheduleBeforeFirstPaint(); + void UnsuppressAndInvalidate(); + + void ClearFrameRefs(nsIFrame* aFrame); + + /** + * Get a reference rendering context. This is a context that should not + * be rendered to, but is suitable for measuring text and performing + * other non-rendering operations. Guaranteed to return non-null. + */ + already_AddRefed CreateReferenceRenderingContext(); + + /** + * Scrolls the view of the document so that the given area of a frame + * is visible, if possible. Layout is not flushed before scrolling. + * + * @param aRect relative to aFrame + * @param aVertical see ScrollContentIntoView and ScrollAxis + * @param aHorizontal see ScrollContentIntoView and ScrollAxis + * @param aScrollFlags if SCROLL_FIRST_ANCESTOR_ONLY is set, only the + * nearest scrollable ancestor is scrolled, otherwise all + * scrollable ancestors may be scrolled if necessary + * if SCROLL_OVERFLOW_HIDDEN is set then we may scroll in a direction + * even if overflow:hidden is specified in that direction; otherwise + * we will not scroll in that direction when overflow:hidden is + * set for that direction + * If SCROLL_NO_PARENT_FRAMES is set then we only scroll + * nodes in this document, not in any parent documents which + * contain this document in a iframe or the like. + * If SCROLL_IGNORE_SCROLL_MARGIN_AND_PADDING is set we ignore scroll-margin + * value specified for |aFrame| and scroll-padding value for the scroll + * container. This option is typically used to locate poped-up frames into + * view. + * @return true if any scrolling happened, false if no scrolling happened + */ + bool ScrollFrameRectIntoView(nsIFrame* aFrame, const nsRect& aRect, + ScrollAxis aVertical, ScrollAxis aHorizontal, + ScrollFlags aScrollFlags); + + /** + * Determine if a rectangle specified in the frame's coordinate system + * intersects "enough" with the viewport to be considered visible. This + * is not a strict test against the viewport -- it's a test against + * the intersection of the viewport and the frame's ancestor scrollable + * frames. If it doesn't intersect enough, return a value indicating + * which direction the frame's topmost ancestor scrollable frame would + * need to be scrolled to bring the frame into view. + * @param aFrame frame that aRect coordinates are specified relative to + * @param aRect rectangle in twips to test for visibility + * @param aMinTwips is the minimum distance in from the edge of the + * visible area that an object must be to be counted + * visible + * @return RectVisibility::Visible if the rect is visible + * RectVisibility::AboveViewport + * RectVisibility::BelowViewport + * RectVisibility::LeftOfViewport + * RectVisibility::RightOfViewport rectangle is outside the + * topmost ancestor scrollable frame in the specified direction + */ RectVisibility GetRectVisibility(nsIFrame* aFrame, const nsRect& aRect, - nscoord aMinTwips) const override; + nscoord aMinTwips) const; - nsresult CaptureHistoryState( - nsILayoutHistoryState** aLayoutHistoryState) override; + /** + * Suppress notification of the frame manager that frames are + * being destroyed. + */ + void SetIgnoreFrameDestruction(bool aIgnore); - void UnsuppressPainting() override; + /** + * Get the AccessibleCaretEventHub, if it exists. AddRefs it. + */ + already_AddRefed GetAccessibleCaretEventHub() const; - nsresult AddOverrideStyleSheet(StyleSheet*) override; - nsresult RemoveOverrideStyleSheet(StyleSheet*) override; + /** + * Get the caret, if it exists. AddRefs it. + */ + already_AddRefed GetCaret() const; + /** + * Set the current caret to a new caret. To undo this, call RestoreCaret. + */ + void SetCaret(nsCaret* aNewCaret); + + /** + * Restore the caret to the original caret that this pres shell was created + * with. + */ + void RestoreCaret(); + + dom::Selection* GetCurrentSelection(SelectionType aSelectionType); + + /** + * Gets a selection controller for the focused content in the DOM window + * for mDocument. + * + * @param aFocusedContent If there is focused content in the DOM window, + * the focused content will be returned. This may + * be nullptr if it's not necessary. + * @return A selection controller for focused content. + * E.g., if an element has focus, returns + * the independent selection controller of it. + * If the DOM window does not have focused content + * (similar to Document.activeElement), returns + * nullptr. + */ + already_AddRefed + GetSelectionControllerForFocusedContent( + nsIContent** aFocusedContent = nullptr); + + /** + * Interface to dispatch events via the presshell + * @note The caller must have a strong reference to the PresShell. + */ MOZ_CAN_RUN_SCRIPT_BOUNDARY - nsresult HandleEventWithTarget( - WidgetEvent* aEvent, nsIFrame* aFrame, nsIContent* aContent, - nsEventStatus* aEventStatus, bool aIsHandlingNativeEvent = false, - nsIContent** aTargetContent = nullptr, - nsIContent* aOverrideClickTarget = nullptr) override { + nsresult HandleEventWithTarget(WidgetEvent* aEvent, nsIFrame* aFrame, + nsIContent* aContent, + nsEventStatus* aEventStatus, + bool aIsHandlingNativeEvent = false, + nsIContent** aTargetContent = nullptr, + nsIContent* aOverrideClickTarget = nullptr) { MOZ_ASSERT(aEvent); EventHandler eventHandler(*this); return eventHandler.HandleEventWithTarget( @@ -188,35 +651,610 @@ class PresShell final : public nsIPresShell, aTargetContent, aOverrideClickTarget); } - void ReconstructFrames(void) override; - void Freeze() override; - void Thaw() override; - void FireOrClearDelayedEvents(bool aFireEvents) override; + /** + * Dispatch event to content only (NOT full processing) + * @note The caller must have a strong reference to the PresShell. + */ + nsresult HandleDOMEventWithTarget(nsIContent* aTargetContent, + WidgetEvent* aEvent, + nsEventStatus* aStatus); + /** + * Dispatch event to content only (NOT full processing) + * @note The caller must have a strong reference to the PresShell. + */ + nsresult HandleDOMEventWithTarget(nsIContent* aTargetContent, + dom::Event* aEvent, nsEventStatus* aStatus); + + /** + * Return whether or not the event is valid to be dispatched + */ + bool CanDispatchEvent(const WidgetGUIEvent* aEvent = nullptr) const; + + /** + * Gets the current target event frame from the PresShell + */ + nsIFrame* GetCurrentEventFrame(); + + /** + * Gets the current target event frame from the PresShell + */ + already_AddRefed GetEventTargetContent(WidgetEvent* aEvent); + + /** + * Get and set the history state for the current document + */ + nsresult CaptureHistoryState(nsILayoutHistoryState** aLayoutHistoryState); + + /** + * Determine if reflow is currently locked + * returns true if reflow is locked, false otherwise + */ + bool IsReflowLocked() const { return mIsReflowing; } + + /** + * Called to find out if painting is suppressed for this presshell. If it is + * suppressd, we don't allow the painting of any layer but the background, and + * we don't recur into our children. + */ + bool IsPaintingSuppressed() const { return mPaintingSuppressed; } + + /** + * Pause painting by freezing the refresh driver of this and all parent + * presentations. This may not have the desired effect if this pres shell + * has its own refresh driver. + */ + void PausePainting(); + + /** + * Resume painting by thawing the refresh driver of this and all parent + * presentations. This may not have the desired effect if this pres shell + * has its own refresh driver. + */ + void ResumePainting(); + + /** + * Unsuppress painting. + */ + void UnsuppressPainting(); + + /** + * Add an override style sheet for this presentation + */ + nsresult AddOverrideStyleSheet(StyleSheet* aSheet); + + /** + * Remove an override style sheet + */ + nsresult RemoveOverrideStyleSheet(StyleSheet* aSheet); + + /** + * Reconstruct frames for all elements in the document + */ + void ReconstructFrames(); + + /** + * See if reflow verification is enabled. To enable reflow verification add + * "verifyreflow:1" to your MOZ_LOG environment variable (any non-zero + * debug level will work). Or, call SetVerifyReflowEnable with true. + */ + static bool GetVerifyReflowEnable(); + + /** + * Set the verify-reflow enable flag. + */ + static void SetVerifyReflowEnable(bool aEnabled); + + nsIFrame* GetAbsoluteContainingBlock(nsIFrame* aFrame); + +#ifdef MOZ_REFLOW_PERF + void DumpReflows(); + void CountReflows(const char* aName, nsIFrame* aFrame); + void PaintCount(const char* aName, gfxContext* aRenderingContext, + nsPresContext* aPresContext, nsIFrame* aFrame, + const nsPoint& aOffset, uint32_t aColor); + void SetPaintFrameCount(bool aOn); + bool IsPaintingFrameCounts(); +#endif // #ifdef MOZ_REFLOW_PERF + +#ifdef DEBUG + // Debugging hooks + void ListComputedStyles(FILE* out, int32_t aIndent = 0); + + void ListStyleSheets(FILE* out, int32_t aIndent = 0); +#endif // #ifdef DEBUG + + /** + * Stop all active elements (plugins and the caret) in this presentation and + * in the presentations of subdocuments. Resets painting to a suppressed + * state. + * XXX this should include image animations + */ + void Freeze(); + bool IsFrozen() { return mFrozen; } + + /** + * Restarts active elements (plugins) in this presentation and in the + * presentations of subdocuments, then do a full invalidate of the content + * area. + */ + void Thaw(); + + void FireOrClearDelayedEvents(bool aFireEvents); + + /** + * When this shell is disconnected from its containing docshell, we + * lose our container pointer. However, we'd still like to be able to target + * user events at the docshell's parent. This pointer allows us to do that. + * It should not be used for any other purpose. + */ + void SetForwardingContainer(const WeakPtr& aContainer); + + /** + * Render the document into an arbitrary gfxContext + * Designed for getting a picture of a document or a piece of a document + * Note that callers will generally want to call FlushPendingNotifications + * to get an up-to-date view of the document + * @param aRect is the region to capture into the offscreen buffer, in the + * root frame's coordinate system (if aIgnoreViewportScrolling is false) + * or in the root scrolled frame's coordinate system + * (if aIgnoreViewportScrolling is true). The coordinates are in appunits. + * @param aFlags see below; + * set RenderDocumentFlags::IsUntrusted if the contents may be passed to + * malicious agents. E.g. we might choose not to paint the contents of + * sensitive widgets such as the file name in a file upload widget, and we + * might choose not to paint themes. + * set RenderDocumentFlags::IgnoreViewportScrolling to ignore clipping and + * scrollbar painting due to scrolling in the viewport + * set RenderDocumentFlags::DrawCaret to draw the caret if one would be + * visible (by default the caret is never drawn) + * set RenderDocumentFlags::UseWidgetLayers to force rendering to go + * through the layer manager for the window. This may be unexpectedly slow + * (if the layer manager must read back data from the GPU) or low-quality + * (if the layer manager reads back pixel data and scales it + * instead of rendering using the appropriate scaling). It may also + * slow everything down if the area rendered does not correspond to the + * normal visible area of the window. + * set RenderDocumentFlags::AsyncDecodeImages to avoid having images + * synchronously decoded during rendering. + * (by default images decode synchronously with RenderDocument) + * set RenderDocumentFlags::DocumentRelative to render the document as if + * there has been no scrolling and interpret |aRect| relative to the document + * instead of the CSS viewport. Only considered if + * RenderDocumentFlags::IgnoreViewportScrolling is set or the document is in + * ignore viewport scrolling mode + * (PresShell::SetIgnoreViewportScrolling/IgnoringViewportScrolling). + * @param aBackgroundColor a background color to render onto + * @param aRenderedContext the gfxContext to render to. We render so that + * one CSS pixel in the source document is rendered to one unit in the current + * transform. + */ nsresult RenderDocument(const nsRect& aRect, RenderDocumentFlags aFlags, nscolor aBackgroundColor, - gfxContext* aThebesContext) override; + gfxContext* aRenderedContext); + /** + * Renders a node aNode to a surface and returns it. The aRegion may be used + * to clip the rendering. This region is measured in CSS pixels from the + * edge of the presshell area. The aPoint, aScreenRect and aFlags arguments + * function in a similar manner as RenderSelection. + */ already_AddRefed RenderNode(nsINode* aNode, const Maybe& aRegion, const LayoutDeviceIntPoint aPoint, LayoutDeviceIntRect* aScreenRect, - RenderImageFlags aFlags) override; + RenderImageFlags aFlags); + /** + * Renders a selection to a surface and returns it. This method is primarily + * intended to create the drag feedback when dragging a selection. + * + * aScreenRect will be filled in with the bounding rectangle of the + * selection area on screen. + * + * If the area of the selection is large and the RenderImageFlags::AutoScale + * is set, the image will be scaled down. The argument aPoint is used in this + * case as a reference point when determining the new screen rectangle after + * scaling. Typically, this will be the mouse position, so that the screen + * rectangle is positioned such that the mouse is over the same point in the + * scaled image as in the original. When scaling does not occur, the mouse + * point isn't used because the position can be determined from the displayed + * frames. + */ already_AddRefed RenderSelection( dom::Selection* aSelection, const LayoutDeviceIntPoint aPoint, - LayoutDeviceIntRect* aScreenRect, RenderImageFlags aFlags) override; + LayoutDeviceIntRect* aScreenRect, RenderImageFlags aFlags); - already_AddRefed GetRootWindow() override; + void AddAutoWeakFrame(AutoWeakFrame* aWeakFrame); + void AddWeakFrame(WeakFrame* aWeakFrame); - already_AddRefed GetFocusedDOMWindowInOurWindow() - override; + void RemoveAutoWeakFrame(AutoWeakFrame* aWeakFrame); + void RemoveWeakFrame(WeakFrame* aWeakFrame); - LayerManager* GetLayerManager() override; + /** + * Stop or restart non synthetic test mouse event handling on *all* + * presShells. + * + * @param aDisable If true, disable all non synthetic test mouse + * events on all presShells. Otherwise, enable them. + */ + void DisableNonTestMouseEvents(bool aDisable); - bool AsyncPanZoomEnabled() override; + /** + * Record the background color of the most recently drawn canvas. This color + * is composited on top of the user's default background color and then used + * to draw the background color of the canvas. See PresShell::Paint, + * PresShell::PaintDefaultBackground, and nsDocShell::SetupNewViewer; + * bug 488242, bug 476557 and other bugs mentioned there. + */ + void SetCanvasBackground(nscolor aColor) { mCanvasBackgroundColor = aColor; } + nscolor GetCanvasBackground() { return mCanvasBackgroundColor; } - void SetIgnoreViewportScrolling(bool aIgnore) override; + /** + * Use the current frame tree (if it exists) to update the background + * color of the most recently drawn canvas. + */ + void UpdateCanvasBackground(); + + /** + * Add a solid color item to the bottom of aList with frame aFrame and + * bounds aBounds representing the dark grey background behind the page of a + * print preview presentation. + */ + void AddPrintPreviewBackgroundItem(nsDisplayListBuilder& aBuilder, + nsDisplayList& aList, nsIFrame* aFrame, + const nsRect& aBounds); + + /** + * Computes the backstop color for the view: transparent if in a transparent + * widget, otherwise the PresContext default background color. This color is + * only visible if the contents of the view as a whole are translucent. + */ + nscolor ComputeBackstopColor(nsView* aDisplayRoot); + + void ObserveNativeAnonMutationsForPrint(bool aObserve) { + mObservesMutationsForPrint = aObserve; + } + bool ObservesNativeAnonMutationsForPrint() { + return mObservesMutationsForPrint; + } + + nsresult SetIsActive(bool aIsActive); + + bool IsActive() { return mIsActive; } + + /** + * Keep track of how many times this presshell has been rendered to + * a window. + */ + uint64_t GetPaintCount() { return mPaintCount; } + void IncrementPaintCount() { ++mPaintCount; } + + /** + * Get the root DOM window of this presShell. + */ + already_AddRefed GetRootWindow(); + + /** + * This returns the focused DOM window under our top level window. + * I.e., when we are deactive, this returns the *last* focused DOM window. + */ + already_AddRefed GetFocusedDOMWindowInOurWindow(); + + /** + * Get the focused content under this window. + */ + already_AddRefed GetFocusedContentInOurWindow() const; + + /** + * Get the layer manager for the widget of the root view, if it has + * one. + */ + LayerManager* GetLayerManager(); + + /** + * Return true iff there is a widget rendering this presShell and that + * widget is APZ-enabled. + */ + bool AsyncPanZoomEnabled(); + + /** + * Track whether we're ignoring viewport scrolling for the purposes + * of painting. If we are ignoring, then layers aren't clipped to + * the CSS viewport and scrollbars aren't drawn. + */ + void SetIgnoreViewportScrolling(bool aIgnore); + bool IgnoringViewportScrolling() const { + return !!(mRenderingStateFlags & + RenderingStateFlags::IgnoringViewportScrolling); + } + + float GetResolution() const { return mResolution.valueOr(1.0); } + float GetCumulativeResolution(); + + /** + * Accessors for a flag that tracks whether the most recent change to + * the pres shell's resolution was originated by the main thread. + */ + bool IsResolutionUpdated() const { return mResolutionUpdated; } + void SetResolutionUpdated(bool aUpdated) { mResolutionUpdated = aUpdated; } + + /** + * Returns true if the resolution has ever been changed by APZ. + */ + bool IsResolutionUpdatedByApz() const { return mResolutionUpdatedByApz; } + + /** + * Calculate the cumulative scale resolution from this document up to + * but not including the root document. + */ + float GetCumulativeNonRootScaleResolution(); + + /** + * Used by session restore code to restore a resolution before the first + * paint. + */ + void SetRestoreResolution(float aResolution, + LayoutDeviceIntSize aDisplaySize); + + /** + * Returns whether we are in a DrawWindow() call that used the + * DRAWWINDOW_DO_NOT_FLUSH flag. + */ + bool InDrawWindowNotFlushing() const { + return !!(mRenderingStateFlags & + RenderingStateFlags::DrawWindowNotFlushing); + } + + /** + * Set the isFirstPaint flag. + */ + void SetIsFirstPaint(bool aIsFirstPaint) { mIsFirstPaint = aIsFirstPaint; } + + /** + * Get the isFirstPaint flag. + */ + bool GetIsFirstPaint() const { return mIsFirstPaint; } + + uint32_t GetPresShellId() { return mPresShellId; } + + /** + * Dispatch a mouse move event based on the most recent mouse position if + * this PresShell is visible. This is used when the contents of the page + * moved (aFromScroll is false) or scrolled (aFromScroll is true). + */ + void SynthesizeMouseMove(bool aFromScroll); + + MOZ_CAN_RUN_SCRIPT + nsresult HandleEvent(nsIFrame* aFrame, WidgetGUIEvent* aEvent, + bool aDontRetargetEvents, nsEventStatus* aEventStatus); + bool ShouldIgnoreInvalidation(); + /** + * Notify that we're going to call Paint with PaintFlags::PaintComposite. + * Fires on the presshell for the painted widget. + * This is issued at a time when it's safe to modify widget geometry. + */ + void WillPaintWindow(); + /** + * Notify that we called Paint with PaintFlags::PaintComposite. + * Fires on the presshell for the painted widget. + * This is issued at a time when it's safe to modify widget geometry. + */ + void DidPaintWindow(); + + bool IsVisible(); + MOZ_CAN_RUN_SCRIPT + void DispatchSynthMouseMove(WidgetGUIEvent* aEvent); + + /* Temporarily ignore the Displayport for better paint performance. We + * trigger a repaint once suppression is disabled. Without that + * the displayport may get left at the suppressed size for an extended + * period of time and result in unnecessary checkerboarding (see bug + * 1255054). */ + void SuppressDisplayport(bool aEnabled); + + /* Whether or not displayport suppression should be turned on. Note that + * this only affects the return value of |IsDisplayportSuppressed()|, and + * doesn't change the value of the internal counter. + */ + void RespectDisplayportSuppression(bool aEnabled); + + /* Whether or not the displayport is currently suppressed. */ + bool IsDisplayportSuppressed(); + + void AddSizeOfIncludingThis(nsWindowSizes& aWindowSizes) const; + + /** + * Methods that retrieve the cached font inflation preferences. + */ + uint32_t FontSizeInflationEmPerLine() const { + return mFontSizeInflationEmPerLine; + } + + uint32_t FontSizeInflationMinTwips() const { + return mFontSizeInflationMinTwips; + } + + uint32_t FontSizeInflationLineThreshold() const { + return mFontSizeInflationLineThreshold; + } + + bool FontSizeInflationForceEnabled() const { + return mFontSizeInflationForceEnabled; + } + + bool FontSizeInflationDisabledInMasterProcess() const { + return mFontSizeInflationDisabledInMasterProcess; + } + + bool FontSizeInflationEnabled() const { return mFontSizeInflationEnabled; } + + /** + * Recomputes whether font-size inflation is enabled. + */ + void RecomputeFontSizeInflationEnabled(); + + /** + * Return true if the most recent interruptible reflow was interrupted. + */ + bool IsReflowInterrupted() const { return mWasLastReflowInterrupted; } + + /** + * Return true if the the interruptible reflows have to be suppressed. + * This may happen only if if the most recent reflow was interrupted. + */ + bool SuppressInterruptibleReflows() const { + return mWasLastReflowInterrupted; + } + + ////////////////////////////////////////////////////////////////////////////// + // Approximate frame visibility tracking public API. + ////////////////////////////////////////////////////////////////////////////// + + /** + * Schedule an update of the list of approximately visible frames "soon". + * This lets the refresh driver know that we want a visibility update in the + * near future. The refresh driver applies its own heuristics and throttling + * to decide when to actually perform the visibility update. + */ + void ScheduleApproximateFrameVisibilityUpdateSoon(); + + /** + * Schedule an update of the list of approximately visible frames "now". The + * update runs asynchronously, but it will be posted to the event loop + * immediately. Prefer the "soon" variation of this method when possible, as + * this variation ignores the refresh driver's heuristics. + */ + void ScheduleApproximateFrameVisibilityUpdateNow(); + + /** + * Clears the current list of approximately visible frames on this pres shell + * and replaces it with frames that are in the display list @aList. + */ + void RebuildApproximateFrameVisibilityDisplayList(const nsDisplayList& aList); + void RebuildApproximateFrameVisibility(nsRect* aRect = nullptr, + bool aRemoveOnly = false); + + /** + * Ensures @aFrame is in the list of approximately visible frames. + */ + void EnsureFrameInApproximatelyVisibleList(nsIFrame* aFrame); + + /// Removes @aFrame from the list of approximately visible frames if present. + void RemoveFrameFromApproximatelyVisibleList(nsIFrame* aFrame); + + /// Whether we should assume all frames are visible. + bool AssumeAllFramesVisible(); + + /** + * Returns whether the document's style set's rule processor for the + * specified level of the cascade is shared by multiple style sets. + * + * @param aSheetType One of the nsIStyleSheetService.*_SHEET constants. + */ + nsresult HasRuleProcessorUsedByMultipleStyleSets(uint32_t aSheetType, + bool* aRetVal); + + /** + * Returns whether or not the document has ever handled user input + */ + bool HasHandledUserInput() const { return mHasHandledUserInput; } + + void FireResizeEvent(); + + void NativeAnonymousContentRemoved(nsIContent* aAnonContent); + + /** + * See HTMLDocument.setKeyPressEventModel() in HTMLDocument.webidl for the + * detail. + */ + void SetKeyPressEventModel(uint16_t aKeyPressEventModel) { + mForceUseLegacyKeyCodeAndCharCodeValues |= + aKeyPressEventModel == + dom::HTMLDocument_Binding::KEYPRESS_EVENT_MODEL_SPLIT; + } + + bool AddRefreshObserver(nsARefreshObserver* aObserver, FlushType aFlushType); + bool RemoveRefreshObserver(nsARefreshObserver* aObserver, + FlushType aFlushType); + + bool AddPostRefreshObserver(nsAPostRefreshObserver* aObserver); + bool RemovePostRefreshObserver(nsAPostRefreshObserver* aObserver); + + // Represents an update to the visual scroll offset that will be sent to APZ. + // The update type is used to determine priority compared to other scroll + // updates. + struct VisualScrollUpdate { + nsPoint mVisualScrollOffset; + FrameMetrics::ScrollOffsetUpdateType mUpdateType; + bool mAcknowledged = false; + }; + + // Ask APZ in the next transaction to scroll to the given visual viewport + // offset (relative to the document). + // Use this sparingly, as it will clobber JS-driven scrolling that happens + // in the same frame. This is mostly intended to be used in special + // situations like "first paint" or session restore. + // If scrolling "far away", i.e. not just within the existing layout + // viewport, it's recommended to use both nsIScrollableFrame.ScrollTo*() + // (via window.scrollTo if calling from JS) *and* this function; otherwise, + // temporary checkerboarding may result. + // Please request APZ review if adding a new call site. + void ScrollToVisual(const nsPoint& aVisualViewportOffset, + FrameMetrics::ScrollOffsetUpdateType aUpdateType, + ScrollMode aMode); + void AcknowledgePendingVisualScrollUpdate(); + void ClearPendingVisualScrollUpdate(); + const Maybe& GetPendingVisualScrollUpdate() const { + return mPendingVisualScrollUpdate; + } + + nsPoint GetLayoutViewportOffset() const; + nsSize GetLayoutViewportSize() const; + + /** + * Documents belonging to an invisible DocShell must not be painted ever. + */ + bool IsNeverPainting() { return mIsNeverPainting; } + + void SetNeverPainting(bool aNeverPainting) { + mIsNeverPainting = aNeverPainting; + } + + /** + * True if a reflow event has been scheduled, or is going to be scheduled + * to run in the future. + */ + bool HasPendingReflow() const { + return mObservingLayoutFlushes || mReflowContinueTimer; + } + + void SyncWindowProperties(nsView* aView); + + Document* GetPrimaryContentDocument(); + + struct MOZ_RAII AutoAssertNoFlush { + explicit AutoAssertNoFlush(PresShell& aPresShell) + : mPresShell(aPresShell), mOldForbidden(mPresShell.mForbiddenToFlush) { + mPresShell.mForbiddenToFlush = true; + } + + ~AutoAssertNoFlush() { mPresShell.mForbiddenToFlush = mOldForbidden; } + + PresShell& mPresShell; + const bool mOldForbidden; + }; + + NS_IMETHOD GetSelectionFromScript(RawSelectionType aRawSelectionType, + dom::Selection** aSelection) override; + dom::Selection* GetSelection(RawSelectionType aRawSelectionType) override; + + NS_IMETHOD SetDisplaySelection(int16_t aToggle) override; + NS_IMETHOD GetDisplaySelection(int16_t* aToggle) override; + NS_IMETHOD ScrollSelectionIntoView(RawSelectionType aRawSelectionType, + SelectionRegion aRegion, + int16_t aFlags) override; + NS_IMETHOD RepaintSelection(RawSelectionType aRawSelectionType) override; /** * Set a "resolution" for the document, which if not 1.0 will @@ -238,40 +1276,17 @@ class PresShell final : public nsIPresShell, nsresult SetResolutionAndScaleTo(float aResolution, ResolutionChangeOrigin aOrigin); - float GetCumulativeResolution() override; - float GetCumulativeNonRootScaleResolution() override; - void SetRestoreResolution(float aResolution, - LayoutDeviceIntSize aDisplaySize) override; - // Widget notificiations void WindowSizeMoveDone(); void SysColorChanged() { mPresContext->SysColorChanged(); } void ThemeChanged() { mPresContext->ThemeChanged(); } void BackingScaleFactorChanged() { mPresContext->UIResolutionChangedSync(); } - void SynthesizeMouseMove(bool aFromScroll) override; - - Document* GetPrimaryContentDocument() override; - - void PausePainting() override; - void ResumePainting() override; - // nsIViewObserver interface void Paint(nsView* aViewToPaint, const nsRegion& aDirtyRegion, PaintFlags aFlags); - MOZ_CAN_RUN_SCRIPT nsresult HandleEvent(nsIFrame* aFrameForPresShell, - WidgetGUIEvent* aEvent, - bool aDontRetargetEvents, - nsEventStatus* aEventStatus) override; - nsresult HandleDOMEventWithTarget(nsIContent* aTargetContent, - WidgetEvent* aEvent, - nsEventStatus* aStatus) override; - nsresult HandleDOMEventWithTarget(nsIContent* aTargetContent, - dom::Event* aEvent, - nsEventStatus* aStatus) override; - bool ShouldIgnoreInvalidation() override; /** * Notify that we're going to call Paint with PaintFlags::PaintLayers * on the pres shell for a widget (which might not be this one, since @@ -280,8 +1295,6 @@ class PresShell final : public nsIPresShell, * widget geometry. */ MOZ_CAN_RUN_SCRIPT void WillPaint(); - void WillPaintWindow() override; - void DidPaintWindow() override; /** * Ensures that the refresh driver is running, and schedules a view @@ -293,11 +1306,6 @@ class PresShell final : public nsIPresShell, */ void ScheduleViewManagerFlush(PaintType aType = PaintType::Default); - bool IsVisible() override; - void SuppressDisplayport(bool aEnabled) override; - void RespectDisplayportSuppression(bool aEnabled) override; - bool IsDisplayportSuppressed() override; - // caret handling NS_IMETHOD SetCaretEnabled(bool aInEnable) override; NS_IMETHOD SetCaretReadOnly(bool aReadOnly) override; @@ -305,10 +1313,23 @@ class PresShell final : public nsIPresShell, NS_IMETHOD SetCaretVisibilityDuringSelection(bool aVisibility) override; NS_IMETHOD GetCaretVisible(bool* _retval) override; + /** + * Should the images have borders etc. Actual visual effects are determined + * by the frames. Visual effects may not effect layout, only display. + * Takes effect on next repaint, does not force a repaint itself. + * + * @param aInEnable if true, visual selection effects are enabled + * if false visual selection effects are disabled + */ NS_IMETHOD SetSelectionFlags(int16_t aInEnable) override; NS_IMETHOD GetSelectionFlags(int16_t* aOutEnable) override; - using nsIPresShell::GetSelectionFlags; + /** + * Gets the current state of non text selection effects + * @return current state of non text selection, + * as set by SetDisplayNonTextSelection + */ + int16_t GetSelectionFlags() const { return mSelectionFlags; } // nsISelectionController @@ -495,26 +1516,6 @@ class PresShell final : public nsIPresShell, bool DoReflow(nsIFrame* aFrame, bool aInterruptible, OverflowChangedTracker* aOverflowTracker); -#ifdef MOZ_REFLOW_PERF - void DumpReflows() override; - void CountReflows(const char* aName, nsIFrame* aFrame) override; - void PaintCount(const char* aName, gfxContext* aRenderingContext, - nsPresContext* aPresContext, nsIFrame* aFrame, - const nsPoint& aOffset, uint32_t aColor) override; - void SetPaintFrameCount(bool aOn) override; - bool IsPaintingFrameCounts() override; -#endif - -#ifdef DEBUG - void ListComputedStyles(FILE* out, int32_t aIndent = 0) override; - - void ListStyleSheets(FILE* out, int32_t aIndent = 0) override; -#endif - - void DisableNonTestMouseEvents(bool aDisable) override; - - void UpdateCanvasBackground() override; - /** * Add a solid color item to the bottom of aList with frame aFrame and bounds * aBounds. Checks first if this needs to be done by checking if aFrame is a @@ -542,62 +1543,10 @@ class PresShell final : public nsIPresShell, AddCanvasBackgroundColorFlags aFlags = AddCanvasBackgroundColorFlags::None); - void AddPrintPreviewBackgroundItem(nsDisplayListBuilder& aBuilder, - nsDisplayList& aList, nsIFrame* aFrame, - const nsRect& aBounds) override; - - nscolor ComputeBackstopColor(nsView* aDisplayRoot) override; - - nsresult SetIsActive(bool aIsActive) override; - - bool GetIsViewportOverridden() override { - return (mMobileViewportManager != nullptr); - } - - RefPtr GetMobileViewportManager() const override; - - void UpdateViewportOverridden(bool aAfterInitialization) override; - - bool IsLayoutFlushObserver() override { - return GetPresContext()->RefreshDriver()->IsLayoutFlushObserver(this); - } - - void LoadComplete() override; - - void AddSizeOfIncludingThis(nsWindowSizes& aWindowSizes) const override; size_t SizeOfTextRuns(MallocSizeOf aMallocSizeOf) const; - ////////////////////////////////////////////////////////////////////////////// - // Approximate frame visibility tracking public API. - ////////////////////////////////////////////////////////////////////////////// - - void ScheduleApproximateFrameVisibilityUpdateSoon() override; - void ScheduleApproximateFrameVisibilityUpdateNow() override; - - void RebuildApproximateFrameVisibilityDisplayList( - const nsDisplayList& aList) override; - void RebuildApproximateFrameVisibility(nsRect* aRect = nullptr, - bool aRemoveOnly = false) override; - - void EnsureFrameInApproximatelyVisibleList(nsIFrame* aFrame) override; - void RemoveFrameFromApproximatelyVisibleList(nsIFrame* aFrame) override; - - bool AssumeAllFramesVisible() override; - - bool CanDispatchEvent(const WidgetGUIEvent* aEvent = nullptr) const override; - void SetNextPaintCompressed() { mNextPaintCompressed = true; } - bool HasHandledUserInput() const override { return mHasHandledUserInput; } - - void FireResizeEvent() override; - - void SetKeyPressEventModel(uint16_t aKeyPressEventModel) override { - mForceUseLegacyKeyCodeAndCharCodeValues |= - aKeyPressEventModel == - dom::HTMLDocument_Binding::KEYPRESS_EVENT_MODEL_SPLIT; - } - static PresShell* GetShellForEventTarget(nsIFrame* aFrame, nsIContent* aContent); static PresShell* GetShellForTouchEvent(WidgetGUIEvent* aEvent); @@ -728,6 +1677,79 @@ class PresShell final : public nsIPresShell, private: ~PresShell(); + /** + * Refresh observer management. + */ + void DoObserveStyleFlushes(); + void DoObserveLayoutFlushes(); + + /** + * Does the actual work of figuring out the current state of font size + * inflation. + */ + bool DetermineFontSizeInflationState(); + + void RecordAlloc(void* aPtr) { +#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED + MOZ_DIAGNOSTIC_ASSERT(!mAllocatedPointers.Contains(aPtr)); + mAllocatedPointers.PutEntry(aPtr); +#endif + } + + void RecordFree(void* aPtr) { +#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED + MOZ_DIAGNOSTIC_ASSERT(mAllocatedPointers.Contains(aPtr)); + mAllocatedPointers.RemoveEntry(aPtr); +#endif + } + + void PushCurrentEventInfo(nsIFrame* aFrame, nsIContent* aContent); + void PopCurrentEventInfo(); + nsIContent* GetCurrentEventContent(); + + friend class ::nsRefreshDriver; + friend class ::nsAutoCauseReflowNotifier; + + void WillCauseReflow(); + void DidCauseReflow(); + + void CancelPostedReflowCallbacks(); + void FlushPendingScrollAnchorAdjustments(); + + void SetPendingVisualScrollUpdate( + const nsPoint& aVisualViewportOffset, + FrameMetrics::ScrollOffsetUpdateType aUpdateType); + +#ifdef MOZ_REFLOW_PERF + UniquePtr mReflowCountMgr; +#endif + + void WillDoReflow(); + + // This data is stored as a content property (nsGkAtoms::scrolling) on + // mContentToScrollTo when we have a pending ScrollIntoView. + struct ScrollIntoViewData { + ScrollAxis mContentScrollVAxis; + ScrollAxis mContentScrollHAxis; + ScrollFlags mContentToScrollToFlags; + }; + + static LazyLogModule gLog; + + DOMHighResTimeStamp GetPerformanceNowUnclamped(); + + // The callback for the mReflowContinueTimer timer. + static void sReflowContinueCallback(nsITimer* aTimer, void* aPresShell); + bool ScheduleReflowOffTimer(); + // MaybeScheduleReflow checks if posting a reflow is needed, then checks if + // the last reflow was interrupted. In the interrupted case ScheduleReflow is + // called off a timer, otherwise it is called directly. + void MaybeScheduleReflow(); + // Actually schedules a reflow. This should only be called by + // MaybeScheduleReflow and the reflow timer ScheduleReflowOffTimer + // sets up. + void ScheduleReflow(); + friend class ::AutoPointerEventTargetUpdater; // ProcessReflowCommands returns whether we processed all our dirty roots @@ -777,9 +1799,9 @@ class PresShell final : public nsIPresShell, struct RenderingState { explicit RenderingState(PresShell* aPresShell) : mResolution(aPresShell->mResolution), - mRenderFlags(aPresShell->mRenderFlags) {} + mRenderingStateFlags(aPresShell->mRenderingStateFlags) {} Maybe mResolution; - RenderFlags mRenderFlags; + RenderingStateFlags mRenderingStateFlags; }; struct AutoSaveRestoreRenderingState { @@ -787,24 +1809,17 @@ class PresShell final : public nsIPresShell, : mPresShell(aPresShell), mOldState(aPresShell) {} ~AutoSaveRestoreRenderingState() { - mPresShell->mRenderFlags = mOldState.mRenderFlags; + mPresShell->mRenderingStateFlags = mOldState.mRenderingStateFlags; mPresShell->mResolution = mOldState.mResolution; } PresShell* mPresShell; RenderingState mOldState; }; - static RenderFlags ChangeFlag(RenderFlags aFlags, bool aOnOff, - eRenderFlag aFlag) { - return aOnOff ? (aFlags | aFlag) : (aFlag & ~aFlag); - } - void SetRenderingState(const RenderingState& aState); friend class ::nsPresShellEventCB; - bool mCaretEnabled; - // methods for painting a range to an offscreen buffer // given a display list, clip the items within the list to @@ -917,7 +1932,7 @@ class PresShell final : public nsIPresShell, already_AddRefed GetParentPresShellForEventHandling(); /** - * EventHandler is implementation of nsIPresShell::HandleEvent(). + * EventHandler is implementation of PresShell::HandleEvent(). */ class MOZ_STACK_CLASS EventHandler final { public: @@ -1753,23 +2768,105 @@ class PresShell final : public nsIPresShell, nsIFrame* mDrawEventTargetFrame = nullptr; #endif // #ifdef DEBUG - // This is used for synthetic mouse events that are sent when what is under - // the mouse pointer may have changed without the mouse moving (eg scrolling, - // change to the document contents). - // It is set only on a presshell for a root document, this value represents - // the last observed location of the mouse relative to that root document. It - // is set to (NS_UNCONSTRAINEDSIZE, NS_UNCONSTRAINEDSIZE) if the mouse isn't - // over our window or there is no last observed mouse location for some - // reason. - nsPoint mMouseLocation; - // This is an APZ state variable that tracks the target guid for the last - // mouse event that was processed (corresponding to mMouseLocation). This is - // needed for the synthetic mouse events. - layers::ScrollableLayerGuid mMouseEventTargetGuid; + private: + // IMPORTANT: The ownership implicit in the following member variables + // has been explicitly checked. If you add any members to this class, + // please make the ownership explicit (pinkerton, scc). + + // These are the same Document and PresContext owned by the DocViewer. + // we must share ownership. + RefPtr mDocument; + RefPtr mPresContext; + // The document's style set owns it but we maintain a ref, may be null. + RefPtr mPrefStyleSheet; + UniquePtr mFrameConstructor; + nsViewManager* mViewManager; // [WEAK] docViewer owns it so I don't have to + RefPtr mSelection; + RefPtr mCaret; + RefPtr mOriginalCaret; + RefPtr mAccessibleCaretEventHub; + // Pointer into mFrameConstructor - this is purely so that GetRootFrame() can + // be inlined: + nsFrameManager* mFrameManager; + WeakPtr mForwardingContainer; + + // The `performance.now()` value when we last started to process reflows. + DOMHighResTimeStamp mLastReflowStart{0.0}; + + // At least on Win32 and Mac after interupting a reflow we need to post + // the resume reflow event off a timer to avoid event starvation because + // posted messages are processed before other messages when the modal + // moving/sizing loop is running, see bug 491700 for details. + nsCOMPtr mReflowContinueTimer; + +#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED + // We track allocated pointers in a debug-only hashtable to assert against + // missing/double frees. + nsTHashtable> mAllocatedPointers; +#endif + + // A list of stack weak frames. This is a pointer to the last item in the + // list. + AutoWeakFrame* mAutoWeakFrames; + + // A hash table of heap allocated weak frames. + nsTHashtable> mWeakFrames; + + class DirtyRootsList { + public: + // Add a dirty root. + void Add(nsIFrame* aFrame); + // Remove this frame if present. + void Remove(nsIFrame* aFrame); + // Remove and return one of the shallowest dirty roots from the list. + // (If two roots are at the same depth, order is indeterminate.) + nsIFrame* PopShallowestRoot(); + // Remove all dirty roots. + void Clear(); + // Is this frame one of the dirty roots? + bool Contains(nsIFrame* aFrame) const; + // Are there no dirty roots? + bool IsEmpty() const; + // Is the given frame an ancestor of any dirty root? + bool FrameIsAncestorOfDirtyRoot(nsIFrame* aFrame) const; + + private: + struct FrameAndDepth { + nsIFrame* mFrame; + const uint32_t mDepth; + + // Easy conversion to nsIFrame*, as it's the most likely need. + operator nsIFrame*() const { return mFrame; } + + // Used to sort by reverse depths, i.e., deeper < shallower. + class CompareByReverseDepth { + public: + bool Equals(const FrameAndDepth& aA, const FrameAndDepth& aB) const { + return aA.mDepth == aB.mDepth; + } + bool LessThan(const FrameAndDepth& aA, const FrameAndDepth& aB) const { + // Reverse depth! So '>' instead of '<'. + return aA.mDepth > aB.mDepth; + } + }; + }; + // List of all known dirty roots, sorted by decreasing depths. + nsTArray mList; + }; + + // Reflow roots that need to be reflowed. + DirtyRootsList mDirtyRoots; + +#ifdef MOZ_GECKO_PROFILER + // These two fields capture call stacks of any changes that require a restyle + // or a reflow. Only the first change per restyle / reflow is recorded (the + // one that caused a call to SetNeedStyleFlush() / SetNeedLayoutFlush()). + UniqueProfilerBacktrace mStyleCause; + UniqueProfilerBacktrace mReflowCause; +#endif nsTArray> mDelayedEvents; - private: nsRevocableEventPtr mSynthMouseMoveEvent; TouchManager mTouchManager; @@ -1785,8 +2882,6 @@ class PresShell final : public nsIPresShell, nsCOMPtr mDelayedPaintTimer; - TimeStamp mLoadBegin; // used to time loads - // Information about live content (which still stay in DOM tree). // Used in case we need re-dispatch event after sending pointer event, // when target of pointer event was deleted during executing user handlers. @@ -1805,21 +2900,98 @@ class PresShell final : public nsIPresShell, a11y::DocAccessible* mDocAccessible; #endif // #ifdef ACCESSIBILITY + nsIFrame* mCurrentEventFrame; + nsCOMPtr mCurrentEventContent; + nsTArray mCurrentEventFrameStack; + nsCOMArray mCurrentEventContentStack; + // Set of frames that we should mark with NS_FRAME_HAS_DIRTY_CHILDREN after + // we finish reflowing mCurrentReflowRoot. + nsTHashtable> mFramesToDirty; + nsTHashtable> mPendingScrollAnchorSelection; + nsTHashtable> mPendingScrollAnchorAdjustment; + + nsCallbackEventRequest* mFirstCallbackEventRequest = nullptr; + nsCallbackEventRequest* mLastCallbackEventRequest = nullptr; + + // This is used for synthetic mouse events that are sent when what is under + // the mouse pointer may have changed without the mouse moving (eg scrolling, + // change to the document contents). + // It is set only on a presshell for a root document, this value represents + // the last observed location of the mouse relative to that root document. It + // is set to (NS_UNCONSTRAINEDSIZE, NS_UNCONSTRAINEDSIZE) if the mouse isn't + // over our window or there is no last observed mouse location for some + // reason. + nsPoint mMouseLocation; + // This is an APZ state variable that tracks the target guid for the last + // mouse event that was processed (corresponding to mMouseLocation). This is + // needed for the synthetic mouse events. + layers::ScrollableLayerGuid mMouseEventTargetGuid; + nsSize mVisualViewportSize; - mozilla::Maybe mVisualViewportOffset; - - TimeStamp mLastOSWake; - - // The focus sequence number of the last processed input event - uint64_t mAPZFocusSequenceNumber; // The focus information needed for async keyboard scrolling FocusTarget mAPZFocusTarget; + nsPresArena<8192> mFrameArena; + + Maybe mVisualViewportOffset; + + // A pending visual scroll offset that we will ask APZ to scroll to + // during the next transaction. Cleared when we send the transaction. + // Only applicable to the RCD pres shell. + Maybe mPendingVisualScrollUpdate; + + // Used to force allocation and rendering of proportionally more or + // less pixels in both dimensions. + Maybe mResolution; + + TimeStamp mLoadBegin; // used to time loads + + TimeStamp mLastOSWake; + + // Count of the number of times this presshell has been painted to a window. + uint64_t mPaintCount; + + // The focus sequence number of the last processed input event + uint64_t mAPZFocusSequenceNumber; + nscoord mLastAnchorScrollPositionY = 0; + // Most recent canvas background color. + nscolor mCanvasBackgroundColor; + int32_t mActiveSuppressDisplayport; + uint32_t mPresShellId; + + // Cached font inflation values. This is done to prevent changing of font + // inflation until a page is reloaded. + uint32_t mFontSizeInflationEmPerLine; + uint32_t mFontSizeInflationMinTwips; + uint32_t mFontSizeInflationLineThreshold; + + int16_t mSelectionFlags; + + // This is used to protect ourselves from triggering reflow while in the + // middle of frame construction and the like... it really shouldn't be + // needed, one hopes, but it is for now. + uint16_t mChangeNestCount; + + // Flags controlling how our document is rendered. These persist + // between paints and so are tied with retained layer pixels. + // PresShell flushes retained layers when the rendering state + // changes in a way that prevents us from being able to (usefully) + // re-use old pixels. + RenderingStateFlags mRenderingStateFlags; + + // Whether we're currently under a FlushPendingNotifications. + // This is used to handle flush reentry correctly. + // NOTE: This can't be a bitfield since AutoRestore has a reference to this + // variable. + bool mInFlush; + + bool mCaretEnabled : 1; + // True if a layout flush might not be a no-op bool mNeedLayoutFlush : 1; @@ -1832,6 +3004,70 @@ class PresShell final : public nsIPresShell, bool mVisualViewportSizeSet : 1; + bool mDidInitialize : 1; + bool mIsDestroying : 1; + bool mIsReflowing : 1; + bool mIsObservingDocument : 1; + + // Whether we shouldn't ever get to FlushPendingNotifications. This flag is + // meant only to sanity-check / assert that FlushPendingNotifications doesn't + // happen during certain periods of time. It shouldn't be made public nor used + // for other purposes. + bool mForbiddenToFlush : 1; + + // We've been disconnected from the document. We will refuse to paint the + // document until either our timer fires or all frames are constructed. + bool mIsDocumentGone : 1; + bool mHaveShutDown : 1; + + // For all documents we initially lock down painting. + bool mPaintingSuppressed : 1; + + bool mLastRootReflowHadUnconstrainedBSize : 1; + + // Indicates that it is safe to unlock painting once all pending reflows + // have been processed. + bool mShouldUnsuppressPainting : 1; + + bool mIgnoreFrameDestruction : 1; + + bool mIsActive : 1; + bool mFrozen : 1; + bool mIsFirstPaint : 1; + bool mObservesMutationsForPrint : 1; + + // Whether the most recent interruptible reflow was actually interrupted: + bool mWasLastReflowInterrupted : 1; + + // True if we're observing the refresh driver for style flushes. + bool mObservingStyleFlushes : 1; + + // True if we're observing the refresh driver for layout flushes, that is, if + // we have a reflow scheduled. + // + // Guaranteed to be false if mReflowContinueTimer is non-null. + bool mObservingLayoutFlushes : 1; + + bool mResizeEventPending : 1; + + bool mFontSizeInflationForceEnabled : 1; + bool mFontSizeInflationDisabledInMasterProcess : 1; + bool mFontSizeInflationEnabled : 1; + + bool mPaintingIsFrozen : 1; + + // If a document belongs to an invisible DocShell, this flag must be set + // to true, so we can avoid any paint calls for widget related to this + // presshell. + bool mIsNeverPainting : 1; + + // Whether the most recent change to the pres shell resolution was + // originated by the main thread. + bool mResolutionUpdated : 1; + + // True if the resolution has been ever changed by APZ. + bool mResolutionUpdatedByApz : 1; + bool mDocumentLoading : 1; bool mNoDelayedMouseEvents : 1; bool mNoDelayedKeyEvents : 1; diff --git a/layout/base/PresShellForwards.h b/layout/base/PresShellForwards.h index 9bed39377850..089d8f710252 100644 --- a/layout/base/PresShellForwards.h +++ b/layout/base/PresShellForwards.h @@ -9,8 +9,6 @@ #include "mozilla/TypedEnumBits.h" -class nsIPresShell; - struct CapturingContentInfo; namespace mozilla { @@ -214,6 +212,17 @@ MOZ_MAKE_ENUM_CLASS_BITWISE_OPERATORS(PaintFlags) // See comment at declaration of ScheduleViewManagerFlush() for the detail. enum class PaintType { Default, DelayedCompress }; +// This is a private enum class of PresShell, but currently, +// MOZ_MAKE_ENUM_CLASS_BITWISE_OPERATORS isn't available in class definition. +// Therefore, we need to put this here. +enum class RenderingStateFlags : uint8_t { + None = 0, + IgnoringViewportScrolling = 1 << 0, + DrawWindowNotFlushing = 1 << 1, +}; + +MOZ_MAKE_ENUM_CLASS_BITWISE_OPERATORS(RenderingStateFlags) + #ifdef DEBUG enum class VerifyReflowFlags { diff --git a/layout/base/RestyleManager.cpp b/layout/base/RestyleManager.cpp index 096fcc771de3..7c033b156c7b 100644 --- a/layout/base/RestyleManager.cpp +++ b/layout/base/RestyleManager.cpp @@ -3044,7 +3044,7 @@ void RestyleManager::DoProcessPendingRestyles(ServoTraversalFlags aFlags) { } // It'd be bad! - nsIPresShell::AutoAssertNoFlush noReentrantFlush(*presShell); + PresShell::AutoAssertNoFlush noReentrantFlush(*presShell); // Create a AnimationsWithDestroyedFrame during restyling process to // stop animations and transitions on elements that have no frame at the end diff --git a/layout/base/Units.h b/layout/base/Units.h index 294601382880..b80eb446c17e 100644 --- a/layout/base/Units.h +++ b/layout/base/Units.h @@ -481,7 +481,7 @@ struct LayoutDevicePixel { * The pixels that layout rasterizes and delivers to the graphics code. * These also are generally referred to as "device pixels" in layout code. * Conversion between CSS pixels and LayerPixels is affected by: - * 1) the "display resolution" (see nsIPresShell::SetResolution) + * 1) the "display resolution" (see PresShell::SetResolution) * 2) the "full zoom" (see nsPresContext::SetFullZoom) * 3) the "widget scale" (see nsIWidget::GetDefaultScale) * 4) rasterizing at a different scale in the presence of some CSS transforms diff --git a/layout/base/crashtests/1548057.html b/layout/base/crashtests/1548057.html new file mode 100644 index 000000000000..013d25427972 --- /dev/null +++ b/layout/base/crashtests/1548057.html @@ -0,0 +1,42 @@ + + + + diff --git a/layout/base/crashtests/crashtests.list b/layout/base/crashtests/crashtests.list index 61092fea1196..49a36fbe6c11 100644 --- a/layout/base/crashtests/crashtests.list +++ b/layout/base/crashtests/crashtests.list @@ -570,3 +570,4 @@ pref(layout.css.column-span.enabled,true) load 1539017.html load 1539303.html pref(layout.css.column-span.enabled,true) load 1541679.html load 1547261.html +pref(layout.css.resizeobserver.enabled,true) load 1548057.html diff --git a/layout/base/moz.build b/layout/base/moz.build index d3dbbc302fd5..b69722d20c99 100644 --- a/layout/base/moz.build +++ b/layout/base/moz.build @@ -52,7 +52,6 @@ EXPORTS += [ 'nsIFrameTraversal.h', 'nsILayoutDebugger.h', 'nsIPercentBSizeObserver.h', - 'nsIPresShell.h', 'nsIReflowCallback.h', 'nsLayoutUtils.h', 'nsPresArena.h', diff --git a/layout/base/nsIPresShell.h b/layout/base/nsIPresShell.h deleted file mode 100644 index 94f7cffde291..000000000000 --- a/layout/base/nsIPresShell.h +++ /dev/null @@ -1,1491 +0,0 @@ -/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ -/* vim: set ts=8 sts=2 et sw=2 tw=80: */ -/* This Source Code Form is subject to the terms of the Mozilla Public - * License, v. 2.0. If a copy of the MPL was not distributed with this - * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ - -/* a presentation of a document, part 2 */ - -#ifndef nsIPresShell_h___ -#define nsIPresShell_h___ - -#include "mozilla/PresShellForwards.h" - -#include "mozilla/ArenaObjectID.h" -#include "mozilla/EventForwards.h" -#include "mozilla/FlushType.h" -#include "mozilla/MemoryReporting.h" -#include "mozilla/ScrollTypes.h" -#include "mozilla/ServoStyleSet.h" -#include "mozilla/ServoStyleConsts.h" -#include "mozilla/StyleSheet.h" -#include "mozilla/UniquePtr.h" -#include "mozilla/WeakPtr.h" -#include "FrameMetrics.h" -#include "GeckoProfiler.h" -#include "gfxPoint.h" -#include "nsDOMNavigationTiming.h" -#include "nsTHashtable.h" -#include "nsHashKeys.h" -#include "nsISupports.h" -#include "nsIContent.h" -#include "nsISelectionController.h" -#include "nsQueryFrame.h" -#include "nsStringFwd.h" -#include "nsCoord.h" -#include "nsColor.h" -#include "nsFrameManager.h" -#include "nsRect.h" -#include "nsRegionFwd.h" -#include // for FILE definition -#include "nsChangeHint.h" -#include "nsRefPtrHashtable.h" -#include "nsClassHashtable.h" -#include "nsPresArena.h" -#include "nsIImageLoadingContent.h" -#include "nsMargin.h" -#include "nsFrameState.h" -#include "nsStubDocumentObserver.h" -#include "nsCOMArray.h" -#include "Units.h" - -#ifdef MOZ_REFLOW_PERF -class ReflowCountMgr; -#endif - -class gfxContext; -struct nsCallbackEventRequest; -class nsDocShell; -class nsIFrame; -class nsPresContext; -class nsWindowSizes; -class nsViewManager; -class nsView; -class nsIPageSequenceFrame; -class nsCanvasFrame; -class nsCaret; -namespace mozilla { -class AccessibleCaretEventHub; -class OverflowChangedTracker; -class StyleSheet; -} // namespace mozilla -class nsFrameSelection; -class nsFrameManager; -class nsILayoutHistoryState; -class nsIReflowCallback; -class nsCSSFrameConstructor; -template -class nsCOMArray; -class AutoWeakFrame; -class MobileViewportManager; -class WeakFrame; -class nsIScrollableFrame; -class nsDisplayList; -class nsDisplayListBuilder; -class nsPIDOMWindowOuter; -struct nsPoint; -class nsINode; -struct nsRect; -class nsRegion; -class nsRefreshDriver; -class nsAutoCauseReflowNotifier; -class nsARefreshObserver; -class nsAPostRefreshObserver; -#ifdef ACCESSIBILITY -class nsAccessibilityService; -namespace mozilla { -namespace a11y { -class DocAccessible; -} // namespace a11y -} // namespace mozilla -#endif -class nsITimer; - -namespace mozilla { -class EventStates; - -namespace dom { -class Element; -class Event; -class Document; -class HTMLSlotElement; -class Touch; -class Selection; -class ShadowRoot; -} // namespace dom - -namespace layout { -class ScrollAnchorContainer; -} // namespace layout - -namespace layers { -class LayerManager; -} // namespace layers - -namespace gfx { -class SourceSurface; -} // namespace gfx -} // namespace mozilla - -// b7b89561-4f03-44b3-9afa-b47e7f313ffb -#define NS_IPRESSHELL_IID \ - { \ - 0xb7b89561, 0x4f03, 0x44b3, { \ - 0x9a, 0xfa, 0xb4, 0x7e, 0x7f, 0x31, 0x3f, 0xfb \ - } \ - } - -#undef NOISY_INTERRUPTIBLE_REFLOW - -/** - * Presentation shell interface. Presentation shells are the - * controlling point for managing the presentation of a document. The - * presentation shell holds a live reference to the document, the - * presentation context, the style manager, the style set and the root - * frame.

- * - * When this object is Release'd, it will release the document, the - * presentation context, the style manager, the style set and the root - * frame. - */ - -class nsIPresShell : public nsStubDocumentObserver { - public: - NS_DECLARE_STATIC_IID_ACCESSOR(NS_IPRESSHELL_IID) - - protected: - typedef mozilla::dom::Document Document; - typedef mozilla::layers::FrameMetrics FrameMetrics; - typedef mozilla::layers::LayerManager LayerManager; - typedef mozilla::gfx::SourceSurface SourceSurface; - - enum eRenderFlag { - STATE_IGNORING_VIEWPORT_SCROLLING = 0x1, - STATE_DRAWWINDOW_NOT_FLUSHING = 0x2 - }; - typedef uint8_t RenderFlags; // for storing the above flags - - public: - nsIPresShell(); - - /** - * All callers are responsible for calling |Destroy| after calling - * |EndObservingDocument|. It needs to be separate only because form - * controls incorrectly store their data in the frames rather than the - * content model and printing calls |EndObservingDocument| multiple - * times to make form controls behave nicely when printed. - */ - virtual void Destroy() = 0; - - bool IsDestroying() { return mIsDestroying; } - - /** - * All frames owned by the shell are allocated from an arena. They - * are also recycled using free lists. Separate free lists are - * maintained for each frame type (aID), which must always correspond - * to the same aSize value. AllocateFrame is infallible and will abort - * on out-of-memory. - */ - void* AllocateFrame(nsQueryFrame::FrameIID aID, size_t aSize) { - void* result = mFrameArena.AllocateByFrameID(aID, aSize); - RecordAlloc(result); - return result; - } - - void FreeFrame(nsQueryFrame::FrameIID aID, void* aPtr) { - RecordFree(aPtr); - if (!mIsDestroying) mFrameArena.FreeByFrameID(aID, aPtr); - } - - /** - * This is for allocating other types of objects (not frames). Separate free - * lists are maintained for each type (aID), which must always correspond to - * the same aSize value. AllocateByObjectID is infallible and will abort on - * out-of-memory. - */ - void* AllocateByObjectID(mozilla::ArenaObjectID aID, size_t aSize) { - void* result = mFrameArena.AllocateByObjectID(aID, aSize); - RecordAlloc(result); - return result; - } - - void FreeByObjectID(mozilla::ArenaObjectID aID, void* aPtr) { - RecordFree(aPtr); - if (!mIsDestroying) mFrameArena.FreeByObjectID(aID, aPtr); - } - - Document* GetDocument() const { return mDocument; } - - nsPresContext* GetPresContext() const { return mPresContext; } - - nsViewManager* GetViewManager() const { return mViewManager; } - - nsRefreshDriver* GetRefreshDriver() const; - - nsCSSFrameConstructor* FrameConstructor() const { - return mFrameConstructor.get(); - } - - /** - * FrameSelection will return the Frame based selection API. - * You cannot go back and forth anymore with QI between nsIDOM sel and - * nsIFrame sel. - */ - already_AddRefed FrameSelection(); - - /** - * ConstFrameSelection returns an object which methods are safe to use for - * example in nsIFrame code. - */ - const nsFrameSelection* ConstFrameSelection() const { return mSelection; } - - // Start receiving notifications from our document. If called after Destroy, - // this will be ignored. - void BeginObservingDocument(); - - // Stop receiving notifications from our document. If called after Destroy, - // this will be ignored. - void EndObservingDocument(); - - bool IsObservingDocument() const { return mIsObservingDocument; } - - /** - * Return whether Initialize() was previously called. - */ - bool DidInitialize() const { return mDidInitialize; } - - /** - * Perform initialization. Constructs the frame for the root content - * object and then enqueues a reflow of the frame model. - * - * Callers of this method must hold a reference to this shell that - * is guaranteed to survive through arbitrary script execution. - * Calling Initialize can execute arbitrary script. - */ - virtual nsresult Initialize() = 0; - - /** - * Reflow the frame model into a new width and height. The - * coordinates for aWidth and aHeight must be in standard nscoord's. - */ - MOZ_CAN_RUN_SCRIPT virtual nsresult ResizeReflow( - nscoord aWidth, nscoord aHeight, nscoord aOldWidth = 0, - nscoord aOldHeight = 0, - mozilla::ResizeReflowOptions aOptions = - mozilla::ResizeReflowOptions::NoOption) = 0; - /** - * Do the same thing as ResizeReflow but even if ResizeReflowOverride was - * called previously. - */ - MOZ_CAN_RUN_SCRIPT virtual nsresult ResizeReflowIgnoreOverride( - nscoord aWidth, nscoord aHeight, nscoord aOldWidth, nscoord aOldHeight, - mozilla::ResizeReflowOptions aOptions = - mozilla::ResizeReflowOptions::NoOption) = 0; - - /** - * Returns true if the platform/pref or docshell require a meta viewport. - */ - virtual bool GetIsViewportOverridden() = 0; - - /** - * Note that the assumptions that determine the need for a meta viewport - * may have changed. - */ - virtual void UpdateViewportOverridden(bool aAfterInitialization) = 0; - - /** - * Get the MobileViewportManager used to manage the document's mobile - * viewport. Will return null in situations where we don't have a mobile - * viewport, and for documents that are not the root content document. - */ - virtual RefPtr GetMobileViewportManager() const = 0; - - /** - * Return true if the presshell expects layout flush. - */ - virtual bool IsLayoutFlushObserver() = 0; - - /** - * Called when document load completes. - */ - virtual void LoadComplete() = 0; - - /** - * This calls through to the frame manager to get the root frame. - */ - nsIFrame* GetRootFrame() const { return mFrameManager->GetRootFrame(); } - - /* - * Get root scroll frame from FrameManager()->GetRootFrame(). - */ - nsIFrame* GetRootScrollFrame() const; - - /* - * The same as GetRootScrollFrame, but returns an nsIScrollableFrame - */ - nsIScrollableFrame* GetRootScrollFrameAsScrollable() const; - - /** - * Get the current focused content or DOM selection that should be the - * target for scrolling. - */ - already_AddRefed GetContentForScrolling() const; - - /** - * Get the DOM selection that should be the target for scrolling, if there - * is no focused content. - */ - already_AddRefed GetSelectedContentForScrolling() const; - - /** - * Gets nearest scrollable frame from the specified content node. The frame - * is scrollable with overflow:scroll or overflow:auto in some direction when - * aDirection is eEither. Otherwise, this returns a nearest frame that is - * scrollable in the specified direction. - */ - nsIScrollableFrame* GetScrollableFrameToScrollForContent( - nsIContent* aContent, mozilla::ScrollableDirection aDirection); - - /** - * Gets nearest scrollable frame from current focused content or DOM - * selection if there is no focused content. The frame is scrollable with - * overflow:scroll or overflow:auto in some direction when aDirection is - * eEither. Otherwise, this returns a nearest frame that is scrollable in - * the specified direction. - */ - nsIScrollableFrame* GetScrollableFrameToScroll( - mozilla::ScrollableDirection aDirection); - - /** - * Gets nearest ancestor scrollable frame from aFrame. The frame is - * scrollable with overflow:scroll or overflow:auto in some direction when - * aDirection is eEither. Otherwise, this returns a nearest frame that is - * scrollable in the specified direction. - */ - nsIScrollableFrame* GetNearestScrollableFrame( - nsIFrame* aFrame, mozilla::ScrollableDirection aDirection); - - /** - * Returns the page sequence frame associated with the frame hierarchy. - * Returns nullptr if not a paginated view. - */ - nsIPageSequenceFrame* GetPageSequenceFrame() const; - - /** - * Returns the canvas frame associated with the frame hierarchy. - * Returns nullptr if is XUL document. - */ - nsCanvasFrame* GetCanvasFrame() const; - - void PostPendingScrollAnchorSelection( - mozilla::layout::ScrollAnchorContainer* aContainer); - void FlushPendingScrollAnchorSelections(); - void PostPendingScrollAnchorAdjustment( - mozilla::layout::ScrollAnchorContainer* aContainer); - - void CancelAllPendingReflows(); - - void NotifyCounterStylesAreDirty(); - - bool FrameIsAncestorOfDirtyRoot(nsIFrame* aFrame) const; - - /** - * Destroy the frames for aElement, and reconstruct them asynchronously if - * needed. - * - * Note that this may destroy frames for an ancestor instead. - */ - void DestroyFramesForAndRestyle(mozilla::dom::Element* aElement); - - /** - * Handles all the layout stuff needed when the slot assignment for an element - * is about to change. - * - * Only called when the slot attribute of the element changes, the rest of - * the changes should be handled in ShadowRoot. - */ - void SlotAssignmentWillChange(mozilla::dom::Element& aElement, - mozilla::dom::HTMLSlotElement* aOldSlot, - mozilla::dom::HTMLSlotElement* aNewSlot); - - void PostRecreateFramesFor(mozilla::dom::Element*); - void RestyleForAnimation(mozilla::dom::Element*, mozilla::RestyleHint); - - /** - * Determine if it is safe to flush all pending notifications. - */ - bool IsSafeToFlush() const; - - /** - * Informs the document's FontFaceSet that the refresh driver ticked, - * flushing style and layout. - */ - void NotifyFontFaceSetOnRefresh(); - - // Removes ourself from the list of layout / style / and resize refresh driver - // observers. - // - // Right now this is only used for documents in the BFCache, so if you want to - // use this for anything else you need to ensure we don't end up in those - // lists after calling this, but before calling StartObservingRefreshDriver - // again. - // - // That is handled by the mDocument->GetBFCacheEntry checks in - // DoObserve*Flushes functions, though that could conceivably become a boolean - // member in the shell if needed. - // - // Callers are responsible of manually calling StartObservingRefreshDriver - // again. - void StopObservingRefreshDriver(); - void StartObservingRefreshDriver(); - - bool ObservingStyleFlushes() const { return mObservingStyleFlushes; } - bool ObservingLayoutFlushes() const { return mObservingLayoutFlushes; } - - void ObserveStyleFlushes() { - if (!ObservingStyleFlushes()) DoObserveStyleFlushes(); - } - - /** - * Callbacks will be called even if reflow itself fails for - * some reason. - */ - nsresult PostReflowCallback(nsIReflowCallback* aCallback); - void CancelReflowCallback(nsIReflowCallback* aCallback); - - void ScheduleBeforeFirstPaint(); - void UnsuppressAndInvalidate(); - - void ClearFrameRefs(nsIFrame* aFrame); - - /** - * Get a reference rendering context. This is a context that should not - * be rendered to, but is suitable for measuring text and performing - * other non-rendering operations. Guaranteed to return non-null. - */ - already_AddRefed CreateReferenceRenderingContext(); - - /** - * Scrolls the view of the document so that the given area of a frame - * is visible, if possible. Layout is not flushed before scrolling. - * - * @param aRect relative to aFrame - * @param aVertical see ScrollContentIntoView and ScrollAxis - * @param aHorizontal see ScrollContentIntoView and ScrollAxis - * @param aScrollFlags if SCROLL_FIRST_ANCESTOR_ONLY is set, only the - * nearest scrollable ancestor is scrolled, otherwise all - * scrollable ancestors may be scrolled if necessary - * if SCROLL_OVERFLOW_HIDDEN is set then we may scroll in a direction - * even if overflow:hidden is specified in that direction; otherwise - * we will not scroll in that direction when overflow:hidden is - * set for that direction - * If SCROLL_NO_PARENT_FRAMES is set then we only scroll - * nodes in this document, not in any parent documents which - * contain this document in a iframe or the like. - * If SCROLL_IGNORE_SCROLL_MARGIN_AND_PADDING is set we ignore scroll-margin - * value specified for |aFrame| and scroll-padding value for the scroll - * container. This option is typically used to locate poped-up frames into - * view. - * @return true if any scrolling happened, false if no scrolling happened - */ - bool ScrollFrameRectIntoView(nsIFrame* aFrame, const nsRect& aRect, - mozilla::ScrollAxis aVertical, - mozilla::ScrollAxis aHorizontal, - mozilla::ScrollFlags aScrollFlags); - - /** - * Determine if a rectangle specified in the frame's coordinate system - * intersects "enough" with the viewport to be considered visible. This - * is not a strict test against the viewport -- it's a test against - * the intersection of the viewport and the frame's ancestor scrollable - * frames. If it doesn't intersect enough, return a value indicating - * which direction the frame's topmost ancestor scrollable frame would - * need to be scrolled to bring the frame into view. - * @param aFrame frame that aRect coordinates are specified relative to - * @param aRect rectangle in twips to test for visibility - * @param aMinTwips is the minimum distance in from the edge of the - * visible area that an object must be to be counted - * visible - * @return RectVisibility::Visible if the rect is visible - * RectVisibility::AboveViewport - * RectVisibility::BelowViewport - * RectVisibility::LeftOfViewport - * RectVisibility::RightOfViewport rectangle is outside the - * topmost ancestor scrollable frame in the specified direction - */ - virtual mozilla::RectVisibility GetRectVisibility( - nsIFrame* aFrame, const nsRect& aRect, nscoord aMinTwips) const = 0; - - /** - * Suppress notification of the frame manager that frames are - * being destroyed. - */ - void SetIgnoreFrameDestruction(bool aIgnore); - - /** - * Get the AccessibleCaretEventHub, if it exists. AddRefs it. - */ - already_AddRefed - GetAccessibleCaretEventHub() const; - - /** - * Get the caret, if it exists. AddRefs it. - */ - already_AddRefed GetCaret() const; - - /** - * Set the current caret to a new caret. To undo this, call RestoreCaret. - */ - void SetCaret(nsCaret* aNewCaret); - - /** - * Restore the caret to the original caret that this pres shell was created - * with. - */ - void RestoreCaret(); - - /** - * Should the images have borders etc. Actual visual effects are determined - * by the frames. Visual effects may not effect layout, only display. - * Takes effect on next repaint, does not force a repaint itself. - * - * @param aInEnable if true, visual selection effects are enabled - * if false visual selection effects are disabled - */ - NS_IMETHOD SetSelectionFlags(int16_t aInEnable) = 0; - - /** - * Gets the current state of non text selection effects - * @return current state of non text selection, - * as set by SetDisplayNonTextSelection - */ - int16_t GetSelectionFlags() const { return mSelectionFlags; } - - virtual mozilla::dom::Selection* GetCurrentSelection( - mozilla::SelectionType aSelectionType) = 0; - - /** - * Gets a selection controller for the focused content in the DOM window - * for mDocument. - * - * @param aFocusedContent If there is focused content in the DOM window, - * the focused content will be returned. This may - * be nullptr if it's not necessary. - * @return A selection controller for focused content. - * E.g., if an element has focus, returns - * the independent selection controller of it. - * If the DOM window does not have focused content - * (similar to Document.activeElement), returns - * nullptr. - */ - virtual already_AddRefed - GetSelectionControllerForFocusedContent( - nsIContent** aFocusedContent = nullptr) = 0; - - /** - * Interface to dispatch events via the presshell - * @note The caller must have a strong reference to the PresShell. - */ - virtual nsresult HandleEventWithTarget( - mozilla::WidgetEvent* aEvent, nsIFrame* aFrame, nsIContent* aContent, - nsEventStatus* aStatus, bool aIsHandlingNativeEvent = false, - nsIContent** aTargetContent = nullptr, - nsIContent* aOverrideClickTarget = nullptr) = 0; - - /** - * Dispatch event to content only (NOT full processing) - * @note The caller must have a strong reference to the PresShell. - */ - virtual nsresult HandleDOMEventWithTarget(nsIContent* aTargetContent, - mozilla::WidgetEvent* aEvent, - nsEventStatus* aStatus) = 0; - - /** - * Dispatch event to content only (NOT full processing) - * @note The caller must have a strong reference to the PresShell. - */ - virtual nsresult HandleDOMEventWithTarget(nsIContent* aTargetContent, - mozilla::dom::Event* aEvent, - nsEventStatus* aStatus) = 0; - - /** - * Return whether or not the event is valid to be dispatched - */ - virtual bool CanDispatchEvent( - const mozilla::WidgetGUIEvent* aEvent = nullptr) const = 0; - - /** - * Gets the current target event frame from the PresShell - */ - nsIFrame* GetCurrentEventFrame(); - - /** - * Gets the current target event frame from the PresShell - */ - already_AddRefed GetEventTargetContent( - mozilla::WidgetEvent* aEvent); - - /** - * Get and set the history state for the current document - */ - - virtual nsresult CaptureHistoryState( - nsILayoutHistoryState** aLayoutHistoryState) = 0; - - /** - * Determine if reflow is currently locked - * returns true if reflow is locked, false otherwise - */ - bool IsReflowLocked() const { return mIsReflowing; } - - /** - * Called to find out if painting is suppressed for this presshell. If it is - * suppressd, we don't allow the painting of any layer but the background, and - * we don't recur into our children. - */ - bool IsPaintingSuppressed() const { return mPaintingSuppressed; } - - /** - * Pause painting by freezing the refresh driver of this and all parent - * presentations. This may not have the desired effect if this pres shell - * has its own refresh driver. - */ - virtual void PausePainting() = 0; - - /** - * Resume painting by thawing the refresh driver of this and all parent - * presentations. This may not have the desired effect if this pres shell - * has its own refresh driver. - */ - virtual void ResumePainting() = 0; - - /** - * Unsuppress painting. - */ - virtual void UnsuppressPainting() = 0; - - /** - * Add an override style sheet for this presentation - */ - virtual nsresult AddOverrideStyleSheet(mozilla::StyleSheet* aSheet) = 0; - - /** - * Remove an override style sheet - */ - virtual nsresult RemoveOverrideStyleSheet(mozilla::StyleSheet* aSheet) = 0; - - /** - * Reconstruct frames for all elements in the document - */ - virtual void ReconstructFrames() = 0; - - /** - * Notify that a content node's state has changed - */ - virtual void ContentStateChanged( - Document* aDocument, nsIContent* aContent, - mozilla::EventStates aStateMask) override = 0; - - /** - * See if reflow verification is enabled. To enable reflow verification add - * "verifyreflow:1" to your MOZ_LOG environment variable (any non-zero - * debug level will work). Or, call SetVerifyReflowEnable with true. - */ - static bool GetVerifyReflowEnable(); - - /** - * Set the verify-reflow enable flag. - */ - static void SetVerifyReflowEnable(bool aEnabled); - - nsIFrame* GetAbsoluteContainingBlock(nsIFrame* aFrame); - -#ifdef MOZ_REFLOW_PERF - virtual void DumpReflows() = 0; - virtual void CountReflows(const char* aName, nsIFrame* aFrame) = 0; - virtual void PaintCount(const char* aName, gfxContext* aRenderingContext, - nsPresContext* aPresContext, nsIFrame* aFrame, - const nsPoint& aOffset, uint32_t aColor) = 0; - virtual void SetPaintFrameCount(bool aOn) = 0; - virtual bool IsPaintingFrameCounts() = 0; -#endif - -#ifdef DEBUG - // Debugging hooks - virtual void ListComputedStyles(FILE* out, int32_t aIndent = 0) = 0; - - virtual void ListStyleSheets(FILE* out, int32_t aIndent = 0) = 0; -#endif - - /** - * Stop all active elements (plugins and the caret) in this presentation and - * in the presentations of subdocuments. Resets painting to a suppressed - * state. - * XXX this should include image animations - */ - virtual void Freeze() = 0; - bool IsFrozen() { return mFrozen; } - - /** - * Restarts active elements (plugins) in this presentation and in the - * presentations of subdocuments, then do a full invalidate of the content - * area. - */ - virtual void Thaw() = 0; - - virtual void FireOrClearDelayedEvents(bool aFireEvents) = 0; - - /** - * When this shell is disconnected from its containing docshell, we - * lose our container pointer. However, we'd still like to be able to target - * user events at the docshell's parent. This pointer allows us to do that. - * It should not be used for any other purpose. - */ - void SetForwardingContainer(const mozilla::WeakPtr& aContainer); - - /** - * Render the document into an arbitrary gfxContext - * Designed for getting a picture of a document or a piece of a document - * Note that callers will generally want to call FlushPendingNotifications - * to get an up-to-date view of the document - * @param aRect is the region to capture into the offscreen buffer, in the - * root frame's coordinate system (if aIgnoreViewportScrolling is false) - * or in the root scrolled frame's coordinate system - * (if aIgnoreViewportScrolling is true). The coordinates are in appunits. - * @param aFlags see below; - * set RenderDocumentFlags::IsUntrusted if the contents may be passed to - * malicious agents. E.g. we might choose not to paint the contents of - * sensitive widgets such as the file name in a file upload widget, and we - * might choose not to paint themes. - * set RenderDocumentFlags::IgnoreViewportScrolling to ignore clipping and - * scrollbar painting due to scrolling in the viewport - * set RenderDocumentFlags::DrawCaret to draw the caret if one would be - * visible (by default the caret is never drawn) - * set RenderDocumentFlags::UseWidgetLayers to force rendering to go - * through the layer manager for the window. This may be unexpectedly slow - * (if the layer manager must read back data from the GPU) or low-quality - * (if the layer manager reads back pixel data and scales it - * instead of rendering using the appropriate scaling). It may also - * slow everything down if the area rendered does not correspond to the - * normal visible area of the window. - * set RenderDocumentFlags::AsyncDecodeImages to avoid having images - * synchronously decoded during rendering. - * (by default images decode synchronously with RenderDocument) - * set RenderDocumentFlags::DocumentRelative to render the document as if - * there has been no scrolling and interpret |aRect| relative to the document - * instead of the CSS viewport. Only considered if - * RenderDocumentFlags::IgnoreViewportScrolling is set or the document is in - * ignore viewport scrolling mode - * (nsIPresShell::SetIgnoreViewportScrolling/IgnoringViewportScrolling). - * @param aBackgroundColor a background color to render onto - * @param aRenderedContext the gfxContext to render to. We render so that - * one CSS pixel in the source document is rendered to one unit in the current - * transform. - */ - virtual nsresult RenderDocument(const nsRect& aRect, - mozilla::RenderDocumentFlags aFlags, - nscolor aBackgroundColor, - gfxContext* aRenderedContext) = 0; - - /** - * Renders a node aNode to a surface and returns it. The aRegion may be used - * to clip the rendering. This region is measured in CSS pixels from the - * edge of the presshell area. The aPoint, aScreenRect and aFlags arguments - * function in a similar manner as RenderSelection. - */ - virtual already_AddRefed RenderNode( - nsINode* aNode, const mozilla::Maybe& aRegion, - const mozilla::LayoutDeviceIntPoint aPoint, - mozilla::LayoutDeviceIntRect* aScreenRect, - mozilla::RenderImageFlags aFlags) = 0; - - /** - * Renders a selection to a surface and returns it. This method is primarily - * intended to create the drag feedback when dragging a selection. - * - * aScreenRect will be filled in with the bounding rectangle of the - * selection area on screen. - * - * If the area of the selection is large and the RenderImageFlags::AutoScale - * is set, the image will be scaled down. The argument aPoint is used in this - * case as a reference point when determining the new screen rectangle after - * scaling. Typically, this will be the mouse position, so that the screen - * rectangle is positioned such that the mouse is over the same point in the - * scaled image as in the original. When scaling does not occur, the mouse - * point isn't used because the position can be determined from the displayed - * frames. - */ - virtual already_AddRefed RenderSelection( - mozilla::dom::Selection* aSelection, - const mozilla::LayoutDeviceIntPoint aPoint, - mozilla::LayoutDeviceIntRect* aScreenRect, - mozilla::RenderImageFlags aFlags) = 0; - - void AddAutoWeakFrame(AutoWeakFrame* aWeakFrame); - void AddWeakFrame(WeakFrame* aWeakFrame); - - void RemoveAutoWeakFrame(AutoWeakFrame* aWeakFrame); - void RemoveWeakFrame(WeakFrame* aWeakFrame); - - /** - * Stop or restart non synthetic test mouse event handling on *all* - * presShells. - * - * @param aDisable If true, disable all non synthetic test mouse - * events on all presShells. Otherwise, enable them. - */ - virtual void DisableNonTestMouseEvents(bool aDisable) = 0; - - /** - * Record the background color of the most recently drawn canvas. This color - * is composited on top of the user's default background color and then used - * to draw the background color of the canvas. See PresShell::Paint, - * PresShell::PaintDefaultBackground, and nsDocShell::SetupNewViewer; - * bug 488242, bug 476557 and other bugs mentioned there. - */ - void SetCanvasBackground(nscolor aColor) { mCanvasBackgroundColor = aColor; } - nscolor GetCanvasBackground() { return mCanvasBackgroundColor; } - - /** - * Use the current frame tree (if it exists) to update the background - * color of the most recently drawn canvas. - */ - virtual void UpdateCanvasBackground() = 0; - - /** - * Add a solid color item to the bottom of aList with frame aFrame and - * bounds aBounds representing the dark grey background behind the page of a - * print preview presentation. - */ - virtual void AddPrintPreviewBackgroundItem(nsDisplayListBuilder& aBuilder, - nsDisplayList& aList, - nsIFrame* aFrame, - const nsRect& aBounds) = 0; - - /** - * Computes the backstop color for the view: transparent if in a transparent - * widget, otherwise the PresContext default background color. This color is - * only visible if the contents of the view as a whole are translucent. - */ - virtual nscolor ComputeBackstopColor(nsView* aDisplayRoot) = 0; - - void ObserveNativeAnonMutationsForPrint(bool aObserve) { - mObservesMutationsForPrint = aObserve; - } - bool ObservesNativeAnonMutationsForPrint() { - return mObservesMutationsForPrint; - } - - virtual nsresult SetIsActive(bool aIsActive) = 0; - - bool IsActive() { return mIsActive; } - - /** - * Keep track of how many times this presshell has been rendered to - * a window. - */ - uint64_t GetPaintCount() { return mPaintCount; } - void IncrementPaintCount() { ++mPaintCount; } - - /** - * Get the root DOM window of this presShell. - */ - virtual already_AddRefed GetRootWindow() = 0; - - /** - * This returns the focused DOM window under our top level window. - * I.e., when we are deactive, this returns the *last* focused DOM window. - */ - virtual already_AddRefed - GetFocusedDOMWindowInOurWindow() = 0; - - /** - * Get the focused content under this window. - */ - already_AddRefed GetFocusedContentInOurWindow() const; - - /** - * Get the layer manager for the widget of the root view, if it has - * one. - */ - virtual LayerManager* GetLayerManager() = 0; - - /** - * Return true iff there is a widget rendering this presShell and that - * widget is APZ-enabled. - */ - virtual bool AsyncPanZoomEnabled() = 0; - - /** - * Track whether we're ignoring viewport scrolling for the purposes - * of painting. If we are ignoring, then layers aren't clipped to - * the CSS viewport and scrollbars aren't drawn. - */ - virtual void SetIgnoreViewportScrolling(bool aIgnore) = 0; - bool IgnoringViewportScrolling() const { - return mRenderFlags & STATE_IGNORING_VIEWPORT_SCROLLING; - } - - float GetResolution() const { return mResolution.valueOr(1.0); } - virtual float GetCumulativeResolution() = 0; - - /** - * Accessors for a flag that tracks whether the most recent change to - * the pres shell's resolution was originated by the main thread. - */ - bool IsResolutionUpdated() const { return mResolutionUpdated; } - void SetResolutionUpdated(bool aUpdated) { mResolutionUpdated = aUpdated; } - - /** - * Returns true if the resolution has ever been changed by APZ. - */ - bool IsResolutionUpdatedByApz() const { return mResolutionUpdatedByApz; } - - /** - * Calculate the cumulative scale resolution from this document up to - * but not including the root document. - */ - virtual float GetCumulativeNonRootScaleResolution() = 0; - - /** - * Used by session restore code to restore a resolution before the first - * paint. - */ - virtual void SetRestoreResolution( - float aResolution, mozilla::LayoutDeviceIntSize aDisplaySize) = 0; - - /** - * Returns whether we are in a DrawWindow() call that used the - * DRAWWINDOW_DO_NOT_FLUSH flag. - */ - bool InDrawWindowNotFlushing() const { - return mRenderFlags & STATE_DRAWWINDOW_NOT_FLUSHING; - } - - /** - * Set the isFirstPaint flag. - */ - void SetIsFirstPaint(bool aIsFirstPaint) { mIsFirstPaint = aIsFirstPaint; } - - /** - * Get the isFirstPaint flag. - */ - bool GetIsFirstPaint() const { return mIsFirstPaint; } - - uint32_t GetPresShellId() { return mPresShellId; } - - /** - * Dispatch a mouse move event based on the most recent mouse position if - * this PresShell is visible. This is used when the contents of the page - * moved (aFromScroll is false) or scrolled (aFromScroll is true). - */ - virtual void SynthesizeMouseMove(bool aFromScroll) = 0; - - MOZ_CAN_RUN_SCRIPT - virtual nsresult HandleEvent(nsIFrame* aFrame, - mozilla::WidgetGUIEvent* aEvent, - bool aDontRetargetEvents, - nsEventStatus* aEventStatus) = 0; - virtual bool ShouldIgnoreInvalidation() = 0; - /** - * Notify that we're going to call Paint with PaintFlags::PaintComposite. - * Fires on the presshell for the painted widget. - * This is issued at a time when it's safe to modify widget geometry. - */ - virtual void WillPaintWindow() = 0; - /** - * Notify that we called Paint with PaintFlags::PaintComposite. - * Fires on the presshell for the painted widget. - * This is issued at a time when it's safe to modify widget geometry. - */ - virtual void DidPaintWindow() = 0; - - virtual bool IsVisible() = 0; - MOZ_CAN_RUN_SCRIPT - void DispatchSynthMouseMove(mozilla::WidgetGUIEvent* aEvent); - - /* Temporarily ignore the Displayport for better paint performance. We - * trigger a repaint once suppression is disabled. Without that - * the displayport may get left at the suppressed size for an extended - * period of time and result in unnecessary checkerboarding (see bug - * 1255054). */ - virtual void SuppressDisplayport(bool aEnabled) = 0; - - /* Whether or not displayport suppression should be turned on. Note that - * this only affects the return value of |IsDisplayportSuppressed()|, and - * doesn't change the value of the internal counter. - */ - virtual void RespectDisplayportSuppression(bool aEnabled) = 0; - - /* Whether or not the displayport is currently suppressed. */ - virtual bool IsDisplayportSuppressed() = 0; - - virtual void AddSizeOfIncludingThis(nsWindowSizes& aWindowSizes) const = 0; - - /** - * Methods that retrieve the cached font inflation preferences. - */ - uint32_t FontSizeInflationEmPerLine() const { - return mFontSizeInflationEmPerLine; - } - - uint32_t FontSizeInflationMinTwips() const { - return mFontSizeInflationMinTwips; - } - - uint32_t FontSizeInflationLineThreshold() const { - return mFontSizeInflationLineThreshold; - } - - bool FontSizeInflationForceEnabled() const { - return mFontSizeInflationForceEnabled; - } - - bool FontSizeInflationDisabledInMasterProcess() const { - return mFontSizeInflationDisabledInMasterProcess; - } - - bool FontSizeInflationEnabled() const { return mFontSizeInflationEnabled; } - - /** - * Recomputes whether font-size inflation is enabled. - */ - void RecomputeFontSizeInflationEnabled(); - - /** - * Return true if the most recent interruptible reflow was interrupted. - */ - bool IsReflowInterrupted() const { return mWasLastReflowInterrupted; } - - /** - * Return true if the the interruptible reflows have to be suppressed. - * This may happen only if if the most recent reflow was interrupted. - */ - bool SuppressInterruptibleReflows() const { - return mWasLastReflowInterrupted; - } - - ////////////////////////////////////////////////////////////////////////////// - // Approximate frame visibility tracking public API. - ////////////////////////////////////////////////////////////////////////////// - - /// Schedule an update of the list of approximately visible frames "soon". - /// This lets the refresh driver know that we want a visibility update in the - /// near future. The refresh driver applies its own heuristics and throttling - /// to decide when to actually perform the visibility update. - virtual void ScheduleApproximateFrameVisibilityUpdateSoon() = 0; - - /// Schedule an update of the list of approximately visible frames "now". The - /// update runs asynchronously, but it will be posted to the event loop - /// immediately. Prefer the "soon" variation of this method when possible, as - /// this variation ignores the refresh driver's heuristics. - virtual void ScheduleApproximateFrameVisibilityUpdateNow() = 0; - - /// Clears the current list of approximately visible frames on this pres shell - /// and replaces it with frames that are in the display list @aList. - virtual void RebuildApproximateFrameVisibilityDisplayList( - const nsDisplayList& aList) = 0; - virtual void RebuildApproximateFrameVisibility(nsRect* aRect = nullptr, - bool aRemoveOnly = false) = 0; - - /// Ensures @aFrame is in the list of approximately visible frames. - virtual void EnsureFrameInApproximatelyVisibleList(nsIFrame* aFrame) = 0; - - /// Removes @aFrame from the list of approximately visible frames if present. - virtual void RemoveFrameFromApproximatelyVisibleList(nsIFrame* aFrame) = 0; - - /// Whether we should assume all frames are visible. - virtual bool AssumeAllFramesVisible() = 0; - - /** - * Returns whether the document's style set's rule processor for the - * specified level of the cascade is shared by multiple style sets. - * - * @param aSheetType One of the nsIStyleSheetService.*_SHEET constants. - */ - nsresult HasRuleProcessorUsedByMultipleStyleSets(uint32_t aSheetType, - bool* aRetVal); - - /** - * Returns whether or not the document has ever handled user input - */ - virtual bool HasHandledUserInput() const = 0; - - virtual void FireResizeEvent() = 0; - - void NativeAnonymousContentRemoved(nsIContent* aAnonContent); - - /** - * See HTMLDocument.setKeyPressEventModel() in HTMLDocument.webidl for the - * detail. - */ - virtual void SetKeyPressEventModel(uint16_t aKeyPressEventModel) = 0; - - protected: - /** - * Refresh observer management. - */ - void DoObserveStyleFlushes(); - void DoObserveLayoutFlushes(); - - /** - * Does the actual work of figuring out the current state of font size - * inflation. - */ - bool DetermineFontSizeInflationState(); - - void RecordAlloc(void* aPtr) { -#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED - MOZ_DIAGNOSTIC_ASSERT(!mAllocatedPointers.Contains(aPtr)); - mAllocatedPointers.PutEntry(aPtr); -#endif - } - - void RecordFree(void* aPtr) { -#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED - MOZ_DIAGNOSTIC_ASSERT(mAllocatedPointers.Contains(aPtr)); - mAllocatedPointers.RemoveEntry(aPtr); -#endif - } - - void PushCurrentEventInfo(nsIFrame* aFrame, nsIContent* aContent); - void PopCurrentEventInfo(); - nsIContent* GetCurrentEventContent(); - - public: - bool AddRefreshObserver(nsARefreshObserver* aObserver, - mozilla::FlushType aFlushType); - bool RemoveRefreshObserver(nsARefreshObserver* aObserver, - mozilla::FlushType aFlushType); - - bool AddPostRefreshObserver(nsAPostRefreshObserver* aObserver); - bool RemovePostRefreshObserver(nsAPostRefreshObserver* aObserver); - - // Represents an update to the visual scroll offset that will be sent to APZ. - // The update type is used to determine priority compared to other scroll - // updates. - struct VisualScrollUpdate { - nsPoint mVisualScrollOffset; - FrameMetrics::ScrollOffsetUpdateType mUpdateType; - bool mAcknowledged = false; - }; - - // Ask APZ in the next transaction to scroll to the given visual viewport - // offset (relative to the document). - // Use this sparingly, as it will clobber JS-driven scrolling that happens - // in the same frame. This is mostly intended to be used in special - // situations like "first paint" or session restore. - // If scrolling "far away", i.e. not just within the existing layout - // viewport, it's recommended to use both nsIScrollableFrame.ScrollTo*() - // (via window.scrollTo if calling from JS) *and* this function; otherwise, - // temporary checkerboarding may result. - // Please request APZ review if adding a new call site. - void ScrollToVisual(const nsPoint& aVisualViewportOffset, - FrameMetrics::ScrollOffsetUpdateType aUpdateType, - mozilla::ScrollMode aMode); - void AcknowledgePendingVisualScrollUpdate(); - void ClearPendingVisualScrollUpdate(); - const mozilla::Maybe& GetPendingVisualScrollUpdate() - const { - return mPendingVisualScrollUpdate; - } - - nsPoint GetLayoutViewportOffset() const; - nsSize GetLayoutViewportSize() const; - - /** - * Documents belonging to an invisible DocShell must not be painted ever. - */ - bool IsNeverPainting() { return mIsNeverPainting; } - - void SetNeverPainting(bool aNeverPainting) { - mIsNeverPainting = aNeverPainting; - } - - /** - * True if a reflow event has been scheduled, or is going to be scheduled - * to run in the future. - */ - bool HasPendingReflow() const { - return mObservingLayoutFlushes || mReflowContinueTimer; - } - - void SyncWindowProperties(nsView* aView); - - virtual Document* GetPrimaryContentDocument() = 0; - - struct MOZ_RAII AutoAssertNoFlush { - explicit AutoAssertNoFlush(nsIPresShell& aShell) - : mShell(aShell), mOldForbidden(mShell.mForbiddenToFlush) { - mShell.mForbiddenToFlush = true; - } - - ~AutoAssertNoFlush() { mShell.mForbiddenToFlush = mOldForbidden; } - - nsIPresShell& mShell; - const bool mOldForbidden; - }; - - protected: - friend class nsRefreshDriver; - friend class ::nsAutoCauseReflowNotifier; - - void WillCauseReflow(); - void DidCauseReflow(); - - void CancelPostedReflowCallbacks(); - void FlushPendingScrollAnchorAdjustments(); - - void SetPendingVisualScrollUpdate( - const nsPoint& aVisualViewportOffset, - FrameMetrics::ScrollOffsetUpdateType aUpdateType); - -#ifdef MOZ_REFLOW_PERF - mozilla::UniquePtr mReflowCountMgr; -#endif - - void WillDoReflow(); - - // This data is stored as a content property (nsGkAtoms::scrolling) on - // mContentToScrollTo when we have a pending ScrollIntoView. - struct ScrollIntoViewData { - mozilla::ScrollAxis mContentScrollVAxis; - mozilla::ScrollAxis mContentScrollHAxis; - mozilla::ScrollFlags mContentToScrollToFlags; - }; - - static mozilla::LazyLogModule gLog; - - DOMHighResTimeStamp GetPerformanceNowUnclamped(); - - // The callback for the mReflowContinueTimer timer. - static void sReflowContinueCallback(nsITimer* aTimer, void* aPresShell); - bool ScheduleReflowOffTimer(); - // MaybeScheduleReflow checks if posting a reflow is needed, then checks if - // the last reflow was interrupted. In the interrupted case ScheduleReflow is - // called off a timer, otherwise it is called directly. - void MaybeScheduleReflow(); - // Actually schedules a reflow. This should only be called by - // MaybeScheduleReflow and the reflow timer ScheduleReflowOffTimer - // sets up. - void ScheduleReflow(); - - // IMPORTANT: The ownership implicit in the following member variables - // has been explicitly checked. If you add any members to this class, - // please make the ownership explicit (pinkerton, scc). - - // These are the same Document and PresContext owned by the DocViewer. - // we must share ownership. - RefPtr mDocument; - RefPtr mPresContext; - // The document's style set owns it but we maintain a ref, may be null. - RefPtr mPrefStyleSheet; - mozilla::UniquePtr mFrameConstructor; - nsViewManager* mViewManager; // [WEAK] docViewer owns it so I don't have to - nsPresArena<8192> mFrameArena; - RefPtr mSelection; - RefPtr mCaret; - RefPtr mOriginalCaret; - RefPtr mAccessibleCaretEventHub; - // Pointer into mFrameConstructor - this is purely so that GetRootFrame() can - // be inlined: - nsFrameManager* mFrameManager; - mozilla::WeakPtr mForwardingContainer; - - // The `performance.now()` value when we last started to process reflows. - DOMHighResTimeStamp mLastReflowStart{0.0}; - - // At least on Win32 and Mac after interupting a reflow we need to post - // the resume reflow event off a timer to avoid event starvation because - // posted messages are processed before other messages when the modal - // moving/sizing loop is running, see bug 491700 for details. - nsCOMPtr mReflowContinueTimer; - -#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED - // We track allocated pointers in a debug-only hashtable to assert against - // missing/double frees. - nsTHashtable> mAllocatedPointers; -#endif - - // Count of the number of times this presshell has been painted to a window. - uint64_t mPaintCount; - - // A pending visual scroll offset that we will ask APZ to scroll to - // during the next transaction. Cleared when we send the transaction. - // Only applicable to the RCD pres shell. - mozilla::Maybe mPendingVisualScrollUpdate; - - // A list of stack weak frames. This is a pointer to the last item in the - // list. - AutoWeakFrame* mAutoWeakFrames; - - // A hash table of heap allocated weak frames. - nsTHashtable> mWeakFrames; - - class DirtyRootsList { - public: - // Add a dirty root. - void Add(nsIFrame* aFrame); - // Remove this frame if present. - void Remove(nsIFrame* aFrame); - // Remove and return one of the shallowest dirty roots from the list. - // (If two roots are at the same depth, order is indeterminate.) - nsIFrame* PopShallowestRoot(); - // Remove all dirty roots. - void Clear(); - // Is this frame one of the dirty roots? - bool Contains(nsIFrame* aFrame) const; - // Are there no dirty roots? - bool IsEmpty() const; - // Is the given frame an ancestor of any dirty root? - bool FrameIsAncestorOfDirtyRoot(nsIFrame* aFrame) const; - - private: - struct FrameAndDepth { - nsIFrame* mFrame; - const uint32_t mDepth; - - // Easy conversion to nsIFrame*, as it's the most likely need. - operator nsIFrame*() const { return mFrame; } - - // Used to sort by reverse depths, i.e., deeper < shallower. - class CompareByReverseDepth { - public: - bool Equals(const FrameAndDepth& aA, const FrameAndDepth& aB) const { - return aA.mDepth == aB.mDepth; - } - bool LessThan(const FrameAndDepth& aA, const FrameAndDepth& aB) const { - // Reverse depth! So '>' instead of '<'. - return aA.mDepth > aB.mDepth; - } - }; - }; - // List of all known dirty roots, sorted by decreasing depths. - nsTArray mList; - }; - - // Reflow roots that need to be reflowed. - DirtyRootsList mDirtyRoots; - -#ifdef MOZ_GECKO_PROFILER - // These two fields capture call stacks of any changes that require a restyle - // or a reflow. Only the first change per restyle / reflow is recorded (the - // one that caused a call to SetNeedStyleFlush() / SetNeedLayoutFlush()). - UniqueProfilerBacktrace mStyleCause; - UniqueProfilerBacktrace mReflowCause; -#endif - - // Most recent canvas background color. - nscolor mCanvasBackgroundColor; - - // Used to force allocation and rendering of proportionally more or - // less pixels in both dimensions. - mozilla::Maybe mResolution; - - int16_t mSelectionFlags; - - // This is used to protect ourselves from triggering reflow while in the - // middle of frame construction and the like... it really shouldn't be - // needed, one hopes, but it is for now. - uint16_t mChangeNestCount; - - // Flags controlling how our document is rendered. These persist - // between paints and so are tied with retained layer pixels. - // PresShell flushes retained layers when the rendering state - // changes in a way that prevents us from being able to (usefully) - // re-use old pixels. - RenderFlags mRenderFlags; - bool mDidInitialize : 1; - bool mIsDestroying : 1; - bool mIsReflowing : 1; - bool mIsObservingDocument : 1; - // Whether we shouldn't ever get to FlushPendingNotifications. This flag is - // meant only to sanity-check / assert that FlushPendingNotifications doesn't - // happen during certain periods of time. It shouldn't be made public nor used - // for other purposes. - bool mForbiddenToFlush : 1; - - // We've been disconnected from the document. We will refuse to paint the - // document until either our timer fires or all frames are constructed. - bool mIsDocumentGone : 1; - bool mHaveShutDown : 1; - - // For all documents we initially lock down painting. - bool mPaintingSuppressed : 1; - - bool mLastRootReflowHadUnconstrainedBSize : 1; - - // Indicates that it is safe to unlock painting once all pending reflows - // have been processed. - bool mShouldUnsuppressPainting : 1; - - bool mIgnoreFrameDestruction : 1; - - bool mIsActive : 1; - bool mFrozen : 1; - bool mIsFirstPaint : 1; - bool mObservesMutationsForPrint : 1; - - // Whether the most recent interruptible reflow was actually interrupted: - bool mWasLastReflowInterrupted : 1; - - // True if we're observing the refresh driver for style flushes. - bool mObservingStyleFlushes : 1; - - // True if we're observing the refresh driver for layout flushes, that is, if - // we have a reflow scheduled. - // - // Guaranteed to be false if mReflowContinueTimer is non-null. - bool mObservingLayoutFlushes : 1; - - bool mResizeEventPending : 1; - - bool mFontSizeInflationForceEnabled : 1; - bool mFontSizeInflationDisabledInMasterProcess : 1; - bool mFontSizeInflationEnabled : 1; - - bool mPaintingIsFrozen : 1; - - // If a document belongs to an invisible DocShell, this flag must be set - // to true, so we can avoid any paint calls for widget related to this - // presshell. - bool mIsNeverPainting : 1; - - // Whether the most recent change to the pres shell resolution was - // originated by the main thread. - bool mResolutionUpdated : 1; - - // True if the resolution has been ever changed by APZ. - bool mResolutionUpdatedByApz : 1; - - uint32_t mPresShellId; - - // Cached font inflation values. This is done to prevent changing of font - // inflation until a page is reloaded. - uint32_t mFontSizeInflationEmPerLine; - uint32_t mFontSizeInflationMinTwips; - uint32_t mFontSizeInflationLineThreshold; - - // Whether we're currently under a FlushPendingNotifications. - // This is used to handle flush reentry correctly. - // NOTE: This can't be a bitfield since AutoRestore has a reference to this - // variable. - bool mInFlush; - - nsIFrame* mCurrentEventFrame; - nsCOMPtr mCurrentEventContent; - nsTArray mCurrentEventFrameStack; - nsCOMArray mCurrentEventContentStack; - // Set of frames that we should mark with NS_FRAME_HAS_DIRTY_CHILDREN after - // we finish reflowing mCurrentReflowRoot. - nsTHashtable> mFramesToDirty; - nsTHashtable> mPendingScrollAnchorSelection; - nsTHashtable> mPendingScrollAnchorAdjustment; - - nsCallbackEventRequest* mFirstCallbackEventRequest = nullptr; - nsCallbackEventRequest* mLastCallbackEventRequest = nullptr; -}; - -NS_DEFINE_STATIC_IID_ACCESSOR(nsIPresShell, NS_IPRESSHELL_IID) - -#endif /* nsIPresShell_h___ */ diff --git a/layout/base/nsIReflowCallback.h b/layout/base/nsIReflowCallback.h index 6a8dd4344e9e..aa7dbd3c24e2 100644 --- a/layout/base/nsIReflowCallback.h +++ b/layout/base/nsIReflowCallback.h @@ -13,7 +13,7 @@ * Protocol: objects will either get a ReflowFinished() call when a reflow * has finished or a ReflowCallbackCanceled() call if the shell is destroyed, * whichever happens first. If the object is explicitly removed from the shell - * (using nsIPresShell::CancelReflowCallback()) before that occurs then neither + * (using PresShell::CancelReflowCallback()) before that occurs then neither * of the callback methods are called. */ class nsIReflowCallback { diff --git a/layout/base/nsLayoutUtils.cpp b/layout/base/nsLayoutUtils.cpp index 67b98b163859..6f5fe4deea40 100644 --- a/layout/base/nsLayoutUtils.cpp +++ b/layout/base/nsLayoutUtils.cpp @@ -2238,7 +2238,7 @@ nsPoint nsLayoutUtils::GetEventCoordinatesRelativeTo( PresShell* presShell = aFrame->PresShell(); // XXX Bug 1224748 - Update nsLayoutUtils functions to correctly handle - // nsPresShell resolution + // PresShell resolution widgetToView = widgetToView.RemoveResolution(GetCurrentAPZResolutionScale(presShell)); @@ -8935,7 +8935,7 @@ ScrollMetadata nsLayoutUtils::ComputeScrollMetadata( FrameMetrics::eRestore, ScrollMode::Instant); } - if (const Maybe& visualUpdate = + if (const Maybe& visualUpdate = presShell->GetPendingVisualScrollUpdate()) { metrics.SetVisualViewportOffset( CSSPoint::FromAppUnits(visualUpdate->mVisualScrollOffset)); diff --git a/layout/base/nsPresContext.cpp b/layout/base/nsPresContext.cpp index 9f00b45b87ad..6422d89ca4a6 100644 --- a/layout/base/nsPresContext.cpp +++ b/layout/base/nsPresContext.cpp @@ -2545,8 +2545,8 @@ void nsRootPresContext::InitApplyPluginGeometryTimer() { } // We'll apply the plugin geometry updates during the next compositing paint - // in this presContext (either from nsPresShell::WillPaintWindow or from - // nsPresShell::DidPaintWindow, depending on the platform). But paints might + // in this presContext (either from PresShell::WillPaintWindow() or from + // PresShell::DidPaintWindow(), depending on the platform). But paints might // get optimized away if the old plugin geometry covers the invalid region, // so set a backup timer to do this too. We want to make sure this // won't fire before our normal paint notifications, if those would diff --git a/layout/base/nsPresContext.h b/layout/base/nsPresContext.h index 0c60d8f101b9..cb0b1008f4d6 100644 --- a/layout/base/nsPresContext.h +++ b/layout/base/nsPresContext.h @@ -921,7 +921,7 @@ class nsPresContext : public nsISupports, * until ReflowStarted is called. In all cases where this returns true, * the passed-in frame (which should be the frame whose reflow will be * interrupted if true is returned) will be passed to - * nsIPresShell::FrameNeedsToContinueReflow. + * PresShell::FrameNeedsToContinueReflow. */ bool CheckForInterrupt(nsIFrame* aFrame); /** diff --git a/layout/generic/ReflowInput.h b/layout/generic/ReflowInput.h index 37938edc6040..53252ba77337 100644 --- a/layout/generic/ReflowInput.h +++ b/layout/generic/ReflowInput.h @@ -387,7 +387,7 @@ struct ReflowInput : public SizeComputationInput { // orthogonal limit; when it finds such a reflow input, it will use its // orthogonal-limit value to constrain inline-size. // This is initialized to NS_UNCONSTRAINEDSIZE (so it will be ignored), - // but reset to a suitable value for the reflow root by nsPresShell. + // but reset to a suitable value for the reflow root by PresShell. nscoord mOrthogonalLimit = NS_UNCONSTRAINEDSIZE; // Accessors for the private fields below. Forcing all callers to use these diff --git a/layout/generic/nsFrameSelection.cpp b/layout/generic/nsFrameSelection.cpp index b91ea3ac7b3f..86ab303afd0b 100644 --- a/layout/generic/nsFrameSelection.cpp +++ b/layout/generic/nsFrameSelection.cpp @@ -2761,8 +2761,8 @@ int16_t AutoCopyListener::sClipboardID = -1; * What we do now: * On every selection change, we copy to the clipboard anew, creating a * HTML buffer, a transferable, an nsISupportsString and - * a huge mess every time. This is basically what nsPresShell::DoCopy does - * to move the selection into the clipboard for Edit->Copy. + * a huge mess every time. This is basically what nsCopySupport::HTMLCopy() + * does to move the selection into the clipboard for Edit->Copy. * * What we should do, to make our end of the deal faster: * Create a singleton transferable with our own magic converter. When selection diff --git a/layout/generic/nsIFrame.h b/layout/generic/nsIFrame.h index 447cd1c03c7f..5b534a334517 100644 --- a/layout/generic/nsIFrame.h +++ b/layout/generic/nsIFrame.h @@ -2153,7 +2153,7 @@ class nsIFrame : public nsQueryFrame { /** * Mark any stored intrinsic width information as dirty (requiring * re-calculation). Note that this should generally not be called - * directly; nsPresShell::FrameNeedsReflow will call it instead. + * directly; PresShell::FrameNeedsReflow() will call it instead. */ virtual void MarkIntrinsicISizesDirty() = 0; diff --git a/layout/generic/nsQueryFrame.h b/layout/generic/nsQueryFrame.h index e69bb1f3de8c..8a3fdc4c8cdf 100644 --- a/layout/generic/nsQueryFrame.h +++ b/layout/generic/nsQueryFrame.h @@ -72,7 +72,7 @@ class nsQueryFrame { // This marker allows mozilla::ArenaObjectID to "extend" this enum // with additional sequential values for use in nsPresArena and - // nsIPresShell::{Allocate,Free}ByObjectId + // PresShell::{Allocate,Free}ByObjectId NON_FRAME_MARKER }; diff --git a/layout/painting/nsCSSRendering.cpp b/layout/painting/nsCSSRendering.cpp index 97c2267a303b..45feb91a42b7 100644 --- a/layout/painting/nsCSSRendering.cpp +++ b/layout/painting/nsCSSRendering.cpp @@ -2442,7 +2442,7 @@ ImgDrawResult nsCSSRendering::PaintStyleImageLayerWithSC( // a solid color item that gets added in nsLayoutUtils::PaintFrame, // or nsSubDocumentFrame::BuildDisplayList (bug 488242). (The solid // color may be moved into nsDisplayCanvasBackground by - // nsPresShell::AddCanvasBackgroundColorItem, and painted by + // PresShell::AddCanvasBackgroundColorItem(), and painted by // nsDisplayCanvasBackground directly.) Either way we don't need to // paint the background color here. bool isCanvasFrame = IsCanvasFrame(aParams.frame); diff --git a/layout/style/ServoStyleSet.cpp b/layout/style/ServoStyleSet.cpp index 0bb2e5e3596a..32db41d26402 100644 --- a/layout/style/ServoStyleSet.cpp +++ b/layout/style/ServoStyleSet.cpp @@ -289,11 +289,7 @@ void ServoStyleSet::SetAuthorStyleDisabled(bool aStyleDisabled) { } } Servo_StyleSet_SetAuthorStyleDisabled(mRawSet.get(), mAuthorStyleDisabled); - // XXX Workaround for the assertion in InvalidateStyleForDocumentStateChanges - // which is called by nsIPresShell::SetAuthorStyleDisabled via nsIPresShell:: - // RestyleForCSSRuleChanges. It is not really necessary because we don't need - // to rebuild stylist for this change. But we have bug around this, and we - // may want to rethink how things should work. See bug 1437785. + // XXX Workaround for bug 1437785. SetStylistStyleSheetsDirty(); } diff --git a/layout/style/nsComputedDOMStyle.cpp b/layout/style/nsComputedDOMStyle.cpp index 4d0052f9912f..d4468f36eb54 100644 --- a/layout/style/nsComputedDOMStyle.cpp +++ b/layout/style/nsComputedDOMStyle.cpp @@ -508,8 +508,7 @@ already_AddRefed nsComputedDOMStyle::DoGetComputedStyleNoFlush( // set. Using the pres shell from the content also means that any // content that's actually *in* a document will get the style from the // correct document. - PresShell* presShell = - static_cast(nsContentUtils::GetPresShellForContent(aElement)); + PresShell* presShell = nsContentUtils::GetPresShellForContent(aElement); bool inDocWithShell = true; if (!presShell) { inDocWithShell = false; diff --git a/layout/style/test/test_media_queries_dynamic.html b/layout/style/test/test_media_queries_dynamic.html index bd299e585ac7..5c2310e54ae5 100644 --- a/layout/style/test/test_media_queries_dynamic.html +++ b/layout/style/test/test_media_queries_dynamic.html @@ -168,7 +168,7 @@ function run() { sheet.insertRule("@media (min-width: 150px) { div { display:flex } }", 0); flush_and_assert_change_counters("add non-matching media query", // FIXME: We restyle here because - // nsIPresShell::RestyleForCSSRuleChanges posts a restyle, but it's + // PresShell::NextRestyleIsForCSSRuleChanges() posts a restyle, but it's // probably avoidable if we wanted to avoid it. { restyle: true, construct: false, reflow: false }); @@ -199,7 +199,7 @@ function run() { sheet.deleteRule(0); flush_and_assert_change_counters("remove non-matching media query", // FIXME: We restyle here because - // nsIPresShell::RestyleForCSSRuleChanges posts a restyle, but it's + // PresShell::NextRestyleIsForCSSRuleChanges() posts a restyle, but it's // probably avoidable if we wanted to avoid it. { restyle: true, construct: false, reflow: false }); diff --git a/modules/libpref/init/all.js b/modules/libpref/init/all.js index c219d146dcc0..f691683647db 100644 --- a/modules/libpref/init/all.js +++ b/modules/libpref/init/all.js @@ -2659,7 +2659,7 @@ pref("csp.overrule_about_uris_without_csp_whitelist", false); pref("csp.skip_about_page_has_csp_assert", false); // assertion flag will be set to false after fixing Bug 1473549 pref("security.allow_eval_with_system_principal", false); -pref("security.uris_using_eval_with_system_principal", "autocomplete.xml,redux.js,react-redux.js,content-task.js,preferencesbindings.js,lodash.js,jszip.js,sinon-7.2.7.js,ajv-4.1.1.js,setup,jsol.js,chrometask_chromescript,simpletest/simpletest.js"); +pref("security.uris_using_eval_with_system_principal", "autocomplete.xml,redux.js,react-redux.js,content-task.js,preferencesbindings.js,lodash.js,jszip.js,sinon-7.2.7.js,ajv-4.1.1.js,setup,jsol.js,simpletest/simpletest.js"); #endif #if defined(DEBUG) || defined(FUZZING) diff --git a/remote/domains/content/Runtime.jsm b/remote/domains/content/Runtime.jsm index e96a1f01437f..285ecaa9b2bd 100644 --- a/remote/domains/content/Runtime.jsm +++ b/remote/domains/content/Runtime.jsm @@ -7,6 +7,7 @@ var EXPORTED_SYMBOLS = ["Runtime"]; const {ContentProcessDomain} = ChromeUtils.import("chrome://remote/content/domains/ContentProcessDomain.jsm"); +const {Services} = ChromeUtils.import("resource://gre/modules/Services.jsm"); class Runtime extends ContentProcessDomain { constructor(session) { @@ -23,12 +24,96 @@ class Runtime extends ContentProcessDomain { async enable() { if (!this.enabled) { this.enabled = true; + this.chromeEventHandler.addEventListener("DOMWindowCreated", this, + {mozSystemGroup: true}); + + // Listen for pageshow and pagehide to track pages going in/out to/from the BF Cache + this.chromeEventHandler.addEventListener("pageshow", this, + {mozSystemGroup: true}); + this.chromeEventHandler.addEventListener("pagehide", this, + {mozSystemGroup: true}); + + Services.obs.addObserver(this, "inner-window-destroyed"); + + // Spin the event loop in order to send the `executionContextCreated` event right + // after we replied to `enable` request. + Services.tm.dispatchToMainThread(() => { + const frameId = this.content.windowUtils.outerWindowID; + const id = this.content.windowUtils.currentInnerWindowID; + this.emit("Runtime.executionContextCreated", { + context: { + id, + auxData: { + isDefault: true, + frameId, + }, + }, + }); + }); } } disable() { if (this.enabled) { this.enabled = false; + this.chromeEventHandler.removeEventListener("DOMWindowCreated", this, + {mozSystemGroup: true}); + this.chromeEventHandler.removeEventListener("pageshow", this, + {mozSystemGroup: true}); + this.chromeEventHandler.removeEventListener("pagehide", this, + {mozSystemGroup: true}); + Services.obs.removeObserver(this, "inner-window-destroyed"); } } + + handleEvent({type, target, persisted}) { + const frameId = target.defaultView.windowUtils.outerWindowID; + const id = target.defaultView.windowUtils.currentInnerWindowID; + switch (type) { + case "DOMWindowCreated": + this.emit("Runtime.executionContextCreated", { + context: { + id, + auxData: { + isDefault: target == this.content.document, + frameId, + }, + }, + }); + break; + + case "pageshow": + // `persisted` is true when this is about a page being resurected from BF Cache + if (!persisted) { + return; + } + this.emit("Runtime.executionContextCreated", { + context: { + id, + auxData: { + isDefault: target == this.content.document, + frameId, + }, + }, + }); + break; + + case "pagehide": + // `persisted` is true when this is about a page being frozen into BF Cache + if (!persisted) { + return; + } + this.emit("Runtime.executionContextDestroyed", { + executionContextId: id, + }); + break; + } + } + + observe(subject, topic, data) { + const innerWindowID = subject.QueryInterface(Ci.nsISupportsPRUint64).data; + this.emit("Runtime.executionContextDestroyed", { + executionContextId: innerWindowID, + }); + } } diff --git a/remote/test/browser/browser.ini b/remote/test/browser/browser.ini index 8177e379f30b..73592efd5ebf 100644 --- a/remote/test/browser/browser.ini +++ b/remote/test/browser/browser.ini @@ -9,5 +9,7 @@ skip-if = debug || asan # bug 1546945 [browser_cdp.js] [browser_main_target.js] [browser_page_frameNavigated.js] +[browser_runtime_executionContext.js] +skip-if = os == "mac" || (verify && os == 'win') # bug 1547961 [browser_tabs.js] [browser_target.js] diff --git a/remote/test/browser/browser_runtime_executionContext.js b/remote/test/browser/browser_runtime_executionContext.js new file mode 100644 index 000000000000..7ae2fd2d16bd --- /dev/null +++ b/remote/test/browser/browser_runtime_executionContext.js @@ -0,0 +1,104 @@ +/* Any copyright is dedicated to the Public Domain. + * http://creativecommons.org/publicdomain/zero/1.0/ */ + +"use strict"; + +/* global getCDP */ + +const {RemoteAgent} = ChromeUtils.import("chrome://remote/content/RemoteAgent.jsm"); +const {RemoteAgentError} = ChromeUtils.import("chrome://remote/content/Error.jsm"); + +// Test the Runtime execution context events + +const TEST_URI = "data:text/html;charset=utf-8,default-test-page"; + +add_task(async function() { + try { + await testCDP(); + } catch (e) { + // Display better error message with the server side stacktrace + // if an error happened on the server side: + if (e.response) { + throw RemoteAgentError.fromJSON(e.response); + } else { + throw e; + } + } +}); + +async function testCDP() { + // Open a test page, to prevent debugging the random default page + await BrowserTestUtils.openNewForegroundTab(gBrowser, TEST_URI); + + // Start the CDP server + RemoteAgent.init(); + RemoteAgent.tabs.start(); + RemoteAgent.listen(Services.io.newURI("http://localhost:9222")); + + // Retrieve the chrome-remote-interface library object + const CDP = await getCDP(); + + // Connect to the server + const client = await CDP({ + target(list) { + // Ensure debugging the right target, i.e. the one for our test tab. + return list.find(target => target.url == TEST_URI); + }, + }); + ok(true, "CDP client has been instantiated"); + + const {Page, Runtime} = client; + + // turn on navigation related events, such as DOMContentLoaded et al. + await Runtime.enable(); + ok(true, "Runtime domain has been enabled"); + + // Calling Runtime.enable will emit executionContextCreated for the existing contexts + const { context: context1 } = await Runtime.executionContextCreated(); + ok(!!context1.id, "The execution context has an id"); + ok(context1.auxData.isDefault, "The execution context is the default one"); + ok(!!context1.auxData.frameId, "The execution context has a frame id set"); + + info("Navigate to a new URL"); + const executionContextDestroyed2 = Runtime.executionContextDestroyed(); + const executionContextCreated2 = Runtime.executionContextCreated(); + + const url = "data:text/html;charset=utf-8,test-page"; + const { frameId } = await Page.navigate({ url }); + ok(true, "A new page has been loaded"); + is(frameId, context1.auxData.frameId, "Page.navigate returns the same frameId than executionContextCreated"); + + let { executionContextId } = await executionContextDestroyed2; + is(executionContextId, context1.id, "The destroyed event reports the previous context id"); + + const { context: context2 } = await executionContextCreated2; + ok(!!context2.id, "The execution context has an id"); + isnot(context1.id, context2.id, "The new execution context has a different id"); + ok(context2.auxData.isDefault, "The execution context is the default one"); + is(context2.auxData.frameId, frameId, "The execution context frame id is the same " + + "than the one returned by Page.navigate"); + + isnot(executionContextId, context2.id, "The destroyed id is different from the " + + "created one"); + + // Navigates back to the previous page. + // This should resurect the original document from the BF Cache and recreate the + // context for it + info("Navigate back to the previous document"); + const executionContextDestroyed3 = Runtime.executionContextDestroyed(); + const executionContextCreated3 = Runtime.executionContextCreated(); + gBrowser.selectedBrowser.goBack(); + const { context: context3 } = await executionContextCreated3; + is(context3.id, context1.id, "The new execution context should be the same than the first one"); + ok(context3.auxData.isDefault, "The execution context is the default one"); + is(context3.auxData.frameId, frameId, "The execution context frame id is always the same"); + + ({ executionContextId } = await executionContextDestroyed3); + is(executionContextId, context2.id, "The destroyed event reports the previous context id"); + await client.close(); + ok(true, "The client is closed"); + + BrowserTestUtils.removeTab(gBrowser.selectedTab); + + await RemoteAgent.close(); +} diff --git a/security/manager/ssl/StaticHPKPins.h b/security/manager/ssl/StaticHPKPins.h index d691681389b5..cb1dfe39ce7c 100644 --- a/security/manager/ssl/StaticHPKPins.h +++ b/security/manager/ssl/StaticHPKPins.h @@ -1152,4 +1152,4 @@ static const TransportSecurityPreload kPublicKeyPinningPreloadList[] = { static const int32_t kUnknownId = -1; -static const PRTime kPreloadPKPinsExpirationTime = INT64_C(1565008070627000); +static const PRTime kPreloadPKPinsExpirationTime = INT64_C(1565267271924000); diff --git a/security/manager/ssl/nsSTSPreloadList.inc b/security/manager/ssl/nsSTSPreloadList.inc index 340cdfb4d539..e0227a94206f 100644 --- a/security/manager/ssl/nsSTSPreloadList.inc +++ b/security/manager/ssl/nsSTSPreloadList.inc @@ -8,10 +8,9 @@ /*****************************************************************************/ #include -const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); +const PRTime gPreloadListExpirationTime = INT64_C(1567686452072000); %% 0-1.party, 1 -000books.net, 1 00100010.net, 1 0010100.net, 1 00120012.net, 1 @@ -37,7 +36,6 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 008251.com, 1 008253.com, 1 008271.com, 1 -0086286.com, 1 00880088.net, 1 00990099.net, 1 009p.com, 1 @@ -53,6 +51,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 01110000011100110111001001100111.com, 1 013zl.com, 1 015zl.com, 1 +01media.fr, 1 01smh.com, 1 020ks.net, 1 021002.com, 1 @@ -229,6 +228,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 0x.sk, 1 0x0.cloud, 1 0x0.li, 1 +0x0000.ml, 1 0x00c.de, 1 0x00ff00ff.com, 1 0x17.de, 1 @@ -353,10 +353,10 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 1288366.com, 1 1288fc.com, 1 12autoankauf-berlin.de, 1 +12gotovo.com, 1 12thmanrising.com, 1 12train.com, 1 12vpn.net, 1 -130.ua, 1 130032.com, 1 130212.com, 1 130232.com, 1 @@ -383,6 +383,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 1391kj.com, 1 1395kj.com, 1 13th-dover.uk, 1 +1406304513.com, 1 141145.com, 1 143533.com, 1 143633.com, 1 @@ -481,7 +482,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 1981612088.rsc.cdn77.org, 1 198ks.net, 1 19area.cn, 1 -19hundert84.de, 1 +19hundert84.de, 0 19qq.vip, 1 1a-diamantscheiben.de, 1 1a-werkstattgeraete.de, 1 @@ -508,6 +509,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 1it.click, 1 1js.de, 1 1kando.com, 0 +1ki174.com, 1 1kmi.co, 1 1ll.uk, 1 1lord1faith.com, 1 @@ -586,6 +588,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 233blog.com, 1 233boy.com, 1 233bwg.com, 1 +233hub.com, 1 233hugo.com, 1 233now.com, 1 233ss.net, 1 @@ -807,6 +810,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 357601.com, 1 357maelai.co, 1 360-staffing.com, 1 +360008888.com, 1 360live.fr, 1 360rail.nl, 1 360vrs.com, 1 @@ -843,11 +847,13 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 378553.com, 1 379700.com, 1 380422.com, 1 +38138938.com, 1 382225.com, 1 3838onndo.tk, 1 3839.ca, 1 387763.com, 1 3880p.com, 1 +3886aa.com, 1 38888msc.com, 1 388da.com, 1 38sihu.com, 0 @@ -927,7 +933,6 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 3tribes.co.uk, 1 3typen.tv, 1 3v4l.org, 1 -3ve.com, 1 3vlnaeet.cz, 1 3xbit.com.br, 1 3xm.at, 1 @@ -1007,6 +1012,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 4loc.us, 1 4lock.com.br, 1 4mm.org, 1 +4monar.com, 1 4o5.xyz, 1 4plebs.moe, 1 4project.co.il, 1 @@ -1056,15 +1062,74 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 51877.net, 1 518d88.com, 1 519422.com, 1 +5197.com, 1 5197dh.com, 1 +5197dns.com, 1 +5197dz.com, 1 +5197sx.com, 1 51acg.eu.org, 1 51aifuli.com, 1 51chiyu.com, 1 51guaq.com, 1 51tiaojiu.com, 1 +52051.com, 1 +52051a.com, 1 +52051b.com, 1 +52051c.com, 1 +52051d.com, 1 +52051e.com, 1 +52051f.com, 1 +52051g.com, 1 +52051h.com, 1 +52051i.com, 1 +52051j.com, 1 +52051k.com, 1 +52051l.com, 1 +52051m.com, 1 +52051n.com, 1 +52051o.com, 1 +52051p.com, 1 +52051q.com, 1 +52051r.com, 1 +52051s.com, 1 +52051t.com, 1 +52051u.com, 1 +52051v.com, 1 +52051w.com, 1 +52051x.com, 1 +52051y.com, 1 +52051z.com, 1 +52067.com, 1 +52067a.com, 1 +52067b.com, 1 +52067c.com, 1 +52067d.com, 1 +52067e.com, 1 +52067f.com, 1 +52067g.com, 1 +52067h.com, 1 +52067i.com, 1 +52067j.com, 1 +52067k.com, 1 +52067l.com, 1 +52067m.com, 1 +52067n.com, 1 +52067o.com, 1 +52067p.com, 1 +52067q.com, 1 +52067r.com, 1 +52067s.com, 1 +52067t.com, 1 +52067u.com, 1 +52067v.com, 1 +52067w.com, 1 +52067x.com, 1 +52067y.com, 1 +52067z.com, 1 5214889.com, 1 5214889.net, 1 5219.ml, 1 +5225sf.com, 1 524022.com, 1 524622.com, 1 524922.com, 1 @@ -1110,6 +1175,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 555w.org, 1 555wfcp.com, 1 555xl.com, 1 +556021.com, 1 556185.com, 1 55797.com, 1 566380.com, 1 @@ -1117,6 +1183,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 575380.com, 1 576422.com, 1 578380.com, 1 +578637.com, 1 579422.com, 1 57wilkie.net, 1 581018.com, 1 @@ -1379,6 +1446,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 74th.jp, 1 755k3.com, 1 756337.com, 1 +758m.com, 1 762.ch, 1 762116.com, 1 763137.com, 1 @@ -1390,6 +1458,12 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 777coin.com, 1 7787p.com, 1 780aa.com, 1 +781371.com, 1 +781376.com, 1 +781671.com, 1 +781683.com, 1 +781713.com, 1 +783631.com, 1 783lab.com, 1 787637.com, 1 787k3.com, 1 @@ -1469,6 +1543,18 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 82kb88.com, 1 833792.com, 1 8349822.com, 1 +8363p.com, 1 +8367p.com, 1 +8368p.com, 1 +8369p.com, 1 +8371p.com, 1 +8373p.com, 1 +8376p.com, 1 +8378p.com, 1 +8379p.com, 1 +8387p.com, 1 +8391p.com, 1 +8396p.com, 1 83kb88.com, 1 848jz.com, 1 850226.com, 1 @@ -1482,6 +1568,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 85383838.com, 0 8560.be, 1 85kb88.com, 1 +86286286.com, 1 8649955.com, 1 8649966.com, 1 8649977.com, 1 @@ -1637,6 +1724,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 91d00.com, 1 91d01.com, 1 91d02.com, 1 +91d27.com, 1 91d30.com, 1 91d31.com, 1 91d33.com, 1 @@ -1648,7 +1736,11 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 924622.com, 1 926422.com, 1 929349.com, 1 +9297.com, 1 9297dh.com, 1 +9297dns.com, 1 +9297hb.com, 1 +9297hd.com, 1 92kb88.com, 1 92url.com, 1 931422.com, 1 @@ -1672,6 +1764,7 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 9617818.com, 1 9617818.net, 1 961cq.com, 1 +962312.com, 1 963cq.com, 1 967606.com, 1 9679693.com, 1 @@ -1680,7 +1773,13 @@ const PRTime gPreloadListExpirationTime = INT64_C(1567427259648000); 9696178.net, 1 96kb88.com, 1 972422.com, 1 +9728.com, 1 9728dh.com, 1 +9728dns.com, 1 +9728dz.com, 1 +9728hb.com, 1 +9728hd.com, 1 +9728sx.com, 1 977hghg.com, 1 9788876.com, 1 9822.am, 1 @@ -1837,7 +1936,6 @@ abasky.net, 1 abateroad66.it, 1 abbadabbabouncycastles.co.uk, 1 abbas.ch, 1 -abbotsparties.co.uk, 1 abbottscastles.co.uk, 1 abbruch-star.de, 1 abc-rz.de, 1 @@ -1958,6 +2056,7 @@ absolutviajes.com, 1 abstractbarista.com, 1 abstractbarista.net, 1 abstraction21.com, 1 +abstudio.de, 1 absturztau.be, 1 absturztaube.ch, 1 absynthe-inquisition.fr, 1 @@ -2260,6 +2359,7 @@ adelianz.com, 1 adelightfulglow.com, 1 adeline.mobi, 1 adentalsolution.com, 1 +adept-elearning.com, 1 adept.org.pl, 1 adesa.co.uk, 1 adevel.eu, 1 @@ -2273,7 +2373,6 @@ adiehard.party, 1 adimaja.com, 1 adinariversloveschool.com, 1 adingenierie.fr, 1 -adiponectinsupplement.net, 1 adiprospero.it, 1 aditibhatia.com, 1 adjagu.org, 1 @@ -2360,6 +2459,7 @@ adtgroup.com, 1 adult.properties, 1 adultbizz.eu, 1 adurra.com, 1 +aduthapa.com, 1 aduvi.de, 1 adv.cr, 1 advaithbot.com, 1 @@ -2373,6 +2473,7 @@ advanced.info, 1 advanceddieselspokane.com, 1 advanceddisposables.co.uk, 0 advancedelectricalservicesqld.com.au, 1 +advancedendoscopycenter.net, 1 advancedoneroofing.com, 1 advancedprotectionkey.com, 1 advancedprotectionsecuritykey.com, 1 @@ -2577,6 +2678,7 @@ agenda21senden.de, 1 agendatelefonica.com.br, 1 agent-grow.com, 1 agentprocessing.com, 1 +agentur-pottkinder.de, 1 agenziaimmobiliarezeta.it, 1 agenziapubblicitaria.milano.it, 1 ageragrosirdistro.com, 1 @@ -2627,7 +2729,6 @@ agouraoutdoorlighting.com, 1 agowa338.de, 1 agpideas.com, 1 agr.asia, 1 -agracan.com, 1 agrajag.nl, 1 agrarking.com, 1 agrarking.de, 1 @@ -2639,7 +2740,6 @@ agricolo.ch, 1 agriculture-schools.com, 1 agridir.site, 1 agrikulturchic.com, 1 -agrilinks.org, 1 agrios.de, 1 agro-forestry.net, 1 agroline.by, 1 @@ -2821,7 +2921,6 @@ airborne-inflatables.co.uk, 1 airbossofamerica.com, 1 airclass.com, 1 aircomms.com, 1 -airconsboksburg.co.za, 1 airductclean.com, 0 airductcleaning-fresno.com, 1 airductcleaninggrandprairie.com, 1 @@ -2847,9 +2946,9 @@ airpbx.com, 1 airplay-inflatable-hire.co.uk, 1 airplayradio.nl, 1 airport-charlotte.com, 1 -airportlimototoronto.com, 1 airpurifierproductsonline.com, 1 airrestoration.ch, 1 +airslate.com, 1 airsnore.com, 1 airsoft.ch, 1 airswap.io, 1 @@ -2881,7 +2980,6 @@ aiwdirect.com, 1 aiwosq.cn, 1 aizxxs.com, 1 aizxxs.net, 1 -ajapaik.ee, 1 ajarope.com, 1 ajaxed.net, 1 ajbouncycastles.co.uk, 1 @@ -2897,6 +2995,7 @@ ajiaojr.net, 1 ajiboye.com, 1 ajnasz.hu, 1 ajsb85.com, 1 +ajwebsolutions.com, 1 ak-varazdin.hr, 1 ak-webit.de, 1 aka.ms, 1 @@ -3055,10 +3154,9 @@ alex4386.us, 1 alex97000.de, 1 alexander-beck.eu, 1 alexanderb.info, 1 -alexandermuetzel.de, 1 alexanderneng.de, 1 alexandernorth.ch, 1 -alexanderrans.com, 1 +alexanderrans.com, 0 alexanderschimpf.de, 1 alexandra-schulze.de, 1 alexandrastorm.com, 1 @@ -3115,6 +3213,7 @@ alexwardweb.com, 1 alexyang.me, 1 alfa-tech.su, 1 alfaponny.se, 1 +alfaproweb.fr, 1 alfirous.com, 1 alfred-figge.de, 1 alfredapp.com, 1 @@ -3154,7 +3253,7 @@ alienvision.com.br, 1 alighierirescaldina.it, 1 alignrs.com, 1 aliim.gdn, 1 -alijammusic.com, 1 +alijammusic.com, 0 alikulov.me, 1 alilialili.ga, 1 alinasmusicstudio.com, 1 @@ -3166,6 +3265,7 @@ alisonisrealestate.com, 1 alisonlitchfield.com, 1 alistairstowing.com, 1 alisync.com, 1 +aliv.biz, 1 aliwebstore.com, 1 alix-board.de, 1 alize-theatre.ch, 1 @@ -3258,7 +3358,6 @@ allpointsheating.com, 1 allproptonline.com, 1 allpussynow.com, 1 allrad-buck.de, 1 -allram.one, 1 allroundpvp.net, 1 allroundtechnology.com, 1 allroundtechnology.nl, 1 @@ -3352,6 +3451,7 @@ alpinechaletrental.com, 1 alpinehighlandrealty.com, 1 alpinepubliclibrary.org, 1 alpinestarmassage.com, 1 +alplogopedia.it, 1 alpstarentaisetaxi.com, 1 alpstarentaisetaxi.fr, 1 alquds.edu, 1 @@ -3479,7 +3579,6 @@ amardham.org, 1 amaresq.com, 1 amartinz.at, 1 amateri.com, 1 -amateurchef.co.uk, 1 amateurpornhours.com, 1 amateurradionotes.com, 1 amateurvoicetalent.com, 1 @@ -3602,6 +3701,7 @@ amosng.com, 1 ampersandnbspsemicolon.com, 1 amphetamines.org, 1 amphibo.ly, 1 +amplead.com, 1 ampledesigners.com, 1 ampleinfographics.com, 1 ampleroads.com, 1 @@ -3691,7 +3791,6 @@ andiplusben.com, 1 andisadhdspot.com, 1 andiscyber.space, 1 anditi.com, 1 -andoms.fi, 1 andre-ballensiefen.de, 1 andre-lategan.com, 1 andre-otto.com, 1 @@ -3708,7 +3807,6 @@ andreas-hecht.com, 1 andreas-kluge.eu, 1 andreaseracleous.com, 1 andreasfeusi.ch, 1 -andreashecht-blog.de, 1 andreasjanker.de, 1 andreaskluge.eu, 1 andreaskrasa.com, 1 @@ -3725,6 +3823,7 @@ andrepicard.de, 1 andrespaz.com, 1 andreundnina.de, 1 andrew.fi, 1 +andrew.london, 1 andrewbdesign.com, 1 andrewbennett.ltd, 1 andrewdaws.co, 1 @@ -3733,7 +3832,6 @@ andrewdaws.io, 1 andrewdaws.me, 1 andrewdaws.tv, 1 andrewensley.com, 1 -andrewhowden.com, 1 andrewimeson.com, 1 andrewin.ru, 1 andrewlarson.org, 1 @@ -3742,6 +3840,7 @@ andrewmichaud.com, 1 andrewmichaud.me, 1 andrewpeng.net, 1 andrewprokos.com, 1 +andrewpucci.com, 1 andrewrdaws.com, 1 andrewrgoss.com, 1 andrewryno.com, 1 @@ -3767,7 +3866,6 @@ androidzone.me, 1 andromeda.se, 1 andromedacenter.com, 1 andronika.net, 0 -androtech.xyz, 1 androticsdirect.com, 1 andruvision.cz, 1 andsat.org, 1 @@ -3890,6 +3988,7 @@ anlp.top, 1 anna.info, 1 annaenemma.nl, 1 annafiore.com.br, 1 +annalitvinova.pro, 1 annangela.moe, 1 annarokina.com, 1 annawagner.pl, 1 @@ -4080,6 +4179,7 @@ apartmentregister.com.au, 1 apasaja.tech, 1 apbank.ch, 1 apbox.de, 1 +apc.ec, 1 apcemporium.co.uk, 1 apcube.com, 1 apdfawl.com, 1 @@ -4166,6 +4266,7 @@ appartement-andrea.at, 1 appartement-evolene.net, 1 appartementhaus-badria.de, 1 appartementmarsum.nl, 1 +appassionata.ru, 1 appdrinks.com, 1 appearance-plm.de, 1 appel-aide.ch, 1 @@ -4282,6 +4383,7 @@ aragon.fun, 1 arai21.net, 1 araleeniken.com, 1 aramido.de, 1 +aramloebmd.com, 1 aranchhomes.com, 1 aranel.me, 1 aranycsillag.net, 1 @@ -4458,7 +4560,6 @@ arnoudvandalen.nl, 1 arnove.net, 1 arnsmedia.nl, 1 arocloud.de, 1 -arod.tk, 1 arogov.com, 1 arokha.com, 1 aromacos.ch, 1 @@ -4499,6 +4600,7 @@ arsplus.ru, 0 arswb.men, 1 art-auction.jp, 1 art-et-culture.ch, 1 +art-et-tonneaux.fr, 1 art-pix.com, 1 art-pix.de, 1 art-pix.net, 1 @@ -4540,6 +4642,7 @@ articaexports.com, 1 articu.no, 1 artificial.army, 1 artificialgrassandlandscaping.com, 1 +artigianociao.jp, 1 artik.cloud, 1 artimpact.ch, 1 artioml.net, 1 @@ -4563,6 +4666,7 @@ artlifeisgood.com, 1 artlogo.biz, 1 artlogo.cz, 1 artlogo.sk, 1 +artmanager.dk, 1 artmarketingnews.com, 1 artmaxi.eu, 1 artmoney.com, 1 @@ -4720,10 +4824,10 @@ assemble-together.org, 1 assempsaibiza.com, 1 assertion.de, 1 assessoriati.com.br, 1 +assetbacked.capital, 1 assetsec.io, 1 assetvault.co.za, 1 assguidesporrentruy.ch, 1 -assign-it.co.uk, 0 assistance-personnes-agees.ch, 1 assistcart.com, 1 assistel.com, 1 @@ -4731,6 +4835,7 @@ assistenzaferrodastiro.org, 1 assistenzafrigorifero.org, 1 assistenzalavatrice.org, 1 assistenzamicroonde.org, 1 +associatedwomenshealthcare.com, 1 assodigitale.it, 1 asspinter.me, 1 assumptionpj.org, 1 @@ -4760,6 +4865,7 @@ astrovandalistas.cc, 1 astural.org, 1 astutikhonda.com, 1 astutr.co, 1 +asu.moe, 1 asuclassfinder.com, 1 asucrews.com, 1 asuhe.cc, 1 @@ -4816,6 +4922,7 @@ atencionbimbo.com, 0 atendimentodelta.com.br, 1 aterlectric.com, 1 aterskapa-data.se, 1 +atf.gov, 1 atg.soy, 1 atgoetschel.ch, 1 atgroup.gr, 1 @@ -4827,6 +4934,7 @@ atheistfrontier.com, 1 athekiu.com, 1 athena-bartholdi.com, 1 athena-garage.co.uk, 1 +athenacle.xyz, 1 athenadynamics.com, 1 athenaneuro.com, 1 atheoryofchange.com, 1 @@ -4938,6 +5046,7 @@ audiense.com, 0 audio-detector.com, 1 audiobookboo.com, 1 audiobookstudio.com, 1 +audioboom.com, 1 audiolibri.org, 1 audiolot.com, 1 audion.cc, 1 @@ -5044,6 +5153,7 @@ autimatisering.nl, 1 autismewoerden.nl, 1 auto-anleitung.de, 1 auto-dealership-news.com, 1 +auto-i-dat.ch, 1 auto-motor-i-sport.pl, 1 auto-plus.tn, 1 auto-res.ru, 1 @@ -5059,7 +5169,7 @@ autobella-hurtownia.pl, 1 autobelle.it, 1 autobourcier.com, 1 autocartruck.com, 1 -autoclean-plus.ch, 1 +autocobot.com, 1 autocontrol.online, 1 autocorner.com, 1 autocrypt.org, 1 @@ -5073,8 +5183,10 @@ autoecoledumontblanc.com, 1 autoelettricaperbambini.com, 1 autoentrepreneurinfo.com, 1 autoepc.ro, 1 +autohomehub.com, 1 autoi.ch, 1 autoinsurancehavasu.com, 1 +autokeyreplacementsanantonio.com, 1 autokovrik-diskont.ru, 1 autolawetawroclaw.pl, 1 autoledky.sk, 1 @@ -5109,7 +5221,6 @@ autoschadeschreuder.nl, 1 autoscuola.roma.it, 1 autosecurityfinance.com, 1 autoshinka72.ru, 1 -autoshopsolutions.com, 1 autoshun.org, 1 autoskola.hr, 1 autoskolaplzen.cz, 1 @@ -5124,6 +5235,18 @@ autoteplo.org, 1 autoterminus-used.be, 1 autoto.hr, 1 autotransportquoteservices.com, 1 +autouncle.at, 1 +autouncle.co.uk, 1 +autouncle.com, 1 +autouncle.de, 1 +autouncle.dk, 1 +autouncle.fi, 1 +autouncle.fr, 1 +autouncle.it, 1 +autouncle.pl, 1 +autouncle.pt, 1 +autouncle.ro, 1 +autouncle.se, 1 autoverzekeringafsluiten.com, 1 autowerkstatt-puchheim.de, 1 autozane.com, 1 @@ -5308,6 +5431,7 @@ azadliq.info, 1 azarus.ch, 1 azazy.net, 0 azgfd.com, 1 +azh-kunden.de, 1 azia.info, 1 aziende.com.ar, 1 azimut.fr, 1 @@ -5485,6 +5609,7 @@ babarkata.com, 1 babeleo.com, 1 babelfisch.eu, 1 babettelandmesser.de, 1 +babineaux.zone, 1 bablodel.biz, 1 bablodel.com, 1 babsbibs.com, 1 @@ -5635,7 +5760,6 @@ balivillassanur.com, 1 baliyano.com, 1 balkonien.org, 1 ball-bizarr.de, 1 -ball3d.es, 1 ballarin.cc, 1 ballbusting-cbt.com, 1 ballejaune.com, 1 @@ -5816,6 +5940,7 @@ baseconvert.com, 1 basedonline.nl, 1 baselang.com, 1 baseline.ba, 1 +basement961.co.nz, 1 basementdoctornorthwest.com, 1 basementfinishingohio.com, 1 basementwaterproofingdesmoines.com, 1 @@ -5853,6 +5978,7 @@ bat9vip.com, 1 bat9vip.net, 1 batcave.tech, 1 batch.com, 1 +baterioverolety.cz, 1 batfoundry.com, 1 bati-alu.fr, 1 batiburrillo.net, 1 @@ -5885,6 +6011,8 @@ bauthier-occasions.be, 1 bautied.de, 1 bauunternehmen-herr.de, 1 bavarianhiker.de, 0 +bavaroparadise.com, 1 +bavarovillage.com, 1 bavartec.de, 1 bawbby.com, 1 bayareaenergyevents.com, 1 @@ -6034,6 +6162,7 @@ beastowner.li, 1 beatfeld.de, 1 beatnikbreaks.com, 1 beatrizaebischer.ch, 1 +beau.pw, 1 beaumelcosmetiques.fr, 1 beaute-eternelle.ch, 1 beauty-italy.ru, 1 @@ -6127,7 +6256,6 @@ beexfit.com, 1 beezkneezcastles.co.uk, 1 beeznest.com, 1 befoodsafe.gov, 1 -beforesunrise.de, 1 beforeyoueatoc.com, 1 beframed.ch, 1 befreewifi.info, 1 @@ -6174,6 +6302,7 @@ belfor-probleme.de, 1 belfordroxo.net.br, 1 belge.rs, 1 belgers.com, 1 +belgicaservices.be, 1 belhopro.be, 1 belics.com, 1 belien-tweedehandswagens.be, 1 @@ -6406,7 +6535,6 @@ best-wedding-quotes.com, 1 best10websitebuilders.com, 1 best2pay.net, 1 best66.me, 1 -bestartshop.com, 1 bestattungen-kammerer.de, 1 bestattungshaus-kammerer.de, 1 bestautoinsurance.com, 1 @@ -6441,7 +6569,6 @@ bestjumptrampolines.be, 1 bestkenmoredentists.com, 1 bestladyshaver.co.uk, 1 bestleftwild.com, 1 -bestlooperpedalsguide.com, 1 bestmotherfucking.website, 1 bestoffert.club, 1 bestoliveoils.com, 1 @@ -6460,6 +6587,7 @@ bestwebsite.gallery, 1 bet-99.cc, 1 bet-99.com, 1 bet-99.net, 1 +bet.eu, 1 bet168wy.com, 1 bet168wy.net, 1 bet909.com, 1 @@ -6475,6 +6603,7 @@ betecnet.de, 1 betformular.com, 1 betgo9.cc, 1 bethanyduke.com, 1 +bethanypeds.com, 1 bethpage.net, 1 betkoo.com, 1 betleakbot.com, 1 @@ -6714,6 +6843,7 @@ bikebay.it, 1 bikehistory.org, 1 biker.dating, 1 bikeshopitalia.com, 1 +bikhof.com, 1 bikiniatoll.com, 1 bikiniseli.com, 1 bikkelbroeders.com, 0 @@ -6826,6 +6956,7 @@ bingo9.net, 1 bingobank.org, 1 bingofriends.com, 1 binhex.net, 1 +binhp.com, 1 binimo.com, 1 biniou.net, 1 binkanhada.biz, 1 @@ -6855,6 +6986,7 @@ bioemsan.cz, 1 bioequivalence.design, 1 bioetco.ch, 1 bioexploratorium.pl, 1 +biofrequenze.it, 1 biogecho.ch, 1 biogecho.swiss, 1 biogeist.de, 1 @@ -7205,7 +7337,6 @@ bleaching-tipps.de, 1 blechbuexn.de, 1 bleche-onlineshop.at, 1 bleche-onlineshop.de, 1 -blechinger.io, 1 blechschmidt.saarland, 1 bleep.zone, 1 blenderinsider.com, 1 @@ -7508,6 +7639,7 @@ boldmediagroup.com, 1 boldt-metallbau.de, 1 bolektro.de, 1 boleyn.su, 1 +bolgarka.kz, 1 bolgarnyelv.hu, 1 bolivarfm.com.ve, 1 bologna-disinfestazioni.it, 1 @@ -7924,6 +8056,7 @@ brandingclic.com, 1 brandingclick.com, 1 brando753.xyz, 1 brandongomez.me, 1 +brandonhaynesmd.com, 1 brandonhubbard.com, 1 brandonlui.ml, 1 brandontaylor-black.com, 1 @@ -8018,6 +8151,7 @@ bretzner.fr, 1 brevboxar.se, 1 brewercollinsleadership.com, 1 brewsouth.com, 1 +brewspark.co, 1 brewvo.com, 1 breznet.com, 1 brfvh24.se, 1 @@ -8126,6 +8260,7 @@ bronevichok.ru, 1 bronwynlewis.com, 1 broodbesteld.nl, 1 brookframework.org, 1 +brooklyncosmetics.net, 1 brooklynrealestateblog.com, 1 brookworth.com, 1 brossman.it, 1 @@ -8162,6 +8297,7 @@ bruna-cdn.nl, 1 brunick.de, 0 brunn.email, 1 brunner.ninja, 1 +brunohenc.from.hr, 1 brunoproduit.ch, 1 brunoramos.com, 1 brunoramos.org, 1 @@ -8267,6 +8403,7 @@ buchwegweiser.com, 1 buck-hydro.de, 1 buckelewrealtygroup.com, 1 bucketlist.co.ke, 1 +buckscountyobgyn.com, 1 buckypaper.com, 1 budaev-shop.ru, 1 buddhismus.net, 1 @@ -8507,6 +8644,7 @@ buytermpaper.com, 1 buytheway.co.za, 1 buywine.shop, 1 buywood.shop, 1 +buziaczki.pl, 1 buzz.tools, 1 buzzconf.io, 1 buzzcontent.com, 1 @@ -8550,6 +8688,7 @@ bydisk.com, 0 bye-bye.us, 1 byeskille.no, 1 bygningsregistrering.dk, 1 +byhe.me, 1 byiu.info, 0 byji.com, 1 byjuschennai.com, 1 @@ -8627,7 +8766,6 @@ c0rporation.com, 1 c16t.uk, 1 c2design.it, 1 c2lab.net, 1 -c2media.de, 0 c2o-library.net, 1 c2o2.xyz, 1 c3.pm, 1 @@ -8669,7 +8807,7 @@ cacd.eu, 1 caceis.bank, 1 cachacacha.com, 1 cachedview.nl, 1 -cachetagalong.com, 1 +cachetagalong.com, 0 cachethome.com, 1 cachetur.no, 1 cackette.com, 1 @@ -8775,7 +8913,6 @@ caletka.cz, 1 calgoty.com, 1 calibreapp.com, 1 calibso.net, 1 -calidadelectronica.com, 1 caliderumba.com, 1 calidoinvierno.com, 1 calixte-concept.fr, 1 @@ -8830,6 +8967,7 @@ cambridgesecuritygroup.org, 1 cambuslangharriers.org, 1 camcapital.com, 1 camconn.cc, 1 +camdenboneandjoint.com, 1 camdesign.pl, 1 camel2243.com, 1 camelforensics.com, 1 @@ -8859,12 +8997,12 @@ campermanaustralia.com, 1 campertrailerfinance.com.au, 1 camperverzekerd.nl, 1 campfiretails.org, 1 -camphub.co, 1 camping-landes.com, 1 camping-le-pasquier.com, 1 camping-seilershof.de, 1 campingcarlovers.com, 1 campinghuntingshooting.com, 1 +campingshop.pl, 1 campingskyhooks.com, 1 campistry.net, 1 campsoulfestival.com, 1 @@ -8903,6 +9041,7 @@ canalsidehouse.be, 1 canalsidehouse.com, 1 canariculturacolor.com, 1 canarymod.net, 1 +canavillage.net, 1 canberraoutletcentre.com.au, 1 cancelmyprofile.com, 1 cancerdata.nhs.uk, 1 @@ -8914,6 +9053,7 @@ candguchocolat.com, 1 candicecity.com, 1 candidasa.com, 1 candidaturedunprix.com, 1 +candinya.com, 1 candlcastles.co.uk, 1 cando.eu, 1 candylion.rocks, 1 @@ -9101,6 +9241,7 @@ carinsurance.es, 1 carinthia.eu, 1 carisenda.com, 1 carkeysanantonio.com, 1 +carlavitalesteticista.com, 1 carlgo11.com, 1 carlife-at.jp, 1 carlili.fr, 1 @@ -9120,6 +9261,7 @@ carlocksmithkey.com, 1 carlocksmithlewisville.com, 1 carlocksmithmesquite.com, 1 carlocksmithtucson.com, 1 +carlosabarbamd.com, 1 carlosfelic.io, 1 carloshmm.com, 1 carloshmm.stream, 1 @@ -9201,6 +9343,7 @@ casabouquet.com, 1 casacameo.com, 0 casacazoleiro.com, 1 casacochecurro.com, 1 +casacomcharme.com.br, 1 casadasportasejanelas.com, 1 casadoarbitro.com.br, 1 casadopulpo.com, 1 @@ -9261,10 +9404,10 @@ casinorewards.info, 1 casinovergleich.com, 1 casio-caisses-enregistreuses.fr, 1 casirus.com, 1 -casjay.cloud, 1 -casjay.info, 1 -casjay.us, 1 -casjaygames.com, 1 +casjay.cloud, 0 +casjay.info, 0 +casjay.us, 0 +casjaygames.com, 0 casjenprome.cz, 1 caspar.ai, 1 casperpanel.com, 1 @@ -9323,6 +9466,7 @@ catharisme.net, 1 catharisme.org, 1 catherinejf.com, 1 cathiebrousse.com, 1 +catholic8964.org, 1 catholics.dating, 1 catholicteacherresources.com, 1 cathosa.nl, 1 @@ -9382,6 +9526,7 @@ cbmusa.com, 1 cbr-xml-daily.ru, 1 cbsdeheidevlinder.nl, 1 cbw.sh, 1 +cc-customer.de, 1 ccac.gov, 1 ccattestprep.com, 1 ccavenue.com, 1 @@ -9461,6 +9606,7 @@ celcomhomefibre.com.my, 1 cele.bi, 1 celebmasta.com, 1 celebphotos.blog, 1 +celebrasianconference.com, 1 celebrityhealthcritic.com, 1 celebrityscope.net, 1 celec.gob.ec, 0 @@ -9520,6 +9666,7 @@ centredaccueil.fr, 1 centreoeil.ch, 1 centrepointorguk-dev.azurewebsites.net, 1 centrobill.com, 1 +centrodeesteticarecife.com, 1 centroecuestrecastellar.com, 1 centrojovencuenca.es, 1 centrolavoro.org, 1 @@ -9565,6 +9712,7 @@ certfa.com, 1 certible.com, 1 certificatedetails.com, 1 certificatespending.com, 1 +certificatetools.com, 1 certificazioni-energetiche.it, 1 certifiedfieldassociate.com, 1 certifiednurses.org, 1 @@ -9637,6 +9785,7 @@ chabaudparfum.com, 1 chabert-provence.fr, 1 chabik.com, 1 chad.ch, 1 +chadpugsley.com, 1 chadstoneapartments.com.au, 1 chadtaljaardt.com, 1 chaffeyconstruction.com, 1 @@ -9778,7 +9927,6 @@ chateroids.com, 1 chatfacile.org, 1 chatforskning.no, 1 chatgrape.com, 1 -chatint.com, 1 chatitaly.org, 1 chatnederland.eu, 1 chatsworthelectrical.com, 1 @@ -10029,7 +10177,6 @@ choiceautoloan.com, 1 chokladfantasi.net, 1 chollima.pro, 1 chomp.life, 1 -chon.io, 1 chook.as, 1 choootto.net, 1 choosemypc.net, 1 @@ -10060,6 +10207,7 @@ chriscutts.uk, 1 chrisdecairos.ca, 1 chrisebert.net, 1 chrisfinazzo.com, 0 +chrisgieger.com, 1 chrisirwin.ca, 1 chrisjean.com, 1 chrislane.com, 1 @@ -10205,7 +10353,7 @@ cienciasempresariais.pt, 1 cierreperimetral.com, 1 cifop-numerique.fr, 1 ciftlikesintisi.com, 1 -cig-dem.com, 1 +cig-dem.com, 0 cigar-cartel.com, 1 cigarterminal.com, 0 cigoteket.se, 1 @@ -10232,7 +10380,6 @@ cinenote.link, 1 cineplex.my, 1 ciniticket.com, 1 cinkciarz.pl, 1 -cinnabon.com, 1 cinq-elements.com, 1 cinq-elements.fr, 1 cinq-elements.net, 1 @@ -10242,6 +10389,7 @@ cio-ciso-interchange.org, 1 cio-cisointerchange.org, 1 cio.go.jp, 1 cio.gov, 0 +cio.guide, 1 cioscloud.com, 1 cip.md, 1 cipartyhire.co.uk, 1 @@ -10539,6 +10687,7 @@ cloudcite.net, 1 cloudcloudcloud.cloud, 1 cloudcrux.net, 1 clouddog.com.br, 1 +cloudeezy.com, 1 cloudey.net, 1 cloudfiles.at, 1 cloudflare-dns.com, 1 @@ -10610,6 +10759,7 @@ clubdelzapato.com, 1 clubdeslecteurs.net, 1 clubedalutashop.com, 1 clubefiel.com.br, 1 +clubegolfpt.com, 1 clubempleos.com, 1 clubeohara.com, 1 clubfamily.de, 1 @@ -10693,7 +10843,9 @@ co50.com, 1 coa.one, 1 coachezmoi.ch, 1 coachfederation.ro, 1 +coaching-harmonique.fr, 1 coaching-impulse.ch, 1 +coaching-park.fr, 1 coalitionministries.org, 1 coalpointcottage.com, 1 coastline.net.au, 1 @@ -10771,6 +10923,7 @@ codemahrt.com, 1 codemill.se, 1 codemonster.eu, 1 codemperium.com, 1 +codenlife.kr, 1 codenlife.xyz, 1 codenode.io, 1 codeofhonor.tech, 1 @@ -10851,7 +11004,6 @@ coigach-assynt.org, 1 coimmvest.com, 1 coin-exchange.cz, 1 coin-quest.net, 1 -coin.dance, 1 coinapult.com, 1 coinbase.com, 1 coinbit.trade, 1 @@ -10956,6 +11108,7 @@ colo-tech.com, 1 cololi.moe, 1 colombian.dating, 1 coloppe.com, 1 +color01.net, 1 coloradobluebook.gov, 1 coloradolottery.com, 1 coloraid.net, 1 @@ -10979,6 +11132,7 @@ colson-occasions.be, 1 coltellisurvival.com, 1 coltonrb.com, 1 columbuswines.com, 1 +colyakoomusic.com, 1 colyakootees.com, 1 com-in.de, 1 com-news.io, 1 @@ -11252,10 +11406,14 @@ conradkostecki.de, 1 conradsautotransmissionrepair.com, 1 conraid.net, 1 consagracionamariasantisima.org, 1 +consciente.ch, 1 +consciente.ngo, 1 +consciente.ong, 1 consciouschoices.net, 1 consciousnesschange.com, 1 consec-systems.de, 1 consegnafioridomicilio.net, 1 +consegne.it, 1 consejosdenutricion.com, 1 consensoprivacy.it, 1 conservados.com.br, 1 @@ -11274,6 +11432,7 @@ constant-rough.de, 1 constares.de, 1 constituenttracker.com, 1 constitution.website, 1 +construct.net, 1 constructexpres.ro, 1 constructieve.nl, 1 construction-colleges.com, 1 @@ -11382,6 +11541,7 @@ coolvox.com, 1 coolwallet.io, 0 coon.fr, 1 coonawarrawines.com.au, 1 +coop.se, 1 cooperativa-je.net, 1 coore.jp, 1 coorpacademy.com, 1 @@ -11471,6 +11631,7 @@ correctpaardbatterijnietje.nl, 1 corrick.io, 1 corrupted.io, 1 corsa-b.uk, 1 +corscanplus.com, 1 corsectra.com, 1 corsicalaw.com, 1 corsihaccpsicurezzalavoro.it, 1 @@ -11541,6 +11702,7 @@ countyjailinmatesearch.com, 1 coup-dun-soir.ch, 1 coupestanley.com, 1 couplay.org, 1 +couponbates.com, 1 couponcodesme.com, 1 cour4g3.me, 1 couragefound.org, 1 @@ -11552,7 +11714,6 @@ courses.nl, 1 courseworkbank.info, 1 courtlistener.com, 1 couscous.recipes, 1 -cousincouples.com, 1 coussinsky.net, 1 couvreur-hinault.fr, 1 covbounce.co.uk, 1 @@ -11886,6 +12047,7 @@ cryptagio.com, 1 cryptearth.de, 1 crypted.chat, 1 crypteianetworks.com, 1 +cryptizy.com, 1 crypto.cat, 0 crypto.graphics, 1 crypto.is, 0 @@ -11944,6 +12106,7 @@ csasummit.org, 1 csbs.fr, 1 csbuilder.io, 1 csca.me, 1 +cscau.com, 1 cscdn.net, 1 csd-sevnica.si, 1 csehnyelv.hu, 1 @@ -11957,7 +12120,7 @@ csgf.fun, 1 csgf.ru, 1 csgo.design, 1 csgo.help, 1 -csgo.su, 0 +csgo.su, 1 csgo77.com, 1 csgoswap.com, 1 csgotwister.com, 1 @@ -11969,6 +12132,7 @@ csilies.de, 1 csinfo.us, 1 csinterstargeneve.ch, 1 csirt.ee, 1 +csjministriesfoundation.org, 1 cskentertainment.co.uk, 1 cslaboralistas.pe, 1 csmainframe.com, 1 @@ -12032,7 +12196,6 @@ cubecraftstore.com, 1 cubecraftstore.net, 1 cubekrowd.net, 1 cubela.tech, 1 -cubetech.co.jp, 1 cubia.de, 1 cubia3.com, 1 cubia4.com, 1 @@ -12056,6 +12219,7 @@ cuentasmutualamr.org.ar, 1 cuetoems.com, 1 cuibonobo.com, 1 cuio.net, 1 +culan.dk, 1 cultiv.nl, 1 cultivo.bio, 1 cultofd50.org, 1 @@ -12084,6 +12248,7 @@ cupom.net, 1 cur.by, 1 curacao-firma.com, 1 curacao-license.com, 1 +curacaodiveguide.com, 1 curamail.co.uk, 1 curareldolordeespalda.com, 1 curatedgeek.com, 1 @@ -12444,6 +12609,7 @@ dakin.nyc, 1 dakindesign.com, 1 dakinnyc.com, 1 daknob.net, 1 +dakotasjoint.com, 1 daktarisys.com, 1 daladubbeln.se, 1 dalaran.city, 1 @@ -12456,6 +12622,7 @@ dalfsennet.nl, 1 dalingk.com, 1 dallas.gov, 1 dallaslu.com, 1 +dallasmenshealth.com, 1 dallinbryce.com, 1 dallmeier.net, 1 dalmatiersheusden.be, 1 @@ -12534,6 +12701,7 @@ danieljball.co.uk, 1 danieljstevens.com, 1 danielkoster.nl, 1 danielmartin.de, 1 +danielmiessler.com, 1 danielmoch.com, 1 danielmorell.com, 1 danielmostertman.com, 1 @@ -12543,6 +12711,7 @@ danielnaaman.com, 1 danielnaaman.net, 1 danielnaaman.org, 1 danielparker.com.au, 1 +danielpenno.com, 1 danielpeukert.cz, 1 danielran.com, 1 danielrozenberg.com, 1 @@ -12747,6 +12916,7 @@ datateknologsektionen.se, 0 datatree.nl, 1 datatruckers.eu, 1 datatruckers.org, 1 +datax-cloud.de, 1 datecougarslocal.com, 1 datelligent.com, 1 datememe.com, 1 @@ -12857,6 +13027,7 @@ dawgtag.ca, 1 dawnbringer.eu, 1 dawnbringer.net, 1 dawnofeden.net, 1 +dawnofhope.tk, 1 dawnson.is, 1 dawoud.org, 1 dawson-floridavilla.co.uk, 1 @@ -12867,7 +13038,6 @@ daydream.team, 1 daylightpirates.org, 1 dayman.net, 1 daymprove.life, 1 -dayofdays.be, 1 dayofthegirl.gc.ca, 1 days.one, 1 daysoftheyear.com, 1 @@ -13036,6 +13206,7 @@ decayshop.com, 1 dechat.nl, 1 decher.de, 1 decidetreatment.org, 1 +decidio.cc, 1 decimatechnologies.eu, 1 decis.fr, 1 decisivetactics.com, 1 @@ -13145,6 +13316,7 @@ degroupage.info, 1 dehopre.com, 1 deidee.nl, 1 deimos.gq, 1 +dein-baumdienst.de, 1 dein-trueffel.de, 1 deinballon.de, 1 deinewebsite.de, 1 @@ -13166,11 +13338,11 @@ delahrzolder.nl, 1 delam.site, 1 delawarenation-nsn.gov, 1 delbecqvo.be, 1 +delbrouck.ch, 0 delcopa.gov, 1 deleenheir.be, 1 deleidscheflesch.nl, 1 delfic.org, 1 -delfino.cr, 1 delhionlinegifts.com, 1 deli-tochigi.jp, 1 deliacreates.com, 1 @@ -13208,6 +13380,7 @@ demarle.ch, 1 dementiapraecox.de, 1 demeyere-usedcars.be, 1 demfloro.ru, 1 +demibaguette.com, 1 demijn.nl, 1 demilletech.net, 1 demiranda.com, 1 @@ -13286,6 +13459,7 @@ depedtayo.ph, 1 deperewi.gov, 1 depicus.com, 1 depilacioncon.com, 1 +deplorablesdaily.com, 1 depone.net, 1 depositart.com, 1 depositomobili.it, 1 @@ -13724,6 +13898,7 @@ digibones.be, 1 digibull.email, 1 digibull.link, 1 digicert-support.com, 1 +digicode.hu, 1 digicy.cloud, 1 digideli.ee, 1 digidroom.be, 1 @@ -13781,6 +13956,7 @@ digitalfuturenow.com, 1 digitalgov.gov, 0 digitalhabit.at, 1 digitalhabitat.io, 1 +digitalhurricane.io, 0 digitalid-sandbox.com, 1 digitalid.com, 1 digitalid.com.au, 1 @@ -13788,10 +13964,12 @@ digitalliteracy.gov, 1 digitalmaniac.co.uk, 1 digitalmarketingindallas.com, 1 digitalposition.com, 1 +digitalredshirts.com, 1 digitalrights.center, 1 digitalrights.fund, 1 digitalroar.com, 1 digitalskillswap.com, 1 +digitalspiders.pk, 1 digitalsurge.io, 1 digitaltcertifikat.dk, 1 digitaltechnologies.ltd.uk, 1 @@ -13825,7 +14003,6 @@ dimdom.com.br, 1 dime-staging.com, 1 dime.io, 1 dimeponline.com.br, 1 -dimeshop.nl, 1 dimez.ru, 1 dimiskovska.de, 1 dimitrihomes.com, 1 @@ -13984,6 +14161,7 @@ diskbit.com, 1 diskbit.nl, 1 disking.co.uk, 1 dismail.de, 1 +displayenergycertificate.co.uk, 1 disposable.link, 1 disroot.org, 1 disrupters.ch, 1 @@ -14131,6 +14309,7 @@ dmd.lv, 1 dmdd.org.uk, 1 dmess.ru, 1 dmfd.net, 1 +dmfj.io, 1 dmi.es, 1 dmitry.sh, 1 dmk-realestate.com, 1 @@ -14724,12 +14903,14 @@ drfrey.ch, 1 drfun1.com, 1 drgerthplasticsurgery.com, 1 drgiyaseddin.com, 1 +drglassgyn.com, 1 drgn.no, 1 drgrace.ca, 1 drhathazi.hu, 1 drheibel.com, 1 drhildebrand.net, 1 drhoseyni.com, 1 +drhyler.com, 1 driesjtuver.nl, 1 driessoftsec.tk, 1 driftdude.nl, 1 @@ -14774,7 +14955,6 @@ drkmtrx.xyz, 1 drlandis.com, 1 drlangsdon.com, 1 drlinkcheck.com, 1 -drlutfi.com, 1 drmayakato.com, 1 drmcdaniel.com, 1 drms.us, 1 @@ -14819,6 +14999,7 @@ drrr.wiki, 1 drsajjadian.com, 1 drsamuelkoo.com, 1 drsturgeonfreitas.com, 1 +drsubbio.com, 1 drtimmarch.com, 1 drtimothybradley.com, 1 drtti.io, 1 @@ -15022,6 +15203,7 @@ dutchrank.nl, 1 dutchsailors.com, 1 dutchwanderers.nl, 1 dutchweballiance.nl, 1 +dutrac.co.id, 1 duval.paris, 1 duvalo.eu, 1 duvalo.info, 1 @@ -15191,15 +15373,12 @@ e1488.com, 1 e15r.co, 1 e2feed.com, 1 e30.ee, 1 -e3leading.com, 1 -e3leading.solutions, 1 -e3leadingsolutions.com, 1 e3learning.institute, 1 e3li.org, 1 e3q.de, 1 e4metech.com, 1 e52888.com, 1 -e52888.net, 0 +e52888.net, 1 e53888.com, 1 e53888.net, 1 e59888.com, 1 @@ -15274,7 +15453,6 @@ easyeigo.com, 1 easyfiles.ch, 1 easyhaul.com, 1 easymun.com, 1 -easyoutdoor.nl, 1 easypay.bg, 1 easypayments.pro, 1 easyproperty.com, 1 @@ -15411,6 +15589,7 @@ ecole-attalens.ch, 1 ecole-iaf.fr, 1 ecoledusabbat.org, 1 ecolemathurincordier.com, 1 +ecologikashop.com, 1 ecology-21.ru, 0 ecombustibil.ro, 1 ecomia.dk, 1 @@ -15446,6 +15625,7 @@ ecovision.com.br, 1 ecpannualmeeting.com, 1 ecrandouble.ch, 1 ectora.com, 1 +ecuadorbienesraices.com, 1 ecupcafe.com, 0 ecuteam.com, 1 ecxforum.com, 1 @@ -15524,6 +15704,7 @@ edu6.cloud, 1 eduard-dopler.de, 1 eduardnikolenko.com, 1 eduardnikolenko.ru, 1 +edubase.net, 1 edubras.com.br, 1 educacionvirtual.com.ar, 1 educatek.es, 1 @@ -15550,7 +15731,6 @@ edusantorini.com, 1 eduschedule.org, 1 eduvpn.no, 1 eduxpert.in, 1 -edv-bv.de, 1 edv-kohls.de, 1 edv-lehrgang.de, 1 edv-ringhofer.de, 1 @@ -15626,6 +15806,7 @@ eft.boutique, 1 eftelingcraft.net, 1 eftopia.org, 1 egablo.black, 1 +egamespw.com, 1 egami.ch, 1 eganassociates.com.au, 1 egarden.it, 1 @@ -15719,6 +15900,7 @@ eioperator.com, 0 eipione.com, 1 eirastudios.co.uk, 0 eirb.fr, 1 +eirik.eu, 1 eisaev.ru, 1 eiskratzer-bedrucken.de, 1 eit-web.de, 0 @@ -15782,6 +15964,7 @@ elblogdegoyo.mx, 1 elbohlyart.com, 1 elburgozagalicos.com, 1 elcambiador.es, 1 +elchamandelaprosperidad.org, 1 elcontadorsac.com, 1 eldapoint.co.uk, 1 eldenelesat.com, 1 @@ -15795,6 +15978,7 @@ eldisagjapi.de, 1 eldrid.ge, 1 eldritchfiction.net, 1 ele-sm.com, 1 +electerious.com, 1 electionsbycounty.com, 1 electionsdatabase.com, 1 electr0sheep.com, 1 @@ -15883,6 +16067,7 @@ electrotainment.com, 1 eled.io, 1 elefandt.com, 1 elefantevoador.com, 1 +elegance-sm.com, 1 eleicoes2014.com.br, 1 eleicoes2016.com.br, 1 eleicoes2018.com, 1 @@ -15949,6 +16134,7 @@ elexprimidor.com, 1 elexwong.com, 1 elfe.de, 1 elfnon.com, 1 +elforno.gr, 1 elfring.eu, 1 elfussports.com, 1 elgalponazo.com.ar, 1 @@ -16005,6 +16191,7 @@ elizabethrominski.com, 1 elizeugomes.com.br, 1 eljef.me, 1 elkoy.org, 1 +ell-net.tokyo, 1 ell888.com, 1 ella-kwikmed.com, 0 ellak.gr, 1 @@ -16066,6 +16253,7 @@ elwave.org, 1 elwix.com, 1 elxsi.de, 1 elyasweb.com, 1 +elysiandigital.co, 1 elysiria.fr, 1 elysiumware.com, 1 em-biotek.cz, 1 @@ -16144,7 +16332,6 @@ emilypennock.com, 1 eminhuseynov.com, 1 emirabiz.com, 0 emirichardson.com, 1 -emisia.com, 1 emivauthey.com, 1 emkrivoy.com, 1 emma-o.com, 1 @@ -16193,6 +16380,7 @@ empyrean-advisors.com, 1 emrenovation.com, 1 emresaglam.com, 1 ems.gov, 1 +emsadi.org, 1 emtradingacademy.com, 1 emultiagent.pl, 1 emvoice.net, 1 @@ -16200,6 +16388,7 @@ emvoiceapp.com, 1 emw3.com, 1 emyr.net, 1 emyself.org, 1 +emzi0767.com, 1 en-booster.jp, 1 en-crypt.me, 1 en-maktoob.search.yahoo.com, 0 @@ -16217,6 +16406,7 @@ encode.host, 1 encodecloud.net, 1 encoderx.uk, 1 encore.io, 0 +encountercss.com, 1 encouragemarketing.com, 1 encredible.de, 0 encredible.org, 0 @@ -16249,6 +16439,7 @@ endoftennancycleaning.co.uk, 1 endohaus.us, 1 endspamwith.us, 1 enduranceday.be, 1 +endustriyelfirinlar.com, 1 endviolence.gc.ca, 1 endzeit-architekten.com, 0 eneamarcantoni.com, 1 @@ -16293,6 +16484,7 @@ engie-laadpalen.nl, 1 engiedev.net, 1 enginepit.com, 1 enginsight.com, 1 +enginx.cn, 1 enginx.net, 1 engl-server.de, 1 engl-systems.de, 1 @@ -16317,7 +16509,6 @@ enjinx.io, 1 enjoy-drive.com, 1 enlight.no, 1 enlightenedhr.com, 1 -enlightenedmind.co, 1 enlightenment.org, 1 enlightenth.com, 1 enlnf.link, 1 @@ -16367,6 +16558,7 @@ entradaweb.cl, 1 entrainr.com, 1 entravex.com, 1 entrecieletpierres.com, 1 +entrezdansladanse.fr, 1 entropia.de, 0 entropy.su, 1 entrusted.io, 1 @@ -16403,12 +16595,14 @@ eosol.net, 1 eosol.services, 1 eosolutions.co, 1 epa.com.es, 1 +epagos.com.ar, 1 epasar.my, 0 epaslaugos.lt, 1 epassafe.com, 1 epave.paris, 1 epay.bg, 1 epaygateway.net, 1 +epcreport.net, 1 epdeveloperchallenge.com, 1 ephesusbreeze.com, 1 epi-lichtblick.de, 1 @@ -16424,6 +16618,7 @@ epicentre.works, 1 epichouse.net, 0 epicinflatables.co.uk, 1 epickitty.co.uk, 1 +epiclub.com.au, 1 epicpages.com, 1 epicsecure.de, 1 epicserver.ru, 1 @@ -16475,6 +16670,7 @@ eposyork.co.uk, 1 eppelblei.lu, 1 eppelduerferjugend.lu, 1 eppelpress.lu, 1 +eppione.com, 1 epreskripce.cz, 1 epsilon.dk, 1 epspolymer.com, 1 @@ -16486,6 +16682,7 @@ eqorg.com, 1 equalcloud.com, 1 equallove.me, 1 equeim.ru, 1 +equi.ac, 1 equiac.com, 1 equidam.com, 1 equinecoaching.ca, 1 @@ -16582,6 +16779,7 @@ ersinerce.com, 1 erspro.net, 1 erstehilfeprodukte.at, 1 ert.ovh, 1 +ertir.ru, 1 eru.im, 0 eru.me, 1 eru.moe, 1 @@ -16876,6 +17074,7 @@ estudiarparaser.com, 1 estudiaryaprenderingles.com, 1 estudio21pattern.com, 0 estufitas.com, 1 +esu.moe, 1 esu.wiki, 1 esu.zone, 1 esurety.net, 1 @@ -16891,6 +17090,7 @@ et-inf.de, 1 eta.cz, 1 etaes.eu, 1 etajerka-spb.ru, 1 +etajerka.spb.ru, 1 etaoinwu.win, 1 etasigmaphi.org, 1 etath.com, 1 @@ -17064,6 +17264,7 @@ evafojtova.cz, 1 evailoil.ee, 1 evailoil.eu, 1 evalesc.com, 1 +evaluate.jp, 1 evamachkova.cz, 1 evamathil.de, 1 evamira.com, 1 @@ -17214,6 +17415,7 @@ exagoni.com.au, 1 exagoni.com.my, 1 examedge.com, 1 examenpilotos.com, 0 +example4d.com, 1 exampleessays.com, 1 examsmate.in, 1 exaplac.com, 1 @@ -17223,7 +17425,6 @@ excaliburtitle.com, 0 exceed.global, 1 exceedagency.com, 1 excel-mechanical.com, 1 -excel-utbildning.nu, 1 excelhot.com, 1 excelkurs.one, 1 excella.me, 1 @@ -17316,7 +17517,6 @@ expo-america.ru, 1 expo-asia.ru, 1 expo-europe.ru, 1 expo-larionov.org, 1 -exponentialnews.net, 1 expoort.co.uk, 1 expoort.com, 1 expoort.com.br, 1 @@ -17335,6 +17535,7 @@ expressmarket.ru, 1 expresstinte.de, 1 expressvpn.com, 1 expresswins.co.uk, 1 +expromo.eu, 1 expxkcd.com, 1 exs.lv, 1 exside.com, 1 @@ -17488,6 +17689,7 @@ facai888.cc, 1 facanabota.com, 1 facanabota.com.br, 1 facarospauls.com, 1 +facchinaggio.milano.it, 1 facciadastile.it, 1 face-fashion.de, 1 face-mania.com, 1 @@ -17506,6 +17708,7 @@ facerepo.com, 1 faceresources.org, 1 facesdr.com, 1 facesnf.com, 1 +facfox.com, 1 fach-journalist.de, 1 fachmann-umzuege.de, 1 fachschaftslisten.at, 1 @@ -17517,7 +17720,6 @@ facilities.fr, 1 facilitiessurvey.org, 1 facilitrak.com, 1 facility-service-muenchen.de, 1 -facingbipolar.com, 1 fackovcova.cz, 1 fackovcova.eu, 1 fackovcova.sk, 1 @@ -17546,6 +17748,7 @@ faelix.net, 1 faerb.it, 1 faeriecakes.be, 1 faeservice.eu, 1 +fafa106.com, 1 fafarishoptrading.com, 1 fafatiger.com, 1 fag.wtf, 1 @@ -17567,6 +17770,7 @@ failoverplan.it, 1 fairbill.com, 1 fairedeseconomies.info, 1 fairgolfteams.com, 1 +fairleighcrafty.com, 1 fairmarketing.com, 1 fairplay.im, 1 fairssl.dk, 1 @@ -17606,8 +17810,10 @@ fallenangeldrinks.com, 1 fallenangeldrinks.eu, 1 fallenangelspirits.co.uk, 1 fallenangelspirits.com, 1 +fallenmoons.nl, 1 fallenmystic.com, 1 fallenspirits.co.uk, 1 +fallin.space, 1 falling.se, 1 fallofthecitadel.com, 1 false.in.net, 1 @@ -17638,6 +17844,7 @@ familiereimann.com, 1 familjenfrodlund.se, 1 familjenm.se, 1 familledessaint.fr, 1 +familleseux.net, 1 familylawhotline.org, 1 familyparties.co.uk, 1 familyreal.ru, 1 @@ -17682,7 +17889,6 @@ fantasymina.de, 1 fantasypartyhire.com.au, 1 fantasyprojections.com, 1 fantasyspectrum.com, 1 -fantasysportsnews.org, 1 fantopia.club, 1 fantraxhq.com, 1 fanvoice.com, 1 @@ -17809,6 +18015,8 @@ fatimamoldes.com.br, 1 fatmixx.com, 1 fator25.com.br, 1 fatowltees.com, 1 +fattailcall.com, 1 +fattorino.it, 1 fatturegeko.eu, 1 fau8.ml, 1 faucetbox.com, 0 @@ -17856,6 +18064,7 @@ fcsic.gov, 1 fdalawboston.com, 1 fdaregs.com, 1 fdevs.ch, 1 +fdfz.edu.cn, 1 fdis.net.cn, 1 fdlibre.eu, 1 fdms.gov, 1 @@ -17996,6 +18205,7 @@ ferienchalet-wallis.ch, 1 ferienhaeuser-krummin.de, 1 ferienhaus-polchow-ruegen.de, 0 ferienhausprovence.ch, 1 +ferienstpeter.de, 1 ferienwohnung-hafeninsel-stralsund.de, 1 ferienwohnung-wiesengrund.eu, 1 ferienwohnungen-lastminute.de, 1 @@ -18141,6 +18351,7 @@ filanthropystar.org, 1 filaretihairlove.gr, 1 file-cloud.eu, 1 file-pdf.it, 1 +filebox.one, 1 filebox.space, 1 filecopa.com, 1 filedropbox.nl, 1 @@ -18210,6 +18421,7 @@ findmybottleshop.com.au, 1 findmynudes.com, 1 findoon.de, 1 findrejsepartner.dk, 1 +findstorenearme.ca, 1 findstorenearme.co.uk, 1 findstorenearme.us, 1 findthatnude.com, 1 @@ -18281,6 +18493,7 @@ fireportal.cz, 1 fireportal.sk, 1 fireshellsecurity.team, 1 firesofheaven.org, 1 +firestuff.org, 1 firesuite.net, 1 firetotheprisons.org, 1 firevap.org, 1 @@ -18405,6 +18618,7 @@ flamet.eu, 1 flameworked.com, 1 flamingcow.tv, 1 flamingkeys.com, 1 +flamingowomenspavilion.com, 1 flamme-von-anor.de, 1 flana.com, 1 flanga.io, 1 @@ -18537,12 +18751,12 @@ floresvilleedc.org, 1 florian-bachelet.fr, 1 florian-thie.de, 1 florian2833z.de, 1 -florianbecker.it, 1 floriankarmen.com, 1 floriankeller.de, 1 florianmitrea.uk, 1 florianschmitt.ca, 1 floriantanner.ch, 1 +florida-prep.org, 1 floridaengineering.org, 1 floridafabrication.net, 1 floridafieros.org, 1 @@ -18560,6 +18774,7 @@ florlola.com, 1 flosch.at, 0 floseed.fr, 1 floskelwolke.de, 1 +flossexanten.de, 1 floth.at, 1 flourishtogether.com, 1 flow.su, 1 @@ -18824,6 +19039,7 @@ forvisualdesign.com, 1 forward-fly-fishing.ch, 1 foryourhealthybody.com, 1 fosaudit.com, 1 +foscamcanada.com, 1 fosdem.org, 1 fosgreece.com, 1 foshanshequ.com, 0 @@ -18872,7 +19088,6 @@ fourashesgolfcentre.com, 1 fourashesgolfcentre.uk, 1 fourdesignstudio.com, 0 fournarisopenday.com, 1 -foutrelis.com, 1 fowlervwparts.com, 1 fowlsmurf.net, 1 fox.my, 0 @@ -18918,6 +19133,7 @@ framezdakkapellen.nl, 1 fran.cr, 1 francescopalazzo.com, 1 francescopandolfibalbi.it, 1 +francescoyatesfansite.com, 1 francetraceur.fr, 1 franchini.email, 1 franchini.engineer, 1 @@ -19236,6 +19452,7 @@ frontletter.io, 1 frontline.cloud, 1 frontlinemessenger.com, 1 fropky.com, 1 +frostednetwork.com, 1 frostprotection.co.uk, 1 frostwarning.com, 1 frosty-gaming.xyz, 1 @@ -19263,7 +19480,6 @@ frugalmechanic.com, 1 frugro.be, 1 fruition.co.jp, 1 fruitscale.com, 1 -fruityfitness.com, 1 fruityten.co.uk, 1 frusky.de, 1 frusky.net, 1 @@ -19364,10 +19580,8 @@ fullbundle.com, 1 fullereno.com, 1 fullerlife.org.uk, 1 fullfilez.com, 1 -fullhost.com, 1 fullhub.ru, 1 fullmatch.net, 1 -fullnitrous.com, 1 fullstacknotes.com, 0 fulltxt.ml, 1 fumblers.ca, 1 @@ -19539,7 +19753,6 @@ fyol.xyz, 0 fyreek.me, 1 fyretrine.com, 1 fysesbjerg.dk, 1 -fysio123.nl, 1 fysiomassageoosterhout.nl, 1 fysiotherapieapeldoornzuid.nl, 1 fysiotherapieholtenbroek.nl, 1 @@ -19552,6 +19765,7 @@ fzhyzamt.com, 1 fztopsec.com, 1 fzx750.ru, 1 g-ds.de, 1 +g-fruit.gr, 1 g-m-w.eu, 1 g-p-design.com, 1 g-rom.net, 1 @@ -19582,9 +19796,11 @@ gabe565.com, 1 gabeb1920.com, 1 gabecook.com, 1 gabethebabetv.com, 1 +gabinetejuridicotecnologicojuandemeseguer.es, 1 gabinetpsychoterapii.krakow.pl, 1 gabiocs.com, 1 gabriel.to, 1 +gabriele-kluge.de, 1 gabriele.tips, 1 gabrielgn.com.br, 1 gabrielsimonet.ch, 1 @@ -19632,6 +19848,7 @@ galabau-maurmann.de, 1 galacg.me, 1 galactic-crew.org, 1 galak.ch, 1 +galaltosalento.it, 1 galanight.cz, 1 galax.us, 1 galaxus.at, 1 @@ -19732,6 +19949,7 @@ gameserver-sponsor.me, 1 gameshogun.xyz, 1 gameshowchallenge.ie, 1 gamesided.com, 1 +gamesme.cn, 1 gamesplanet.com, 1 gamesputnik.ru, 1 gamestats.gg, 1 @@ -19759,6 +19977,7 @@ gamoloco.com, 1 gan.wtf, 1 ganado.org, 1 ganaenergia.com, 1 +ganaenergia.es, 1 ganasoku.net, 1 gancedo.com.es, 1 gandalfservice.com, 1 @@ -19796,7 +20015,6 @@ garanteasy.com, 1 garantieabschluss.de, 0 garazskapuszereles.hu, 1 garbage-juice.com, 1 -garbagedisposalguides.com, 1 garbomuffin.com, 1 garcia-franco.com, 1 garciagerman.com, 1 @@ -19838,7 +20056,6 @@ gasnews.net, 1 gassouthkenticoqa.azurewebsites.net, 1 gastauftritt.net, 1 gastoudererenda.nl, 1 -gastritisolucion.com, 1 gastromedicalcenter.com.br, 1 gastrotiger.at, 1 gastrotiger.de, 1 @@ -19848,6 +20065,7 @@ gateaucreation.fr, 1 gatekiller.co.uk, 1 gatemoves.com, 1 gatewaybridal.com, 1 +gathermycrew.org.au, 1 gathu.co.ke, 1 gatilagata.com.br, 1 gatomix.net, 1 @@ -19888,6 +20106,7 @@ gbl.selfip.net, 1 gboys.net, 1 gbs-uk.com, 1 gc-mc.de, 1 +gc.de, 1 gc.gy, 1 gc.net, 1 gc.ru.net, 1 @@ -19911,6 +20130,7 @@ gdngs.de, 1 gdoce.es, 0 gdpr-pohotovost.cz, 1 gdraco.com, 1 +gdsqua.re, 1 gdutnic.com, 1 gdv.me, 1 gdz-spishy.com, 1 @@ -19961,6 +20181,7 @@ geeks.one, 0 geekshirts.cz, 1 geekstreet.fr, 1 geekthis.de, 1 +geektier.com, 1 geektopia.es, 1 geekwhack.org, 1 geekwithabudget.com, 1 @@ -20064,7 +20285,6 @@ geniusteacher.in, 1 geniuszone.biz, 1 genocidediary.org, 1 genodeftest.de, 1 -genome.gov, 1 genomequestlive.com, 1 genoog.com, 1 genosse-einhorn.de, 1 @@ -20080,7 +20300,10 @@ genslerwisp.com, 1 gensokyo.chat, 0 gensokyo.re, 1 gensonline.eu, 1 +gentcdn.com, 1 gentianes.ch, 1 +gentlent.com, 1 +gentlent.net, 1 gentoo-blog.de, 1 gentooblog.de, 1 gentz.rocks, 1 @@ -20096,7 +20319,7 @@ geoip.fedoraproject.org, 1 geoip.stg.fedoraproject.org, 1 geojs.io, 1 geology-schools.com, 1 -geomac.gov, 0 +geomac.gov, 1 geometra.roma.it, 1 geometra24.it, 1 geomex.be, 1 @@ -20305,7 +20528,6 @@ ghostblog.info, 0 ghostcir.com, 1 ghou.me, 1 ghowell.io, 1 -ghrelinblocker.info, 1 ghuntley.com, 0 giac.org, 1 giacomodrago.com, 1 @@ -20413,14 +20635,13 @@ girsa.org, 1 girvas.ru, 1 gisac.org, 1 gisch.tk, 1 -gisgov.be, 1 gisher.news, 1 gisher.org, 1 gisher.video, 1 gishiko.net, 1 gistr.io, 1 git.co, 1 -git.market, 1 +git.market, 0 git.org.il, 1 git.sb, 1 git.tt, 1 @@ -20447,6 +20668,7 @@ giveattheoffice.org, 0 giveaways.ph, 1 giveme.online, 1 given2.com, 1 +giveoneup.org, 1 givesunlight.com, 1 givingnexus.org, 0 givingtools.com, 1 @@ -20475,6 +20697,7 @@ gladdy.uk, 1 gladdymedia.co.uk, 1 gladdymedia.com, 1 gladdymedia.uk, 1 +gladiac.duckdns.org, 1 gladwellentertainments.co.uk, 1 gladysstrickland.com, 1 glahcks.com, 1 @@ -20554,7 +20777,9 @@ globalventil.com, 1 globalvisions-events.ch, 1 globalvisions-events.com, 1 globcoin.io, 1 +globe-flight.de, 1 globelink-group.com, 1 +globologic.com, 1 globuli-info.de, 1 glocalworks.jp, 1 gloeckle-gruppe.de, 1 @@ -20742,6 +20967,7 @@ golser.info, 1 gomasy.jp, 1 gomel.chat, 1 gomel.city, 1 +gomelagromashplus.by, 1 gomelchat.com, 1 gomelphoto.com, 1 gomiblog.com, 1 @@ -20973,6 +21199,7 @@ grapevine.is, 1 graph.org, 1 graphcommons.com, 1 graphene.software, 1 +grapheneos.org, 1 graphic-schools.com, 1 graphic-shot.com, 1 graphire.io, 1 @@ -21353,7 +21580,6 @@ guolaw.ca, 1 guoliang.me, 1 guozeyu.com, 1 gupfen.ch, 1 -guphi.net, 0 gurkan.in, 1 gurmel.ru, 1 gurpusmaximus.com, 1 @@ -21381,6 +21607,7 @@ guusvandewal.nl, 1 guvernalternativa.ro, 1 guyeskens.be, 1 guysauto.com, 1 +guytarrant.co.uk, 1 gv-neumann.de, 1 gv-salto.nl, 1 gvatas.in, 1 @@ -21466,6 +21693,7 @@ haaksmadehaanuitvaart.nl, 1 haancommunity.cf, 1 haarigerrattenarsch.com, 1 haarlemsesaxofoonschool.nl, 1 +haarstudiok99.nl, 1 haavard.me, 1 haazen.xyz, 1 habarisoft.com, 1 @@ -21476,7 +21704,6 @@ haberer.me, 1 habitat-domotique.fr, 1 habr.com, 1 habtium.es, 1 -habview.net, 1 hacc.top, 1 haccp.bergamo.it, 1 haccp.milano.it, 1 @@ -21551,6 +21778,7 @@ haerwu.biz, 1 haferman.net, 1 haferman.org, 1 hafniatimes.com, 1 +hag27.com, 1 haggeluring.su, 1 hagiati.gr, 1 hagier.pl, 1 @@ -21577,7 +21805,6 @@ hajekj.net, 1 haju.fi, 1 hak5.org, 1 hakaru.org, 1 -hakase.io, 1 hakase.pw, 1 hakatabijin-mind.com, 1 hake.me, 1 @@ -21700,7 +21927,7 @@ hanys.xyz, 1 hanzcollection.online, 1 hanzubon.jp, 1 hao-zhang.com, 1 -haocq3.com, 1 +haocq3.com, 0 haogoodair.ca, 1 haoqi.men, 1 haorenka.org, 1 @@ -21908,7 +22135,6 @@ hayashi-rin.net, 1 haydenjames.io, 1 haydentomas.com, 1 hayfordoleary.com, 1 -haynes-davis.com, 1 haystack-staging.com, 1 hayvid.com, 1 haz.cat, 1 @@ -21918,6 +22144,7 @@ hazeltime.com, 1 hazeover.com, 1 hazloconlapix.com, 1 hazukilab.com, 1 +hb5197.com, 1 hb8522.com, 1 hbbet.com, 1 hbcu-colleges.com, 1 @@ -21933,6 +22160,7 @@ hd-gaming.com, 1 hd-offensive.at, 0 hd-only.org, 1 hd-outillage.com, 1 +hd5197.com, 1 hdc.cz, 1 hdcamvids.com, 1 hdcenter.cc, 1 @@ -21992,7 +22220,6 @@ healthyandnaturalliving.com, 1 healthybeterlife.click, 1 healthyfitfood.com, 1 healthypeople.gov, 1 -healthyrecharge.com, 1 healthyspirituality.org, 1 healthysuperhuman.com, 1 healthyteame.com, 1 @@ -22042,6 +22269,7 @@ hec-espace-entreprise.ch, 1 hec.global, 1 heckelektro.de, 1 heckerundknopp.de, 1 +hedge.fi, 1 hedgeschool.ie, 1 hedonism.org, 1 hedonistic-imperative.com, 1 @@ -22247,6 +22475,7 @@ heroiclove.com, 1 heroicpixel.com, 1 heroku.com, 1 heroku.ga, 1 +heroliker.com, 1 heromuster.com, 1 herpes-no.com, 1 herr-webdesign.de, 1 @@ -22315,6 +22544,7 @@ hfox.org, 1 hfsctx.gov, 1 hfu.io, 1 hg.gg, 1 +hg.python.org, 1 hg170.cc, 1 hg71839.com, 1 hg881.com, 1 @@ -22362,6 +22592,7 @@ hiffo.de, 1 hig.gov, 1 higgstools.org, 1 highair.net, 1 +highdesertroboticsurgery.com, 1 higherpress.org, 1 highkick.jp, 1 highland-webcams.com, 1 @@ -22399,6 +22630,8 @@ hill.selfip.net, 1 hillcrestswimclub.com, 1 hillebrand.io, 1 hillier-swift.co.uk, 1 +hillsandsaunders.co.uk, 1 +hillsandsaunders.com, 1 hillsboroccpa.org, 1 hillstrak.com.au, 1 hillstrakwpg.com.au, 1 @@ -22417,6 +22650,7 @@ hinata-hidetoshi.com, 1 hindimoviedownload.net, 1 hindimovieonline.net, 1 hingle.me, 1 +hingston.org, 1 hintergrundbewegung.de, 1 hinterhofbu.de, 1 hinterposemuckel.de, 1 @@ -22827,7 +23061,7 @@ hostico.ro, 1 hostinecpodlipou.cz, 1 hosting-swiss.ch, 1 hostingactive.it, 1 -hostingalternative.com, 1 +hostingalternative.com, 0 hostingfirst.nl, 1 hostinghelp.guru, 1 hostinginnederland.nl, 1 @@ -22847,7 +23081,7 @@ hotartup.com, 1 hotcandlestick.com, 1 hotchillibox.com, 1 hotcoin.io, 1 -hotdoc.com.au, 0 +hotdoc.com.au, 1 hotel-alan.hr, 1 hotel-kontorhaus-stralsund.de, 1 hotel-kontorhaus.de, 1 @@ -22933,6 +23167,7 @@ howmanymilesfrom.com, 1 howsecureismypassword.net, 1 howsmyssl.com, 1 howsmytls.com, 1 +howson.me, 1 howsyourhealth.org, 1 howtocommunicate.com.au, 1 howtogeek.com, 1 @@ -22956,6 +23191,7 @@ hpkp-faq.de, 1 hps.digital, 1 hps.hu, 1 hpsdigital.hu, 1 +hpvtimmerwerken.nl, 1 hq77.ru, 1 hqhh.org, 1 hqq.tv, 1 @@ -23026,6 +23262,7 @@ hti.digital, 1 htlball.at, 1 htmanager.fr, 1 html.moe, 1 +html2gutenberg.com, 1 html5.org, 1 html5media.info, 1 htmlacademy.ru, 1 @@ -23118,6 +23355,8 @@ hugofs.com, 1 hugolegrand.fr, 1 hugolynx.fr, 1 hugonote.ml, 1 +hugonote.ovh, 1 +hugovr.nl, 1 huguesblanchard.paris, 1 huguesditciles.com, 1 huh.gdn, 1 @@ -23268,7 +23507,6 @@ hybula.com, 1 hycken.com, 1 hyckenberg.com, 1 hyderabadonlinegifts.com, 1 -hydra.zone, 1 hydracommunity.net, 1 hydrante.ch, 1 hydrasolutions.de, 1 @@ -23292,6 +23530,7 @@ hypeitems.pl, 1 hypemgmt.com, 1 hyper-matrix.org, 1 hyper-text.org, 1 +hyper.ai, 1 hyperactive.am, 1 hyperalgesia.com, 1 hyperautomotive.com.au, 1 @@ -23452,14 +23691,13 @@ icanhasht.ml, 1 icanhazpass.com, 1 icarlos.net, 1 icasture.top, 1 -icbemp.gov, 1 +icbemp.gov, 0 icci.info, 1 iccpublisher.com, 1 icdp.org.ua, 1 ice.xyz, 1 icebat.dyndns.org, 1 iceberg.academy, 1 -icebook.co.uk, 1 icebound.win, 1 icecars.net, 1 icecontrol.ro, 1 @@ -23499,6 +23737,7 @@ ict-crew.nl, 1 ict-helpteam.nl, 1 ict-radar.com, 1 ict-radar.nl, 1 +ictbiz.com.au, 1 ictcareer.ch, 1 ictinforensics.org, 1 ictoniolopisa.it, 1 @@ -23604,6 +23843,7 @@ ieeesb.nl, 1 ieeesbe.nl, 1 ieeespmb.org, 1 ieffalot.me, 1 +iegat.com, 1 ieji.de, 1 iemb.cf, 1 iemb.tk, 1 @@ -23781,6 +24021,7 @@ iligang.com, 1 iligang.link, 1 iligang.xin, 1 ilii.me, 1 +iliz-kafe.fr, 1 ilkeakyildiz.com, 0 illambias.ch, 1 illative.net, 1 @@ -23805,6 +24046,7 @@ ilmataat.ee, 1 ilmiobusinessonline.it, 1 ilmiogiardiniere.it, 1 ilmuk.org, 0 +iloli.name, 1 ilonewolfs.com, 1 ilookz.nl, 1 ilove.fish, 1 @@ -23863,7 +24105,6 @@ imcsi.cn, 1 imcsx.co, 1 imdemos.com, 1 ime.moe, 1 -imedes.de, 1 imedi.it, 1 imediafly.com, 1 imedikament.de, 1 @@ -24046,6 +24287,7 @@ indianaberry.com, 1 indianaffairs.gov, 0 indianafoundationpros.com, 1 indianamoldrepairpros.com, 1 +indianareflux.com, 1 indianawaterdamagerepairpros.com, 1 indiansmartpanel.com, 1 indiapur.com, 1 @@ -24135,7 +24377,6 @@ influxus.com, 0 infmed.com, 1 info-bay.com, 1 info-beamer.com, 1 -info-d-74.com, 1 info-o-zbozi.cz, 1 info-screen-usercontent.me, 1 info-screen.me, 1 @@ -24375,9 +24616,12 @@ inserzioniticino.ch, 1 insgesamt.net, 1 inshapenutrition.com.br, 1 insho.fashion, 1 +inshop.hu, 1 inside19.com, 1 insideaudit.com, 1 insidebedroom.com, 1 +insideevs.com, 1 +insideevs.fr, 1 insidesolutions.nl, 1 insidethefirewall.tk, 1 insighti.com, 1 @@ -24577,6 +24821,7 @@ inton.biz, 1 intoparking.com, 1 intoparking.fi, 1 intpforum.com, 1 +intr0.cf, 1 intr0.com, 1 intr0.tk, 1 intrack.net.au, 1 @@ -24608,7 +24853,6 @@ invenio.software, 1 inventaire.ch, 1 inventionsteps.com.au, 1 inventix.nl, 1 -inventoryexpress.xyz, 1 inventoryimages.co.uk, 1 inventoryimages.com, 1 inventtatte.com, 1 @@ -24680,6 +24924,7 @@ iondrey.ga, 1 iondrey.gq, 1 iondrey.ml, 1 iondrey.tk, 1 +ione.net.nz, 1 ionlabs.kr, 1 ionovia.de, 1 ionspin.com, 1 @@ -24693,6 +24938,7 @@ iosmods.com, 1 iosnoops.com, 1 iossifovlab.com, 1 iostream.by, 1 +iotac.xyz, 1 iotfen.com, 1 iotsms.io, 1 iowaent.com, 1 @@ -24804,7 +25050,6 @@ irmag.ru, 1 irmgard-woelfle.de, 1 irmgardkoch.com, 1 iro-iro.xyz, 1 -irodorinet.com, 1 iroise.ch, 1 ironbelly.pro, 1 ironcarnival.com, 1 @@ -24821,6 +25066,8 @@ irvingramo.com, 1 is-going-to-rickroll.me, 1 is-rocket.science, 1 is-sw.net, 1 +isa357.com, 1 +isa5417.com, 1 isaaccomputerscience.org, 1 isaacdgoodman.com, 0 isaackabel.cf, 1 @@ -24982,7 +25229,6 @@ isyu.xyz, 1 isz.no, 1 iszy.cc, 1 it-academy.sk, 1 -it-boss.ro, 1 it-enthusiasts.tech, 1 it-faul.de, 1 it-fernau.com, 1 @@ -25017,6 +25263,7 @@ itactiq.info, 1 itad.top, 1 itaiferber.net, 1 ital-gamma.be, 1 +italbavaro.com, 1 italia-store.com, 1 italiachegioca.com, 1 italian.dating, 1 @@ -25143,6 +25390,7 @@ ivaoru.org, 1 ivfausland.de, 1 ivfmeds.com, 1 ivig.com.br, 1 +ivisitorinsurance.com, 1 ivo.co.za, 1 ivocopro.de, 1 ivocotec.de, 1 @@ -25229,6 +25477,7 @@ j2h.de, 1 j3e.de, 1 j5lx.de, 1 j5lx.eu, 1 +j5lx.io, 1 j605.tk, 1 ja-dyck.de, 1 ja-gps.com.au, 1 @@ -25307,6 +25556,7 @@ jahner.xyz, 1 jahofmann.de, 0 jailbreakingisnotacrime.org, 1 jaimechanaga.com, 1 +jaingynecology.com, 1 jaion.ml, 1 jaion.tech, 1 jaion.xyz, 1 @@ -25476,7 +25726,6 @@ jasonian-photo.com, 0 jasonmili.online, 1 jasonrobinson.me, 1 jasonsansone.com, 1 -jasonsplecoscichlids.com, 1 jasonwindholz.com, 1 jasper.link, 1 jasperhammink.com, 1 @@ -25761,6 +26010,7 @@ jianji.de, 1 jianny.me, 1 jianshu.com, 1 jianwei.wang, 1 +jianyuan.art, 1 jianyuan.pro, 1 jiaqiang.vip, 1 jiatingtrading.com, 1 @@ -25926,6 +26176,7 @@ jodyboucher.com, 0 jodyshop.com, 1 joe262.com, 1 joearodriguez.com, 1 +joebiden.com, 1 joebobbriggs.net, 1 joecod.es, 1 joedavison.me, 1 @@ -26099,6 +26350,7 @@ jonpavelich.com, 1 jons.org, 1 jonscaife.com, 1 jonssheds.direct, 1 +joodari.fi, 1 jooksms.com, 1 jooksuratas.ee, 1 joomlant.org, 1 @@ -26135,6 +26387,7 @@ josefottosson.se, 1 joseitoda.org, 1 josemikkola.fi, 1 josepbel.com, 1 +josephbarela.com, 1 josephbleroy.com, 1 josephgeorge.com.au, 1 josephre.es, 0 @@ -26483,6 +26736,7 @@ k8.com, 1 k8013.com, 1 k807.com, 1 k8084.com, 1 +k819.com, 1 k819.net, 1 k82.org, 1 k821.com, 1 @@ -26531,6 +26785,7 @@ kaikei7.com, 1 kaileymslusser.com, 1 kainetsoft.com, 1 kainz.be, 1 +kaioken.bar, 1 kaisab.com, 1 kaisakura.net, 1 kaisev.net, 0 @@ -26607,6 +26862,7 @@ kanar.nl, 1 kancolle.me, 1 kandalife.com, 1 kandianshang.com, 1 +kandofu.com, 1 kanecastles.com, 1 kanehusky.com, 0 kanetix.ca, 1 @@ -26706,7 +26962,6 @@ kartar.net, 0 kartatopia.com, 1 kartbird.com, 1 kartec.com, 1 -karten-verlag.de, 1 kartonmodellbau.org, 1 karula.org, 1 karuna.community, 1 @@ -27020,6 +27275,7 @@ kevinmorssink.nl, 1 kevinpirnie.com, 0 kevinrandles.com, 0 kevinratcliff.com, 1 +kevinschreuder.com, 1 kevyn.lu, 1 kexino.com, 1 kexueboy.com, 1 @@ -27103,6 +27359,7 @@ kick-in.nl, 1 kickasscanadians.ca, 1 kickedmycat.com, 1 kicou.info, 0 +kiczela.eu, 1 kidaptive.com, 1 kidbacker.com, 1 kiddieschristian.academy, 1 @@ -27110,6 +27367,7 @@ kiddyboom.ua, 1 kids-at-home.ch, 1 kids-castles.com, 1 kids-ok.com, 1 +kids2day.in, 1 kidsareatrip.com, 1 kidsclub.photos, 1 kidsdaysout.co.uk, 1 @@ -27341,6 +27599,7 @@ kjchernov.info, 1 kjellner.com, 1 kjelltitulaer.com, 1 kjellvn.net, 1 +kjfaudio.com, 1 kjgmuenster.org, 1 kjmedia.dk, 1 kjnotes.com, 1 @@ -27367,6 +27626,7 @@ klapib.ee, 1 klares-licht.de, 1 klarika.com, 1 klarmobil-empfehlen.de, 1 +klas.or.id, 0 klauke-enterprises.com, 1 klausbrinch.dk, 0 klausen.dk, 1 @@ -27404,6 +27664,7 @@ klemkow.org, 1 klempin.se, 1 kleppe.co, 1 kleteckova.cz, 1 +klev.su, 1 klickstdu.com, 1 kliemann.me, 1 klimaloven.no, 1 @@ -27463,7 +27724,6 @@ kngk.org, 1 kngkng.com, 1 kniga.market, 0 knight-industries.org, 1 -knightsblog.de, 1 knightsbridge.net, 1 knightsbridgewine.com, 1 knightsweep.com, 1 @@ -27564,6 +27824,7 @@ kokumoto.com, 1 kolania.com, 1 kolania.de, 1 kolania.net, 1 +kolaprestaurant.com, 1 kolas.in, 1 kolaykaydet.com, 1 kolbeck.tk, 1 @@ -27607,6 +27868,7 @@ komoju.com, 1 komok.co.uk, 1 komp247.pl, 1 kompetenzkurs.de, 1 +kompjoeter.net, 1 komplet.sk, 1 kon-sil.de, 1 kondi.net, 1 @@ -27639,6 +27901,7 @@ koodimasin.ee, 1 koodimasin.eu, 1 kooer.org, 1 koof.win, 1 +koolauwomenshealthcare.com, 1 kooli.ee, 1 koolikatsed.ee, 1 koolitee.ee, 1 @@ -27676,7 +27939,6 @@ korosiprogram.hu, 1 korp.fr, 1 korrelzout.nl, 1 kortgebyr.dk, 1 -kortic.com, 1 korup.com, 1 koryfi.com, 1 kos4all.com, 1 @@ -27731,7 +27993,6 @@ kpforme.org, 1 kpinvest.eu, 1 kplasticsurgery.com, 1 kplnet.net, 1 -kpmgccc.co.nz, 1 kpmgclientcollab.co.nz, 1 kpop.re, 1 kpopsource.com, 1 @@ -27774,6 +28035,7 @@ krazykoolkastles.com, 1 krazyphotobooths.co.uk, 1 krc.link, 1 kreationnext.com, 0 +kreativbande.com, 1 kreativelabs.ch, 1 kreativstrecke.de, 1 kredigram.com, 1 @@ -27913,6 +28175,7 @@ kt3i.com, 1 ktbnetbank.com, 1 kthnxbai.xyz, 1 ktm-troxler.de, 1 +ktmclubitalia.it, 1 kts-thueringen.de, 1 ktsee.eu.org, 1 ktsofas.gr, 1 @@ -28022,6 +28285,7 @@ kutukupret.com, 1 kutus.ee, 1 kuunlamaailm.ee, 1 kuwago.io, 1 +kuwichitaim.com, 1 kuzbass-pwl.ru, 1 kvadratnimeter.si, 1 kvalita-1a.cz, 1 @@ -28054,7 +28318,6 @@ kydara.com, 1 kyle.place, 1 kyledrake.net, 1 kylegutschow.com, 1 -kylejohnson.io, 1 kylelaker.com, 1 kylerwood.com, 1 kylinj.com, 0 @@ -28116,6 +28379,7 @@ labanochjonas.se, 1 labanote.com, 1 labanskoller.se, 1 labanskollermark.se, 1 +labavn.org, 1 labcenter.com, 1 labcoat.jp, 1 labeled.vn, 1 @@ -28175,6 +28439,7 @@ ladyanna.de, 1 ladybugjam.com, 1 ladylikeit.com, 1 ladyofhopeparish.org, 1 +laegernevedlillebaelt.dk, 1 laermschmiede.de, 1 laextra.mx, 1 lafantasticatravel.com, 1 @@ -28220,6 +28485,7 @@ lakehavasuhouserentals.com, 1 lakehavasuwebsites.com, 1 lakelandbank.com, 1 lakeoswegotowncar.com, 1 +lakersview.com, 1 lakesherwoodelectric.com, 1 lakesherwoodelectrical.com, 1 lakesherwoodelectrician.com, 1 @@ -28296,6 +28562,7 @@ landhaus-havelse.de, 1 landinfo.no, 1 landingear.com, 1 landlordy.com, 1 +landofelves.net, 0 landoncreekapartments.com, 1 landrovermerriamparts.com, 1 landscape-photography.org, 1 @@ -28466,6 +28733,9 @@ lattyware.co.uk, 1 lattyware.com, 1 laubacher.io, 1 lauchundei.at, 1 +laudableapps.com, 1 +laudablesites.com, 1 +laudwein.fr, 1 lauensteiner.de, 0 laufpix.de, 1 lauftreff-himmelgeist.de, 1 @@ -28863,7 +29133,6 @@ lernplattform-akademie.de, 1 les-ateliers-de-melineo.be, 1 les-explos.com, 1 les-inoxydables.com, 1 -les-pingouins.com, 1 lesaffre.es, 1 lesancheslibres.fr, 1 lesarts.com, 1 @@ -28941,6 +29210,7 @@ leulu.com, 1 leumi-how-to.co.il, 1 leutgeb.xyz, 1 leuthardtfamily.com, 1 +lev103.com, 1 levans.fr, 1 levanscatering.com, 0 level-10.de, 1 @@ -29007,6 +29277,7 @@ lhamaths.online, 1 lhasaapso.com.br, 1 lhconsult.tk, 0 lheinrich.org, 1 +lhero.org, 1 lhgavarain.com, 1 lhost.su, 1 lhr.wiki, 1 @@ -29141,6 +29412,7 @@ lifeslonglist.com, 1 lifestyle7788.com, 1 lifestylecent.com, 1 lifestylefinancial.ca, 1 +lifestylefoto.cz, 1 lifestyler.me, 1 lifestyletravel.co.za, 1 lifetree.network, 1 @@ -29249,7 +29521,6 @@ linan.blog, 1 linan.info, 1 linan.me, 1 linan.site, 1 -linasjourney.com, 1 lincdavis.com, 1 linchpin-it.com, 1 lincnaarzorg.nl, 1 @@ -29344,6 +29615,7 @@ linuxcode.net, 1 linuxcommand.ru, 1 linuxdays.cz, 1 linuxforum.ch, 1 +linuxgiggle.com, 1 linuxhostsupport.com, 1 linuxhub.ro, 1 linuxiuvat.de, 1 @@ -29456,6 +29728,7 @@ liu0hy.cn, 1 liubliu.co.uk, 1 liud.im, 1 liudon.org, 1 +liujr.tk, 1 liukang.tech, 1 liul.in, 1 liupeicheng.top, 1 @@ -29493,7 +29766,6 @@ livekort.dk, 1 livekort.no, 1 livekort.se, 1 livekortti.com, 1 -livekortti.fi, 1 livela.jp, 1 livelexi.com, 1 livelifewithintent.com, 1 @@ -29551,6 +29823,7 @@ lkbk.uk, 1 lkellar.org, 1 lknw.de, 1 lkummer.cz, 1 +ll.gr, 1 llamacuba.com, 1 llamasweet.tech, 1 llandudnochristmasfayre.co.uk, 1 @@ -29620,6 +29893,7 @@ localbitcoins.com, 1 localblitz.com, 1 localblock.co.za, 1 localbouncycastle.com, 1 +localcryptopremium.com, 1 locald.at, 1 localdecor.com.br, 1 localethereum.com, 1 @@ -29831,6 +30105,7 @@ london-transfers.com, 1 london.dating, 1 londongallery.net, 1 londongynaecologist.co, 1 +londonindustryshop.com, 1 londonkan.jp, 1 londonkeyholdingcompany.co.uk, 1 londonpropertymatch.com, 1 @@ -29914,6 +30189,7 @@ long0999.com, 1 long139.com, 1 long139.net, 1 long18.cc, 1 +long228.com, 1 long288.com, 1 long566.net, 1 long688.com, 1 @@ -29962,7 +30238,6 @@ loqu8.com, 1 loquo.com, 1 loqyu.co, 1 loqyu.com, 1 -lord.sh, 1 lordjevington.co.uk, 1 lordofthebrick.com, 1 lore.azurewebsites.net, 1 @@ -29990,6 +30265,7 @@ lostsandal.com, 1 lostsandal.io, 1 lostserver.com, 1 lostwithdan.com, 1 +loteamentoabertoamparo.com.br, 1 loteamentomontereiitu.com.br, 1 lothlorien.ca, 0 lotl.ru, 1 @@ -30013,6 +30289,7 @@ louisapolicefoundation.com, 1 louisapolicefoundation.org, 1 louisemisellinteriors.co.uk, 1 louisvillecarguys.com, 1 +louisvillefibroids.com, 1 loune.net, 1 loungecafe.net, 1 loungecafe.org, 1 @@ -30048,6 +30325,7 @@ lovelytimes.net, 1 lovemanagementaccounts.co.uk, 1 lovemiku.info, 1 lovemomiji.com, 1 +lovemybubbles.com, 1 lovenwishes.com, 1 loveph.one, 1 lover-bg.com, 1 @@ -30075,6 +30353,7 @@ loyaleco.it, 1 loyaltech.ch, 1 loyaltyondemand.club, 1 loyaltyondemand.eu, 1 +loyisa.cn, 1 lp-support.nl, 1 lpacademy.com.br, 1 lpbk-bethel.de, 0 @@ -30083,7 +30362,6 @@ lq.hr, 1 lra-cloud.de, 1 lrdo.net, 1 lriese.ch, 1 -lrssystems.com, 1 lrumeq.com, 1 ls-alarm.de, 1 ls-modcompany.com, 1 @@ -30313,6 +30591,7 @@ lw-addons.net, 1 lwl-foej-bewerbung.de, 1 lwl.moe, 1 lwl12.com, 1 +lwsl.ink, 1 lxai.net, 1 lxd.cc, 1 lxd.pm, 1 @@ -30358,11 +30637,13 @@ lzwc.nl, 1 lzzr.me, 1 m-22.com, 1 m-chemical.com.hk, 1 +m-cont.cz, 1 m-gaming.tk, 1 m-generator.com, 1 m-gh.info, 1 m-idea.jp, 1 m-kleinert.de, 1 +m-kugpn.ru, 1 m-mail.fr, 1 m-monitor.pl, 1 m-net.de, 1 @@ -30441,6 +30722,7 @@ maco.org.uk, 1 maconnerie-dcs.ch, 1 macosxfilerecovery.com, 1 macros.co.jp, 1 +macrostudent.com, 1 macstore.pe, 1 macsupportnacka.se, 1 macsupportstockholm.se, 1 @@ -30460,6 +30742,8 @@ made-in-earth.co.jp, 1 made-to-usb.com, 1 madebydusk.com, 1 madebyshore.com, 1 +madeinorder.com, 0 +madeinrussia.com, 1 madeinstudio3.com, 1 madeintucson.org, 1 madeitwor.se, 1 @@ -30513,6 +30797,7 @@ magasinsenfrance.com, 1 magazin3513.com, 1 magazinedabeleza.net, 1 magazinedotreino.com.br, 1 +magbt.net, 1 magdic.eu, 1 magebit.com, 1 magenbrot.net, 0 @@ -30672,6 +30957,7 @@ makeurbiz.com, 1 maki-chan.de, 1 makinen.ru, 1 makino.games, 1 +makita-online.kz, 1 makkusu.photo, 1 makkyon.com, 1 makos.jp, 1 @@ -30737,6 +31023,7 @@ mamadoma.com.ua, 1 mamamoet.ru, 1 mamanecesitaungintonic.com, 1 mamastore.eu, 1 +mamatting.com, 1 mamaxi.org, 1 mambas.cn, 1 mamiecouscous.com, 1 @@ -30745,6 +31032,7 @@ mammaw.com, 1 mammooc.org, 1 mammothlakesmls.net, 1 mamochka.org.ua, 1 +mamoris-net.jp, 1 mamospienas.lt, 1 mamot.fr, 0 mamout.xyz, 1 @@ -30785,6 +31073,8 @@ manfredschafer.ch, 1 mangahigh.com, 1 mangapoi.com, 1 mangaristica.com, 0 +mangel.io, 1 +mangnhuapvc.com.vn, 1 mangotwoke.co.uk, 1 manhattanchoralensemble.org, 1 manhole.club, 1 @@ -30793,6 +31083,7 @@ maniacoland.com, 1 maniaiti.nz, 1 manicbouncycastles.co.uk, 1 manicode.com, 1 +manilaprinciples.org, 1 maniorpedi.com, 1 maniosglass.gr, 1 manipil.ch, 1 @@ -30865,7 +31156,7 @@ maomao.blog, 1 maomihz.com, 1 maone.net, 1 maorseo.com, 1 -maorx.cn, 0 +maorx.cn, 1 maosensanguentadasdejesus.net, 1 maowtm.org, 1 maozedong.red, 1 @@ -31135,6 +31426,7 @@ martijnvanderzande.nl, 1 martin-loewer.de, 1 martin-mattel.com, 1 martin-smith.info, 1 +martin-weil.de, 1 martin.vet, 1 martinbaileyphotography.com, 1 martindimitrov.cz, 1 @@ -31186,7 +31478,6 @@ masiniunelte.store.ro, 1 masiul.is, 1 maskim.fr, 1 maskinkultur.com, 1 -maslife365.com, 1 maslin.io, 1 masrur.org, 1 massaboutique.com, 1 @@ -31618,6 +31909,7 @@ mebanesteakhouse.com, 1 mecanicadom.com, 1 mecanicoautomotriz.org, 1 mecaniquemondor.com, 1 +meccano.srl, 1 mechanics-schools.com, 1 mechanixdirect.co.uk, 0 mechanus.io, 1 @@ -31654,6 +31946,7 @@ medeinos.lt, 1 medellinapartamentos.com, 1 medeurope.info, 1 medexpress.co.uk, 1 +medguide-bg.com, 1 medhy.fr, 1 medi.com.br, 1 media-courses.com, 0 @@ -31840,6 +32133,7 @@ mehmetince.net, 1 mehostdd.com, 0 mehr-schulferien.de, 1 mehrleben.at, 1 +mehrnevesht.com, 1 mehrwert.de, 1 meia.ir, 1 meidens.com, 1 @@ -31993,6 +32287,7 @@ mer.gd, 1 merakilp.com, 1 meransuedtirol.com, 1 meraseo.com, 1 +mercadeolocal.com.ar, 1 mercadoleal.com.br, 1 mercadopago.com, 1 mercamaris.es, 1 @@ -32016,6 +32311,7 @@ merenita.eu, 1 merenita.net, 1 merenita.nl, 1 meric-graphisme.info, 1 +meridianenvironmental.com, 1 meridianfresno.com, 1 meridianmetals.com, 1 meridianoshop.com.br, 1 @@ -32061,6 +32357,7 @@ mestazitrka.cz, 1 mesvt.com, 1 meta-db.com, 1 meta-word.com, 1 +meta4.be, 1 metachris.com, 1 metacoda.com, 1 metacode.biz, 1 @@ -32120,6 +32417,7 @@ metron-eging.com, 1 metron-networks.com, 1 metron-online.com, 1 metronaut.de, 1 +metronews.co.nz, 1 metropolisil.gov, 1 metropop.ch, 1 metsasta.com, 1 @@ -32136,6 +32434,7 @@ mevs.cz, 1 mexican.dating, 1 mexicanjokes.net, 1 mexico.sh, 1 +mexicodental.co, 1 mexicom.org, 1 mexior.nl, 1 meyash.co, 1 @@ -32157,6 +32456,7 @@ mgdigitalmarketing.com.au, 1 mghiorzi.com.ar, 1 mghw.ch, 1 mgi.gov, 1 +mgiljum.com, 1 mglink.be, 1 mgrossklaus.de, 1 mgrt.net, 1 @@ -32174,6 +32474,7 @@ mhf.gc.ca, 1 mhi.web.id, 1 mhjuma.com, 1 mhmfoundationrepair.com, 1 +mhurologytriad.org, 1 mi-beratung.de, 1 mi-so-ji.com, 1 mi80.com, 1 @@ -32184,6 +32485,7 @@ miadennees.com, 1 miagexport.com, 1 mialquilerdecoches.com, 1 miamaibaum.com, 1 +miaololi.com, 1 miaomiao.eu.org, 1 miaomiaomiao.live, 1 miaonagemi.com, 1 @@ -32291,6 +32593,7 @@ midcarolinaregionalairport.com, 1 midcarolinaregionalairport.org, 1 middletowndelcopa.gov, 1 midgawash.com, 1 +midi-ctes.fr, 1 midislandrealty.com, 1 midistop.org, 1 midkam.ca, 1 @@ -32365,7 +32668,6 @@ mikeblog.site, 1 mikebutcher.ca, 1 mikecapson.com, 1 mikecb.org, 1 -mikedugan.org, 1 mikegao.net, 0 mikegao.org, 1 mikegarnett.co.uk, 1 @@ -32374,6 +32676,7 @@ mikehamburg.com, 1 mikehilldesign.co.uk, 1 mikeklidjian.com, 1 mikekreuzer.com, 1 +mikemooresales.com, 1 mikerichards.photography, 1 miketabor.com, 1 miketheuer.com, 1 @@ -32488,7 +32791,6 @@ mindofmedia.dk, 1 mindoktor.se, 0 mindorbs.com, 1 mindox.com.br, 1 -mindsetatx.com, 1 mindstretchers.co.uk, 1 mindwerks.net, 1 mindwork.space, 1 @@ -32551,7 +32853,9 @@ minitrucktalk.com, 1 minivaro.de, 1 miniverse.social, 1 miniwallaby.com, 1 +miniwolke.ch, 1 minkymoon.jp, 1 +minmaxgame.com, 1 minnesotakinkyyouth.org, 1 minnesotareadingcorps.org, 1 minnit.chat, 1 @@ -32579,6 +32883,7 @@ miproximopaso.org, 1 mipueblohoy.com, 1 mipymesenlinea.com, 1 mir.pe, 1 +mirabalphoto.es, 1 miraheze.org, 1 miraidenshi.com, 1 miramar.ca, 1 @@ -32643,6 +32948,7 @@ mister-matthew.de, 1 misterseguros.com.br, 1 mistine.com.cn, 1 mistine.net, 1 +mistinecn.com, 1 mistreaded.com, 1 mistybox.com, 1 misupport.dk, 1 @@ -32682,7 +32988,6 @@ mitylite.com, 1 mitzpettel.com, 1 miui-germany.de, 1 miukimodafeminina.com, 1 -mivestuariolaboral.com, 1 mivzak.im, 1 mivzakim.biz, 1 mivzakim.cf, 1 @@ -32779,6 +33084,7 @@ mlytics.com, 1 mm-wife.com, 1 mm13.at, 1 mm404.com, 1 +mmalisz.com, 1 mmaps.ddns.net, 1 mmaps.org, 1 mmarnitz.de, 1 @@ -32830,6 +33136,7 @@ moahmo.com, 1 moarcookies.com, 1 moas.design, 1 moas.photos, 1 +mobag.ru, 1 mobal.com, 1 mobasuite.com, 1 mobeforlife.com, 0 @@ -32873,7 +33180,7 @@ mobsender.com, 1 mobycoders.com, 1 mobydog.net, 1 moc.ac, 1 -mochanstore.com, 1 +mochanstore.com, 0 mochiyuki.net, 1 mochizuki.moe, 1 mochoko.com, 1 @@ -32953,7 +33260,7 @@ moeyun.net, 1 mofidmed.com, 1 mofohome.dyndns.org, 1 moha-swiss.com, 1 -mohela.com, 1 +mohanmekap.com, 1 mohr-maschinenservice.de, 1 moin.jp, 1 moipourtoit.ch, 1 @@ -32971,6 +33278,7 @@ mojizuri.com, 1 mojkragujevac.net, 1 mojoco.co.za, 1 mojomusic.org, 1 +mojt.net, 1 mojzis.com, 1 mojzis.cz, 1 mojzisova.com, 1 @@ -33077,6 +33385,7 @@ monpermisvoiture.com, 1 monpetitforfait.com, 1 monpetitmobile.com, 1 monplay.host, 1 +monsecretariat.pro, 1 monsieurbureau.com, 1 monsieursavon.ch, 1 monsterandfox.co.uk, 1 @@ -33115,6 +33424,7 @@ moonagic.com, 1 moonagic.io, 1 moonbench.xyz, 1 moonbot.io, 1 +moonboys.de, 1 moonchart.co.uk, 1 moondrop.org, 1 moonkin.eu, 1 @@ -33197,6 +33507,7 @@ mortalincarnation.com, 1 morteruelo.net, 1 mortgagecalculator.biz, 1 mortis.eu, 1 +morvo.mx, 1 mosaic-design.ru, 1 mosaicadvisors.com, 1 mosaicmarble.com, 1 @@ -33212,7 +33523,6 @@ moskeedieren.nl, 1 mosquitojoe.com, 1 mosscade.com, 1 mosshi.be, 1 -mostcomfortableworkboots.net, 1 mostholynameofjesus.org, 1 mostlyharmless.at, 1 mostlyoverhead.com, 1 @@ -33373,6 +33683,7 @@ mrmoregame.de, 1 mrnh.de, 1 mrnh.tk, 1 mrning.com, 1 +mrnordic.com, 1 mrparker.pw, 1 mrprintables.com, 1 mrs-labo.jp, 1 @@ -33427,6 +33738,7 @@ msz-fotografie.de, 1 mszavodumiru.cz, 1 mt-bank.jp, 1 mt.search.yahoo.com, 0 +mt1016.com, 1 mt2414.com, 1 mt4programming.com, 1 mta.fail, 1 @@ -33441,6 +33753,7 @@ mtcq.jp, 1 mtd.org, 1 mtd.ovh, 1 mte.sk, 1 +mtechprecisioninc.com, 1 mteleport.net, 1 mtfgnettoyage.fr, 1 mtgeni.us, 1 @@ -33508,6 +33821,7 @@ mulaisehat.com, 1 mulej.net, 1 mulheres18.com, 1 muling.lu, 1 +mulk.hopto.org, 1 mullens-usedcars.be, 1 mullerimoveisrj.com.br, 1 multi-vpn.biz, 1 @@ -33518,7 +33832,6 @@ multicomhost.com, 1 multigamecard.com, 1 multigeist.de, 1 multikalender.de, 0 -multimail.work, 1 multimatte.com, 0 multimed-solutions.com, 1 multimed.krakow.pl, 1 @@ -33654,8 +33967,8 @@ mutantmonkey.info, 1 mutantmonkey.sexy, 1 muthai.in.th, 1 mutuals.cool, 1 +mutuelle.fr, 1 muunnin.net, 1 -muurlingoogzorg.nl, 1 muusika.fun, 1 muusikoiden.net, 1 muwatenraqamy.org, 1 @@ -33775,6 +34088,7 @@ mycolorado.gov, 1 mycompanion.cz, 1 myconan.net, 1 myconan.tk, 1 +myconf.com, 1 myconf.uk, 1 myconnect.cn, 1 myconsulting.ch, 1 @@ -33855,6 +34169,7 @@ mygrotto.org, 1 mygymer.ch, 1 myhatsuden.jp, 1 myhealthreviews.com, 1 +myhmz.bid, 1 myhollywoodnews.com, 1 myhome-24.pl, 1 myhostname.net, 1 @@ -34024,7 +34339,6 @@ mysber.ru, 1 myschoolphoto.org, 1 myseatime.com, 1 mysecretcase.com, 1 -mysectools.org, 1 myself5.de, 1 myseo.ga, 1 myserv.one, 1 @@ -34101,6 +34415,7 @@ mywebpanel.nl, 1 myweddingaway.co.uk, 1 myweddingreceptionideas.com, 1 mywetpussycams.com, 1 +mywiwe.com.au, 1 myworkinfo.com, 0 myworth.com.au, 1 myxnr.com, 1 @@ -34609,6 +34924,7 @@ neel.ch, 1 neemzy.org, 1 neer.io, 1 neet-investor.biz, 1 +neev.tech, 1 nefertitis.cz, 1 neffat.si, 1 neflabs.com, 1 @@ -34669,6 +34985,7 @@ nemunai.re, 1 nengzhen.com.cn, 1 nenkin-kikin.jp, 1 neno.io, 1 +neo2k.dk, 1 neo2shyalien.eu, 0 neobits.nl, 1 neocities.org, 1 @@ -34915,6 +35232,7 @@ newcreamforface.com, 1 newday.host, 1 newdimensioninterlock.com, 1 newearth.press, 1 +newenglandworkinjury.com, 1 newfacialbeautycream.com, 1 newfangledscoop.com, 1 newfiepedia.ca, 1 @@ -35113,6 +35431,7 @@ nicoladixonrealestate.com, 1 nicolaeiotcu.ro, 1 nicolaiteglskov.dk, 1 nicolajanedesigns.co.uk, 1 +nicolaottomano.it, 1 nicolas-dumermuth.com, 1 nicolas-hoffmann.net, 1 nicolas-hoizey.com, 1 @@ -35221,7 +35540,6 @@ ninebennink.com, 1 ninepints.co, 1 ninesix.cc, 1 ninespec.com, 1 -ninetailed.ninja, 1 ninetaillabs.com, 1 ninetaillabs.xyz, 1 ninfora.com, 1 @@ -35265,6 +35583,7 @@ nitix.games, 1 nitrix.me, 1 nitrohorse.com, 0 nitrokey.com, 1 +nitropanel.com, 1 nitropur.com, 1 nitropur.de, 1 nitrous-networks.com, 1 @@ -35419,7 +35738,6 @@ noordsee.de, 1 noordwesthoekrit.nl, 1 noorsolidarity.com, 1 noortronic.com, 1 -nootroic.com, 1 nootronerd.com, 1 nootropic.com, 1 nootropicpedia.com, 1 @@ -35456,6 +35774,7 @@ norman-preusser-gmbh.de, 1 normanbauer.com, 1 normandgascon.com, 1 normankranich.de, 1 +normantobar.com, 1 norml.fr, 1 noroshi-burger.com, 1 norrkemi.se, 1 @@ -35489,6 +35808,7 @@ northpointoutdoors.com, 1 northpole.dance, 1 northpost.is, 1 northridgeelectrical.com, 1 +northtexasvasectomy.com, 1 northumbriagames.co.uk, 1 northwest-events.co.uk, 1 northwoodsfish.com, 1 @@ -35632,6 +35952,7 @@ nrd.gov, 1 nrd.li, 1 nrdstd.io, 1 nrev.ch, 1 +nriol.net, 1 nrkn.fr, 1 nrsmart.com, 1 nrsweb.org, 1 @@ -35668,6 +35989,7 @@ nst-maroc.com, 1 nstatic.xyz, 1 nstd.net, 1 nstinvoiceqa.com, 1 +nstnet.org, 1 nstremsdoerfer.ovh, 1 nstrust.co.uk, 1 nsure.us, 1 @@ -35744,6 +36066,7 @@ nureg.net, 1 nureg.xyz, 1 nuriacamaras.com, 1 nursejj.com, 1 +nursemom.ca, 1 nurseone.ca, 1 nurses.dating, 1 nursingschool.network, 1 @@ -35774,7 +36097,6 @@ nuvospineandsports.com, 1 nuxer.fr, 1 nv.gw, 1 nvcogct.gov, 1 -nve-qatar.com, 1 nvl-game.tokyo, 1 nvq.nl, 1 nvr.bz, 1 @@ -35797,6 +36119,7 @@ nwwc.dk, 1 nwwnetwork.net, 1 nx42.pw, 1 nxcd.com.br, 1 +nxgn.io, 1 nxinfo.ch, 1 nxit.ca, 1 nxth.io, 1 @@ -35840,6 +36163,7 @@ nyxi.eu, 1 nyyu.tk, 1 nyzed.com, 1 nzb.cat, 0 +nzbs.com, 1 nzstudy.ac.nz, 1 nzws.me, 1 o-results.ch, 1 @@ -35889,6 +36213,7 @@ oberoi.de, 1 obfuscate.xyz, 1 obg-global.com, 1 obgalslancaster.com, 1 +obgynmiamifl.com, 1 obioncountytn.gov, 1 obitech.de, 1 object.earth, 1 @@ -35985,7 +36310,7 @@ oddsandevens.ca, 1 oddsandevensbookkeeping.ca, 1 oddtime.net, 1 ode.red, 1 -odensc.me, 1 +odensc.me, 0 odense3dprint.dk, 1 odeonentertainment.co.uk, 1 odhosc.ca, 1 @@ -36101,6 +36426,7 @@ oita-homes.com, 1 ojaioliveoil.com, 1 ojdip.net, 1 ojp.gov, 1 +ok3on.cz, 1 okad-center.de, 1 okad.de, 1 okad.eu, 1 @@ -36119,6 +36445,7 @@ okhrana.agency, 1 okib.ca, 1 okin-jp.net, 1 okinawa-mag.net, 1 +oklahomafibroids.com, 1 oklahomamoversassociation.org, 1 oklahomanotepro.com, 1 okmx.cloud, 1 @@ -36255,7 +36582,9 @@ omniatv.com, 1 omnibot.tv, 1 omnienviro.com, 0 omnienviro.com.au, 0 +omnifurgone.it, 1 omnigon.network, 1 +omnimoto.it, 1 omniscimus.net, 0 omnisiens.se, 1 omnitrack.org, 1 @@ -36534,6 +36863,7 @@ openresearch.amsterdam, 1 openresty.com, 1 openreview.net, 1 openroademail.com, 1 +openrtm.org, 1 openruhr.de, 1 openscreen.lu, 1 openshippers.com, 1 @@ -36808,6 +37138,7 @@ ottoproject.io, 0 ottoversand.at, 1 otus-magnum.com, 1 otvaracie-hodiny.sk, 1 +otvertka.kz, 1 otya.me, 1 ouaibe.qc.ca, 1 ouattara.ch, 1 @@ -36836,9 +37167,7 @@ ouruglyfood.com, 1 ourwedding.xyz, 1 ourworldindata.org, 1 out-of-scope.de, 1 -outdoorchoose.com, 1 outdoorfurniture.ie, 1 -outdoorhole.com, 1 outdoorimagingportal.com, 1 outdoorlightingagoura.com, 1 outdoorlightingagourahills.com, 1 @@ -36872,6 +37201,7 @@ outsideconnections.com, 1 outsiders.paris, 1 outstack.vote, 1 ouxiang.me, 1 +ovabastecedoraindustrial.com, 1 ovelhaostra.com, 0 overalglas.nl, 1 overamsteluitgevers.nl, 1 @@ -36953,6 +37283,7 @@ p.ki, 1 p0l.de, 1 p1984.nl, 0 p1cn.com, 1 +p1group.com, 1 p1ratrulezzz.me, 1 p22.co, 1 p4chivtac.com, 1 @@ -36999,6 +37330,7 @@ paceda.nl, 1 pacelink.de, 1 pacifco.com, 1 pacificcashforcars.com.au, 1 +pacificgynsurgicalgroup.com, 1 pacificpalisadeselectric.com, 1 pacificpalisadeselectrical.com, 1 pacificpalisadeselectrician.com, 1 @@ -37022,6 +37354,7 @@ pactf.com, 1 padam-group.com, 1 padberx-marketing-consultants.de, 1 paddy.rocks, 1 +padelbox.de, 1 pader-deko.de, 1 padianda.com, 1 padkit.org, 1 @@ -37285,6 +37618,7 @@ parodesigns.com, 1 parolu.io, 1 parquettista.milano.it, 1 parquettista.roma.it, 1 +parrocchiamontevecchia.it, 1 parry.org, 1 parsdev.ir, 1 parsemail.org, 1 @@ -37640,6 +37974,7 @@ pebbles.net.in, 1 pechonova.com, 1 pecker-johnson.com, 1 peda.net, 1 +pedalsbarcelona.com, 1 peddock.com, 1 peddy.dyndns.org, 1 pedicurean.nl, 1 @@ -37773,6 +38108,7 @@ perd.re, 1 perecraft.com, 1 pereuda.com, 1 perevedi.org, 1 +perez-marrero.com, 1 perezdecastro.org, 1 perfect-carstyle.de, 1 perfect.in.th, 1 @@ -37876,6 +38212,8 @@ peterlew.is, 1 petermaar.com, 1 peters.consulting, 1 petersontoscano.com, 1 +petervaldesii.com, 0 +petervaldesii.io, 0 petervanleeuwentweewielers.nl, 1 petfa.ga, 1 petit-archer.com, 1 @@ -38013,6 +38351,7 @@ philipp1994.de, 1 philippa.cool, 1 philippbirkholz.com, 1 philippbirkholz.de, 1 +philippe-mignotte.fr, 1 philippebonnard.fr, 1 philipperoose.be, 1 philippheenen.de, 1 @@ -38233,6 +38572,7 @@ pincodeit.com, 1 pincong.rocks, 1 pindanutjes.be, 0 pinebaylibrary.org, 1 +pinellaslaser.com, 1 pinemountainnursery.com.au, 1 pinemountbaptistchurch.org, 1 pinetopazrealestate.com, 1 @@ -38888,6 +39228,7 @@ polytechecosystem.vc, 1 polytekniskforening.dk, 1 pomar.club, 0 pomelo-paradigm.com, 1 +pomfe.co, 1 pomfeed.fr, 1 pommedepain.fr, 1 pommetelecom.fr, 1 @@ -38927,6 +39268,7 @@ pooltechthailand.com, 1 pooltools.net, 1 poolvilla-margarita.net, 0 poon.io, 1 +poopchart.net, 1 poopjournal.rocks, 1 poopr.ru, 1 poorclarepa.org, 1 @@ -38983,6 +39325,7 @@ pornoserver.eu, 1 pornovk.xxx, 1 pornport.org, 1 pornshop.biz, 1 +pornskyhub.com, 1 pornsocket.com, 1 pornspider.to, 1 pornstop.net, 1 @@ -39009,6 +39352,7 @@ portalmundo.xyz, 1 portamiinpista.it, 1 portatiles-baratos.net, 1 porte.roma.it, 1 +portefeuillesignalen.nl, 0 portercup.com, 1 porterranchelectrical.com, 1 portesmagistral.com, 1 @@ -39086,6 +39430,7 @@ pothe.de, 1 potionlabs.de, 1 potlytics.com, 1 potolok.am, 1 +potomacurology.com, 1 potomania.cz, 1 potrillionaires.com, 1 potterscraftcider.com, 1 @@ -39208,6 +39553,7 @@ precept.uk.com, 1 preciouslife.fr, 1 preciscx.com, 1 preciseassemblies.com, 1 +precision-tops.com, 1 precision.st, 1 precisiondigital-llc.com, 1 precisionmachineservice.com, 1 @@ -39334,7 +39680,6 @@ primordialsnooze.com, 1 primorus.lt, 1 princefamilylaw.co.uk, 1 princeofwhales.com, 1 -princesparktouch.com, 1 princessbackpack.de, 1 princessefoulard.com, 1 principalsexam.com, 1 @@ -39394,6 +39739,7 @@ privacy-week-vienna.at, 1 privacy-week.at, 1 privacy.com, 1 privacybadger.org, 1 +privacybydesign.foundation, 1 privacychick.com, 1 privacychick.io, 1 privacyforjournalists.org.au, 1 @@ -39423,6 +39769,7 @@ privatestatic.com, 0 privatevoid.net, 1 privatewolke.com, 1 privatfrei.de, 1 +privatislauga.lt, 1 privatpatient-krankenhaus.de, 1 privatstunden.express, 1 privc.io, 1 @@ -39462,6 +39809,7 @@ probiv.biz, 1 probiv.cc, 1 procar-rheinland.de, 1 procarservices.com, 1 +procarswoking.com, 1 procens.us, 1 procensus.com, 1 procert.ch, 1 @@ -39508,6 +39856,7 @@ proesb.net, 1 prof.ch, 1 profection.biz, 1 professional.cleaning, 1 +professionalbeautyshop.it, 1 professors.ee, 1 profidea.cz, 1 profile.tf, 1 @@ -39685,6 +40034,7 @@ providencecmc.com, 1 providerlijst.com, 1 providerlijst.ml, 1 providerlijst.nl, 1 +provinciaotlavoro.it, 1 provision-isr.nl, 1 provitec.com, 1 provitec.de, 1 @@ -39731,6 +40081,7 @@ przemas.pl, 1 przerabianiezdjec.pl, 1 ps-provider.co.jp, 1 ps-sale.ru, 1 +ps2911.com, 1 ps4all.nl, 1 psabrowse.com, 1 psasines.pt, 1 @@ -39901,7 +40252,7 @@ puralps.ch, 1 puravida-estate.com, 1 pure-gmbh.com, 1 purecabo.com, 1 -purefkh.xyz, 1 +purefkh.xyz, 0 purefreefrom.co.uk, 1 pureitsolutionsllp.com, 1 purejewels.com, 1 @@ -40052,6 +40403,7 @@ qcstyleacademy.com, 1 qctravelschool.com, 1 qdabogados.com, 1 qdon.space, 0 +qdqlh.cn, 1 qe-lab.at, 1 qedcon.org, 0 qelectrotech.org, 1 @@ -40090,12 +40442,14 @@ qkka.org, 1 qklshequ.com, 1 qkmortgage.com, 1 ql.tc, 1 +qlarititech.io, 1 qlcvea.com, 1 qldconservation.org.au, 1 qldformulaford.org, 1 qlix.pl, 1 qlrace.com, 0 qm-marzahnnordwest.de, 1 +qmee.com, 1 qnatek.org, 1 qnq.moe, 1 qoacher.com, 1 @@ -40316,6 +40670,7 @@ rabotaescort.com, 1 rabynska.eu, 1 racasdecachorro.org, 1 raccoltarifiuti.com, 1 +raccoon-music.com, 1 raccoon.fun, 1 racermaster.xyz, 1 racesport.nl, 0 @@ -40324,7 +40679,6 @@ raceviewequestrian.com, 1 rachelchen.me, 1 racheldiensthuette.de, 1 rachelmoorelaw.com, 1 -rachelreagan.com, 1 rachelsbouncycastles.co.uk, 1 rachida-dati.eu, 1 rachurch.net, 1 @@ -40390,6 +40744,7 @@ raelto.com, 1 raeu.me, 1 raeven.nl, 1 raevinnd.com, 1 +raewardfresh.co.nz, 1 rafaelmagalhaesweb.com, 1 rafas.com.tr, 1 rafey.xyz, 1 @@ -40665,6 +41020,7 @@ rcgoncalves.pt, 1 rchavez.site, 1 rchrdsn.uk, 1 rcifsgapinsurance.co.uk, 1 +rclaywilliamsdo.com, 1 rclsm.net, 1 rcmlinx.com, 1 rcmstream.com, 1 @@ -41175,12 +41531,14 @@ rentta.fashion, 1 renuo.ch, 1 renxinge.cn, 0 renyiyou.com, 1 -reo.gov, 1 +reo.gov, 0 reorz.com, 0 reox.at, 0 repaik.com, 0 repair.by, 1 repaper.org, 1 +reparacionesdecalefones.com, 1 +reparizy.com, 1 repaxan.com, 1 repkord.com, 1 replaceits.me, 1 @@ -41480,6 +41838,7 @@ ricoydesign.com, 1 ricozienke.de, 1 riddimsworld.com, 1 riddler.com.ar, 1 +rideapart.com, 1 rideintaxi.com, 1 rident-estetic.ro, 1 rides-japan.jp, 1 @@ -41749,6 +42108,7 @@ roddis.net, 1 rodehutskors.net, 1 rodeobull.biz, 1 rodeohire.com, 1 +rodeoimport.com, 1 rodeosales.co.uk, 1 rodest.net, 1 rodevlaggen.nl, 1 @@ -41812,6 +42172,7 @@ rolliwelt.de, 1 rolodato.com, 1 roma-servizi.it, 1 romab.com, 1 +romail.ml, 1 romain-arias.fr, 1 romaindepeigne.fr, 1 romainlapoux.com, 1 @@ -42009,6 +42370,7 @@ royceandsteph.com, 1 roycewilliams.net, 1 roychan.org, 1 roygerritse.nl, 1 +royjr.com, 1 royzez.com, 1 rozalisbengal.ro, 1 rozalynne-dawn.ga, 1 @@ -42088,10 +42450,10 @@ rteplayer.com, 1 rtesport.eu, 1 rteworld.com, 1 rths.tk, 0 +rthsoftware.cn, 1 rthsoftware.net, 0 rtmoran.org, 1 rtrappman.com, 1 -rtrinflatables.co.uk, 1 rtsak.com, 1 rtsr.ch, 1 rttss.com, 1 @@ -42267,7 +42629,6 @@ ryankearney.com, 0 ryanmcdonough.co.uk, 0 ryanparman.com, 1 ryanroberts.co.uk, 1 -ryansmithphotography.com, 1 ryanstreur.com, 1 ryazan-region.ru, 1 rybox.info, 1 @@ -42386,7 +42747,6 @@ safebaseflorida.com, 1 safebasements.com, 1 safebasementsnorthdakota.com, 1 safebasementsofindiana.com, 1 -safebuyerscheme.co.uk, 1 safecar.gov, 1 safegold.ca, 1 safegroup.pl, 1 @@ -42427,6 +42787,7 @@ sagargandecha.com.au, 1 sagedocumentmanager.com, 1 sagerus.com, 1 saggiocc.com, 1 +sagitta.hr, 1 sagracefarms.com, 1 sagsmarseille.com, 1 sahajbooks.com, 1 @@ -42590,7 +42951,7 @@ samgrayson.me, 1 samhuri.net, 1 samifar.in, 1 samizdat.cz, 1 -samkelleher.com, 0 +samkelleher.com, 1 saml-gateway.org, 1 samlamac.com, 1 samlaw.co.nz, 1 @@ -43018,6 +43379,7 @@ schoknecht.one, 1 schoko-ferien.de, 1 schokoferien.de, 1 schokokeks.org, 1 +schokoladensouffle.eu, 1 scholar.group, 1 scholar.site, 1 scholarly.com.ph, 1 @@ -43039,6 +43401,7 @@ schoolarchive.net, 1 schoolbus.at, 1 schoolcafe.com, 1 schooli.io, 1 +schoolofphilosophy.org.au, 1 schoolotzyv.ru, 1 schoolsonice.nl, 1 schoop.me, 1 @@ -43129,11 +43492,11 @@ scintilla.nl, 1 scintillating.stream, 1 sciototownship-oh.gov, 1 scistarter.com, 1 +scitheory.com, 1 scitopia.me, 1 scitopia.net, 1 scity88.com, 1 sckc.stream, 0 -sclns.co, 1 scm-2017.org, 1 scohetal.de, 1 scoop6.co.uk, 1 @@ -43228,6 +43591,7 @@ scwilliams.co.uk, 1 scwilliams.uk, 1 sd.af, 1 sdcardrecovery.de, 1 +sdfleetmanagement.com, 1 sdg-tracker.org, 1 sdgllc.com, 1 sdho.org, 1 @@ -43247,6 +43611,7 @@ se-theories.org, 1 se.com, 1 se.search.yahoo.com, 0 sea-godzilla.com, 1 +seabooty.com, 1 seac.me, 1 seacam-store.com, 1 seachef.it, 1 @@ -43386,7 +43751,6 @@ secure.co.hu, 1 secure.facebook.com, 0 securecloudplatform.nl, 1 securecomms.cz, 1 -securedns.zone, 1 securedrop.org, 1 secureesolutions.com, 1 securefiletransfer.nl, 1 @@ -43489,6 +43853,7 @@ sefru.de, 1 seg-leipzig.org, 1 seg-sys.com, 1 segaretro.org, 1 +segenstore.com, 1 segitz.de, 1 segmetic.com, 1 segnalabullo.com, 1 @@ -43618,6 +43983,7 @@ senmendai-reform.com, 1 senobio.com, 1 senorporno.com, 1 sens2lavie.com, 1 +sensavi.ua, 1 sense.hamburg, 1 sensebridge.com, 1 sensebridge.net, 1 @@ -43638,6 +44004,7 @@ sentidosdelatierra.org, 1 sentiments.io, 1 sentinel.gov, 1 sentinelproject.io, 1 +sentinelsmotorcycleclub.com, 1 sentirmebien.org, 1 sentry.io, 1 sentry.nu, 1 @@ -43662,7 +44029,6 @@ seoinc.com, 1 seojames.com, 1 seolib.org, 1 seolotsen.de, 1 -seomarketing.bg, 1 seomaton.com, 1 seomaton.org, 1 seomen.biz, 1 @@ -43701,6 +44067,7 @@ serbanpaun.ro, 1 serbianclimbing.com, 1 sereema.com, 1 serenaden.at, 1 +serenavillage.net, 1 serendeputy.com, 1 serf.io, 1 serge-design.ch, 1 @@ -43769,6 +44136,7 @@ servicebeaute.fr, 1 serviceboss.de, 1 servicemembers.gov, 1 servicerequesthub.io, 1 +serviciales.com, 1 servida.ch, 1 servietten-grosshandel.at, 1 servietten-grosshandel.be, 1 @@ -43782,6 +44150,7 @@ servingbaby.com, 1 servious.org, 1 servitek.de, 1 serviziourgente.it, 1 +servmaslt.com, 1 servo.org, 1 servx.org, 1 serw.org, 1 @@ -43791,13 +44160,14 @@ serwusik.pl, 1 seryovpn.com, 1 seryox.com, 1 sesam-biotech.com, 1 +sesamecare.com, 1 sesrdcem.cz, 1 sessile-oak.co.uk, 1 session.bbc.co.uk, 1 session.bbc.com, 1 sessionslogning.dk, 1 sesslerimmo.ch, 1 -sestolab.pp.ua, 1 +sestolab.pp.ua, 0 sestra.in, 1 setasgourmet.es, 1 setenforce.one, 1 @@ -43837,6 +44207,7 @@ sevsopr.ru, 1 sevwebdesign.com, 1 sewa.nu, 1 sewafineseam.com, 1 +sewamobilperdana.com, 1 sewatec.com, 1 sewinginsight.com, 1 sewoo.co.uk, 1 @@ -43865,6 +44236,7 @@ seydaozcan.com, 1 seyfarth.de, 1 seyr.it, 1 seyr.me, 1 +sf3223.com, 1 sfa.sk, 1 sfaparish.org, 1 sfaturiit.ro, 1 @@ -44007,7 +44379,6 @@ sharisharpe.com, 1 shark.cat, 1 shark5060.net, 1 sharkcut.se, 1 -sharks.football, 1 sharpe-practice.co.uk, 1 sharperedge.pw, 1 sharperedgecomputers.com, 1 @@ -44341,6 +44712,7 @@ sietejefes.com.ar, 1 sieulog.com, 1 sift-tool.org, 1 sig6.org, 1 +siga.com, 1 sigabrt.org, 1 sigcafe.net, 1 siggerudklatreklubb.no, 1 @@ -44492,6 +44864,7 @@ silvergoldbull.uz, 1 silvergoldbull.ws, 1 silverkingalaska.com, 1 silverlinkz.net, 1 +silvernight.social, 1 silverseen.com, 1 silvershadow.cc, 1 silverstartup.sk, 1 @@ -44504,7 +44877,7 @@ silvistefi.com, 1 silvobeat.blog, 1 silvobeat.com, 1 sim-karten.net, 1 -sim-minaoshi.jp, 1 +sim-sim.appspot.com, 1 sim-usa.mobi, 1 sim4seed.org, 1 simam.de, 1 @@ -44797,7 +45170,6 @@ skinmarket.co, 1 skinmodo.com, 1 skinpwrd.com, 1 skins.net, 1 -skinwhiteningoptions.com, 1 skipfault.com, 1 skipperinnovations.com, 0 skippy.dog, 1 @@ -44876,6 +45248,7 @@ skynethk.com, 1 skynetnetwork.eu.org, 1 skynetz.tk, 1 skype.com, 1 +skyportcloud.com, 1 skyquid.co.uk, 1 skys-entertainment.com, 1 skyscanner.com, 1 @@ -45092,6 +45465,7 @@ smdcn.net, 1 smdtk.com, 1 sme-gmbh.net, 1 smeetsengraas.com, 1 +smelly.cloud, 1 smesitel-online.ru, 1 smeso.it, 1 smexpt.com, 1 @@ -45118,6 +45492,7 @@ smithandcanova.co.uk, 0 smithchow.com, 1 smithchung.eu, 1 smithcountytxtaxrates.gov, 1 +smithf.red, 1 smits.frl, 1 smkw.com, 0 sml.lc, 1 @@ -45193,6 +45568,7 @@ sncdn.com, 1 sndbouncycastles.co.uk, 1 sneak.berlin, 1 sneaker.date, 1 +sneakers88.it, 1 sneakpod.de, 1 sneakycode.net, 1 sneakynote.com, 1 @@ -45266,6 +45642,7 @@ snuff.porn, 1 snughealth.org.uk, 1 snus123.com, 1 snuverma.com, 1 +snwsjz.com, 1 sny.no, 1 so-comm.fr, 1 so.is-a-cpa.com, 1 @@ -45376,6 +45753,7 @@ sogutma.com.tr, 1 sohamroy.me, 1 sohncloud.my-router.de, 1 soia.ca, 1 +sointelcom.com.co, 1 soinvett.com, 1 sojingle.net, 1 sokaissues.info, 1 @@ -45435,13 +45813,11 @@ solomonsklash.io, 1 solonotizie24.it, 1 solos.im, 1 solsocog.de, 0 -soltekla.com, 1 soluphant.de, 1 solupredperu.com, 1 solutionhoisthire.com.au, 1 solutions-teknik.com, 1 solvation.de, 1 -solve.co.uk, 1 solved.tips, 1 solvemethod.com, 1 solvewebmedia.com, 1 @@ -45525,6 +45901,7 @@ sorenstudios.com, 1 sorincocorada.ro, 1 sorn.service.gov.uk, 1 sorrowfulunfounded.com, 1 +sort.land, 1 sortaweird.net, 0 sortesim.com.br, 1 soruly.com, 1 @@ -45595,6 +45972,7 @@ sourcecode.love, 1 sourcecode.tw, 1 sourcely.net, 1 sourceway.de, 1 +sourdough.vc, 1 souris.ch, 1 sous-surveillance.net, 0 southafrican.dating, 1 @@ -45627,10 +46005,12 @@ soved.eu, 1 sovendus.com, 1 sovendus.de, 1 sovereignpcs.com, 1 +soverin.net, 1 sowlutions.com, 1 sowncloud.de, 1 soybase.org, 1 soydemac.com, 1 +soyfanonline.com, 1 soyvigilante.com, 1 sozai-good.com, 1 sozialstation-ritterhude.de, 1 @@ -45640,6 +46020,7 @@ sp-sites.com.au, 1 sp.com.pl, 1 sp.rw, 1 sp8ce.co, 1 +space-inc.co.jp, 1 space-it.de, 1 space-y.cf, 1 spacebear.ee, 1 @@ -45678,7 +46059,6 @@ sparendirekt.at, 1 sparkbase.cn, 1 sparkforautism.org, 1 sparklatvia.lv, 1 -sparklebastard.com, 1 sparkresearch.net, 1 sparkwood.org, 1 sparkz.no, 1 @@ -45746,7 +46126,6 @@ spendwise.com.au, 1 spenglerei-shop.de, 1 spenny.tf, 1 sperandii.it, 1 -sperec.fr, 1 spero.solutions, 1 sperrstun.de, 1 spesys-services.fr, 1 @@ -46082,6 +46461,7 @@ stageirites.com, 1 stageirites.fr, 1 stageirites.org, 1 stagelectrical.com.au, 1 +stagespediatrics.com, 1 stagstickets.co.uk, 1 stahlfeuer-ofenwerkstatt.de, 1 stahlfors.com, 1 @@ -46090,7 +46470,6 @@ stainternational.com, 1 stair.ch, 1 stairfallgames.com, 1 stairlin.com, 1 -stakeshare.org, 1 stakestrategy.com, 1 staklim-malang.info, 1 stako.jp, 1 @@ -46370,6 +46749,7 @@ steven-klix.de, 1 stevenberg.net, 1 stevenbolgartersnakes.com, 1 stevengoodpaster.com, 1 +stevengrech.com, 1 stevenhumphrey.uk, 1 stevenroddis.com, 1 stevens.se, 0 @@ -46805,6 +47185,7 @@ subrosr.com, 1 subsistence.wiki, 1 substitutealert.com, 1 subtitry.ru, 1 +subtlelonging.com, 1 suburban-landscape.net, 1 suburbaninfinitioftroyparts.com, 1 subversive-tech.com, 1 @@ -46826,7 +47207,6 @@ sudo-i.net, 1 sudo.im, 1 sudo.li, 1 sudo.ws, 1 -sudokian.io, 1 sudoschool.com, 1 sudosu.fr, 1 suelyonjones.com, 1 @@ -46840,6 +47220,7 @@ sugarandcloth.com, 1 sugarbrother.com, 1 sugarhillsfarm.com, 1 sugarlandkarate.net, 1 +sugarlandurology.com, 1 sugarmillmanagement.com, 1 sugarshin.net, 1 sugartownfarm.com, 1 @@ -46864,6 +47245,7 @@ sulek.eu, 1 sullenholland.nl, 1 suluvir.com, 1 sumguy.com, 1 +sumit.me, 1 summa.eu, 0 summer.ga, 1 summerbo.at, 1 @@ -46928,7 +47310,6 @@ sunstar.bg, 1 sunwolf.studio, 1 sunxchina.com, 1 suool.net, 1 -suourl.com, 1 supa.sexy, 1 supastuds.com, 1 supcoronado.com, 1 @@ -46982,7 +47363,6 @@ superstropdas.nl, 1 supersu.kr, 1 superswingtrainer.com, 1 supertasker.org, 1 -supertechcrew.com, 1 supertutorial.com.br, 1 supervets.com.au, 1 supervisionassist.com, 1 @@ -46993,6 +47373,7 @@ supplementler.com, 1 supplies24.at, 1 supplies24.es, 1 supplynation.org.au, 1 +support-ticino.ch, 1 support.mayfirst.org, 0 supportdesk.nu, 1 supportericking.org, 1 @@ -47167,6 +47548,7 @@ swey.net, 1 swfloshatraining.com, 1 swfmax.com, 1 swi.sytes.net, 1 +swid.co.uk, 1 swift-devedge.de, 1 swiftcashforcars.com.au, 1 swiftcrypto.com, 1 @@ -47195,6 +47577,7 @@ swisscypher.com, 1 swissdojo.ch, 1 swisselement365.com, 1 swissentreprises.ch, 1 +swisservers.com, 1 swissfreshaircan.ch, 1 swissfreshaircan.com, 1 swissid.ch, 1 @@ -47284,6 +47667,7 @@ synchtu.be, 0 syncmindglobal.com, 1 syncmylife.net, 0 syncrise.co.jp, 1 +synd.io, 1 syndic-discount.fr, 0 syneart.com, 1 synecek11.cz, 1 @@ -47435,6 +47819,7 @@ taglioepiega.eu, 1 taglioepiega.it, 1 tagnull.de, 1 tagpay.com, 1 +tagtoys.com, 1 tagungsraum-usedom.de, 1 tagungsraum-zinnowitz.de, 1 tahavu.com, 1 @@ -47466,13 +47851,14 @@ takebackyourstate.com, 1 takebackyourstate.net, 1 takebackyourstate.org, 1 takebonus.com, 0 -takedownthissite.com, 1 takeitoffline.co.uk, 1 takemoto-ped.com, 1 taken.pl, 1 takenbydrone.com.au, 1 takeomi.jp, 1 takeshifujimoto.com, 0 +taki.sh, 1 +taki.to, 1 takinet.kr, 1 takipone.com, 1 takk.pl, 1 @@ -47598,6 +47984,7 @@ tarasecurity.com, 1 tarasevich.by, 1 tardis.io, 1 tarek.link, 1 +tarfin.com, 1 targetbuilding.com, 1 targetexecutivesearch.com, 1 targimieszkaniowe.net, 1 @@ -47648,6 +48035,7 @@ taxationweb.co.uk, 1 taxhawk.com, 1 taxi-chamonix.fr, 1 taxi-collectif.ch, 1 +taxi-edessas.gr, 1 taxi-jihlava.cz, 1 taxi-legroux.com, 1 taxi-puck.pl, 1 @@ -47892,6 +48280,7 @@ techwithcromulent.com, 1 techwords.io, 1 techy360.com, 1 techzero.cn, 1 +techzjc.com, 1 tecit.ch, 1 teckids.org, 1 tecknobox.fr, 1 @@ -47988,6 +48377,7 @@ teleskell.org, 1 telesto.online, 1 teletechnology.in, 0 teletexto.com, 1 +televizeseznam.cz, 1 telework.gov, 1 telibee.com, 1 telling.xyz, 1 @@ -48136,6 +48526,7 @@ testpornsite.com, 1 testsuite.org, 1 testsvigilantesdeseguridad.es, 1 testuje.net, 1 +testvocacional.online, 1 tetedelacourse.ch, 1 teto.nu, 1 tetraetc.com, 1 @@ -48157,6 +48548,7 @@ texasllcpros.com, 1 texaspaintingandgutters.com, 1 texasparkinglotstriping.com, 1 texastwostepdivorce.com, 1 +texasurodoc.com, 1 texasvolunteerattorneys.org, 1 texby.com, 1 texhnolyze.net, 1 @@ -48301,6 +48693,7 @@ thebigbitch.nl, 1 thebigdatacompany.com, 1 thebiggive.org.uk, 1 thebiglaskowski.com, 1 +thebigslow.com, 1 thebigwave.de, 1 thebikeinsurer.co.uk, 1 thebimhub.com, 1 @@ -48415,6 +48808,7 @@ theflowerbasketonline.com, 1 theflowershopdeddington.com, 1 theflyingbear.net, 0 thefnafarchive.org, 1 +thefootinstitutela.com, 1 theforkedspoon.com, 1 thefox.com.fr, 1 thefreemail.com, 1 @@ -48428,6 +48822,7 @@ thefunfirm.co.uk, 1 thefurnitureco.uk, 1 thefurniturefamily.com, 1 thefusion.net.in, 1 +thegarage961.co.nz, 1 thegarrowcompany.com, 1 thegatheringocala.com, 1 thegeekdiary.com, 1 @@ -48476,6 +48871,7 @@ theinitium.com, 1 theinnerprism.com, 1 theintercept.com, 1 theinternationalgeekconspiracy.eu, 1 +theissen.io, 1 theissue.com.au, 1 theitsage.com, 0 thejacksoninstitute.com.au, 1 @@ -48753,6 +49149,7 @@ thierrybasset.ch, 1 thierryhayoz.ch, 1 thietbithoathiem.net, 1 thijmenmathijs.nl, 1 +thijs.amsterdam, 1 thijsbekke.nl, 1 thijsenarjan.nl, 1 thijsslop.nl, 1 @@ -49015,6 +49412,7 @@ timeauction.hk, 1 timebox.tk, 1 timebutler.de, 1 timecd.cn, 1 +timeclub24.ru, 1 timeglass.de, 1 timeless-photostudio.com, 1 timelessskincare.co.uk, 1 @@ -49146,6 +49544,7 @@ tjp.ch, 1 tjs.me, 1 tju.me, 1 tjxxzy.com, 1 +tk-its.net, 1 tkacz.pro, 1 tkanemoto.com, 1 tkat.ch, 1 @@ -49185,7 +49584,6 @@ tmberg.gq, 1 tmberg.ml, 1 tmberg.tk, 1 tmc.com.mt, 1 -tmcpromotions.co.uk, 1 tmcreationweb.com, 1 tmd.cool, 1 tmdb.biz, 1 @@ -49244,7 +49642,6 @@ tobiashorvath.com, 1 tobiashorvath.de, 1 tobiaskorf.de, 1 tobiaspahlings.de, 1 -tobiassachs.de, 1 tobiassattler.com, 1 tobiaswiese.com, 1 tobiaswiese.eu, 1 @@ -49407,6 +49804,7 @@ tomwilson.io, 1 tomyork.net, 1 tonabor.ru, 1 tonage.de, 1 +tonarinoliusan.com, 1 tonburi.jp, 0 toncusters.nl, 1 tondles.com, 1 @@ -49433,6 +49831,7 @@ tonguetechnology.com, 1 toni-dis.ch, 0 tonifarres.net, 1 tonigallagherinteriors.com, 1 +tonight.de, 1 tonkayagran.com, 1 tonkayagran.ru, 1 tonkinson.com, 1 @@ -49647,6 +50046,7 @@ toujours-actif.com, 1 toulineprestige.com, 1 tounyou-raku.com, 1 touray-enterprise.ch, 1 +tourdewestwoud.nl, 1 tourgest.net, 1 tourismwithme.com, 1 tourispo.com, 1 @@ -49756,6 +50156,7 @@ trade247.exchange, 1 tradedesk.co.za, 1 tradeinvent.co.uk, 1 tradeonfx.com, 1 +traderbot.com.br, 1 traderjoe-cloud.de, 1 tradernet.com, 1 tradernet.ru, 1 @@ -50024,6 +50425,7 @@ tributh.tk, 1 tricefy4.com, 1 triciaree.com, 1 trickedguys.com, 0 +trickle.works, 1 trico-pigmentazione.it, 1 triddi.com, 1 trident-online.de, 1 @@ -50041,7 +50443,7 @@ triluxds.com, 1 trim-a-slab.com, 1 trim21.cn, 1 trimage.org, 1 -trinary.ca, 1 +trinary.ca, 0 trindonball.com, 1 trineco.com, 1 trineco.fi, 1 @@ -50087,6 +50489,7 @@ troomcafe.com, 1 troopaid.info, 1 trophee-discount.com, 1 tropicalserver.com, 0 +troplo.com, 1 trotec.com, 1 trotina.cz, 1 trouble-free-employees.com, 1 @@ -50118,6 +50521,8 @@ trueduality.net, 1 truehempculture.com.au, 1 trueinstincts.ca, 1 truekey.com, 1 +trueminecraft.com, 1 +truendo.com, 1 truentumvet.it, 1 trueproxy.net, 1 truerizm.ru, 1 @@ -50184,6 +50589,7 @@ ts-publishers.com, 1 ts3-dns.com, 1 ts3-dns.net, 1 ts3-legenda.tech, 1 +ts5server.eu, 1 tsa-sucks.com, 1 tsab.moe, 1 tsai.com.de, 1 @@ -50425,7 +50831,6 @@ twistedwave.com, 1 twistertoneel.nl, 1 twisto.cz, 1 twisto.pl, 1 -twistopay.com, 1 twit-guide.com, 1 twitchplaysleaderboard.info, 1 twittelzie.nl, 1 @@ -50625,6 +51030,7 @@ uitgeverij-deviant.nl, 1 uitvaartvrouwenfriesland.nl, 1 uitvaartzorg-heerenveen.nl, 1 uitvaartzorgzuidwestfriesland.nl, 1 +ujiyasu.com, 1 ujob.com.cn, 1 ujvary.eu, 1 uk.dating, 1 @@ -50765,6 +51171,7 @@ unfuddle.cn, 1 unga.dk, 1 ungaeuropeer.se, 1 ungegamere.dk, 1 +ungelektro.no, 1 unghie.com, 1 unhurriedluxury.com, 1 uni2share.com, 1 @@ -50871,6 +51278,7 @@ unlogis.ch, 1 unmarkdocs.co, 1 unmonito.red, 1 unn-edu.info, 1 +unnamed.download, 1 uno-pizza.ru, 1 uno.fi, 1 uno.uk, 1 @@ -50927,6 +51335,7 @@ upcambio.com, 1 upcloud.cz, 1 upd.jp, 1 upengo.com, 1 +upforshare.com, 1 upgamerengine.com, 1 upgamerengine.com.br, 1 upgamerengine.net, 1 @@ -50934,6 +51343,7 @@ upgauged.com, 1 upholsterydesign.com.au, 1 upitnik.rs, 1 uplaqui.com.br, 1 +uplead.com, 1 uplinklabs.net, 1 upload.cat, 1 upload.facebook.com, 0 @@ -51085,6 +51495,7 @@ uskaria.com, 1 usleep.net, 1 usninosnikrcni.eu, 1 usnti.com, 1 +uspaacc.com, 1 usphs.gov, 1 usportsgo.com, 1 uspsoig.gov, 1 @@ -51109,6 +51520,7 @@ utahfanclub.org, 1 utahhydrographics.com, 1 utahlocal.net, 1 utahtravelcenter.com, 1 +utavatu.mk, 1 utazas-nyaralas.info, 1 utazine.com, 1 utcast-mate.com, 1 @@ -51233,8 +51645,6 @@ valentinesongs.com, 1 valentinritz.com, 1 valeo-it.de, 1 valeriansaliou.name, 1 -vales.io, 1 -valesdigital.com, 1 valiant.finance, 1 validatis.com, 1 validator.nu, 1 @@ -51325,6 +51735,7 @@ vantru.is, 1 vanwa.ch, 1 vanwoensel.xyz, 1 vanwunnik.com, 1 +vape-hit.in, 1 vapecom-shop.com, 1 vapecraftinc.com, 1 vapecrunch.com, 1 @@ -51367,6 +51778,7 @@ varztupasaulis.com, 1 varztupasaulis.eu, 1 varztupasaulis.lt, 1 varztupasaulis.net, 1 +vasanth.org, 0 vasastansbygg.se, 1 vascomm.co.id, 1 vase-eroticke-povidky.cz, 1 @@ -51377,7 +51789,6 @@ vasileruscior.ro, 1 vasilikieleftheriou.com, 1 vaskulitis-info.de, 1 vasp.group, 0 -vasports.com.au, 1 vastenotaris.nl, 1 vasyharan.com, 1 vat-eu.com, 1 @@ -51461,7 +51872,6 @@ vegekoszyk.pl, 1 vegepa.com, 1 vegetariantokyo.net, 1 veggie-einhorn.de, 1 -veggiesecret.com, 1 vegguide.org, 1 vegoresto.fr, 1 vehicleenquiry.service.gov.uk, 1 @@ -51495,6 +51905,7 @@ venicefloridawebsitedesign.com, 1 venicerealdeal.com, 1 venje.pro, 1 venmail.net, 1 +venstar.com, 1 ventajasdesventajas.com, 1 venten.ee, 1 ventesprivees-fr.com, 1 @@ -51660,6 +52071,7 @@ viantours.net, 1 viaprinto.de, 1 viasinc.com, 0 viato.fr, 1 +vibgyyor.com, 1 vibrant-america.com, 1 vibrato1-kutikomi.com, 1 vicenage.com, 1 @@ -51749,7 +52161,6 @@ vietnamhost.vn, 0 vietnamluxurytravelagency.com, 1 vietnamphotoblog.com, 1 vietnamwomenveterans.org, 1 -vietplan.vn, 1 vieux.pro, 1 view-page-source.com, 1 viewbook.com, 1 @@ -51819,6 +52230,7 @@ villu.ga, 1 vilog.me, 1 viltsu.net, 1 vim.cx, 1 +vim.ge, 1 vima.ch, 1 vimeo.com, 1 vimeosucks.nyc, 1 @@ -51944,6 +52356,7 @@ visitbeulah.com, 1 visitcambridgeshirefens.org, 1 visitkangaroovalley.com.au, 1 visitmaine.com, 1 +visitorguard.com, 1 visor.ph, 1 vista-research-group.com, 1 vistaalmar.es, 1 @@ -51990,6 +52403,7 @@ vitrado.de, 1 vitsoft.by, 1 vitzro.kr, 1 viva2000.com, 1 +vivaio.roma.it, 1 vivaldi-fr.com, 1 vivaldi.club, 1 vivaldi.com, 1 @@ -52035,7 +52449,6 @@ vladimiroff.org, 1 vladislavstoyanov.com, 1 vladsfads.com, 1 vlakem.net, 1 -vlastimilburian.cz, 1 vldkn.net, 1 vleesbesteld.nl, 1 vleij.com, 1 @@ -52104,7 +52517,6 @@ voidptr.eu, 1 voids.org, 1 voidshift.com, 1 voidx.top, 1 -voidzehn.com, 1 voipdigit.nl, 1 voipsun.com, 1 vojtechpavelka.cz, 1 @@ -52146,6 +52558,7 @@ vonski.pl, 1 vonterra.us, 1 voodoochile.at, 1 voolik.pw, 1 +voordeuren-opmaat.nl, 1 vooreenveiligthuis.nl, 0 voorjou.com, 1 vop.li, 1 @@ -52290,6 +52703,7 @@ vvzero.me, 1 vw-touranclub.cz, 1 vwbusje.com, 1 vwfsrentacar.co.uk, 1 +vwh-kunden.de, 1 vwittich.de, 1 vwo.com, 1 vwoforangeparts.com, 1 @@ -52563,6 +52977,7 @@ waterbrook.com.au, 1 waterdogsmokedfish.com, 1 waterdrop.tk, 1 waterfedpole.com, 0 +waterheaterdallastx.com, 1 waterleeftinbeek.nl, 1 watermonitor.gov, 1 wateroutlook.com, 1 @@ -52573,6 +52988,7 @@ waterseal.in, 1 waterside-residents.org.uk, 1 waterslide-austria.at, 1 watertrails.io, 1 +watervillewomenscare.com, 1 waterworkscondos.com, 1 watfordjc.uk, 1 watoo.tech, 1 @@ -52795,6 +53211,7 @@ webproject.rocks, 1 webpubsub.com, 1 webqualitat.com.br, 1 webqueens.com, 1 +webrabbit.at, 1 webrebels.org, 0 webrentcars.com, 1 webreport.fr, 1 @@ -52877,7 +53294,6 @@ weebl.me, 1 weeblr.com, 1 weeblrpress.com, 1 weed.ren, 1 -weedelec.pl, 1 weedlife.com, 1 weedupdate.com, 1 weedworthy.com, 1 @@ -53122,7 +53538,6 @@ wf-staging-hr.appspot.com, 1 wf-training-hrd.appspot.com, 1 wf-training-master.appspot.com, 1 wf-trial-hrd.appspot.com, 1 -wfcom-98-wf-www.pantheonsite.io, 1 wfcp1010.com, 1 wfh.ovh, 1 wfh.se, 1 @@ -53763,6 +54178,7 @@ worldcigars.com.br, 1 worldcubeassociation.org, 1 worldessays.com, 1 worldeventscalendars.com, 1 +worldmeetings.com, 1 worldmeteo.info, 1 worldnettps.com, 1 worldofarganoil.com, 1 @@ -53852,7 +54268,6 @@ wpnuvem.com, 1 wpoptimalizace.cz, 1 wpostats.com, 0 wprodevs.com, 1 -wpscans.com, 1 wpserp.com, 1 wpsharks.com, 1 wpsitemovers.com, 1 @@ -53860,6 +54275,7 @@ wpsmackdown.com, 1 wpsnelheid.nl, 1 wpsono.com, 1 wpthaiuser.com, 1 +wptorium.com, 1 wptotal.com, 1 wpvulndb.com, 1 wq.ro, 1 @@ -53980,7 +54396,6 @@ wwc.ren, 1 wweforums.net, 1 wweichen.com.cn, 1 wwgc2011.se, 1 -wwjd.dynu.net, 1 wwtext.com, 1 wwv-8522.com, 1 wwv-8722.com, 1 @@ -54082,6 +54497,7 @@ wxh.jp, 1 wxkxsw.com, 1 wxlog.cn, 1 wxster.com, 1 +wxw.moe, 1 wxzm.sx, 1 wyam.io, 1 wyatttauber.com, 1 @@ -54141,7 +54557,9 @@ xanadu-taxi.cz, 1 xanadu-trans.cz, 1 xanax.pro, 0 xanderbron.tech, 1 +xanimalcaps.com, 1 xants.de, 1 +xanyl.de, 1 xatr0z.org, 0 xavier.is, 1 xavierdmello.com, 1 @@ -54240,7 +54658,18 @@ xbdmov.com, 1 xbertschy.com, 1 xbjt1.com, 1 xbjt11.com, 1 +xbjt2.com, 1 +xbjt22.com, 1 +xbjt3.com, 1 +xbjt33.com, 1 +xbjt4.com, 1 +xbjt5.com, 1 +xbjt55.com, 1 xbjt66.com, 1 +xbjt666.com, 1 +xbjt7.com, 1 +xbjt77.com, 1 +xbjt9.com, 1 xblau.com, 1 xboxdownloadthat.com, 1 xboxlivegoldshop.nl, 1 @@ -54254,14 +54683,20 @@ xbtmusic.org, 0 xbyl.xn--fiqs8s, 1 xbyl15.com, 1 xbyl16.com, 1 +xbyl17.com, 1 xbyl21.com, 1 xbyl23.com, 1 xbyl26.com, 1 +xbyl28.com, 1 xbyl39.com, 1 +xbyl62.com, 1 xbyl63.com, 1 +xbyl67.com, 1 xbyl71.com, 1 +xbyl73.com, 1 xbyl78.com, 1 xbyl82.com, 1 +xbyl85.com, 1 xbyl91.com, 1 xceedgaming.com, 1 xcentricmold.com, 1 @@ -54366,6 +54801,14 @@ xilou.org, 1 ximble.com, 1 xin-in.com, 1 xin-in.net, 1 +xinbo010.com, 1 +xinbo016.com, 1 +xinbo018.com, 1 +xinbo020.com, 1 +xinbo026.com, 1 +xinbo028.com, 1 +xinbo030.com, 1 +xinbo050.com, 1 xinbo270.com, 1 xinbo676.com, 1 xinboyule.com, 0 @@ -54398,7 +54841,6 @@ xliang.co, 1 xluxes.jp, 1 xm.digital, 1 xmedius.ca, 1 -xmedius.com, 1 xmedius.eu, 1 xmenrevolution.com, 1 xmflyrk.com, 1 @@ -54419,6 +54861,7 @@ xn----7sbmucgqdbgwwc5e9b.xn--p1ai, 1 xn----8hcdn2ankm1bfq.com, 1 xn----9sbkdigdao0de1a8g.com, 1 xn--0iv967ab7w.xn--rhqv96g, 1 +xn--0kq33cbsi8bk6d417b.com, 1 xn--0kq33cz5c8wmwrqqw1d.com, 1 xn--12c3bpr6bsv7c.com, 1 xn--12cg9bnm5ci2ag9hbcs17a.com, 1 @@ -54491,7 +54934,6 @@ xn--detrkl13b9sbv53j.org, 1 xn--die-hrercharts-zpb.de, 1 xn--dk8haaa.ws, 1 xn--dmonenjger-q5ag.net, 1 -xn--dmontaa-9za.com, 1 xn--dragni-g1a.de, 1 xn--dtursfest-72a.dk, 1 xn--durhre-yxa.de, 1 @@ -54568,7 +55010,6 @@ xn--mgi-qla.life, 1 xn--mhringen-65a.de, 1 xn--mhsv04avtt1xi.com, 0 xn--mllers-wxa.info, 1 -xn--mntsamling-0cb.dk, 1 xn--myrepubic-wub.net, 1 xn--myrepublc-x5a.net, 1 xn--n8j7dygrbu0c31a5861bq8qb.com, 1 @@ -54579,6 +55020,7 @@ xn--o38h.tk, 1 xn--o77hka.ga, 1 xn--obt757c.com, 1 xn--oiqt18e8e2a.eu.org, 1 +xn--p3t555glxhnwa.com, 1 xn--p8j9a0d9c9a.xn--q9jyb4c, 1 xn--pbt947am3ab71g.com, 1 xn--pckqk6xk43lunk.net, 1 @@ -54606,6 +55048,7 @@ xn--schsischer-christstollen-qbc.shop, 1 xn--solidaritt-am-ort-yqb.de, 1 xn--spenijmazania-yhc.pl, 1 xn--srenpind-54a.dk, 1 +xn--svezavaukuu-ulb08i.rs, 1 xn--sz8h.ml, 1 xn--t-oha.lv, 1 xn--t8j2a3042d.xyz, 1 @@ -54661,6 +55104,7 @@ xoh.at, 1 xolphin.nl, 1 xombitgames.com, 1 xombitmusic.com, 1 +xombra.com, 1 xone.cz, 0 xonn.de, 1 xor.cat, 1 @@ -54720,7 +55164,6 @@ xtrainsights.com, 1 xtreme-servers.eu, 1 xtremebouncepartyhire.com.au, 1 xtremegaming.it, 1 -xtrememidlife.nl, 1 xtri.xyz, 1 xtronics.com, 1 xts.bike, 1 @@ -54740,6 +55183,7 @@ xuehao.net.cn, 1 xuehuang666.cn, 1 xujan.com, 1 xuming.studio, 1 +xun3708855.com, 1 xunn.io, 1 xuntaosms.com, 1 xuntier.ch, 1 @@ -54752,6 +55196,7 @@ xwaretech.info, 1 xx0r.eu, 1 xxffo.com, 1 xxiz.com, 1 +xxx020625.com, 1 xxxladyboysporn.com, 1 xxxlbox.com, 1 xxxred.net, 1 @@ -54861,7 +55306,6 @@ ycbmstaging.com, 1 ych.art, 1 ycherbonnel.fr, 1 ychon.com, 1 -ychong.com, 1 yclan.net, 1 ycnrg.org, 1 yd.io, 1 @@ -54982,6 +55426,7 @@ yiz96.com, 1 yjsoft.me, 1 yjsw.sh.cn, 1 ykhut.com, 1 +ykqpw.com, 1 yksityisyydensuoja.fi, 1 ylde.de, 1 ylilauta.org, 1 @@ -55039,6 +55484,7 @@ yolops.net, 1 yombo.net, 1 yomena.in, 1 yon.co.il, 1 +yonema.com, 1 yongbin.org, 1 yoonas.com, 1 yooomu.com, 1 @@ -55133,6 +55579,7 @@ yourfuntrivia.com, 1 yourfuturestrategy.com.au, 1 yourgadget.ro, 1 yourgames.tv, 1 +youri.me, 1 yourlanguages.de, 1 yourlovesong.com.mx, 1 yourmemorykeeper.co.uk, 1 @@ -55141,6 +55588,7 @@ yourpersonalfrance.com, 1 yourscotlandtour.co.uk, 1 yourself.today, 1 yourskin.nl, 1 +yourstage.nl, 1 yourstake.org, 1 yourticketbooking.com, 1 yourtime.tv, 1 @@ -55174,7 +55622,6 @@ yr166166.com, 1 yrjanheikki.com, 1 yrx.me, 1 yryz.net, 1 -ys-shop.biz, 1 ys6888.cc, 1 ysicing.me, 1 ysicing.net, 1 @@ -55291,12 +55738,14 @@ yurisviridov.com, 1 yusa.me, 1 yushi.moe, 1 yusu.org, 1 +yusukesakai.com, 1 yutakato.net, 1 yutangyun.com, 1 yuucchi.com, 1 yuuki0xff.jp, 1 yuuta.moe, 1 yuvaindia.co.in, 1 +yuvibrands.com, 1 yuwei.org, 1 yuweiji.com, 1 yuweiyang.xyz, 1 @@ -55398,7 +55847,6 @@ zalan.do, 1 zalohovaniburian.cz, 1 zaltv.com, 1 zalvus.com, 1 -zalzalac.com, 1 zamalektoday.com, 1 zamow.co, 1 zandcell.com, 1 @@ -55407,6 +55855,7 @@ zanellidesigns.co.uk, 1 zanshinkankarate.com, 1 zanthra.com, 1 zanzabar.it, 1 +zanzariere.roma.it, 1 zanzo.cz, 1 zaoext.com, 1 zap-mag.ru, 1 @@ -55417,7 +55866,6 @@ zarabiaj.com, 1 zargescases.co.uk, 1 zarmarket.org, 1 zarpo.com.br, 1 -zary.me, 1 zatsepin.by, 1 zaufanatrzeciastrona.pl, 1 zavec.com.ec, 1 @@ -55444,6 +55892,7 @@ zcon.nl, 1 zcore.org, 1 zcr.ca, 1 zcryp.to, 0 +zcwtl.com, 1 zd0808.com, 1 zd2727.com, 1 zd3434.com, 1 @@ -55601,6 +56050,7 @@ zhdd.pl, 1 zhen-chen.com, 1 zhengjie.com, 1 zhengouwu.com, 1 +zhengqiangonglue.com, 1 zhengzihan.com, 1 zhenic.ir, 1 zhenyan.org, 1 @@ -55625,6 +56075,7 @@ zhouba.cz, 1 zhoujiashu.com, 1 zhoushuo.me, 0 zhoutiancai.cn, 1 +zhouzeng1314.com, 1 zhovner.com, 1 zhthings.com, 1 zhuihoude.com, 1 @@ -55845,6 +56296,7 @@ zouk.info, 1 zouyaoji.top, 1 zozo.com, 1 zozzle.co.uk, 1 +zp.do, 1 zp25.ninja, 1 zq789.com, 1 zqwqz.com, 1 @@ -55871,6 +56323,7 @@ zten.org, 1 ztjuh.tk, 1 zuan-in.com, 1 zuan-in.net, 1 +zuanqianni.com, 1 zubel.it, 0 zubora.co, 1 zubr.net, 1 diff --git a/services/settings/dumps/blocklists/addons.json b/services/settings/dumps/blocklists/addons.json index c21c17a0b3a1..e35cce1d4f35 100644 --- a/services/settings/dumps/blocklists/addons.json +++ b/services/settings/dumps/blocklists/addons.json @@ -1 +1 @@ -{"data":[{"guid":"{c65b18e1-cd3d-4773-a901-15a0753e7d81}","prefs":[],"schema":1556224830338,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1546994","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"PrincipalInterceptor"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"af62a050-b136-4d56-ab3a-af85a2510bc4","last_modified":1556224874229},{"guid":"{4bf110f8-5f50-4a35-b7fa-64228bfa2d0b}","prefs":[],"schema":1556224790813,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1547048","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"Predicate Property"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5968da82-1d7e-407e-bf93-5d2247ce55c1","last_modified":1556224830329},{"guid":"{0bd4e0af-664d-4273-a670-7cb3d0b5a4a5}","prefs":[],"schema":1556224295744,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1547046","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"ConsumerWatcher"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6a6cc6fb-dce1-49cd-b624-7b44afacf157","last_modified":1556224790803},{"guid":"{bbddf452-1a72-4a5d-a833-0416ac7fd76f}","prefs":[],"schema":1556197615318,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1546989","why":"This add-on violates Mozilla's add-on policy by executing remote code.","name":"AV Scanner (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"20c25379-aed8-4ab4-9e7f-f2d3f5d948a7","last_modified":1556206274610},{"guid":"/^((\\{1601769e-0b0d-4c43-97a7-723ce374996b\\})|(\\{d714118b-5cdd-4829-9299-1066fecc0867\\})|(\\{e8671db6-24be-4744-808c-a63fb744ccca\\}))$/","prefs":[],"schema":1556133515829,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1545834","why":"This add-on violates Mozilla\u2019s add-on policies by overriding search behavior without user consent or control.","name":"XPC and Tabs"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1b536121-fd82-4639-bc70-30d7060e42d3","last_modified":1556133806451},{"guid":"{3f5f741d-a980-4b58-8552-b1ae328841f4}","prefs":[],"schema":1556099103820,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1546480","why":"This add-on violates Mozilla's add-on policy by intentionally weakening website security and adding fraudulent content to web pages.","name":"Google Translate (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ae288e5e-78d5-4b49-8b4d-fa9f25c3baa2","last_modified":1556112119390},{"guid":"{3fab603e-3ee1-1222-a859-5f85a3441216}","prefs":[],"schema":1555527937277,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1545213","why":"This add-on violates Mozilla's add-on policy by overriding search behavior without user consent or control.","name":"Add security (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"74ad8c8b-a65a-470c-aa2f-ca14e1e8774d","last_modified":1555528639011},{"guid":"/^((\\{880cacfe-5793-4346-89ce-fbbd368d394c\\})|(\\{f0780038-50b9-11e9-9c72-4ba2d8f2ec9f\\})|(\\{22ffe411-2b0e-11e9-87f9-c329f1f9c8d2\\})|(\\{cf4bae43-026f-4e7e-a85a-952a7ca697a1\\})|(\\{17052516-09be-11e9-a008-03419f6c8bc6\\})|(\\{333fb3de-18a8-18e8-b6d3-e73213911efb\\})|(\\{aa4abac2-1ffa-12aa-bbdd-9305cb2c1254\\})|(\\{72222e70-2fd6-11e9-956b-27f7787b8d2d\\})|(\\{637212d8-3484-11e9-9812-005056b22b42\\})|(\\{4a222e60-31de-1eca-8476-37565daf6afb\\})|(\\{7fc6d222-48d5-11e9-b586-17e94c73a1b1\\})|(\\{e111c358-121b-13fa-bf23-bb57da32d184\\})|(\\{9674445c-8dff-4580-96b2-99442a7ae9af\\}))$/","prefs":[],"schema":1555525532852,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544315","why":"This add-on violates Mozilla's add-on policy by executing remote code.","name":"Various"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cbd7444f-e62a-4639-b172-845548b6d4a7","last_modified":1555527929174},{"guid":"{674fff65-6cd0-488a-9453-fb91fc3d7397}","prefs":[],"schema":1555406446874,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543924","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"Assistant"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8aff4cb0-4d5f-4e74-8db7-b04f616c3b60","last_modified":1555503879816},{"guid":"{40cd7fd2-a3e4-43f9-9d86-0e0a70376203}","prefs":[],"schema":1555184501005,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544268","why":"This add-on maliciously injects remote code for execution.","name":"Scan Tech"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"881d3476-f18a-4560-b065-cded406783d2","last_modified":1555228377222},{"guid":"{8ee8602c-aba6-4e2a-9faa-1724c3f4f9ba}","prefs":[],"schema":1555102738661,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544205","why":"The add-on is maliciously loading remote code for execution.","name":"Service Proccesor"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"94621e2f-28a0-4b18-97c6-5f6203f5912e","last_modified":1555161086175},{"guid":"{d8b03707-e39f-4b17-8e56-56354fb14af5}","prefs":[],"schema":1555100104657,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544103","why":"This add-on maliciously injects scripts, violating our policies.","name":"Interruptible Observer"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3a921aa8-d44a-4272-be63-0fd102577f59","last_modified":1555100575898},{"guid":"{132cb2fd-a6ae-45d2-84cf-b48d591f037d}","prefs":[],"schema":1555099951278,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543922","why":"This add-on injects remote scripts and overrides search behavior without user consent or control. It also masks as an add-on with a different purpose.","name":"Player"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"371796e4-387a-4dd0-9ddc-47ba1dd85be7","last_modified":1555100104648},{"guid":"H.264.Addon.Test@firefox.com","prefs":[],"schema":1555099832659,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543919","why":"This add-on exfiltrates user data without consent or control and may be misleading the user into believing this is an add-on by Firefox.","name":"H.264 Video Codec Fake"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"53ef1aad-7bdb-4f4e-8d46-55d6ec2d78ab","last_modified":1555099951269},{"guid":"{608f71eb-5bd6-45d8-bc93-b9e812cf17b7}","prefs":[],"schema":1555099501294,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543801","why":"This add-on maliciously injects remote scripts, violating our policies.","name":"Consumer Tech"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ea00841e-8dc2-4e11-9119-7a599e47d800","last_modified":1555099832650},{"guid":"/^((\\{8220ccaf-15a4-4f47-a670-a4119a4296a4\\})|(\\{9da72c11-44d7-423c-b19c-c75cd6188c3e\\})|(\\{99d0e4d0-c5ef-4567-b74c-80c5ed21ad99\\}))$/","prefs":[],"schema":1555011689511,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543848","why":"This add-on violates Mozilla's add-on policy by overriding search behavior without user's consent or control.","name":"Search overriding add-on"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"03554696-58fe-4b90-89d1-72b72f88f82e","last_modified":1555069748234},{"guid":"/^((\\{b37f383f-e60f-4eb1-ac0f-9147e0e8f2f7\\})|(\\{8ad567d2-3fe2-446b-bce9-a3acbe878dba\\}))$/","prefs":[],"schema":1554997740201,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543673","why":"These add-ons are overriding search behavior without user's consent or control.","name":"Hash"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"036e2e7d-5403-49be-92cf-b5187ceef7ec","last_modified":1554997910212},{"guid":"{be6ab6a9-7004-4c5c-8df9-8d36122d8b14}","prefs":[],"schema":1554997613727,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543705","why":"This add-on injects remote scripts with malicious intent.","name":"asin"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6fd3ab94-8e38-47f3-b129-3ca8396d0a22","last_modified":1554997740187},{"guid":"/^((\\{61f433aa-45fd-42a9-9c90-c1d7820661d5\\})|(\\{86cd46b6-433a-439c-bff2-722846709f44\\})|(\\{98e126a4-4e70-4300-b893-3b2cca19bc9b\\})|(\\{8f42dc3a-1c46-4fc2-8c7f-dd76a63b1cf7\\})|(\\{a24d3582-2fc2-475c-8440-335736e17c6e\\})|(\\{cf0b5280-cd08-465d-ad7d-70308538f30a\\})|(\\{936f3c79-5dc9-4694-bca8-47932de3357a\\})|(\\{e48d5888-8736-4858-83ba-e816378ffef8\\})|(\\{5305f89c-ceec-4217-8bae-c9c376c7462b\\})|(\\{a2ac47e5-d225-4718-9b57-18a932f87610\\})|(\\{79f60f07-6aee-42cd-9105-c0a52f401316\\}))$/","prefs":[],"schema":1554981266268,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543664","why":"These add-ons exfiltrate user data while masking as a legit add-on.","name":"Adobe Flash Player Fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"fc38e782-d55b-4fb7-8f9c-374aa18af09c","last_modified":1554997613713},{"guid":"/^((\\{0913599d-3094-44a7-8cc2-b8467d5afc7c\\})|(\\{7bee7f1b-d8ad-424d-807d-e69e6634988e\\}))$/","prefs":[],"schema":1554898779160,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543462","why":"This add-on violates Mozilla's policies by exfiltrating user data without their consent or control.","name":"Malware exfiltrating user data"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0d86ba71-7baa-4cb3-b3b8-da4ccdfa36b9","last_modified":1554976164809},{"guid":"/^((\\{9946bf2f-0aef-4040-bc57-cdae2bde196a\\})|(\\{d511784e-d088-4fce-b77c-14c186f08641\\})|(\\{fe59312a-97bd-4ca7-bce3-b0db95b1e251\\}))$/","prefs":[],"schema":1554897771015,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543118","why":"This add-on violates Mozilla's add-on policies by overriding search behavior without user consent or control.","name":"Invert (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ed01b7e5-73d1-42a6-9fc8-af2d83879854","last_modified":1554898652923},{"guid":"{c75432cb-980d-4e64-98c8-d7947b382a2c}","prefs":[],"schema":1554897109129,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543255","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Concrete Tech"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7fd0eb9c-9f6c-40ea-ba39-645cafb1d5a0","last_modified":1554897390260},{"guid":"/^((\\{6a99a9ec-f149-4ad3-b644-15e44290d00c\\})|(\\{cd9d1582-13dc-4ce1-9c83-4aaa31c6bc36\\})|(\\{3414a827-ee54-4331-85eb-736a824bb7e0\\}))$/","prefs":[],"schema":1554896836686,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543181","why":"This add-on violates Mozilla's add-on policies by overriding search behavior without users' consent or control.","name":"Drag (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a4f0ac78-ba85-4b5a-9d1f-f3f2c6ae4f7c","last_modified":1554897104624},{"guid":"/^((\\{4b6e66db-ee0b-4fc3-abe6-b97cb4798faf\\})|(\\{8aff5f41-86f8-40f1-896d-954eae7fb670\\}))$/","prefs":[],"schema":1554817097951,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543049","why":"Search hijacking","name":"Fit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8a7efe6b-8670-4714-b4b2-08ce5f202ee7","last_modified":1554818136441},{"guid":"{81425b21-cc8c-42d0-98e8-69844bcb7404}","prefs":[],"schema":1554811583185,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543048","why":"Remote Script Injection","name":"Tech Chip"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"dafcc63d-37e0-42e2-b439-59727cf9de48","last_modified":1554811754967},{"guid":"{d85aa6ef-639b-43a1-8560-ddeb59935d10}","prefs":[],"schema":1554803024628,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543047","why":"Remote Script Injection","name":"BatchSerialize"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"204b7b05-d8e1-4de3-86f9-fcf95edb40c0","last_modified":1554811583171},{"guid":"/^((\\{bf163ed1-e9f9-4c98-ae4b-8391133472d1\\})|(\\{ec283482-2d66-49b2-9dc5-0d03bcbffe65\\})|(\\{0a19856e-4168-4765-a8ab-a3a34fa88ec1\\})|(\\{e2019dd1-4591-42e2-864a-535a99972b1a\\})|(\\{88a65f0c-f952-41f0-8868-f22fa12597b3\\}))$/","prefs":[],"schema":1554754247858,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540998","why":"Exfiltrating user data to a remote site while masking as a different add-on","name":"More Flash Player Clones"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ddd97fae-7040-4758-811f-1dd53116e6ab","last_modified":1554755273775},{"guid":"/^((\\{743fc0de-1085-4078-8611-848024989608\\})|(\\{02acc043-f402-4e48-aa15-56ee1364e17c\\})|(\\{1b7892ab-6dbe-49d1-9c71-bbb70458c830\\})|(\\{25b3b5bc-b77a-49d1-ab56-c0e760fe02ff\\})|(\\{2c78aa89-8cdd-4a96-821a-e35628aea2fb\\})|(\\{2f154b99-05c2-4629-b687-f2aa031d9f65\\})|(\\{36df6f78-16c4-42c2-a6b8-9210a2953739\\})|(\\{40ada62f-72a8-46b7-8e50-4153f660ce34\\})|(\\{49f58462-fc24-472c-b85a-4a3dbbf48741\\})|(\\{4a8cb3fd-0400-47b3-a799-9f2964229bfa\\})|(\\{5429f6da-d7fe-4f1b-a85e-6dc721ec0037\\})|(\\{74480b2f-1198-45b3-86b3-ca0778482216\\})|(\\{777f1169-a824-459d-8a2d-ca2ffaf59424\\})|(\\{81e610be-656a-4a71-866d-dd94b5096c60\\})|(\\{81ee3e70-b6e4-44d0-b5c2-94ded26bb5ac\\})|(\\{881c71c1-6800-4e8b-89de-0d14ef67d588\\})|(\\{9b5d7f59-be9c-4f1e-bf0c-31f085c17726\\})|(\\{9eff0ead-25a4-429c-b4b2-280ba3c6f2d9\\})|(\\{ad1b7e87-e260-4aee-a602-ef234743443e\\})|(\\{b54a530a-cacc-4c76-a7c3-feafd4ce0b13\\})|(\\{bd0d7634-770e-4d9f-8309-d264a5fbbfa9\\})|(\\{bdf16cc8-3da6-4317-a1eb-2ab8adce6b66\\})|(\\{bf484a7f-49fd-4681-afa5-8a063d010a14\\})|(\\{c7cf6d86-207b-4231-a96a-bbfdc9fe59aa\\})|(\\{d33f83c2-dbc6-41d2-a8b9-28fdaa96985e\\})|(\\{d71757ee-edc7-44d5-b536-cb0370d7d9f6\\})|(\\{daf86db4-7dd4-47d4-a1d1-7c31f6b9bbe3\\})|(\\{e27060a0-5fb5-4844-b446-d2655d7681fa\\})|(\\{fae0d133-05dd-44e6-88e1-e218ca2b2caf\\})|(\\{fbf69005-55d8-4360-a562-255a8c285fea\\})|(\\{fd6d1b53-89f5-4d91-9234-fb3e1b067c1b\\}))$/","prefs":[],"schema":1554753973658,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540998","why":"Exfiltrating user data to a remote site while masking as a different add-on","name":"Adobe Flash fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e12a97c7-2c83-4e1c-a2c3-66a653bc6048","last_modified":1554754247845},{"guid":"{ea173fdc-f27a-482a-8a0a-61fd1aa2ee2e}","prefs":[],"schema":1554744706554,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541005","why":"Masks as a legit add-on and includes a remote script that is against our policies","name":"InterpreterInvocation"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8742ec6a-2e51-4e94-bc6a-653dac08521b","last_modified":1554753973644},{"guid":"{16768af9-4120-4566-95cf-c4234effa084}","prefs":[],"schema":1554733900697,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540999","why":"This add-on changes the search settings in a way that is not allowed per our policies","name":"Unknown search hijacking add-on"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3fb0ed8e-6e5d-489e-8c9d-b6f48705a742","last_modified":1554736392840},{"guid":"{35b9640e-ebbb-44b7-85af-d9ec3af3c6a6}","prefs":[],"schema":1554730607333,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540690","why":"Malicious remote script injection","name":"Patagonia Bit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0eb3a151-ca6b-4dbb-81b3-c10635660c84","last_modified":1554733900683},{"guid":"{d574e1f8-537d-4b6c-97bb-9f7a138f4d67}","prefs":[],"schema":1554728269766,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540686","why":"Injects remote scripts and masks as a different add-on","name":"DistributedConsumer"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a158055b-3387-4961-a4a3-a820d9299e15","last_modified":1554730607318},{"guid":"one-search@mozzilla.xpi","prefs":[],"schema":1554666099983,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1542208","why":"The add-on violates Mozilla's add-on policies by overriding search behavior without user consent or control.","name":"One Search"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1344c583-9593-412f-a565-c6cc96a07c28","last_modified":1554718843138},{"guid":"/^((\\{00b4b65b-79d9-4e92-bc1e-2b926918b91c\\})|(\\{0cb66591-e935-47e4-95c2-3063786f6555\\})|(\\{6cf25884-f86d-4a4e-a924-d95282ce5b71\\})|(\\{22cce9c6-a1de-457f-8938-c981b976b6f4\\})|(\\{89d99d4c-e7c4-4601-91a8-216e597a826b\\})|(\\{998d3ac7-b475-410e-ad3d-2eeb526c1853\\})|(\\{9423e8df-6200-45c0-877a-479c46e91b30\\})|(\\{64937e0b-6e00-4d5f-bf19-190d6614aae2\\})|(\\{91507dc4-c005-4534-80af-d8fbdeac29ed\\})|(\\{a2247e60-7b89-4857-a2fa-0eaee1cad460\\})|(\\{c9c28751-5865-449f-8e45-b3363edf9fb7\\})|(\\{cdfd004f-cddc-4ad7-8e2d-a58457e42b1f\\})|(\\{d3e7f35d-7d9f-4d38-9a2b-1581f6b3e870\\})|(\\{df574ffe-cce0-42db-857b-627cb164a4d4\\})|(\\{e06afe6e-ed52-40f8-82bf-d070a37387fb\\})|(\\{e7e7fb96-cfab-4a5b-85fe-20f621e1bc2e\\})|(\\{e12e5afd-bd1e-43c6-9288-321dc485cb1c\\})|(\\{e92d8545-0396-4808-96de-830c61c0d1b3\\})|(\\{e883b012-1987-4f37-8053-02e59e20c242\\})|(\\{ed3386c6-76c6-4786-a37b-9816d5f2a260\\}))$/","prefs":[],"schema":1554462951082,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541662","why":"These add-ons violate Mozilla's add-on policies by overriding search preferences without user control or consent.","name":"Search overriding malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a1c376fe-20c5-4da3-9126-3fe95b874dce","last_modified":1554463075420},{"guid":"sourcegraph-for-firefox@sourcegraph.com","prefs":[],"schema":1554375072708,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541010","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Sourcegraph for Firefox"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"19.4.2.1038","minVersion":"0"}],"id":"9fde5729-9be6-4955-9627-67742c5ed62a","last_modified":1554395912709},{"guid":"/^((\\{6ab41e83-2a91-4c2a-babb-86107a1d1f75\\})|(\\{d84a9d0d-7a31-459e-b45a-2ad111884d1f\\}))$/","prefs":[],"schema":1554293659259,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541405","why":"This add-on violates Mozilla's add-on policies by overriding search settings without user control or notice.","name":"PopWin (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"04b2954e-4f83-4557-968e-2139a277bf1c","last_modified":1554301860877},{"guid":"/^((@searchlock-staging-automation)|(@searchlock-automation)|(@searchlock-fx)|(@searchlock-staging)|(jid1-vRJA7N8VwBoiXw@jetpack))$/","prefs":[],"schema":1554293340413,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540868","why":"This add-on violates Mozilla's add-on policies by executing remote code and overriding search preferences.","name":"SearchLock"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aacb25e1-71c5-4bee-ad16-e39e732210ba","last_modified":1554293606641},{"guid":"{03dfffe0-509f-11e9-aa00-e7e13d49f3de}","prefs":[],"schema":1554290590697,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540113","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Addon (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9c75fe89-7011-47ad-b213-57f5a81a4c89","last_modified":1554290693618},{"guid":"{e555c358-121b-13fa-bf23-bb57da32d184}","prefs":[],"schema":1554290541557,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540111","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Security (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1809ea7a-8155-4ae7-8c83-ee7c749d30f5","last_modified":1554290590689},{"guid":"{a9c33302-4c97-11e9-9a9d-af400df725e1}","prefs":[],"schema":1554147700324,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539514","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Security (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5b4e4e75-cc96-4ca9-aa9f-6a2d2f6cd96a","last_modified":1554290541548},{"guid":"{a3f765c3-8dde-4467-ad6e-fd70c3333e50}","prefs":[],"schema":1554119395186,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538143","why":"Remote script injection","name":"Angelic Bit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"93dc42cc-4ff3-460d-a8f2-12f1d947b530","last_modified":1554119427564},{"guid":"{91f77263-866e-4acb-a569-f66ac47889f8}","prefs":[],"schema":1553974898434,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539226","why":"Remote script injection","name":"Bit Apex"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c528f48a-9b2c-48ca-8b4a-eac442cc0bd0","last_modified":1554119395177},{"guid":"{2256fabf-19f1-4e12-9951-5d126dd9e928}","prefs":[],"schema":1553899022464,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540086","why":"Search hijacking","name":"Twit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7c705f73-9d1d-4ee9-ad11-347d18729adb","last_modified":1553900528324},{"guid":"/^((\\{00f77164-eca9-4353-916d-8ea493a54c8d\\})|(\\{0716b2a5-8181-45b8-b675-915e38903761\\})|(\\{26124967-7e32-4577-b998-7296c68d3eb9\\})|(\\{273052bc-fc67-4fc1-a6fd-e62acc3ddad1\\})|(\\{4b5f53ac-36ac-4018-80cb-f1106f60ef96\\})|(\\{61065f61-51aa-462c-aca0-f1addbfa202b\\})|(\\{63383006-d617-4a00-9ca7-30a6864782ee\\})|(\\{7629c987-59ea-4e2f-bcde-b55646ecd268\\})|(\\{78e8c8fa-32ce-432b-9a40-b615bff7cd96\\})|(\\{8e9c05df-e0f5-479f-abb9-858650cb471e\\})|(\\{947f1ac0-09f2-4016-a345-dad0d2ee8f57\\})|(\\{9b9f8124-47bc-4699-8557-45573995b0af\\})|(\\{ab159932-d1dd-4d16-9332-8302a01e0ced\\})|(\\{b7340504-f6ba-43cb-8bd6-5ead88d29898\\})|(\\{bcb9265f-20fd-4311-a33f-212c2d08043a\\})|(\\{f8701822-2814-4d5d-af01-cf7fde4fd510\\}))$/","prefs":[],"schema":1553898687988,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539910","why":"Data exfiltration, is not actually a flash player","name":"Adobe Flash Player fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"64fc6369-b504-4920-abab-f2cf3cc5424a","last_modified":1553899022456},{"guid":"/^((\\{7dd03112-82a0-4c82-9957-117dedaac14a\\})|(\\{59fd3cac-1a4d-4f0f-a129-c241b203eb51\\}))$/","prefs":[],"schema":1553897736388,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540287","why":"Search hijacking","name":"Song"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"b32b14f5-0024-48fb-a4b6-1496add1dac0","last_modified":1553898687980},{"guid":"/^((\\{70c2cef0-6cc6-41b8-ad6b-bbd11182a101\\})|(\\{a0366612-376e-47e3-b5fa-b805c7176088\\}))$/","prefs":[],"schema":1553810805293,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540055","why":"Search hijacking, masking as legit add-on","name":"Pix"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d78262b0-ecfc-475e-9759-f7319451cb43","last_modified":1553847044919},{"guid":"/^((\\{10f1b84d-79ca-41d0-97f6-abb53cec0765\\})|(\\{7891c029-0071-4534-b7f0-7288f14ee0ad\\}))$/","prefs":[],"schema":1553810612956,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538476","why":"Remote script injection, search hijacking","name":"FX"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"50197dbd-71bc-492f-a0f1-6658ec454df4","last_modified":1553810696456},{"guid":"/^((\\{058769c7-784e-47a9-a2c4-dfd81bbf6c8c\\})|(\\{2a58598a-f951-4fb0-af2b-12fb7482bf33\\}))$/","prefs":[],"schema":1553810234714,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539910","why":"Keylogger","name":"Fake adobe flash player"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e1355888-e1cd-4d21-9652-c3000662ed88","last_modified":1553810612947},{"guid":"/^((\\{54c7e57f-8ef0-48d5-92a0-6e95d193a12c\\})|(\\{32d262da-e3cd-4300-aa0b-c284eb4e17bf\\}))$/","prefs":[],"schema":1553802101395,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538536","why":"Search hijacking, masking as legit add-on","name":"TxP"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"fa6c7cdb-e477-4478-8dd4-3e1106be6aa3","last_modified":1553810234705},{"guid":"/^((\\{36261798-4c2a-4206-89cc-6c28932b2e98\\})|(\\{b2b9bb64-78d5-43ca-b0cf-a9ee8460521b\\}))$/","prefs":[],"schema":1553616425198,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538234","why":"Clone of Feedbro with added remote scripts and search hijacking","name":"Feedbro Fake"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e00b2639-8a4f-427a-80d8-7c4937c58f31","last_modified":1553620435398},{"guid":"new-tab-search@mozzilla.xpi","prefs":[],"schema":1553616311575,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538500","why":"Search hijacking","name":"New Tab Search"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a4dca16a-9fa1-4b55-899c-0f8d5eda1a57","last_modified":1553616386570},{"guid":"{a9c33302-4c97-11e9-9a9d-af400df725e3}","prefs":[],"schema":1553616259023,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538141","why":"remote code execution","name":"Fake Security add-on"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0c09f067-6e5f-4ee0-9040-08b4297ebe02","last_modified":1553616311567},{"guid":"{7ab5c514-4ebe-22e9-a925-9b7c7317c373}","prefs":[],"schema":1553548654429,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538266","why":"remote code injection","name":"Eval"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a1f04f09-f4d5-4875-b4b1-a2c772178e8e","last_modified":1553616158755},{"guid":"{bc919484-f20e-48e2-a7c8-6642e111abce}","prefs":[],"schema":1553519202849,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538962","why":"Inserting monetization iframes and masking as a legit add-on. Contains patterns for known malicious add-ons.","name":"Pinterest Save Button clone"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7abbecfb-5512-47d1-ba9b-96d6a61b85ee","last_modified":1553548325261},{"guid":"/^((\\{157cd8f9-48f0-43a1-9bcf-c4316753e087\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e086\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e088\\}))$/","prefs":[],"schema":1553186907495,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1537895","why":"This add-on violates Mozilla's add-on policies by overriding search settings.","name":"SD App (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e263fbec-7155-442f-aa82-cdf218f9e3d7","last_modified":1553193746700},{"guid":"/^((\\{1c94bc8a-3ac1-12e1-aae7-0b314772229c\\})|(\\{8a22255c-4737-11e9-a86b-0bb66337cb31\\})|(\\{3fab603e-3ee1-1222-a859-5f85a3441216\\}))$/","prefs":[],"schema":1553166786114,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535655","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"'Security' add-ons (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6cf1b676-f0b8-4fea-8a5f-64957650dc2e","last_modified":1553172061896},{"guid":"{28ac81f1-b04d-448f-94be-1b8cc8fbd58d}","prefs":[],"schema":1553079961735,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1536513","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"UtilsBridge (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f60b3eec-b8b8-4bd7-8d2b-3f7912c3451f","last_modified":1553080348264},{"guid":"/^((\\{9332d73d-7991-46bf-8b67-6db1a21f0167\\})|(\\{b33715d3-eff8-4186-a252-0af5094b8644\\})|(\\{eb7aff78-6145-4a31-a7f5-f3c353ddb312\\})|(\\{6c5cd693-2919-4458-b776-2ac5b6ab1cb0\\})|(\\{daacefee-aaba-4f10-8d4d-059904d8a153\\})|(\\{94d8d504-838c-4392-9971-cd2f6e21ca21\\})|(\\{6574bb31-c971-454f-b08c-a75bfee00855\\})|(\\{1688ecb0-e382-481f-8c70-541d70bdd2e9\\})|(\\{f7b9f777-7b01-4f73-8eb8-f2ad85d4da1c\\})|(\\{598d7ac6-1789-4573-ae6a-5798ed7f6d83\\})|(\\{c0eb4d03-d18e-40bf-b21b-8237ee1bed76\\})|(\\{d0513185-1f20-4045-a232-f3a4252af379\\})|(\\{9ae8269f-eea1-4097-87fd-b7d2f102184d\\})|(\\{5683f95b-2517-4ca7-9d19-83d7f309b62a\\})|(\\{013d3691-0dd6-471b-bf0d-2750d7406a22\\})|(\\{ae73a262-1a27-4d1d-9be7-4b41a84dfd23\\})|(\\{1d92fc5d-5353-401f-8c5f-373b3b6dae67\\})|(\\{e8a81b54-3728-4a9c-8c63-18ef803ef9be\\})|(\\{d604961b-3a3d-4f60-87ae-35977c10b787\\})|(\\{cbe9b620-fac0-407a-b3be-b0a61b319ef8\\})|(\\{1cdb403e-11c7-421b-9c87-0c0d90263626\\})|(\\{f5fa0bfe-a981-48ff-b809-8faa3126f0bc\\})|(\\{7dc6d0d2-b2f0-4334-979d-6ebeff77785a\\})|(\\{13623b47-de82-4226-85f8-d3ae343e619b\\})|(\\{db7b6ea7-2605-44c7-807b-2419d7eec531\\})|(\\{b9298a4a-acca-446d-aa72-d37f5e1576cd\\})|(\\{2e689bc0-735f-445c-bcc7-2cc495f5eb40\\})|(\\{04acd977-4c2b-4162-af33-8c585bea90c5\\})|(\\{2436dde0-3230-4933-9020-c15b3b9e693b\\})|(\\{dcb556aa-ef6e-4778-9f60-c5ae18a72cfb\\})|(\\{5a24385f-ada4-455d-95ad-62cb6256360d\\})|(\\{97f88a13-5b79-4345-a85e-2560d54f577c\\})|(\\{12f4cde8-7d1c-4a9e-9ef7-431f5ecd53a4\\})|(\\{18a93813-7deb-40cf-b3a6-402369e6d817\\})|(\\{9cee5c92-eb1e-4892-86ff-d2d1c627f5b9\\})|(\\{cb1c544e-d444-4c85-8224-64aa26e82230\\})|(\\{1c3b247f-2ef4-4483-93a6-0a3da7bc3548\\})|(\\{1f6913f2-dead-4f96-bf96-0e64affd46ae\\})|(\\{109adc7d-f308-43a5-aa0e-07ccdc5dad2c\\})|(\\{7170e23c-c706-48a7-919f-c1c22548dbfb\\})|(\\{6aa47f05-1f3f-4798-908a-0ed01b2361e0\\})|(\\{33ef0e7b-15ea-4b08-a779-173731ac20b3\\})|(\\{a0361564-9461-4da0-8ec0-7dc6f418f707\\})|(\\{c12631ed-993a-4c2e-9bf0-37867ae40491\\})|(\\{00b79649-3f0e-4b12-a8f0-376a7b2db716\\})|(\\{89096e44-c8b4-4ce5-aad2-f5bac765f608\\})|(\\{6f4eff89-0e32-42bd-a5c1-354adc8417fd\\})|(\\{482c54ae-e080-4596-bf7c-ae972fdff9a3\\})|(\\{04868575-532f-4b43-9325-7e707c109c25\\})|(\\{042c3065-1291-4409-bae5-8d11f3c268e2\\})|(\\{126e7fc4-bf2d-4467-88b1-f3b17bc10da4\\})|(\\{cea21739-b9ce-46c7-ad3e-3607b1ff6538\\})|(\\{06eea1e7-a8be-4794-8cd5-ed12e5f86161\\})|(\\{50993bc5-011c-4322-b522-41e6f3997163\\})|(\\{219a2146-5d9b-472a-8630-4c96a0994bec\\})|(\\{1db94c2f-d957-4b12-a1dc-903bb28f5ff5\\})|(\\{2f7d887c-7d56-41fa-bf9b-eadf6e500427\\})|(\\{2b16f4ab-a2a9-43fd-8fd6-ad6f354b0d28\\})|(\\{034d2b14-29e6-42ad-b2db-2c31286f3fb7\\})|(\\{77058195-5ae1-440c-8f86-c60a96d12ca9\\})|(\\{8082ff2f-2151-4281-8134-1423e5961ca1\\})|(\\{9fa797e8-d7d4-4851-b7e9-76b61ecf046f\\})|(\\{87178fbe-17a5-4d8d-b5ed-48d17179b101\\})|(\\{f010d9e9-0878-4c83-af45-df966cbe8d26\\})|(\\{2aa8c5cd-18fa-4991-b354-d6f459efeca9\\})|(\\{4021839d-3f4a-4866-94fb-9fa809c5245b\\}))$/","prefs":[],"schema":1553024292304,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535088","why":"This add-on violates Mozilla's add-on policies by exfiltration user data and tracking online activities.","name":"Search overriding malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"478d4acd-3c01-4dd5-b784-4e06b69d1c05","last_modified":1553079818962},{"guid":"{781b89d4-fa53-45a1-bea4-151dd4c8b288}","prefs":[],"schema":1553013598703,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535280","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Drop Tech (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"81759002-967e-4856-9f55-61d7c30cdb3b","last_modified":1553013656506},{"guid":"{3b52063a-0683-4de2-b6e1-6192c78b6ba3}","prefs":[],"schema":1553013551744,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1536042","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Project Tech (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6a7f932a-3911-4884-8cb9-d282d282c0cc","last_modified":1553013598695},{"guid":"{47610aad-982f-4822-93ca-8c27dc96a13b}","prefs":[],"schema":1552938092086,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534773","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Tech Hand (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"12874e4d-28b5-4e98-8c33-b6cf5eb032bf","last_modified":1553013551736},{"guid":"amqp-dwn-all-vd@artur.brown","prefs":[],"schema":1552916969263,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1536052","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Video Downloader Plus (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a3f5ce2f-d8ef-4dae-9fce-1d7fb69d2b37","last_modified":1552917123606},{"guid":"/^((\\{1d758385-fddd-478e-85a0-13eef59f60e5\\})|(\\{1ec3e92a-fd3c-4e16-82e2-56d44bd7bdf4\\})|(\\{3dadda0d-d67c-4452-9475-246c33198192\\})|(\\{4a48f6a8-c9d6-4ae2-8513-a7e9fe785a56\\})|(\\{4d2da172-b160-42b5-9fea-0ede63e0ab52\\})|(\\{5bcd4feb-ce52-4e6f-9da6-eef2a75a4f70\\})|(\\{5eb45d74-0f46-4269-bc0e-8a2a49d64267\\})|(\\{7e8c27c0-b94c-4026-8068-2d152143f073\\})|(\\{9ede19b2-bb97-4d1c-abab-b1d72e7d4c74\\})|(\\{19abb7a0-fb4d-41ff-97d4-65f1680c1348\\})|(\\{25efbdeb-04fa-4998-a9f8-99c1293c7b7f\\})|(\\{0049a401-f02d-4d16-8b5e-5933e5855a4c\\})|(\\{65b91ca5-cd06-42a6-9637-8ecde3a69fd6\\})|(\\{146ec14e-f623-4cb2-88ed-7d3bb8101090\\})|(\\{790d2797-82f3-4bc3-8759-c00d426bbf2f\\})|(\\{865f42b5-e073-4a36-84b1-47d09096b48b\\})|(\\{90055a5b-45a8-45c1-b0a0-979ab2a9064f\\})|(\\{a4f5c163-7b64-46c4-bfd3-348ecc99873a\\})|(\\{a8c40ee7-a376-417b-8022-40909a10181b\\})|(\\{a1031346-14d3-464f-9e50-c30dfd88ad92\\})|(\\{abd16535-2fa8-4bfd-b84e-ed09c9c60e53\\})|(\\{b5ee8c58-b5e5-4ba0-a899-9a54a2f0e386\\})|(\\{b246bb42-577e-4587-adf2-7274b378b0b4\\})|(\\{bb43765b-fe06-4d50-9802-0c6742b220aa\\})|(\\{bf3f628d-9e52-4727-b940-054c65a5a304\\})|(\\{c6bc710d-8cc8-4224-9287-44ecfa452a81\\})|(\\{c232edce-83c9-4184-9782-22df800f65e2\\})|(\\{c5397be4-b756-45b8-a247-339846fada52\\})|(\\{c6675bc5-f7ea-4a11-8252-1152d3783ae3\\})|(\\{cc6a088b-5a84-4e48-8de8-d2f6be3abae7\\})|(\\{e6c12219-f67e-4ea0-a9c3-2c541febeff1\\})|(\\{eb3a7ef7-a4d0-49a4-8b21-2a91c1758100\\})|(\\{ec34588b-86b4-4de3-a3bf-f4d1d8386475\\})|(\\{f4fd8825-648f-4b63-a499-3fd702d42149\\})|(\\{fc4f31f6-c5ed-4afd-8c19-df96e107ce7d\\})|(\\{fe337ef5-bb69-44bf-82a8-ee5c13406165\\})|(\\{ff285a1c-5672-44c3-890e-6c4f25976b83\\}))$/","prefs":[],"schema":1552908996320,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535421","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"25f18cc5-6ecc-419f-b093-b79e9f261062","last_modified":1552916969252},{"guid":"{a4491aab-e273-4bc3-b45e-a7b9b9414a5f}","prefs":[],"schema":1552695264438,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534792","why":"Search takeover not according to policies, masking as a different add-on","name":"FFCop"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d2da9c45-59f8-4257-9d7e-07c4fa5de958","last_modified":1552695747900},{"guid":"/^((\\{0f6b717d-1625-4434-b770-5ae33eb64b16\\})|(\\{6d092be7-0bad-46af-9489-04e4b3988644\\})|(\\{7f6049d6-e8b0-4c42-8028-204d1458ddb6\\})|(\\{12b75028-c038-40bd-be5b-2809b7d18d78\\})|(\\{46f35a01-faaf-4fab-95e6-7dfc8b6d8b73\\})|(\\{55d2c6f7-62fa-4091-988b-7f4c4b3c1bff\\})|(\\{75aeaeec-d415-404d-84ba-bd70bcc5e70c\\})|(\\{76b8cf24-227d-4e2b-af4c-39ec5b47babf\\})|(\\{77b725cc-5d0e-4b82-88f0-ec6961acd697\\})|(\\{90fc8426-06ba-43ab-8110-7478ff86f531\\})|(\\{90fc8426-06ba-43ab-8110-7478ff86f539\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e084\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e085\\})|(\\{201ec7f7-57b1-48dd-945c-b1ea7489195d\\})|(\\{280fc0f5-6dfb-4a3c-92ae-acb2d5352175\\})|(\\{388f6d65-4a1b-43ac-b791-387882c30599\\})|(\\{0575cabd-38f3-4964-bdc3-0141a2f062e9\\})|(\\{927e4189-4f56-437e-a0d4-5e232612b5c7\\})|(\\{7277d7cf-c598-420b-ab6e-ab066e1e2fdd\\})|(\\{67775ec2-c879-438b-9409-89fba7ffc684\\})|(\\{397386d2-bb76-4b69-8121-86fad15c5216\\})|(\\{bd7f03dc-b362-4744-b118-43ab916205f9\\})|(\\{c133fb29-c967-4aec-953a-4974e8cbdb26\\})|(\\{cc94c8a7-efa3-435c-91fe-ca305f70e39d\\})|(\\{cfd2ff68-6579-4448-8a26-561bdb63877c\\})|(\\{d00f0050-a66c-49fc-9236-1498d4d29f67\\})|(\\{daa287a2-5916-413e-9b61-52c00b5aa061\\})|(\\{dcfac76f-2fd2-4477-9a60-22d167cabcb4\\})|(\\{dd1bbcf4-bff3-4f15-8a2c-3d52ce987f70\\})|(\\{ddb546b5-6490-4af5-8813-8e701bc06e26\\})|(\\{ead6848b-4bd6-4f9a-93bd-b8460c6f6973\\})|(\\{eb8f7a97-ffb0-40f1-9321-5ab1de884f1c\\})|(\\{ec3e8a3d-df39-4f84-ab31-dae369a225e4\\})|(\\{ef986f55-2dc9-4e39-8c87-618cf4fe5e69\\})|(\\{f8b4b601-7917-40c1-94ec-8efbbf125a46\\})|(\\{f8bc456c-0fb4-4d5d-a85f-dfeb25459e76\\})|(\\{f0458469-cc09-407e-a891-be8606553341\\})|(\\{fa73622c-8b41-45b8-9d93-6d66e7633765\\})|(@loveroms)|(loveroms-ash1280@jetpack)|(searchdimension@gmail\\.com))$/","prefs":[],"schema":1552655172725,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535402","why":" This add-on violates Mozilla add-on policies by including abusive search behavior.","name":"Add-ons including abusive search behavior"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f9cd41dd-9e52-4506-bb58-a31e189f4ab9","last_modified":1552655392045},{"guid":"{b6f5f2d0-1aa3-4e43-b536-6db1b1bf7d1c}","prefs":[],"schema":1552592498693,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535601","why":"This add-on violates Mozilla's add-on policies by exfiltrating user data.","name":"FFcanu (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5b807d5f-a192-450a-a0b3-98113c4beff1","last_modified":1552655172717},{"guid":"{e19fed8c-637a-42e3-b62a-3a6c4040ded8}","prefs":[],"schema":1552570939014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535345","why":"This add-on violates Mozilla's add-policies by executing remote code.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5027a1c1-e050-434f-ba77-56417bc2d7cf","last_modified":1552589019976},{"guid":"{fb62e856-f09b-4cbc-ba07-642ab55f6cb4}","prefs":[],"schema":1552567880022,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534781","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"EncDNA module (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ce66baec-1237-481c-87db-ccc1bcf0359d","last_modified":1552567941331},{"guid":"{54fc344c-e8ba-462a-a6d9-9ce1b794ce46}","prefs":[],"schema":1552567837850,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534817","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"4bec4aaf-dd5b-4754-bd01-461fdc7ea5ca","last_modified":1552567880014},{"guid":"{7b6def45-d585-431a-a479-5bb2badf2506}","prefs":[],"schema":1552567781490,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535055","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"PredicitionR (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e9227d28-b627-48b8-8392-e9fb5a00d9b6","last_modified":1552567837842},{"guid":"{6fb28b6b-abf2-4937-af28-340851faa971}","prefs":[],"schema":1552567721181,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534769","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"metamedian (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ed853ce8-83e0-42b7-8d93-7f48041d4987","last_modified":1552567781482},{"guid":"{ae5b30dd-b29d-4ae6-844b-5d7bfc3d7915}","prefs":[],"schema":1552567676370,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534807","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Crypto Valuator (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3cfd9af5-a7d0-49d3-971b-7af5e2eab78f","last_modified":1552567721173},{"guid":"web-private@ext.com","prefs":[],"schema":1552567616148,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534828","why":"This add-on violates Mozilla's add-on policies by overriding search preferences.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3d52fe32-71e5-47bd-8eda-d98fa0c489e9","last_modified":1552567676362},{"guid":"/^((ads@firefox\\.pl)|(adsfinland@firefox\\.pl)|(adsfrance@firefox\\.pl)|(dodateknowy@o2\\.pl)|(dodateksuper1@firefox\\.pl)|(dodateksuper2@firefox\\.pl)|(dodateksuper3@firefox\\.pl)|(dodateksuper5@firefox\\.pl)|(dodateksuper6@firefox\\.pl)|(dodateksuper@firefox\\.pl)|(test_b@iext\\.pro)|(\\{697be03c-cdd2-430e-b6cf-0f9b5f0556ee\\})|(\\{c9ced03f-a5cf-4dbf-b5ba-67673e442590\\})|(\\{cbe59f66-a23a-45c1-81ac-d0cbedf9ea4e\\})|(\\{dbf0a186-d41c-40ae-8841-e9d8a6b49d8d\\}))$/","prefs":[],"schema":1552493457658,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534940","why":"This add-on violates Mozilla's add-on policies by using a deceiving name and exfiltrating user data.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"67025e3b-860c-4680-949f-ec472cd72fae","last_modified":1552567437766},{"guid":"/^((\\{86c18738-11ed-4c16-af92-786aa036c83c\\})|(\\{d0fee16a-f4eb-4dc1-9961-82b913e5943d\\})|(\\{1c4937a1-c678-4607-8665-a16384ee302e\\})|(\\{22caeb02-38a3-415d-b168-64fadccbb4a4\\})|(\\{1c9372e7-5f0e-4541-99cf-dfbf2ab00b01\\})|(\\{9fe66994-8ed1-4317-a20a-1d0544ca062f\\})|(\\{6df222d8-97c7-42bf-9683-1cf8119c1e9e\\})|(\\{4c2dda03-bad0-4160-a8a1-6d089200420e\\})|(\\{7aae7d4f-55b9-42eb-b683-932591265e17\\})|(\\{e6f8ab99-3c96-410c-95d1-267ad48ed3e2\\})|(\\{6d8c5068-d0cb-47a5-af5e-3f23064f4608\\})|(\\{90481f38-d06a-465e-a54c-206bbb1ee9ae\\})|(\\{4b75aeb8-f14a-4ef3-b1ad-09733b40dac3\\})|(\\{3a8ca495-f5ab-4320-b070-4f44266fe3d1\\})|(\\{84f8914f-0dec-48ed-a0fd-4a7712c06793\\})|(\\{aa613fce-603c-41df-bf49-9b09614cebe6\\})|(\\{30314350-199a-4951-9c05-c3537a946492\\})|(\\{a2edce1d-10ab-483d-8c01-5e5fe0c82902\\})|(\\{ec91a3d4-8311-4700-aa15-b3941f21a052\\})|(\\{e9049687-164a-4cf3-be1f-1291cfb0f44a\\})|(\\{2be73925-ebaf-43ca-8b26-bd820887f591\\})|(\\{840eadea-1c68-411f-b4e9-08d9f236385d\\})|(\\{0a89d040-5fb1-46d7-bf81-43b55e83695d\\})|(\\{6a1e76ed-4ac2-4a0c-8beb-43ae63558b36\\})|(\\{1b90c930-e7d7-486a-9085-8b57129489c7\\})|(\\{eab649ca-af76-4de9-95b0-8036e35a66cc\\})|(\\{0628e652-98f4-4e58-9ecb-ad996b061aef\\})|(elfr@geckoaddon\\.org)|(else@geckoaddon\\.org)|(fr_b@iext\\.pro)|(it_b@iext\\.pro)|(sv_b@iext\\.pro)|(no_b1@iext\\.pro)|(fi_b@iext\\.pro)|(au_b@iext\\.pro)|(elfr12@geckoaddon\\.org)|(test@informations\\.to)|(se_pop@informations\\.to)|(it@spongebog\\.funny-ok\\.com)|(it@tsunami\\.funny-ok\\.com)|(fi@spongebog\\.funny-ok\\.com)|(fi@tsunami\\.funny-ok\\.com)|(no@spongebog\\.funny-ok\\.com)|(no@tsunami\\.funny-ok\\.com)|(fr@tsunami\\.funny-ok\\.com)|(fr@spongebog\\.funny-ok\\.com)|(se@tsunami\\.funny-ok\\.com)|(se@spongebog\\.funny-ok\\.com)|(au@spongebog\\.funny-ok\\.com)|(au@tsunami\\.funny-ok\\.com)|(nz@spongebog\\.funny-ok\\.com)|(nz@tsunami\\.funny-ok\\.com)|(gr@spongebog\\.funny-ok\\.com)|(gr@tsunami\\.funny-ok\\.com)|(nz_fnew@tsunami\\.funny-ok\\.com))$/","prefs":[],"schema":1552320039514,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534103","why":"Stealing cookies, browsing history and other information","name":"Rogue Updater add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"b57d9505-21bf-4a24-accb-05ceac50dadc","last_modified":1552323475989},{"guid":"{c04d9d7d-1c8c-4eab-a51a-828c47e1b8b7}","prefs":[],"schema":1552246898392,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1533780","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"asin (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2c739daa-ffee-48d9-a825-e53c8fd2bb3c","last_modified":1552300402314},{"guid":"/^((\\{ee2d725e-9726-43ac-8040-60ce9ff2831b\\})|(\\{55417a80-e6f7-4d77-8d73-f59045e5e890\\}))$/","prefs":[],"schema":1551728497880,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1532269","why":"This add-on violates Mozilla's add-on policies by using a deceptive name.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aca80fb4-760e-4cd4-9fec-649fb38b2947","last_modified":1551794995188},{"guid":"/^((\\{5084f455-bc8f-483c-b145-91245bcbfd64\\})|(\\{bd69d5d0-4b2f-48cb-bab5-dcf1e0f9c63b\\}))$/","prefs":[],"schema":1551398716775,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1531416","why":"Maliciously collecting form data and cookie modification","name":"Adblock/Adobe Flash fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7718be46-8e84-4bc7-a5a9-4c5de18378ee","last_modified":1551399019543},{"guid":"/^((\\{6745ccb4-833d-497e-b582-d98a5e790e8c\\})|(\\{cd205ddb-b106-4d2a-a965-5d1c610b5072\\})|(\\{218ec82e-2839-42da-acaa-e527454f4237\\})|(\\{7af25a3d-1caf-49f8-8be9-8ae6065db7c5\\}))$/","prefs":[],"schema":1551397746059,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530911","why":"Search hijacking, remote scripts","name":"Emoj1 clones"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"77a32be3-94ce-49c2-b129-fa2562a7f47b","last_modified":1551398716765},{"guid":"Youtube-video@Myaddons.com","prefs":[],"schema":1551397521494,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529887","why":"Remote script injection and data exfiltration","name":"YouTube Video and MP3 Downloader"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a30f9f2a-aa68-48b7-88cc-8a582405b385","last_modified":1551397746049},{"guid":"Youtube-downloader@Myaddons.com","prefs":[],"schema":1551396963937,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529873","why":"Remote script injection, data exfiltration","name":"YouTube MP3 Converter"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1d596a69-157f-4743-9465-f86d6452206b","last_modified":1551397521482},{"guid":"{ba74c7ee-32b1-11e9-ade5-1f2222a4f325}","prefs":[],"schema":1551382900634,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529573","why":"Remote script injection and user data exfiltration","name":"GET Security"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"01825fea-8c5c-4d76-bd06-e1019c188056","last_modified":1551396963926},{"guid":"/^((\\{e0686c32-99b4-44d8-972f-88bf08b68f88\\})|(\\{b2225e4c-9d1d-472b-8aeb-5ff203bcff9a\\}))$/","prefs":[],"schema":1551210091992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530932","why":"This add-on is distributed violates Mozilla's add-on policies by being distributed through a fake Firefox update page.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"37252271-9e38-46a9-b23a-2b6d7048c0db","last_modified":1551250023025},{"guid":"{9d7cfde2-39ae-11e9-bde0-02427e2eba50}","prefs":[],"schema":1551104404768,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530640","why":"This add-on violates Mozilla's add-on policies by including abusive remote functionality, negatively affecting security and performance.","name":"Unnamed malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7bb234b0-cfda-4a23-bf02-9c82fb3500a3","last_modified":1551204284998},{"guid":"/^((\\{8387ccbe-b9ac-438d-b049-c86b30a6dacb\\})|(\\{2ef58672-740c-46bd-a50d-b9880986b574\\})|(\\{7ff51e81-f4b1-4682-9f45-43a771d80748\\})|(\\{ecb03616-f3c2-4580-99dd-6a233047abdd\\})|(\\{850be3a2-ca5f-47ad-838c-fe39b006e0da\\})|(\\{df9f6ab1-c82c-41d4-85ce-86dcfe839ce9\\})|(\\{a59679da-f097-4db4-b2bc-6ad7b645e127\\}))$/","prefs":[],"schema":1551100033342,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530194","why":"This add-on violates Mozilla add-on policies by including abusive search behavior.","name":"Safe Browsing (Malware) and similar"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ec121e9e-d56d-436b-bb2d-735fdcff3c03","last_modified":1551100630159},{"guid":"{4603d01d-ae80-4653-9288-d5ef98b99a17}","prefs":[],"schema":1551099702949,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529924","why":"This add-on violates Mozilla add-on policies by including abusive remote code.","name":"IMmailgun (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"32227de6-a7bf-454c-bf44-4478ddd96abe","last_modified":1551099805258},{"guid":"{157cd8f9-48f0-43a1-9bcf-c4316753e083}","prefs":[],"schema":1551037300209,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529926","why":"This add-on violates Mozilla add-on policies by including abusive search behavior.","name":"SD App (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5b3fe8de-6d05-4d95-a6d2-cd5695f1b0c0","last_modified":1551099426266},{"guid":"{5288d05d-253f-4675-be3b-152bf02aa3ec}","prefs":[],"schema":1550683849233,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529328","why":"Remote script injection along with deceptive code to hide the fact","name":"Unicode & Emoji Support"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9600b4cd-da02-4947-a4f5-c56c657ba197","last_modified":1550684288501},{"guid":"restore.old@youtube.com","prefs":[],"schema":1550580649249,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529126","why":"This add-ons does remote script injection in a way that attempts to hide the injection. The code being executed runs on all pages which is contrary to what the add-on is described to do.","name":"Restore Old Youtube"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"27917953-17fb-4ffc-bcf1-5fc2727174b4","last_modified":1550617105595},{"guid":"/^((pohhpifegcbplaijeeonlbkjgocfgjbf@chrome-store-foxified-18573537)|(pohhpifegcbplaijeeonlbkjgocfgjbf@chrome-store-foxified-570932499)|(aackamlchlgmalkmcphbhhcjebbpnfdf@chrome-store-foxified-233164420)|(pohhpifegcbplaijeeonlbkjgocfgjbf@chrome-store-foxified-1808417494)|(nnfhjlgginbfdejaajhbboeemajpjgfp@chrome-store-foxified-699139867)|(dilkapnoekabmkkhhdlpnpfgjcmddlia@chrome-store-foxified-1808417494)|(dilkapnoekabmkkhhdlpnpfgjcmddlia@chrome-store-foxified-1190639722)|(nnfhjlgginbfdejaajhbboeemajpjgfp@chrome-store-foxified-2745518014)|(fibaefnljghpmdibfkhnlaniblfkkndi@chrome-store-foxified-1955364993)|(dilkapnoekabmkkhhdlpnpfgjcmddlia@chrome-store-foxified-1516694386)|(generated-rk4dtanssk56goquir78sz@chrome-store-foxified--1594555229)|(nnfhjlgginbfdejaajhbboeemajpjgfp@chrome-store-foxified-1388315457)|(oaoebpgbkehlcdggaeeohgfpopdhjell@chrome-store-foxified-1823310541)|(fibaefnljghpmdibfkhnlaniblfkkndi@chrome-store-foxified--1031675095)|(ancjheohbkbnkgcmfaldcaepoeeplkgh@chrome-store-foxified-1823310541)|(generated-lwcbpuj27wcknyyl6pkap7@chrome-store-foxified-1823310541)|(generated-bmtr2hbgikv399aj6aeycd@chrome-store-foxified-1823310541)|(generated-8w9odie82h2ugbsrofooj3@chrome-store-foxified-1823310541)|(\\{4170faaa-ee87-4a0e-b57a-1aec49282887\\})|(\\{b66dd4bc-7f5e-41d9-bc43-84c5736d0c87\\})|(\\{507ad1fb-08ae-43ac-a596-fd5b6e7dea9a\\})|(\\{8bf85207-66df-4eb7-b913-ac162498c687\\})|(\\{b063895a-8077-452d-b049-ebc20a39f882\\})|(\\{5776bd90-3d09-43b5-a769-8da373e9820f\\})|(\\{f6bdce44-3d5a-4f88-9a64-e39fcb4f0717\\})|(\\{1c22e687-6a02-440c-a6d5-c1ccaf520e10\\})|(\\{f7be824f-7287-466a-8590-2f48007a223b\\})|(\\{89ffc0b4-97f7-447c-bd6f-9c519b0188bd\\})|(\\{3a67084b-c231-4b4b-a924-ffa741f90921\\})|(\\{fac8b1d0-f321-491d-9234-c40d89b3660d\\})|(\\{a8053a83-8d1a-4f0e-9f88-d31cfe00cf83\\})|(\\{d10fa57e-37d3-43d3-39f8-e6d5b2a7759d\\})|(savetube_downloader@savetube\\.co)|(\\{95a8a08c-53a8-7e1d-5a80-f1a5cd4751bf\\})|(\\{5037bd74-c23b-4bbf-8865-6b5a09e07342\\})|(\\{830c558c-70f0-4b07-95f1-8e06ad34ee2c\\})|(\\{e4d93c37-1299-452f-9b60-adee15ad3802\\})|(googlemaps@search))$/","prefs":[],"schema":1550502645324,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528761","why":"Malicious add-ons injecting remote scripts and exfiltrating data for monetization purposes. Some of the add-ons are masking themselves as legit add-ons and using various obfuscation tactics to hide their injections.","name":"Rogue Youtube downloaders and related add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f2483d7d-1895-4ae6-9901-7321e59062a6","last_modified":1550502978653},{"guid":"/^((((generated-e0yf8zkhypow3jjifkqzwo)|(iiinclagpealgnaglbmkdbfbgchjjbpg)|(jaehkpjddfdgiiefcnhahapilbejohhj))@chrome-store-foxified--?\\d+)|(jid1-9ETkKdBARv7Iww@jetpack)|(\\{813fe658-5a29-4dcc-ba6c-3941676e4f19\\}))$/","prefs":[],"schema":1550254444783,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528308","why":"This add-on violates Mozilla's add-on policies by tracking user behavior and including remote code.","name":"BuyHatke Best Price Comparison, Graph, Coupons (and similar)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d6b2dbad-31e9-4984-b649-19036cd38e1d","last_modified":1550265430182},{"guid":"/^((odnenajaeicndaeiapagpglohiklndhe@chrome-store-foxified-2174031944)|(akdibckdjeocfbcjaikipkhhbggcbgkg@chrome-store-foxified-699805590)|(\\{bd9f5830-bf8c-4e38-933d-09f85b24d744\\})|(youtube-downloader@addoncrop\\.com)|(dailymotion-downloader@addoncrop\\.com)|(youtube-mp3-iframe-downloader@addoncrop\\.com)|(youtube-downloader-lite@addoncrop\\.com)|(dailymotion-downloader-lite@addoncrop\\.com)|(generated-p5qj07ef5ceqfktp5v8whw@chrome-store-foxified--505607522)|(generated-tuag2j5gwq73xzp8fbw3j8@chrome-store-foxified--505607522)|(generated-uj53d5j612ap5pz11hwgv2@chrome-store-foxified--505607522)|(\\{f51f0244-bfb0-40ce-bf9d-af49f5949e61\\})|(\\{81751484-2dc9-47bf-aec3-b8e556237178\\})|(\\{d89d1e20-57af-4164-82cc-650af45cf0a5\\})|(\\{a5e28713-14c3-4967-befe-2ec253e317cd\\})|(\\{335ac35b-6c16-4304-93f0-64a418e5bf81\\})|(\\{d3fdb429-ef84-40a4-b160-010745ee0098\\})|(\\{d66db057-7d38-4df4-a0ba-63c272be25ee\\})|(\\{ff7f7151-09e3-4e35-9052-b21e23e7e2c1\\})|(\\{1479da02-e759-4a6f-8f62-c08096583806\\})|(\\{42d59cda-c117-459e-b244-1b850c27ccc9\\})|(\\{bec48f33-7869-4158-8cbc-5cf1606f9afa\\})|(\\{08ca656c-4973-46a8-85a9-3d771399c86e\\})|(\\{dc5336c8-5624-4f74-a794-bb15f3760f34\\})|(\\{6a3d97de-1b42-4624-880a-1a68bc917142\\})|(\\{ad965166-3a34-449d-8230-a636fb5cae57\\})|(video-view@vv\\.us)|(video-view@excoe\\.com)|(xeco@rama\\.com)|(ghj@brem\\.com)|(fgtr@rembgr\\.com)|(xero@saltam\\.com)|(sora@remjem\\.com)|(repo@saram\\.com)|(tora@empoytr\\.net)|(saving@ropbart\\.com)|(japa@vbgt\\.com)|(rtya@nop\\.net)|(asan@khazan\\.com)|(xerb@tangot\\.com)|(audiotools@ramdeen\\.com)|(webat@extrolm\\.com)|(media@medplus\\.com)|(audio@audequl\\.com)|(control@medcontrols\\.com)|(sabqo@rimjim\\.com)|(repto@secroa\\.com)|(meters@videobf\\.com)|(betro@diskra\\.com)|(codeca@vxmrop\\.com)|(revoca@feronx\\.com)|(brota@vidbrghta\\.com))$/","prefs":[],"schema":1550173301925,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1527603","why":"This add-on violates Mozilla's add-on policy by including malicious remote code.","name":"Various add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d94f7e0f-7088-43c9-a8da-eae102781079","last_modified":1550253583075},{"guid":"superzoom@funnerapps.com","prefs":[],"schema":1549578756953,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1525405","why":"This add-on includes abusive functionality including violating the user's security and privacy.","name":"SuperZoom (Abusive)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f7c4b329-7a54-48d3-9494-81783fe99d90","last_modified":1549627400713},{"guid":"/^((\\{0bf1c111-c256-4a17-891d-1bc69338162e\\})|(\\{0ffbc4b1-f269-4cff-9552-5f77337ebc1a\\})|(\\{1bbdc69d-55d3-4872-bd03-14eb05e7a7ad\\})|(\\{1ce00b82-ac47-43e6-a69c-f7dc9344168a\\})|(\\{2b01628b-0110-4965-972c-7a0b624fb99f\\})|(\\{3a84e0b0-3151-449e-b6e8-1062036afac6\\})|(\\{3bbcc16b-23f7-40a6-b88c-9ced9d009c93\\})|(\\{3ea48f4a-b585-44a7-aff5-faeb5e5b47d5\\})|(\\{7b161d2c-ee98-4321-a78a-433950672c8a\\})|(\\{8a8d97d8-b879-4024-8321-765e0f395b84\\})|(\\{9c0d6766-debe-4461-b14f-68ddfc13a78a\\})|(\\{014f9781-c104-41a4-a983-fc6aa4690664\\})|(\\{27ffdb27-0a34-4dea-a483-3b357bc6a5fe\\})|(\\{81ba256a-4f32-40df-86b5-e6b9861481e1\\})|(\\{338c7503-fb54-4b69-a84b-916f7452c7fa\\})|(\\{400e053f-55df-4e86-a91a-eae8d7b7bcd1\\})|(\\{617e0484-8346-44f2-851e-60ab89a919f9\\})|(\\{656a0095-d852-4dcc-a107-764df7ad0ec4\\})|(\\{754a330b-efbe-4016-8526-bf0f2e11e45e\\})|(\\{802ba900-013c-42f6-a11a-093c4bf35baa\\})|(\\{2771ce08-4898-4f58-89a5-e2b9d00bfab2\\})|(\\{3906b944-92f3-4d43-89dc-31ad6484a77c\\})|(\\{6516cdbc-9332-437f-89ac-b57470655542\\})|(\\{6847c507-1793-4be2-be86-4c2cc0b445bf\\})|(\\{9687db9b-410c-47f2-8c36-fde63c7c29e4\\})|(\\{0035237e-97ab-40eb-ba9d-c453fb6aa079\\})|(\\{20143127-e0bd-4396-aee9-52229cf9b5eb\\})|(\\{33254399-d5b2-4d84-b90b-9c4d4dc71112\\})|(\\{34621968-1952-4428-909d-df5b220efe74\\})|(\\{83769978-21cf-417c-b4a9-582b4161e395\\})|(\\{aa369db0-4232-47b8-bbbb-49ad31d49dce\\})|(\\{aff733de-d7d8-49c2-824a-7f2b2e282927\\})|(\\{c0b587fe-766b-446f-9aae-bc6edc9f6f4c\\})|(\\{c47a75b9-c6d2-4009-a245-c6dcedeea932\\})|(\\{c51bd197-28bd-442f-8537-dea5ae129047\\})|(\\{cac044a2-b93c-4f24-bf2f-b902741d29a8\\})|(\\{de17ce6f-389f-4368-9675-b9ed93133f17\\})|(\\{e2b105bc-1821-4838-bdf9-0fa4f6781b18\\})|(\\{e6c8bc7f-0133-418a-86ed-ba2c0a6925df\\})|(\\{f4acda5f-a75b-4b3b-8a73-8ca3df8d5f57\\})|(\\{f4fd18ee-8f6a-4708-8338-7e7981b73453\\})|(\\{f2320322-1fff-4998-bc28-4ad61621012a\\})|(\\{ff939f5e-a97c-4c14-b853-9c82519dbf73\\})|(@complete-youtube-downloader)|(@swsearchassist)|(@swsearchassist2)|(@youtube-download-helper-addon-1)|(@youtube-download-helper-addon-3)|(@ytd-support)|(@ytmp4-support)|(@ytu-support)|(18-plus-bypass@agebypass\\.org)|(18plus@sweetytweety\\.jp)|(addon@firefox-addon-s\\.com)|(ageverify@doubletrouble\\.net)|(auto-fill-dhruv\\.techapps@gmail\\.com)|(awesomeaddons@gmail\\.com)|(blndkmebkmenignoajhoemebccmmfjib@chrome-store-foxified--730948579)|(boomerang-for-gmailtm@chrome-store-foxified--1895216441)|(boomerang-for-gmailtm@chrome-store-foxified-1472004183)|(browsing_certificate@easycerts\\.in)|(certs-js@verify\\.org)|(clear-flash-cookies@tubedownload\\.org)|(dghpnfeglanbbjaggjegpbijhcbnfdno@chrome-store-foxified--1026618965)|(dghpnfeglanbbjaggjegpbijhcbnfdno@chrome-store-foxified--1382673267)|(dghpnfeglanbbjaggjegpbijhcbnfdno@chrome-store-foxified-3810896411)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-1917762393)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-2539369515)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-3411285726)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-3957753373)|(dhruv@gmail\\.com)|(easy\\.download@youtube\\.com)|(easy18plusverify@agehelper\\.com)|(EasyQR@johndoe)|(easytranslate@johndoehits)|(ecaieeiecbdhkcgknidmfelflleobbnp@chrome-store-foxified-2878848146)|(eurekasakamika@chrome-store-foxified-unsigned)|(faeeclonpikbempnbjbbajfjjajjgfio@chrome-store-foxified--1071037210)|(faeeclonpikbempnbjbbajfjjajjgfio@chrome-store-foxified-335403930)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified--546579415)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified--929033716)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified--1776201342)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-411918147)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-711293137)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-1406852911)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-1805495496)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-2344964585)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-2515600300)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-2947667317)|(generated-c5el8k8zv2b1gcncleefj9@chrome-store-foxified--1160265316)|(guid-reused-by-pk-720807)|(guid-reused-by-pk-881137)|(html5-video-everywhere@lejenome\\.me)|(iapifmceeokikomajpccajhjpacjmibe@chrome-store-foxified-6029610)|(info@ytdownloader\\.info)|(jabcajffpafebcdcaddoegpenicdipdk@chrome-store-foxified-1110252619)|(jpegcert@freeverify\\.org)|(kmrfree@yahoo\\.com)|(lets-kingw@empotrm\\.com)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-29039950)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-77744803)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-357866719)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-447115206)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-549146896)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-1084455972)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-1602969934)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-2271560562)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-2595595173)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-3103352300)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-3116340547)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-3959272483)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-4076222235)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-4090031097)|(media-certificates@auth0\\.io)|(mingle-cash-extension@minglecash\\.com)|(MiningBlocker@MiningBlockerAddOn\\.com)|(multimedia@certifications\\.us)|(nominer-block-coin-miners@tubedownload\\.org)|(open-in-idm@tubedownload\\.org)|(sabqo@yolla\\.net)|(search-by-image@addonsmash)|(selfdestructingcookies@addonsmash)|(streaming-certficate@mdn\\.org)|(swt@gobck\\.com)|(tabs-re-open@gtk\\.cc)|(user-agent-rewriter@a\\.org)|(vba@vba\\.com)|(verification@bexp\\.co)|(vidcert@certs\\.org)|(xplayer@gobck\\.com)|(youtube_download_express@free-downloader\\.online)|(youtube_downloader@downloaders\\.xyz)|(youtube_grabber@utubegrabber\\.co)|(youtube-lyrics-by-rob-w@awesome\\.addons)|(youtube-mp4-downloader@tubedownload\\.org)|(ytdownloader@ytdownloader\\.org)|(yttools\\.download@youtube\\.com))$/","prefs":[],"schema":1549482092694,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1525880","why":"Add-ons that include abusive or malicious remote code.","name":"Various abusive add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"be96c9a1-0b01-468e-ac9b-761ba3587162","last_modified":1549541801862},{"guid":"/^((addon@firefox-updater\\.com)|(downloader@youtube-download\\.org)|(downloader2@youtube-download\\.org)|(downloader1@youtube-download\\.org))$/","prefs":[],"schema":1549369087422,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1525153","why":"These add-ons include abusive behavior.","name":"\"FF Manual Update (Required)\" and \"Easy Youtube Video Downloader Express\" (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6b72e942-af54-469c-b9f2-9e436ad2c0d1","last_modified":1549373215201},{"guid":"/^((\\{0b347362-773f-4527-a006-f96e9db437e5\\})|(\\{9edb10ad-67af-4ad0-af45-efe452479321\\})|(\\{202e2671-6153-450d-bc66-5e67cee3603f\\}))$/","prefs":[],"schema":1548963700621,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1524357","why":"This add-on includes hidden abusive functionality.","name":"Video download add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"680a99e9-c972-4a14-9b15-e56eeeed75eb","last_modified":1549037404012},{"guid":"/^((\\{a9bc520e-68ab-49c2-a8df-75a0349d54fd\\})|(\\{bfc5d009-c6bd-4526-92ce-a9d27102f7f2\\}))$/","prefs":[],"schema":1548699141208,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1522959","why":"Add-ons that contain abusive functionality.","name":"Unnamed (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"97c4ee31-4009-40de-ae02-f1b349c87d01","last_modified":1548699177099},{"guid":"{4e47160d-ec83-417c-ab01-cda978378d9e}","prefs":[],"schema":1548699076839,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1522970","why":"The add-on contains abusive functionality.","name":"mlflow (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"62c54642-73ab-4641-b5c2-47e4ae29bbc5","last_modified":1548699141199},{"guid":"/^((\\{feff5ea4-ed4a-46a3-9331-12fec01d52a9\\})|(\\{8ffc339c-0ca1-46e3-acb3-3bfd889f9a21\\})|(\\{1fe481b5-baad-44e9-b410-082cf0f2acbb\\})|(\\{92c85192-b325-4599-82e2-a110f193eae6\\})|(\\{5bc21266-26f1-469a-bc1a-a49d7b70ecb9\\})|(\\{dc2dd143-f2e7-4f46-a8ff-4dc1a985e889\\})|(\\{c1233bb6-31a9-4c7d-8469-f8f44adee9ba\\})|(\\{d0d48905-1065-43dc-ab96-434d100602ed\\})|(\\{11deae99-2675-4d5e-86cd-7bd55b88daf2\\})|(\\{a7014e8e-eacf-4ba0-9047-c897c4ed3387\\})|(\\{b9c545a5-0ffa-490a-8071-2fee09478cfe\\})|(\\{39e8eebb-4d9e-4a03-93a8-4468fdd7a186\\})|(\\{8ccc00b1-2010-4155-a07c-f4d7c4d6dec2\\})|(\\{a1056511-4919-43b7-a9e5-ac2b770de810\\})|(\\{90a6da19-9165-44c1-819c-e3b53409f9c9\\})|(\\{e3862078-8f9f-4f8e-99dc-55ba558f0619\\})|(\\{d89fcf34-2615-4efc-a267-1e83ab6a19d0\\})|(\\{588151ce-eab4-4acf-83a7-bb5ccaf4d867\\})|(\\{6ab6312d-5fd4-42a9-ab10-08b954e53f9d\\})|(\\{24a6cbde-be68-4b7d-9f1b-d4d5dfd178a3\\})|(\\{55ae1a08-105f-4f7f-9d4e-e448b517db2b\\})|(\\{74fe9d83-df17-4812-bd3f-27b84b0086b7\\})|(\\{21140e51-713a-4bf8-865b-e2ee07282409\\})|(\\{24f39610-2958-4dc8-a73b-75cc9665bffa\\})|(\\{c50a45a5-efa4-44af-8946-6f20e4748d47\\})|(\\{41d0b7e0-0d93-4f67-bed9-da6d7688ad16\\})|(\\{c2bee222-2163-4c0f-89f5-4ac502f06810\\})|(\\{4be4602e-2b20-473f-8f2b-85e8c53d17dc\\})|(\\{dec2e9b5-e787-4fb5-a7bc-5894f80f7367\\})|(\\{179526e1-1824-49f7-afb3-49fdaadaa503\\})|(\\{4f07d826-ca9e-4370-a508-b984f54758de\\})|(\\{d0558df2-714f-4793-9d85-d2d648de4f2e\\})|(\\{daf1a69b-f47b-4936-bd25-5ac21f4e27ec\\}))$/","prefs":[],"schema":1548099697813,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521975","why":"Remote script injection and deceptive tactics to hide the fact","name":"ext-affiliate add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"87c17ce6-aaef-4d47-a662-588efff34041","last_modified":1548198338831},{"guid":"hlper@xero.com","prefs":[],"schema":1548076840649,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521533","why":"This add-on executes abusive remote code.","name":"Av Player Helper (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1e2ae4c0-66cd-40bc-9cf6-5ca0ce9548f7","last_modified":1548084072622},{"guid":"/^((xtera@soravem\\.net)|(nozl@ssave\\.net))$/","prefs":[],"schema":1547926889113,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521429","why":"This add-on injects abusive remote code.","name":"Video Assist (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c69997df-0b61-4de5-a351-b640123a9c3b","last_modified":1548073537411},{"guid":"/^((\\{94f608b3-76b6-4b7b-8cef-7360df22a930\\})|(\\{9648b74f-35ea-4218-acf0-ec2191f509f6\\}))$/","prefs":[],"schema":1547754101798,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1520813","why":"Add-ons that leak private user data.","name":"Instagram Register and Google Register (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a15e8d7e-0726-4190-8187-c75e2b46d429","last_modified":1547810271416},{"guid":"reopen@closedtab.com","prefs":[],"schema":1547067530457,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1518847","why":"This add-on contains unwanted abusive behavior unrelated to the add-ons functionality.","name":"Reopen Closed Tabs (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"451d950f-ca89-491b-87e7-45123e4f5ab4","last_modified":1547206877909},{"guid":"{43ecded1-f7cb-4bb6-a03d-4bec23b9f22d}","prefs":[],"schema":1547025691087,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1518580","why":"This add-on violates Mozilla's policy and user's security/privacy by loading abusive code from remote.","name":"lamme (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"06c6868e-055f-4e7d-aa8f-5ba577f43e85","last_modified":1547027153061},{"guid":"youtube_downloader@addon.partners","prefs":[],"schema":1546890104853,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1518032","why":"This add-on contains unwanted abusive functionality.","name":"YouTube Download Tool HD (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5a42c5bb-9cb4-4d96-b978-8d9f816322e6","last_modified":1547025691078},{"guid":"/^((\\{00cf6ee0-14f3-4e35-a4fd-d2160fe2f05e\\})|(\\{0da583da-e623-41f2-b2d2-0ac61b493171\\})|(\\{105c14a6-8b6f-49ef-b0d6-41bad99ad5e8\\})|(\\{10a15a74-271f-4098-a662-bd827db4f8bc\\})|(\\{13e02b9b-2797-4100-8144-65b73c4145c4\\})|(\\{1eb56568-8a30-42b1-a646-ad9f485f60fe\\})|(\\{1eb8a08c-82a8-4d1d-8b80-f7b5cd4751bf\\})|(\\{2f8220a8-b2a7-4277-ba6b-bdcb6958f669\\})|(\\{33f39a5d-137c-4757-9f9d-e86395c8bf20\\})|(\\{347ca189-9e63-43d2-8a2f-5d5141598bdc\\})|(\\{396056fc-1697-4954-b535-06de8d62fe1b\\})|(\\{3d530918-dbe8-442c-8faf-1f4ca7ca8ab9\\})|(\\{3e283c2e-cde3-4baa-8076-226ca8fb90ef\\})|(\\{591468f8-ebbd-497a-92f1-fa0a1206adb4\\})|(\\{5f6c3eb8-aa32-489a-bb01-b12b23d2001a\\})|(\\{6cbb397a-d865-42b2-8454-25a75b710dff\\})|(\\{7ae2bde0-f7ea-4bf3-a055-06953f9fcf31\\})|(\\{7b402578-ddec-4eee-9c8b-98e4e8db0059\\})|(\\{7fb00cf7-40d3-4415-a0c8-a48d3fbe847f\\})|(\\{87a8a08c-82a8-4d1d-8b80-f7b5cd4751bf\\})|(\\{888220a8-b2a7-4277-ba6b-bdcb6958f669\\})|(\\{8b1dd8f3-224b-4975-bda2-cb2dd184d4d8\\})|(\\{8bcdc9cc-f6be-4203-ae43-a9d281f0bcdb\\})|(\\{8cda9ce6-7893-4f47-ac70-a65215cec288\\})|(\\{8dc9b946-0bb9-4264-9c76-fd9ff1e159a2\\})|(\\{942e0fec-19f2-4ebc-8a74-009da7fa625d\\})|(\\{b2a720a8-b2a7-4277-aa6b-bdeb6958f669\\})|(\\{bdcf953b-d2aa-4e7a-8176-aeb1e95a0caf\\})|(\\{cae82615-f7be-4aff-875d-33da1bc93923\\})|(\\{d2aa953b-bdcf-4f7a-8476-ddb1e9500caf\\})|(\\{da0fa57e-17d3-40d3-99f8-e9d5b2a7759d\\})|(\\{da1237ca-e35d-4653-b2b5-d98043f33781\\})|(\\{e164563a-1512-4b81-99ff-95f2644c4075\\})|(\\{e2a720a8-b3a7-1277-aa2b-bdeb2958f669\\})|(\\{e6a90490-6ef7-407d-863a-7dd120f6f7dc\\})|(\\{f15cfa53-fa9b-43cf-84e8-16ece6695922\\})|(\\{f722c845-2d8b-4a0a-b518-4f39af703e79\\})|(\\{ff1c4e62-7c11-4ea7-b734-3462417ceeb5\\})|(\\{ffa0a57e-17d2-41d3-96f8-e8d5b2a0759d\\}))$/","prefs":[],"schema":1546378806655,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1517154","why":"Executing remote code containing coin mining and other undisclosed monetization","name":"Various remote iframe add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"53c5fb08-1001-471e-87ce-31185a84bcbc","last_modified":1546439268437},{"guid":"{02267dc4-36f2-4c22-8103-9e26477b48ef}","prefs":[],"schema":1545922885656,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1516539","why":"Google Search hijacking and affiliate injection","name":"Markdown"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6dd73da4-cb2f-4eb8-8850-890e80c8d57b","last_modified":1545926512914},{"guid":"{d064563a-1542-4b8b-99ff-95f1644c4075}","prefs":[],"schema":1545921144932,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1516488","why":"Obfuscated remote script injection stealing data","name":"PDF Print and Save"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"875bc1c6-257e-438a-8624-3bfe963747b0","last_modified":1545922824252},{"guid":"/^((\\{83768008-e10c-48c0-b303-5a0f1de763a1\\})|(\\{430b0612-bfad-463b-8783-cf2e32801513\\})|(\\{519adb83-4abb-4a66-8e94-243754b8adce\\})|(\\{228a707d-55c1-465b-a759-a2129eb6602e\\}))$/","prefs":[],"schema":1545853297809,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1516131","why":"Remote script injection and data exfiltration","name":"Various malicious remote script injection add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c0cb1a85-c6c6-453e-b126-0e6e26ceaf88","last_modified":1545870108716},{"guid":"/^((\\{4c4ceb83-f3f1-ad73-bfe0-259a371ed872\\})|(\\{a941b5ab-8894-41e1-a2ca-c5a6e2769c5f\\})|(\\{56488007-bd74-4702-9b6d-aee8f6cc05ea\\})|(\\{9eebac07-ac86-4be7-928f-e1015f858eee\\})|(\\{5a993517-5be7-480e-a86c-b8e8109fa774\\})|(\\{309ad78e-efff-43cf-910c-76361c536b20\\})|(\\{cefcf45b-dfec-4072-9ffc-317094c69c28\\})|(\\{5b04980b-25e9-4bc6-b6ea-02c58d86cc5e\\})|(\\{0021a844-360f-480e-ac53-47391b7b17b4\\})|(\\{2bed9f51-62a8-4471-b23c-827e6727c794\\})|(\\{7d2130d3-d724-4f58-b6b7-8537a9e09d4c\\})|(\\{ccd3847a-e5ec-4d28-bf98-340230dcbd4d\\})|(\\{83716b9b-6e6e-4471-af76-2d846f5804f3\\})|(\\{5154c03a-4bfc-4b13-86a9-0581a7d8c26d\\})|(\\{24f51c5c-e3f5-4667-bd6c-0be4f6ef5cc2\\})|(\\{73554774-4390-4b00-a5b9-84e8e06d6f3c\\})|(\\{c70cfd12-6dc3-4021-97f2-68057b3b759b\\})|(\\{ef5fe17b-eb6a-4e5e-9c18-9d423525bbbd\\})|(\\{461eb9b4-953c-4412-998e-9452a7cb42e0\\})|(\\{966b00fe-40b0-4d4b-8fde-6deca31c577b\\})|(\\{dab908ac-e1b0-4d7e-bc2e-86a15f37621f\\})|(\\{01a067d3-7bfa-44ac-8da7-2474a0114a7e\\})|(\\{6126261f-d025-4254-a1db-068a48113b11\\})|(\\{6c80453f-05ec-4243-bb71-e1aac5e59cae\\})|(\\{f94ec34b-5590-4518-8546-c1c3a94a5731\\})|(\\{5d4c049e-7433-485a-ac62-dd6e41af1a73\\})|(\\{507f643d-6db8-47fe-af9c-7a7b85a86d83\\})|(\\{5c56eeb4-f97c-4b0d-a72f-8e639fbaf295\\})|(\\{2ef98f55-1e26-40d3-a113-a004618a772e\\})|(\\{77d58874-d516-4b00-b68a-2d987ef83ec5\\})|(\\{7a0755d3-3ba2-4b19-98ce-efcdc36423fc\\})|(\\{47ee3ba1-8974-4f71-b8a4-8033d8c2155f\\})|(\\{a477f774-bc36-4cc8-85bd-99f6b04ea255\\})|(\\{1a2e41e3-4343-4a00-90cd-ce77ac77a8af\\})|(\\{7b180e9a-afd6-4693-94a1-c7b5ed9b46fa\\})|(\\{51f76862-f222-414d-8724-6063f61bbabf\\})|(\\{d47a0c63-ac4c-48ce-8fc7-c5abc81d7f75\\})|(\\{b8adf653-f262-413c-b955-100213b105ad\\})|(\\{ccedf35b-dfd6-417a-80de-fb432948861d\\})|(\\{70e29b0e-7cd8-40df-b560-cf6eb066350d\\})|(\\{9926f8ad-b4c3-4122-a033-1b8a5db416db\\})|(\\{62eefb1c-a2d8-40ba-ab94-9fc2f2d31b2f\\})|(\\{17f14919-00bd-44a4-8c14-78ab9728038f\\})|(\\{20e36a3e-672c-4448-9efb-5750cbffe90c\\})|(\\{6070c95f-6460-4ffd-9846-2bbd7238697f\\})|(\\{1edb8a4e-f105-4623-9e19-e40fb082b132\\})|(\\{223a1503-772d-45eb-8cb8-e2e49563703d\\})|(\\{59e0f01c-1f70-445c-a572-7be5d85549bd\\})|(\\{8ec160b7-1089-4944-a999-a1d6afa71c5d\\})|(\\{d2d111d6-0ea1-4880-ae7b-2e82dff3a719\\})|(\\{cfacacd6-191c-46c4-b78c-8a48289b2829\\})|(\\{1155e72f-2b21-433f-ba9a-5af6ed40c8ee\\})|(\\{583910bd-759f-40f6-b96a-1d678d65650f\\}))$/","prefs":[],"schema":1545162093238,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1514865","why":"Remote script injection and data exfiltration","name":"Various add-ons using .cool domains"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"53168513-103a-4ea0-a48f-bc291354cc9f","last_modified":1545232187960},{"guid":"{56a1e8d2-3ced-4919-aca5-ddd58e0f31ef}","prefs":[],"schema":1544470901949,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491312","why":"The add-on introduces unwanted functionality for users.","name":"Web Guard (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1dc366d6-c774-4eca-af19-4f9495c2c55e","last_modified":1544544484935},{"guid":"/^((\\{a99e680b-4349-42a5-b292-79b349bf4f3d\\})|(\\{f09a2393-1e6d-4ae4-a020-4772e94040ae\\})|(\\{c9ed9184-179f-485f-adb8-8bd8e9b7cee6\\})|(\\{085e53da-25a2-4162-906e-6c158ec977ac\\})|(\\{bd6960ba-7c06-493b-8cc4-0964a9968df5\\})|(\\{6eeec42e-a844-4bfd-a380-cfbfc988bd78\\})|(\\{3bbfb999-1c82-422e-b7a8-9e04649c7c51\\})|(\\{bfd229b6-089d-49e8-a09c-9ad652f056f6\\})|(\\{ab23eb77-1c96-4e20-b381-14dec82ee9b8\\})|(\\{ebcce9f0-6210-4cf3-a521-5c273924f5ba\\})|(\\{574aba9d-0573-4614-aec8-276fbc85741e\\})|(\\{12e75094-10b0-497b-92af-5405c053c73b\\})|(\\{99508271-f8c0-4ca9-a5f8-ee61e4bd6e86\\})|(\\{831beefc-cd8c-4bd5-a581-bba13d374973\\})|(\\{c8fe42db-b7e2-49e6-98c4-14ac369473a4\\})|(\\{f8927cca-e6cb-4faf-941d-928f84eb937f\\})|(\\{17e9f867-9402-4b19-8686-f0c2b02d378f\\})|(\\{f12ac367-199b-4cad-8e5a-0a7a1135cad0\\})|(\\{487003ce-5253-4eab-bf76-684f26365168\\})|(\\{487003ce-5213-2ecb-bf16-684f25365161\\}))$/","prefs":[],"schema":1543088493623,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1509864","why":"Add-ons that track users and load remote code, while pretending to provide cursor customization features.","name":"Various cursor and update add-ons (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a8d942b3-779d-4391-a39c-58c746c13b70","last_modified":1543241996691},{"guid":"{97f19f1f-dbb0-4e50-8b46-8091318617bc}","prefs":[],"schema":1542229276053,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1507191","why":"Fraudulent Adobe Reader add-on","name":"Adobe Reader (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"03120522-ee87-4cf8-891a-acfb248536ff","last_modified":1542272674851},{"guid":"/^((video-downloader@vd\\.io)|(image-search-reverse@an\\.br)|(YouTube\\.Downloader@2\\.8)|(eMoji@ems-al\\.io))$/","prefs":[],"schema":1542023230755,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1506560","why":"Add-ons that contain malicious copies of third-party libraries.","name":"Malware containing unwanted behavior"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cd079abe-8e8d-476f-a550-63f75ac09fe8","last_modified":1542025588071},{"guid":"/^({b384b75c-c978-4c4d-b3cf-62a82d8f8f12})|({b471eba0-dc87-495e-bb4f-dc02c8b1dc39})|({36f623de-750c-4498-a5d3-ac720e6bfea3})$/","prefs":[],"schema":1541360505662,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504619","why":"Add-ons that contain unwanted behavior.","name":"Google Translate (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aa5eefa7-716a-45a6-870b-4697b023d894","last_modified":1541435973146},{"guid":"{80869932-37ba-4dd4-8dfe-2ef30a2067cc}","prefs":[],"schema":1538941301306,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1497161","why":"Malicious page redirection","name":"Iridium (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"dd5b0fa4-48fd-4bf6-943d-34de125bf502","last_modified":1538996335645},{"guid":"admin@vietbacsecurity.com","prefs":[],"schema":1537309741764,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491716","why":"Logging and sending keystrokes to a remote server.","name":"Vietnamese Input Method (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"89d714f6-9f35-4107-b8af-a16777f66337","last_modified":1537309752952},{"guid":"Safe@vietbacsecurity.com","prefs":[],"schema":1537309684266,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491717","why":"Logging and sending keystrokes to a remote server.","name":"SafeKids (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c651780e-c185-4d6c-b509-d34673c158a3","last_modified":1537309741758},{"guid":"/^((\\{c9226c62-9948-4038-b247-2b95a921135b\\})|(\\{5de34d4f-b891-4575-b54b-54c53b4e6418\\})|(\\{9f7ac3be-8f1c-47c6-8ebe-655b29eb7f21\\})|(\\{bb33ccaf-e279-4253-8946-cfae19a35aa4\\}))$/","prefs":[],"schema":1537305338753,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491298","why":"These add-ons inject remote malicious scripts on Google websites.","name":"Dll and similar (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"54b3e69a-40ae-4be5-b7cf-cf51c526dcfb","last_modified":1537306138745},{"guid":"updater-pro-unlisted@mozilla.com","prefs":[],"schema":1537305285414,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491306","why":"Redirects search queries.","name":"Updater Pro (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3108c151-9f25-4eca-8d80-a2fbb2d9bd07","last_modified":1537305338747},{"guid":"/^((\\{686fc9c5-c339-43db-b93a-5181a217f9a6\\})|(\\{eb4b28c8-7f2d-4327-a00c-40de4299ba44\\})|(\\{58d735b4-9d6c-4e37-b146-7b9f7e79e318\\})|(\\{ff608c10-2abc-415c-9fe8-0fdd8e988de8\\})|(\\{5a8145e2-6cbb-4509-a268-f3121429656c\\})|(\\{6d451f29-1d6b-4c34-a510-c1234488b0a3\\})|(\\{de71f09a-3342-48c5-95c1-4b0f17567554\\})|(\\{df106b04-984e-4e27-97b6-3f3150e98a9e\\})|(\\{70DE470A-4DC0-11E6-A074-0C08D310C1A8\\})|(\\{4dcde019-2a1b-499b-a5cd-322828e1279b\\})|(\\{1ec3563f-1567-49a6-bb5c-75d52334b01c\\})|(\\{c140c82e-98e6-49fd-ae17-0627e6f7c5e1\\})|(\\{2581c1f6-5ad9-48d4-8008-4c37dcea1984\\})|(\\{a2bcc6f7-14f7-4083-b4b0-c335edc68612\\})|(\\{4c726bb6-a2af-44ed-b498-794cfd8d8838\\})|(\\{fa6c39a6-cd11-477b-966d-f388f0ba4203\\})|(\\{26c7bd04-18d3-47f5-aeec-bb54e562acf2\\})|(\\{7a961c90-2071-4f94-9d9a-d4e3bbf247c0\\})|(\\{a0481ea2-03f0-4e56-a0e1-030908ecb43e\\})|(\\{c98fb54e-d25f-43f4-bd72-dfaa736391e2\\})|(\\{da57263d-adfc-4768-91f7-b3b076c20d63\\})|(\\{3abb352c-8735-4fb6-9fd6-8117aea3d705\\})|(contactus@unzipper\\.com)|(\\{a1499769-6978-4647-ac0f-78da4652716d\\})|(\\{581D0A4C-1013-11E7-938B-FCD2A0406E17\\})|(\\{68feffe4-bfd8-4fc3-8320-8178a3b7aa67\\})|(\\{823489ae-1bf8-4403-acdd-ea1bdc6431da\\})|(\\{4c0d11c3-ee81-4f73-a63c-da23d8388abd\\})|(\\{dc7d2ecc-9cc3-40d7-93ed-ef6f3219bd6f\\})|(\\{21f29077-6271-46fc-8a79-abaeedb2002b\\})|(\\{55d15d4d-da76-44ab-95a3-639315be5ef8\\})|(\\{edfbec6b-8432-4856-930d-feb334fb69c1\\})|(\\{f81a3bf7-d626-48cf-bd24-64e111ddc580\\})|(\\{4407ab94-60ae-4526-b1ab-2521ffd285c7\\})|(\\{4aa2ba11-f87b-4950-8250-cd977252e556\\})|(\\{646b0c4d-4c6f-429d-9b09-37101b36ed1c\\})|(\\{1b2d76f1-4906-42d2-9643-0ce928505dab\\})|(\\{1869f89d-5f15-4c0d-b993-2fa8f09694fb\\})|(\\{7e4edd36-e3a6-4ddb-9e98-22b4e9eb4721\\})|(\\{e9c9ad8c-84ba-43f2-9ae2-c1448694a2a0\\})|(\\{6b2bb4f0-78ea-47c2-a03a-f4bf8f916eda\\})|(\\{539e1692-5841-4ac6-b0cd-40db15c34738\\}))$/","prefs":[],"schema":1536183366865,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1488578","why":"These add-ons take away user control by redirecting search.","name":"Tightrope search add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"81eb67a5-3fdb-448c-aadd-5f4d3b7cf281","last_modified":1536186868443},{"guid":"/^((\\{f01a138a-c051-4bc7-a90a-21151ce05755\\})|(\\{50f78250-63ce-4191-b7c3-e0efc6309b64\\})|(\\{3d2b2ff4-126b-4874-a57e-ed7dac670230\\})|(\\{e7c1abd4-ec8e-4519-8f3a-7bd763b8a353\\})|(\\{4d40bf75-fbe2-45f6-a119-b191c2dd33b0\\})|(\\{08df7ff2-dee0-453c-b85e-f3369add18ef\\}))$/","prefs":[],"schema":1535990752587,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1488248","why":"Add-ons that inject malicious remote code.","name":"Various Malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"67f72634-e170-4860-a5a3-133f160ebc32","last_modified":1535992146430},{"guid":"/^((\\{1cfaec8b-a1cb-4fc5-b139-897a22a71390\\})|(\\{2ed89659-09c1-4280-9dd7-1daf69272a86\\})|(\\{5c82f5cc-31f8-4316-bb7d-45a5c05227e6\\})|(\\{6a98a401-378c-4eac-b93c-da1036a00c6c\\})|(\\{6d83ebde-6396-483c-b078-57c9d445abfa\\})|(\\{07efb887-b09f-4028-8f7f-c0036d0485ea\\})|(\\{36f4882f-ff0b-4865-8674-ef02a937f7da\\})|(\\{61dea9e9-922d-4218-acdd-cfef0fdf85e7\\})|(\\{261be583-9695-48e0-bd93-a4feafaa18e6\\})|(\\{401ae092-6c5c-4771-9a87-a6827be80224\\})|(\\{534b7a84-9fc6-4d7c-9d67-e3365d2ae088\\})|(\\{552a949f-6d0e-402d-903d-1550075541ba\\})|(\\{579b8de8-c461-4301-ab09-695579f9b7c7\\})|(\\{754d3be3-7337-488e-a5bb-86487e495495\\})|(\\{2775f69b-75e4-46cb-a5aa-f819624bd9a6\\})|(\\{41290ec4-b3f0-45ad-b8f3-7bcbca01ed0d\\})|(\\{0159131f-d76f-4365-81cd-d6831549b90a\\})|(\\{01527332-1170-4f20-a65b-376e25438f3d\\})|(\\{760e6ff0-798d-4291-9d5f-12f48ef7658b\\})|(\\{7e31c21c-156a-4783-b1ce-df0274a89c75\\})|(\\{8e247308-a68a-4280-b0e2-a14c2f15180a\\})|(\\{b6d36fe8-eca1-4d85-859e-a4cc74debfed\\})|(\\{bab0e844-2979-407f-9264-c87ebe279e72\\})|(\\{d00f78fe-ee73-4589-b120-5723b9a64aa0\\})|(\\{d59a7294-6c08-4ad5-ba6d-a3bc41851de5\\})|(\\{d145aa5b-6e66-40cb-8a08-d55a53fc7058\\})|(\\{d79962e3-4511-4c44-8a40-aed6d32a53b1\\})|(\\{e3e2a47e-7295-426f-8517-e72c31da3f23\\})|(\\{e6348f01-841d-419f-8298-93d6adb0b022\\})|(\\{eb6f8a22-d96e-4727-9167-be68c7d0a7e9\\})|(\\{fdd72dfe-e10b-468b-8508-4de34f4e95e3\\}))$/","prefs":[],"schema":1535830899087,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487472","why":"Several add-ons that change forcefully override search settings.","name":"Various malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"43f11241-88e3-4139-9f02-ac39489a241f","last_modified":1535990735167},{"guid":"/^((application2@fr-metoun\\.com)|(application@br-annitop\\.com)|(application@br-atoleg\\.com)|(application@br-cholty\\.com)|(application@br-debozoiz\\.com)|(application@br-echite\\.com)|(application@br-estracep\\.com)|(application@br-exatrom\\.com)|(application@br-iginot\\.com)|(application@br-imastifi\\.com)|(application@br-isobiv\\.com)|(application@br-ludimaro\\.com)|(application@br-pintoula\\.com)|(application@br-proufta\\.com)|(application@br-qhirta\\.com)|(application@br-qibizar\\.com)|(application@br-qopletr\\.com)|(application@br-roblaprouf\\.com)|(application@br-rosalop\\.com)|(application@br-samalag\\.com)|(application@br-sopreni\\.com)|(application@br-stoumo\\.com)|(application@br-villonat\\.com)|(application@br-zoobre\\.com)|(application@de-barbuna\\.com)|(application@de-bicelou\\.com)|(application@de-blabuma\\.com)|(application@de-dalofir\\.com)|(application@de-elplic\\.com)|(application@de-erotah\\.com)|(application@de-ertuck\\.com)|(application@de-eurosty\\.com)|(application@de-ezigat\\.com)|(application@de-lorelam\\.com)|(application@de-losimt\\.com)|(application@de-luchil\\.com)|(application@de-miligap\\.com)|(application@de-open-dog\\.com)|(application@de-rydima\\.com)|(application@de-slapapi\\.com)|(application@de-soqano\\.com)|(application@de-treboola\\.com)|(application@de-vasurk\\.com)|(application@de-ygivas\\.com)|(application@es-biloufer\\.com)|(application@es-boulass\\.com)|(application@es-cemaseur\\.com)|(application@es-elixet\\.com)|(application@es-gestona\\.com)|(application@es-glicalol\\.com)|(application@es-griloup\\.com)|(application@es-iblep\\.com)|(application@es-iglere\\.com)|(application@es-jounyl\\.com)|(application@es-klepst\\.com)|(application@es-nofinaj\\.com)|(application@es-ofarnut\\.com)|(application@es-phistouquet\\.com)|(application@es-pronzal\\.com)|(application@es-roterf\\.com)|(application@es-taapas\\.com)|(application@es-tatoflex\\.com)|(application@fr-acomyl\\.com)|(application@fr-avortep\\.com)|(application@fr-blicac\\.com)|(application@fr-bloubil\\.com)|(application@fr-carazouco\\.com)|(application@fr-cichalou\\.com)|(application@fr-consimis\\.com)|(application@fr-cropam\\.com)|(application@fr-deplitg\\.com)|(application@fr-doadoto\\.com)|(application@fr-domeoco\\.com)|(application@fr-domlaji\\.com)|(application@fr-eferif\\.com)|(application@fr-eivlot\\.com)|(application@fr-eristrass\\.com)|(application@fr-ertike\\.com)|(application@fr-esiliq\\.com)|(application@fr-fedurol\\.com)|(application@fr-grilsta\\.com)|(application@fr-hyjouco\\.com)|(application@fr-intramys\\.com)|(application@fr-istrubil\\.com)|(application@fr-javelas\\.com)|(application@fr-jusftip\\.com)|(application@fr-lolaji\\.com)|(application@fr-macoulpa\\.com)|(application@fr-mareps\\.com)|(application@fr-metoun\\.com)|(application@fr-metyga\\.com)|(application@fr-mimaloy\\.com)|(application@fr-monstegou\\.com)|(application@fr-oplaff\\.com)|(application@fr-ortisul\\.com)|(application@fr-pastamicle\\.com)|(application@fr-petrlimado\\.com)|(application@fr-pinadolada\\.com)|(application@fr-raepdi\\.com)|(application@fr-soudamo\\.com)|(application@fr-stoumo\\.com)|(application@fr-stropemer\\.com)|(application@fr-tlapel\\.com)|(application@fr-tresdumil\\.com)|(application@fr-troglit\\.com)|(application@fr-troplip\\.com)|(application@fr-tropset\\.com)|(application@fr-vlouma)|(application@fr-yetras\\.com)|(application@fr-zorbil\\.com)|(application@fr-zoublet\\.com)|(application@it-bipoel\\.com)|(application@it-eneude\\.com)|(application@it-glucmu\\.com)|(application@it-greskof\\.com)|(application@it-gripoal\\.com)|(application@it-janomirg\\.com)|(application@it-lapretofe\\.com)|(application@it-oomatie\\.com)|(application@it-platoks\\.com)|(application@it-plopatic\\.com)|(application@it-riploi\\.com)|(application@it-sabuf\\.com)|(application@it-selbamo\\.com)|(application@it-sjilota\\.com)|(application@it-stoploco\\.com)|(application@it-teryom\\.com)|(application@it-tyhfepa\\.com)|(application@it-ujdilon\\.com)|(application@it-zunelrish\\.com)|(application@uk-ablapol\\.com)|(application@uk-blamap\\.com)|(application@uk-cepamoa\\.com)|(application@uk-cloakyz\\.com)|(application@uk-crisofil\\.com)|(application@uk-donasip\\.com)|(application@uk-fanibi\\.com)|(application@uk-intramys\\.com)|(application@uk-klastaf\\.com)|(application@uk-liloust\\.com)|(application@uk-logmati\\.com)|(application@uk-manulap\\.com)|(application@uk-misafou\\.com)|(application@uk-nedmaf\\.com)|(application@uk-optalme\\.com)|(application@uk-plifacil\\.com)|(application@uk-poulilax\\.com)|(application@uk-rastafroc\\.com)|(application@uk-ruflec\\.com)|(application@uk-sabrelpt\\.com)|(application@uk-sqadipt\\.com)|(application@uk-tetsop\\.com)|(application@uk-ustif\\.com)|(application@uk-vomesq\\.com)|(application@uk-vrinotd\\.com)|(application@us-estuky\\.com)|(application@us-lesgsyo\\.com)|(applicationY@search-lesgsyo\\.com)|(\\{88069ce6-2762-4e02-a994-004b48bd83c1\\}))$/","prefs":[],"schema":1535701078449,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487627","why":"Add-ons whose main purpose is to track user browsing behavior.","name":"Abusive add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"914ec360-d35e-4420-a88f-1bad3513f054","last_modified":1535705400394},{"guid":"/^((\\{35253b0b-8109-437f-b8fa-d7e690d3bde1\\})|(\\{0c8d774c-0447-11e7-a3b1-1b43e3911f03\\})|(\\{c11f85de-0bf8-11e7-9dcd-83433cae2e8e\\})|(\\{f9f072c8-5357-11e7-bb4c-c37ea2335fb4\\})|(\\{b6d09408-a35e-11e7-bc48-f3e9438e081e\\}))$/","prefs":[],"schema":1535658090284,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1486754","why":"Add-ons that execute remote malicious code.","name":"Several malicious add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"56bd2f99-57eb-4904-840a-23ca155d93ad","last_modified":1535701073599},{"guid":"/^((fireAnalytics\\.download@mozilla\\.com)|(fireabsorb@mozilla\\.com)|(fireaccent@mozilla\\.com)|(fireaccept@mozilla\\.com)|(fireads@mozilla\\.com)|(firealerts@mozilla\\.com)|(fireapi@mozilla\\.com)|(fireapp@mozilla\\.com)|(fireattribution@mozilla\\.com)|(fireauthenticator@mozilla\\.com)|(firecalendar@mozilla\\.com)|(firemail@mozilla\\.com)|(firemarketplace@mozilla\\.com)|(firequestions@mozilla\\.com)|(firescript@mozilla\\.com)|(firesheets@mozilla\\.com)|(firespam@mozilla\\.com)|(firesuite@mozilla\\.com)|(\\{3b6dfc8f-e8ed-4b4c-b616-bdc8c526ac1d\\})|(\\{834f87db-0ff7-4518-89a0-0167a963a869\\})|(\\{4921fe4d-fbe6-4806-8eed-346d7aff7c75\\})|(\\{07809949-bd7d-40a6-a17b-19807448f77d\\})|(\\{68968617-cc8b-4c25-9c38-34646cdbe43e\\})|(\\{b8b2c0e1-f85d-4acd-aeb1-b6308a473874\\})|(\\{bc0b3499-f772-468e-9de6-b4aaf65d2bbb\\}))$/","prefs":[],"schema":1535555549913,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1486636","why":"Add-ons that hijack search settings.","name":"Various malicious add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"fcd12629-43df-4751-9654-7cc008f8f7c0","last_modified":1535555562143},{"guid":"/^((\\{25211004-63e4-4a94-9c71-bdfeabb72bfe\\})|(\\{cbf23b92-ea55-4ca9-a5ae-f4197e286bc8\\})|(\\{7ac0550e-19cb-4d22-be12-b0b352144b33\\})|(Mada111@mozilla\\.com)|(\\{c71709a9-af59-4958-a587-646c8c314c16\\})|(\\{6ac3f3b4-18db-4f69-a210-7babefd94b1e\\})|(addon@fastsearch\\.me)|(\\{53d152fa-0ae0-47f1-97bf-c97ca3051562\\})|(\\{f9071611-24ee-472b-b106-f5e2f40bbe54\\})|(\\{972920f1-3bfd-4e99-b605-8688a94c3c85\\})|(\\{985afe98-fa74-4932-8026-4bdc880552ac\\})|(\\{d96a82f5-5d3e-46ed-945f-7c62c20b7644\\})|(\\{3a036dc5-c13b-499a-a62d-e18aab59d485\\})|(\\{49574957-56c6-4477-87f1-1ac7fa1b2299\\})|(\\{097006e8-9a95-4f7c-9c2f-59f20c61771c\\})|(\\{8619885d-0380-467a-b3fe-92a115299c32\\})|(\\{aa0587d6-4760-4abe-b3a1-2a5958f46775\\})|(\\{bdada7ae-cf89-46cf-b1fe-f3681f596278\\})|(\\{649bead3-df51-4023-8090-02ceb2f7095a\\})|(\\{097c3142-0b68-416a-9919-9dd576aedc17\\})|(\\{bc3cced8-51f0-4519-89ee-56706b67ea4b\\})|(\\{796da6e3-01c0-4c63-96dd-1737710b2ff6\\}))$/","prefs":[],"schema":1535485297866,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487083","why":"Add-ons that hijack search settings and contain other unwanted features.","name":"Vairous malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"016676cc-c381-4c01-adcf-2d46f48142d0","last_modified":1535550828514},{"guid":"/^((Timemetric@tmetric)|(image-fastpicker@eight04.blogspot\\.com)|(textMarkertool@underFlyingBirches\\.org)|(youpanel@jetpack)|({0ff32ce0-dee9-4e7e-9260-65e58373e21d})|({4ca00873-7e8d-4ada-b460-96cad0eb8fa9})|({6b427f73-2ee1-4256-b69d-7dc253ebe030})|({6f13489d-b274-45b6-80fa-e9daa140e1a4})|({40a9d23b-09ef-4c82-ae1d-7fc5c067e987})|({205c2185-ebe4-4106-92ab-0ffa7c4efcbb})|({256ec7b0-57b4-416d-91c1-2bfdf01b2438})|({568db771-c718-4587-bcd0-e3728ee53550})|({5782a0f1-de26-42e5-a5b3-dae9ec05221b})|({9077390b-89a9-41ad-998f-ab973e37f26f})|({8e7269ac-a171-4d9f-9c0a-c504848fd52f})|({3e6586e2-7410-4f10-bba0-914abfc3a0b4})|({b3f06312-93c7-4a4f-a78b-f5defc185d8f})|({c1aee371-4401-4bab-937a-ceb15c2323c1})|({c579191c-6bb8-4795-adca-d1bf180b512d})|({d0aa0ad2-15ed-4415-8ef5-723f303c2a67})|({d8157e0c-bf39-42eb-a0c3-051ff9724a8c})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({ee97f92d-1bfe-4e9d-816c-0dfcd63a6206}))$/","prefs":[],"schema":1535356061028,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1485145","why":"Add-ons that run remote malicious code from websites that trick the user into installing the add-on.","name":"Malware running remote malicious code"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a0d44ee3-9492-47d7-ac1c-35f520e819ae","last_modified":1535393877555},{"guid":"/^((fastplayer@fastsearch\\.me)|(ff-search-flash-unlisted@mozilla\\.com)|(inspiratiooo-unlisted@mozilla\\.com)|(lite-search-ff-unlisted@mozilla\\.com)|(mysearchprotect-unlisted@mozilla\\.com)|(pdfconverter-unlisted@mozilla\\.com)|(plugin-search-ff-unlisted@mozilla\\.com)|(pro-search-ff-unlisted@mozilla\\.com)|(pro-search-unlisted@mozilla\\.com)|(searchincognito-unlisted@mozilla\\.com)|(socopoco-search@mozilla\\.com)|(socopoco-unlisted@mozilla\\.com)|(\\{08ea1e08-e237-42e7-ad60-811398c21d58\\})|(\\{0a56e2a0-a374-48b6-9afc-976680fab110\\})|(\\{193b040d-2a00-4406-b9ae-e0d345b53201\\})|(\\{1ffa2e79-7cd4-4fbf-8034-20bcb3463d20\\})|(\\{528cbbe2-3cde-4331-9344-e348cb310783\\})|(\\{6f7c2a42-515a-4797-b615-eaa9d78e8c80\\})|(\\{be2a3fba-7ea2-48b9-bbae-dffa7ae45ef8\\})|(\\{c0231a6b-c8c8-4453-abc9-c4a999a863bd\\}))$/","prefs":[],"schema":1535139689975,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483854","why":"Add-ons overwriting search changes without consent and remote script injection","name":"\"Flash Updater\" and search redirectors"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"46779b5a-2369-4007-bff0-857a657626ba","last_modified":1535153064735},{"guid":"/^(({aeac6f90-5e17-46fe-8e81-9007264b907d})|({6ee25421-1bd5-4f0c-9924-79eb29a8889d})|({b317fa11-c23d-45b9-9fd8-9df41a094525})|({16ac3e8f-507a-4e04-966b-0247a196c0b4}))$/","prefs":[],"schema":1534946831027,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1485609","why":"Add-ons that take away user control by changing search settings.","name":"Search hijacking malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ab029019-0e93-450a-8c11-ac31556c2a77","last_modified":1535020847820},{"guid":"@testpilot-addon","prefs":[],"schema":1534876689555,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1485083","why":"Older versions of the TestPilot add-on cause stability issues in Firefox.","name":"Testpilot (old, broken versions)"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.8-dev-259fe19","minVersion":"0"}],"id":"ee2d12a4-ea1d-4f3d-9df1-4303e8993f18","last_modified":1534946810180},{"guid":"/(({a4d84dae-7906-4064-911b-3ad2b1ec178b})|({d7e388c5-1cd0-4aa6-8888-9172f90951fb})|({a67f4004-855f-4e6f-8ef0-2ac735614967})|({25230eb3-db35-4613-8c03-e9a3912b7004})|({37384122-9046-4ff9-a31f-963767d9fe33})|({f1479b0b-0762-4ba2-97fc-010ea9dd4e73})|({53804e15-69e5-4b24-8883-c8f68bd98cf6})|({0f2aec80-aade-46b8-838c-54eeb595aa96})|({b65d6378-6840-4da6-b30e-dee113f680aa})|({e8fc3f33-14b7-41aa-88a1-d0d7b5641a50})|({c49ee246-d3d2-4e88-bfdb-4a3b4de9f974}))$/","prefs":[],"schema":1534621297612,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484536","why":"Add-ons that don't respect user choice by overriding search.","name":"Search hijacking add-ons (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"01c22882-868b-43e1-bb23-29d5dc7bc11b","last_modified":1534781959544},{"guid":"/^((firefox@browser-security\\.de)|(firefox@smarttube\\.io)|({0fde9597-0508-47ff-ad8a-793fa059c4e7})|(info@browser-privacy\\.com)|({d3b98a68-fd64-4763-8b66-e15e47ef000a})|({36ea170d-2586-45fb-9f48-5f6b6fd59da7})|(youtubemp3converter@yttools\\.io)|(simplysearch@dirtylittlehelpers\\.com)|(extreme@smarttube\\.io)|(selfdestructingcookies@dirtylittlehelpers\\.com)|({27a1b6d8-c6c9-4ddd-bf20-3afa0ccf5040})|({2e9cae8b-ee3f-4762-a39e-b53d31dffd37})|(adblock@smarttube\\.io)|({a659bdfa-dbbe-4e58-baf8-70a6975e47d0})|({f9455ec1-203a-4fe8-95b6-f6c54a9e56af})|({8c85526d-1be9-4b96-9462-aa48a811f4cf})|(mail@quick-buttons\\.de)|(youtubeadblocker@yttools\\.io)|(extension@browser-safety\\.org)|(contact@web-security\\.com)|(videodownloader@dirtylittlehelpers\\.com)|(googlenotrack@dirtylittlehelpers\\.com)|(develop@quick-amz\\.com))$/","prefs":[],"schema":1534448497752,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483995","why":"Sending user data to remote servers unnecessarily, and potential for remote code execution. Suspicious account activity for multiple accounts on AMO.","name":"Web Security and others"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"96b2e7d5-d4e4-425e-b275-086dc7ccd6ad","last_modified":1534449179691},{"guid":"/^((de\\.firefoxextension12345@asdf\\.pl)|(deex1@de\\.com)|(esex1@ese\\.com)|(estrellach@protonmail\\.com)|(fifi312@protonmail\\.com)|(finex1@fin\\.com)|(firefoxextension123@asdf\\.pl)|(firefoxextension1234@asdf\\.pl)|(firefoxextension12345@asdf\\.pl)|(firefoxextension123456@asdf\\.pl)|(frexff1@frexff1\\.com)|(frexff2@frexff2\\.com)|(frexff3@frexff3\\.com)|(ind@niepodam\\.pl)|(jacob4311@protonmail\\.com)|(javonnu144@protonmail\\.com)|(keellon33-ff@protonmail\\.com)|(keellon33@protonmail\\.com)|(masetoo4113@protonmail\\.com)|(mikecosenti11@protonmail\\.com)|(paigecho@protonmail\\.com)|(salooo12@protonmail\\.com)|(swex1@swe\\.com)|(swex2@swe\\.com)|(swex3@swe\\.com)|(willburpoor@protonmail\\.com)|(williamhibburn@protonmail\\.com)|)$/","prefs":[],"schema":1534415492022,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483769","why":"Malware targeting Facebook","name":"Facebook malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"202fbae4-e904-430a-a244-63b0fb04385f","last_modified":1534415530239},{"guid":"/^((@svuznnqyxinw)|(myprivacytools@besttools\\.com)|(powertools@penprivacy\\.com)|(privacypro@mybestprivacy\\.com)|(realsecure@top10\\.com)|(rlbvpdfrlbgx@scoutee\\.net)|(vfjkurlfijwz@scoutee\\.net))$/","prefs":[],"schema":1534382102271,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1482322","why":"Add-ons that change the default search engine, taking away user control.","name":"Search hijacking add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"df852b6a-28be-4b10-9285-869f4761f111","last_modified":1534382538298},{"guid":"/^(({1a3fb414-0945-405c-a62a-9fe5e1a50c69})|({1a45f6aa-d80a-4317-84d2-0ce43671b08a})|({2d52a462-8bec-4708-9cd1-894b682bdc78})|({3f841cfc-de5a-421f-8bd7-2bf1d943b02a})|({5c7601bf-522b-47e5-b0f0-ea0e706af443})|({7ebe580f-71c9-4ef8-8073-f38deaeb9dfb})|({8b2188fd-1daf-4851-b387-28d964014353})|({8cee42ac-f1fe-40ae-aed6-24e3b76b2f77})|({8d13c4a9-5e8c-47a6-b583-681c83164ac9})|({9b1d775a-1877-45c9-ad48-d6fcfa4fff39})|({9efdbe5f-6e51-4a35-a41b-71dc939e6221})|({23f63efb-156e-440b-a96c-118bebc21057})|({026dfc8c-ecc8-41ba-b45f-70ffbd5cc672})|({34aa433c-27e9-4c87-a662-9f82f99eb9af})|({36f34d69-f22f-47c3-b4cd-4f37b7676107})|({39bd8607-0af4-4d6b-bd69-9a63c1825d3c})|({48c6ad6d-297c-4074-8fef-ca5f07683859})|({54aa688d-9504-481d-ba75-cfee421b98e0})|({59f59748-e6a8-4b41-87b5-9baadd75ddef})|({61d99407-1231-4edc-acc8-ab96cbbcf151})|({68ca8e3a-397a-4135-a3af-b6e4068a1eae})|({71beafd6-779b-4b7d-a78b-18a107277b59})|({83ed90f8-b07e-4c45-ba6b-ba2fe12cebb6})|({231dfb44-98e0-4bc4-b6ee-1dac4a836b08})|({273f0bce-33f4-45f6-ae03-df67df3864c2})|({392f4252-c731-4715-9f8d-d5815f766abb})|({484ec5d0-4cfd-4d96-88d0-a349bfc33780})|({569dbf47-cc10-41c4-8fd5-5f6cf4a833c7})|({578cad7a-57d5-404d-8dda-4d30de33b0c2})|({986b2c3f-e335-4b39-b3ad-46caf809d3aa})|({1091c11f-5983-410e-a715-0968754cff54})|({2330eb8a-e3fe-4b2e-9f17-9ddbfb96e6f5})|({5920b042-0af1-4658-97c1-602315d3b93d})|({6331a47f-8aae-490c-a9ad-eae786b4349f})|({6698b988-c3ef-4e1f-8740-08d52719eab5})|({30516f71-88d4-489b-a27f-d00a63ad459f})|({12089699-5570-4bf6-890f-07e7f674aa6e})|({84887738-92bf-4903-a5e8-695fd078c657})|({8562e48e-3723-412a-9ebd-b33d3d3b29dd})|({6e449795-c545-41be-92c0-5d467c147389})|({1e369c7c-6b61-436e-8978-4640687670d6})|({a03d427a-bd2e-42b6-828f-a57f38fac7b5})|({a77fc9b9-6ebb-418d-b0b6-86311c191158})|({a368025b-9828-43a1-8a5c-f6fab61c9be9})|({b1908b02-410d-4778-8856-7e259fbf471d})|({b9425ace-c2e9-4ec4-b564-4062546f4eca})|({b9845b5d-70c9-419c-a9a5-98ea8ee5cc01})|({ba99fee7-9806-4e32-8257-a33ffc3b8539})|({bdf8767d-ae4c-4d45-8f95-0ba29b910600})|({c6c4a718-cf91-4648-aa9b-170d66163cf2})|({ca0f2988-e1a8-4e83-afde-0dca56a17d5f})|({cac5db09-979b-40e3-8c8e-d96397b0eecb})|({d3b5280b-f8d8-4669-bdf6-91f23ae58042})|({d73d2f6a-ea24-4b1b-8c76-563fce9f786d})|({d77fed37-85c0-4b94-89bb-0d2849472b8d})|({d371abec-84bb-481b-acbf-235639451127})|({de47a3b4-dad1-4f4a-bdd6-8666586e29e8})|({ded6afad-2aaa-446b-b6bd-b12a8a61c945})|({e0c3a1ca-8e21-4d1b-b53b-ea115cf59172})|({e6bbf496-6489-4b48-8e5a-799aad4aa742})|({e63b262a-f9b8-4496-9c4b-9d3cbd6aea90})|({e73c1b5d-20f7-4d86-ad16-9de3c27718e2})|({eb01dc49-688f-4a21-aa8d-49bd88a8f319})|({edc9816b-60b4-493c-a090-01125e0b8018})|({effa2f97-0f07-44c8-99cb-32ac760a0621})|({f6e6fd9b-b89f-4e8d-9257-01405bc139a6})|({ff87977a-fefb-4a9d-b703-4b73dce8853d})|({ffea9e62-e516-4238-88a7-d6f9346f4955}))$/","prefs":[],"schema":1534335096640,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483191","why":"Add-ons that change the default search engine, taking away user control.","name":"Search hijacking add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d9892a76-b22e-40bd-8073-89b0f8110ec7","last_modified":1534336165428},{"guid":"/^((Timemetric@tmetric)|(textMarkertool@underFlyingBirches\\.org)|(youpanel@jetpack)|({6f13489d-b274-45b6-80fa-e9daa140e1a4})|({568db771-c718-4587-bcd0-e3728ee53550})|({829827cd-03be-4fed-af96-dd5997806fb4})|({9077390b-89a9-41ad-998f-ab973e37f26f})|({8e7269ac-a171-4d9f-9c0a-c504848fd52f})|({aaaffe20-3306-4c64-9fe5-66986ebb248e})|({bf153de7-cdf2-4554-af46-29dabfb2aa2d})|({c579191c-6bb8-4795-adca-d1bf180b512d})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({ee97f92d-1bfe-4e9d-816c-0dfcd63a6206}))$/","prefs":[],"schema":1534275699570,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483206","why":"Add-ons that execute malicious remote code","name":"Various malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2734325e-143b-4962-98bf-4b18c77407e2","last_modified":1534334500118},{"guid":"/^(({0f9e469e-4245-43f8-a7a8-7e730f80d284})|({117ca2f3-df4c-4e17-a5c5-b49077e9c731})|({11db147a-a1cb-43dd-9c05-0d11683483e1})|({1ed2af70-9e89-42db-a9e8-17ae594003ac})|({24ed6bdc-3085-413b-a62e-dc5dd30272f4})|({2aa19a7a-2a43-4e0d-a3dc-abb33fa7e2b6})|({3d6fbbb3-6c80-47bb-af20-56fcaebcb9ca})|({42f4c194-8929-42b9-a9a3-afa56dd0913b})|({46740fa0-896d-4f2e-a240-9478865c47c2})|({4718da68-a373-4a03-a77b-0f49b8bb40ee})|({4d41e0b8-bf7e-45ab-bd90-c426b420e3ee})|({50957a38-c15d-42da-94f5-325bc74a554c})|({5650fc63-a7c5-4627-8d0a-99b20dcbd94b})|({5c5c38ec-08bf-493a-9352-6ccf25d60c08})|({67ecb446-9ccd-4193-a27f-7bd1521bd03c})|({71f01ffe-226d-4634-9b21-968f5ce9f8f5})|({72f31855-2412-4998-a6ff-978f89bba0c3})|({7b3c1e86-2599-4e1a-ad98-767ae38286c8})|({7c37463c-001e-4f58-9e88-aaab2a624551})|({7de64f18-8e6b-4c41-9b05-d8872b418026})|({82dcf841-c7e1-4764-bb47-caa28909e447})|({872f20ea-196e-4d11-8835-1cc4c877b1b8})|({8efee317-546f-418d-82d3-60cc5187acf5})|({93deeba1-0126-43f7-a94d-4eecfce53b33})|({9cc12446-16da-4200-b284-d5fc18670825})|({9cd27996-6068-4597-8e97-bb63f783a224})|({9fdcedc7-ffde-44c3-94f6-4196b1e0d9fc})|({a191563e-ac30-4c5a-af3d-85bb9e9f9286})|({a4cb0430-c92e-44c6-9427-6a6629c4c5f6})|({a87f1b9b-8817-4bff-80fd-db96020c56c8})|({ae29a313-c6a9-48be-918d-1e4c67ba642f})|({b2cea58a-845d-4394-9b02-8a31cfbb4873})|({b420e2be-df31-4bea-83f4-103fe0aa558c})|({b77afcab-0971-4c50-9486-f6f54845a273})|({b868c6f4-5841-4c14-86ee-d60bbfd1cec1})|({b99ae7b1-aabb-4674-ba8f-14ed32d04e76})|({b9bb8009-3716-4d0c-bcb4-35f9874e931e})|({c53c4cbc-04a7-4771-9e97-c08c85871e1e})|({ce0d1384-b99b-478e-850a-fa6dfbe5a2d4})|({cf8e8789-e75d-4823-939f-c49a9ae7fba2})|({d0f67c53-42b5-4650-b343-d9664c04c838})|({dfa77d38-f67b-4c41-80d5-96470d804d09})|({e20c916e-12ea-445b-b6f6-a42ec801b9f8})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({e7d03b09-24b3-4d99-8e1b-c510f5d13612})|({fa8141ba-fa56-414e-91c0-898135c74c9d})|({fc99b961-5878-46b4-b091-6d2f507bf44d})|(firedocs@mozilla\\.com)|(firetasks@mozilla\\.com)|(getta@mozilla\\.com)|(javideo@mozilla\\.com)|(javideo2@mozilla\\.com)|(javideos@mozilla\\.com)|(javideosz@mozilla\\.com)|(search_free@mozilla\\.com)|(search-unlisted@mozilla\\.com)|(search-unlisted101125511@mozilla\\.com)|(search-unlisted10155511@mozilla\\.com)|(search-unlisted1025525511@mozilla\\.com)|(search-unlisted1099120071@mozilla\\.com)|(search-unlisted1099125511@mozilla\\.com)|(search-unlisted109925511@mozilla\\.com)|(search-unlisted11@mozilla\\.com)|(search-unlisted111@mozilla\\.com)|(search-unlisted12@mozilla\\.com)|(search-unlisted14400770034@mozilla\\.com)|(search-unlisted144007741154@mozilla\\.com)|(search-unlisted144436110034@mozilla\\.com)|(search-unlisted14454@mozilla\\.com)|(search-unlisted1570124111@mozilla\\.com)|(search-unlisted1570254441111@mozilla\\.com)|(search-unlisted15721239034@mozilla\\.com)|(search-unlisted157441@mozilla\\.com)|(search-unlisted15757771@mozilla\\.com)|(search-unlisted1577122001@mozilla\\.com)|(search-unlisted15777441001@mozilla\\.com)|(search-unlisted15788120036001@mozilla\\.com)|(search-unlisted157881200361111@mozilla\\.com)|(search-unlisted1578899961111@mozilla\\.com)|(search-unlisted157999658@mozilla\\.com)|(search-unlisted158436561@mozilla\\.com)|(search-unlisted158440374111@mozilla\\.com)|(search-unlisted15874111@mozilla\\.com)|(search-unlisted1741395551@mozilla\\.com)|(search-unlisted17441000051@mozilla\\.com)|(search-unlisted174410000522777441@mozilla\\.com)|(search-unlisted1768fdgfdg@mozilla\\.com)|(search-unlisted180000411@mozilla\\.com)|(search-unlisted18000411@mozilla\\.com)|(search-unlisted1800411@mozilla\\.com)|(search-unlisted18011888@mozilla\\.com)|(search-unlisted1801668@mozilla\\.com)|(search-unlisted18033411@mozilla\\.com)|(search-unlisted180888@mozilla\\.com)|(search-unlisted181438@mozilla\\.com)|(search-unlisted18411@mozilla\\.com)|(search-unlisted18922544@mozilla\\.com)|(search-unlisted1955511@mozilla\\.com)|(search-unlisted2@mozilla\\.com)|(search-unlisted3@mozilla\\.com)|(search-unlisted4@mozilla\\.com)|(search-unlisted400@mozilla\\.com)|(search-unlisted40110@mozilla\\.com)|(search-unlisted5@mozilla\\.com)|(search-unlisted55@mozilla\\.com)|(search@mozilla\\.com)|(searchazsd@mozilla\\.com)|(smart246@mozilla\\.com)|(smarter1@mozilla\\.com)|(smarters1@mozilla\\.com)|(stream@mozilla\\.com)|(tahdith@mozilla\\.com)|(therill@mozilla\\.com)|(Updates@mozilla\\.com))$/","prefs":[],"schema":1534102906482,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1480591","why":"These add-ons violate the no-surprises and user-control policy.","name":"Search engine hijacking malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cee5c2ab-1059-4b15-a78c-1203116552c4","last_modified":1534157457677},{"guid":"/^((search-unlisted2@mozilla\\.com)|(search-unlisted3@mozilla\\.com)|(search-unlisted4@mozilla\\.com)|(search-unlisted5@mozilla\\.com)|(search-unlisted11@mozilla\\.com)|(search-unlisted12@mozilla\\.com)|(search-unlisted55@mozilla\\.com)|(search-unlisted111@mozilla\\.com)|(search-unlisted400@mozilla\\.com)|(search-unlisted40110@mozilla\\.com)|(search-unlisted17441000051@mozilla\\.com)|(search-unlisted174410000522777441@mozilla\\.com)|(search-unlisted@mozilla\\.com)|({0a054930-63d7-46f4-937a-de80eab21da4})|({0b24cf69-02b8-407d-83db-e7af04fc1f3e})|({0c4df994-4f4a-4646-ae5d-8936be8a4188})|({0d50d8aa-d1ed-4930-b0a0-f3340d2f510e})|({0eb4672d-58a6-4230-b74c-50ca3716c4b0})|({0f9e469e-4245-43f8-a7a8-7e730f80d284})|({0fc9fcc7-2f47-4fd1-a811-6bd4d611294b})|({4479446e-40f3-48af-ab85-7e3bb4468227})|({1a927d5b-42e7-4407-828a-fdc441d0daae})|({1a760841-50c3-4143-9f7e-3c8f04e8f9d1})|({1bd8ba17-b3ed-412e-88db-35bc4d8771d7})|({1c7d6d9e-325a-4260-8213-82d51277fc31})|({01c9a4a4-06dd-426b-9500-2ea6fe841b88})|({1cab8ccf-deff-4743-925d-a47cbd0a6b56})|({1cb0652a-4645-412d-b7e8-0b9e9a83242f})|({1d6634ca-dd37-4a31-aad1-321f05aa2bb3})|({1d9997b2-f61e-429a-8591-999a6d62becc})|({1ed2af70-9e89-42db-a9e8-17ae594003ac})|({01f409a5-d617-47be-a574-d54325fe05d1})|({2a8bec00-0ab0-4b4d-bd3d-4f59eada8fd8})|({2aeb1f92-6ddc-49f5-b7b3-3872d7e019a9})|({2bb68b03-b528-4133-9fc4-4980fbb4e449})|({2cac0be1-10a2-4a0d-b8c5-787837ea5955})|({2d3c5a5a-8e6f-4762-8aff-b24953fe1cc9})|({2ee125f1-5a32-4f8e-b135-6e2a5a51f598})|({2f53e091-4b16-4b60-9cae-69d0c55b2e78})|({3a65e87c-7ffc-408d-927e-ebf1784efd6d})|({3a26e767-b781-4e21-aaf8-ac813d9edc9f})|({3c3ef2a3-0440-4e77-9e3c-1ca8d48f895c})|({3dca6517-0d75-42d2-b966-20467f82dca1})|({3f4191fa-8f16-47d2-9414-36bfc9e0c2bf})|({3f49e12b-bb58-4797-982c-4364030d96d9})|({4aa2f47a-0bae-4a47-8a1b-1b93313a2938})|({04abafc7-7a65-401d-97f3-af2853854373})|({4ad16913-e5cb-4292-974c-d557ef5ec5bb})|({4b1050c6-9139-4126-9331-30a836e75db9})|({4b1777ec-6fe4-4572-9a29-5af206e003bf})|({4beacbbb-1691-40e7-8c1e-4853ce2e2dee})|({4c140bc5-c2ad-41c3-a407-749473530904})|({4cbef3f0-4205-4165-8871-2844f9737602})|({4dac7c77-e117-4cae-a9f0-6bd89e9e26ab})|({04ed02dc-0cb0-40c2-8bc8-6f20843024b8})|({4f6b6aaf-c5a1-4fac-8228-ead4d359dc6d})|({4f8a15fb-45c2-4d3b-afb1-c0c8813a4a5a})|({5af74f5a-652b-4b83-a2a9-f3d21c3c0010})|({5b0f6d3c-10fd-414c-a135-dffd26d7de0f})|({5b421f02-e55e-4b63-b90e-aa0cfea01f53})|({5b620343-cd69-49b8-a7ba-f9d499ee5d3d})|({5c5cf69b-ed92-4429-8d26-ff3bb6c37269})|({5cf77367-b141-4ba4-ac2a-5b2ca3728e81})|({5da81d3d-5db1-432a-affc-4a2fe9a70749})|({5eac1066-90c3-4ba0-b361-e6315dcd6828})|({5ec4c837-59b9-496d-96e2-ff3fa74ca01f})|({5efd8c7a-ff37-41ac-a55c-af4170453fdf})|({5f4e63e4-351f-4a21-a8e5-e50dc72b5566})|({6a934ff5-e41d-43a2-baf5-2d215a869674})|({06a71249-ef35-4f61-b2c8-85c3c6ee5617})|({6ad26473-5822-4142-8881-0c56a8ebc8c0})|({6cee30bc-a27c-43ea-ac72-302862db62b2})|({6ed852d5-a72e-4f26-863f-f660e79a2ebb})|({6eee2d17-f932-4a43-a254-9e2223be8f32})|({6f13489d-b274-45b6-80fa-e9daa140e1a4})|({6fa41039-572b-44a4-acd4-01fdaebf608d})|({7ae85eef-49cf-440d-8d13-2bebf32f14cf})|({7b3c1e86-2599-4e1a-ad98-767ae38286c8})|({7b23c0de-aa3d-447f-9435-1e8eba216f09})|({7b71d75e-51f5-4a71-9207-7acb58827420})|({7c6bf09e-5526-4bce-9548-7458ec56cded})|({7ca54c8d-d515-4f2a-a21f-3d32951491a6})|({7d932012-b4dd-42cc-8a78-b15ca82d0e61})|({7d5e24a1-7bef-4d09-a952-b9519ec00d20})|({7eabad73-919d-4890-b737-8d409c719547})|({7eaf96aa-d4e7-41b0-9f12-775c2ac7f7c0})|({7f8bc48d-1c7c-41a0-8534-54adc079338f})|({7f84c4d8-bdf5-4110-a10d-fa2a6e80ef6a})|({8a6bda75-4668-4489-8869-a6f9ccbfeb84})|({8a0699a0-09c3-4cf1-b38d-fec25441650c})|({8ab8c1a2-70d4-41a8-bf78-0d0df77ac47f})|({8b4cb418-027e-4213-927a-868b33a88b4f})|({8fcfe2b3-598e-4861-a5d4-0d77993f984b})|({9a941038-82fa-4ae4-ba98-f2eb2d195345})|({9b8a3057-8bf4-4a9e-b94b-867e4e71a50c})|({9b8df895-fcdd-452a-8c46-da5be345b5bc})|({09c8fa16-4eec-4f78-b19d-9b24b1b57e1e})|({09cbfddf-5e55-4676-920d-5a16cb9e4cb5})|({9cf8d28f-f546-4871-ac4d-5faff8b5bde3})|({9d592fd5-e655-461a-9b28-9eba85d4c97f})|({9fc6e583-78a5-4a2b-8569-4297bb8b3300})|({014d98ce-dab9-4c1d-8643-166e75d7cb4d})|({18c64b09-4ccb-4c21-ba6f-ebd4a1efa034})|({21d83d85-a636-4b18-955d-376a6b19bd19})|({22ecf14b-ead6-4684-a498-7b2b839a4c97})|({23c65153-c21e-430a-a2dc-0793410a870d})|({29c69b12-8208-457e-92f4-e663b00a1f10})|({30a8d6f1-0401-4327-8c46-2e1ab45dfe77})|({30d63f93-1446-43b3-8219-deefec9c81ce})|({32cb52f8-c78a-423d-b378-0abec72304a6})|({35bfa8c0-68c1-41f8-a5dd-7f3b3c956da9})|({36a4269e-4eef-4538-baea-9dafbf6a8e2f})|({37f8e483-c782-40ed-82e9-36f101b9e41f})|({42a512a8-37e0-4e07-a1db-5b4651d75048})|({43ae5745-c40a-45ab-9c11-74316c0e9fd2})|({53fa8e1c-112b-4013-b582-0d9e8c51ca75})|({56effac7-3ae9-41e3-9b46-51469f67b3b2})|({61a486c0-ce3d-4bf1-b4f2-e186a2adecf1})|({62b55928-80cc-49f7-8a4b-ec06030d6601})|({63df223d-51cf-4f76-aad8-bbc94c895ed2})|({064d8320-e0f3-411f-9ed1-8c1349279d20})|({071b9878-a7d3-4ae3-8ef0-2eaee1923403})|({72c1ca96-c05d-46a7-bce1-c507ec3db4ea})|({76ce213c-8e57-4a14-b60a-67a5519bd7a7})|({78c2f6a0-3b54-4a21-bf25-a3348278c327})|({0079b71b-89c9-4d82-aea3-120ee12d9890})|({81ac42f3-3d17-4cff-85af-8b7f89c8826b})|({81dc4f0e-9dab-4bd2-ab9d-d9365fbf676f})|({82c8ced2-e08c-4d6c-a12b-3e8227d7fc2a})|({83d6f65c-7fc0-47d0-9864-a488bfcaa376})|({83d38ac3-121b-4f28-bf9c-1220bd3c643b})|({84b9121e-55c9-409a-9b28-c588b5096222})|({87ba49bd-daba-4071-aedf-4f32a7e63dbe})|({87c552f9-7dbb-421b-8deb-571d4a2d7a21})|({87dcb9bf-3a3e-4b93-9c85-ba750a55831a})|({89a4f24d-37d5-46e7-9d30-ba4778da1aaa})|({93c524c4-2e92-4dd7-8b37-31a69bc579e8})|({94df38fc-2dbe-4056-9b35-d9858d0264d3})|({95c7ae97-c87e-4827-a2b7-7b9934d7d642})|({95d58338-ba6a-40c8-93fd-05a34731dc0e})|({97c436a9-7232-4495-bf34-17e782d6232c})|({97fca2cd-545f-42ef-ae93-dc13b046bd3b})|({0111c475-01e6-42ea-a9b4-27bed9eb6092})|({115a8321-4414-4f4c-aee6-9f812121b446})|({158a5a56-aca0-418f-bec0-5b3bda6e9d4c})|({243a0246-cbab-4b46-93fb-249039f68d84})|({283d4f2a-bab1-43ce-90be-5129741ac988})|({408a506b-2336-4671-a490-83a1094b4097})|({0432b92a-bfcf-41b9-b5f0-df9629feece1})|({484e0ba4-a20b-4404-bb1b-b93473782ae0})|({486ecaf1-1080-48c1-8973-549bc731ccf9})|({495a84bd-5a0c-4c74-8a50-88a4ba9d74ba})|({520f2c78-7804-4f59-ae74-a192476055ed})|({543f7503-3620-4f41-8f9e-c258fdff07e9})|({0573bea9-7368-49cd-ba10-600be3535a0b})|({605a0c42-86af-40c4-bf39-f14060f316aa})|({618baeb9-e694-4c7b-9328-69f35b6a8839})|({640c40e5-a881-4d16-a4d0-6aa788399dd2})|({713d4902-ae7b-4a9a-bcf5-47f39a73aed0})|({767d394a-aa77-40c9-9365-c1916b4a2f84})|({832ffcf9-55e9-4fd1-b2eb-f19e1fac5089})|({866a0745-8b91-4199-820a-ec17de52b5f2})|({869b5825-e344-4375-839b-085d3c09ab9f})|({919fed43-3961-48d9-b0ef-893054f4f6f1})|({971d6ef0-a085-4a04-83d8-6e489907d926})|({1855d130-4893-4c79-b4aa-cbdf6fee86d3})|({02328ee7-a82b-4983-a5f7-d0fc353698f0})|({2897c767-03aa-4c2f-910a-6d0c0b9b9315})|({3908d078-e1db-40bf-9567-5845aa77b833})|({04150f98-2d7c-4ae2-8979-f5baa198a577})|({4253db7f-5136-42c3-b09d-cf38344d1e16})|({4414af84-1e1f-449b-ac85-b79f812eb69b})|({4739f233-57c1-4466-ad51-224558cf375d})|({5066a3b2-f848-4a59-a297-f268bc3a08b6})|({6072a2a8-f1bc-4c9c-b836-7ac53e3f51e4})|({7854ee87-079f-4a25-8e57-050d131404fe})|({07953f60-447e-4f53-a5ef-ed060487f616})|({8886a262-1c25-490b-b797-2e750dd9f36b})|({12473a49-06df-4770-9c47-a871e1f63aea})|({15508c91-aa0a-4b75-81a2-13055c96281d})|({18868c3a-a209-41a6-855d-f99f782d1606})|({24997a0a-9d9b-4c87-a076-766d44e1f6fd})|({27380afd-f42a-4c25-b57d-b9012e0d5d48})|({28044ca8-8e90-435e-bc63-a757af2fb6be})|({30972e0a-f613-4c46-8c87-2e59878e7180})|({31680d42-c80d-4f8a-86d3-cd4930620369})|({44685ba6-68b3-4895-879e-4efa29dfb578})|({046258c9-75c5-429d-8d5b-386cfbadc39d})|({47352fbf-80d9-4b70-9398-fb7bffa3da53})|({56316a2b-ef89-4366-b4aa-9121a2bb6dea})|({65072bef-041f-492e-8a51-acca2aaeac70})|({677e2d00-264c-4f62-a4e8-2d971349c440})|({72056a58-91a5-4de5-b831-a1fa51f0411a})|({85349ea6-2b5d-496a-9379-d4be82c2c13d})|({98363f8b-d070-47b6-acc6-65b80acac4f3})|({179710ba-0561-4551-8e8d-1809422cb09f})|({207435d0-201d-43f9-bb0f-381efe97501d})|({313e3aef-bdc9-4768-8f1f-b3beb175d781})|({387092cb-d2dc-4da5-9389-4a766c604ec2})|({0599211f-6314-4bf9-854b-84cb18da97f8})|({829827cd-03be-4fed-af96-dd5997806fb4})|({856862a5-8109-47eb-b815-a94059570888})|({1e6f5a54-2c4f-4597-aa9e-3e278c617d38})|({1490068c-d8b7-4bd2-9621-a648942b312c})|({18e5e07b-0cfa-4990-a67b-4512ecbae04b})|({3584581e-c01a-4f53-aec8-ca3293bb550d})|({5280684d-f769-43c9-8eaa-fb04f7de9199})|({5766852a-b384-4276-ad06-70c2283b4792})|({34364255-2a81-4d6e-9760-85fe616abe80})|({45621564-b408-4c29-8515-4cf1f26e4bc3})|({62237447-e365-487e-8fc3-64ddf37bdaed})|({7e7aa524-a8af-4880-8106-102a35cfbf42})|({71639610-9cc3-47e0-86ed-d5b99eaa41d5})|({78550476-29ff-4b7e-b437-195024e7e54e})|({85064550-57a8-4d06-bd4b-66f9c6925bf5})|({93070807-c5cd-4bde-a699-1319140a3a9c})|({11e7b9b3-a769-4d7f-b200-17cffa4f9291})|({22632e5e-95b9-4f05-b4b7-79033d50467f})|({03e10db6-b6a7-466a-a2b3-862e98960a85})|({23775e7d-dfcf-42b1-aaad-8017aa88fc59})|({85e31e7e-3e3a-42d3-9b7b-0a2ff1818b33})|({9e32ca65-4670-41e3-b6bb-8773e6b9bba8})|({6e43af8e-a78e-4beb-991f-7b015234eacc})|({57e61dc7-db04-4cf8-bbd3-62a15fc74138})|({01166e60-d740-440c-b640-6bf964504b3c})|({52e137bc-a330-4c25-a981-6c1ab9feb806})|({488e190b-d1f6-4de8-bffb-0c90cc805b62})|({5e257c96-bfed-457d-b57e-18f31f08d7bb})|({2134e327-8060-441c-ba68-b167b82ff5bc})|({1e68848a-2bb7-425c-81a2-524ab93763eb})|({8e888a6a-ec19-4f06-a77c-6800219c6daf})|({7e907a15-0a4c-4ff4-b64f-5eeb8f841349})|({a0ab16af-3384-4dbe-8722-476ce3947873})|({a0c54bd8-7817-4a40-b657-6dc7d59bd961})|({a0ce2605-b5fc-4265-aa65-863354e85058})|({a1f8e136-bce5-4fd3-9ed1-f260703a5582})|({a3fbc8be-dac2-4971-b76a-908464cfa0e0})|({a5a84c10-f12c-496e-80df-33386b7a1463})|({a5f90823-0a50-414f-ad34-de0f6f26f78e})|({a6b83c45-3f24-4913-a1f7-6f42411bbb54})|({a9eb2583-75e0-435a-bb6c-69d5d9b20e27})|({a32ebb9b-8649-493e-a9e9-f091f6ac1217})|({a83c1cbb-7a41-41e7-a2ae-58efcb4dc2e4})|({a506c5af-0f95-4107-86f8-3de05e2794c9})|({a02001ae-b7ed-45d7-baf2-c07f0a7b6f87})|({a5808da1-5b4f-42f2-b030-161fd11a36f7})|({a18087bb-4980-4349-898c-ca1b7a0e59cd})|({a345865c-44b9-4197-b418-934f191ce555})|({a7487703-02d8-4a82-a7d0-2859de96edb4})|({a2427e23-d349-4b25-b5b8-46960b218079})|({a015e172-2465-40fc-a6ce-d5a59992c56a})|({aaaffe20-3306-4c64-9fe5-66986ebb248e})|({abec23c3-478f-4a5b-8a38-68ccd500ec42})|({ac06c6b2-3fd6-45ee-9237-6235aa347215})|({ac037ad5-2b22-46c7-a2dc-052b799b22b5})|({ac296b47-7c03-486f-a1d6-c48b24419749})|({acbff78b-9765-4b55-84a8-1c6673560c08})|({acfe4807-8c3f-4ecc-85d1-aa804e971e91})|({ada56fe6-f6df-4517-9ed0-b301686a34cc})|({af44c8b4-4fd8-42c3-a18e-c5eb5bd822e2})|({b5a35d05-fa28-41b5-ae22-db1665f93f6b})|({b7b0948c-d050-4c4c-b588-b9d54f014c4d})|({b7f366fa-6c66-46bf-8df2-797c5e52859f})|({b9bb8009-3716-4d0c-bcb4-35f9874e931e})|({b12cfdc7-3c69-43cb-a3fb-38981b68a087})|({b019c485-2a48-4f5b-be13-a7af94bc1a3e})|({b91fcda4-88b0-4a10-9015-9365e5340563})|({b30591d6-ec24-4fae-9df6-2f3fe676c232})|({b99847d6-c932-4b52-9650-af83c9dae649})|({bbe79d30-e023-4e82-b35e-0bfdfe608672})|({bc3c2caf-2710-4246-bd22-b8dc5241693a})|({bc3c7922-e425-47e2-a2dd-0dbb71aa8423})|({bc763c41-09ca-459a-9b22-cf4474f51ebc})|({bd5ba448-b096-4bd0-9582-eb7a5c9c0948})|({be5d0c88-571b-4d01-a27a-cc2d2b75868c})|({be981b5e-1d9d-40dc-bd4f-47a7a027611c})|({be37931c-af60-4337-8708-63889f36445d})|({bea8866f-01f8-49e9-92cd-61e96c05d288})|({bf153de7-cdf2-4554-af46-29dabfb2aa2d})|({c3a2b953-025b-425d-9e6e-f1a26ee8d4c2})|({c3b71705-c3a6-4e32-bd5f-eb814d0e0f53})|({c5d359ff-ae01-4f67-a4f7-bf234b5afd6e})|({c6c8ea62-e0b1-4820-9b7f-827bc5b709f4})|({c8c8e8de-2989-4028-bbf2-d372e219ba71})|({c34f47d1-2302-4200-80d4-4f26e47b2980})|({c178b310-6ed5-4e04-9e71-76518dd5fb3e})|({c2341a34-a3a0-4234-90cf-74df1db0aa49})|({c8399f02-02f4-48e3-baea-586564311f95})|({c41807db-69a1-4c35-86c1-bc63044e4fcb})|({c383716f-b23f-47b2-b6bb-d7c1a7c218af})|({c3447081-f790-45cb-ae03-0d7f1764c88c})|({c445e470-9e5a-4521-8649-93c8848df377})|({c8e14311-4b2d-4eb0-9a6b-062c6912f50e})|({ca4fdfdb-e831-4e6e-aa8b-0f2e84f4ed07})|({ca6cb8b2-a223-496d-b0f6-35c31bc7ca2b})|({cba7ce11-952b-4dcb-ba85-a5b618c92420})|({cc6b2dc7-7d6f-470f-bccc-6a42907162d1})|({cc689da4-203f-4a0c-a7a6-a00a5abe74c5})|({ccb7b5d6-a567-40a2-9686-a097a8b583dd})|({cd28aa38-d2f1-45a3-96c3-6cfd4702ef51})|({cd89045b-2e06-46bb-9e34-48e8799e5ef2})|({cdda1813-51d6-4b1f-8a2f-8f9a74a28e14})|({ce0d1384-b99b-478e-850a-fa6dfbe5a2d4})|({ce93dcc7-f911-4098-8238-7f023dcdfd0d})|({cf9d96ff-5997-439a-b32b-98214c621eee})|({cfa458f9-b49b-4e09-8cb2-5e50bd8937cc})|({cfb50cdf-e371-4d6b-9ef2-fcfe6726db02})|({d1ab5ebd-9505-481d-a6cd-6b9db8d65977})|({d03b6b0f-4d44-4666-a6d6-f16ad9483593})|({d9d8cfc1-7112-40cc-a1e9-0c7b899aae98})|({d47ebc8a-c1ea-4a42-9ca3-f723fff034bd})|({d72d260f-c965-4641-bf49-af4135fc46cb})|({d78d27f4-9716-4f13-a8b6-842c455d6a46})|({d355bee9-07f0-47d3-8de6-59b8eecba57b})|({d461cc1b-8a36-4ff0-b330-1824c148f326})|({d97223b8-44e5-46c7-8ab5-e1d8986daf44})|({d42328e1-9749-46ba-b35c-cce85ddd4ace})|({da7d00bf-f3c8-4c66-8b54-351947c1ef68})|({db84feec-2e1f-48f0-9511-645fe4784feb})|({dc6256cc-b6d0-44ca-b42f-4091f11a9d29})|({dd1cb0ec-be2a-432b-9c90-d64c824ac371})|({dd95dd08-75d1-4f06-a75b-51979cbab247})|({ddae89bd-6793-45d8-8ec9-7f4fb7212378})|({de3b1909-d4da-45e9-8da5-7d36a30e2fc6})|({df09f268-3c92-49db-8c31-6a25a6643896})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({e05ba06a-6d6a-4c51-b8fc-60b461ffecaf})|({e7b978ae-ffc2-4998-a99d-0f4e2f24da82})|({e7fb6f2f-52b6-4b02-b410-2937940f5049})|({e08d85c5-4c0f-4ce3-9194-760187ce93ba})|({e08ebf0b-431d-4ed1-88bb-02e5db8b9443})|({e9c47315-2a2b-4583-88f3-43d196fa11af})|({e341ed12-a703-47fe-b8dd-5948c38070e4})|({e804fa4c-08e0-4dae-a237-8680074eba07})|({e8982fbd-1bc2-4726-ad8d-10be90f660bd})|({e40673cd-9027-4f61-956c-2097c03ae2be})|({e72172d1-39c9-4f41-829d-a1b8d845d1ca})|({e73854da-9503-423b-ab27-fafea2fbf443})|({e81e7246-e697-4811-b336-72298d930857})|({ea618d26-780e-4f0f-91fd-2a6911064204})|({ea523075-66cd-4c03-ab04-5219b8dda753})|({eb3ebb14-6ced-4f60-9800-85c3de3680a4})|({ec8c5fee-0a49-44f5-bf55-f763c52889a6})|({eccd286a-5b1d-494d-82b0-92a12213d95a})|({ed352072-ddf0-4cb4-9cb6-d8aa3741c2de})|({edb476af-0505-42af-a7fd-ec9f454804c0})|({ee97f92d-1bfe-4e9d-816c-0dfcd63a6206})|({f0b809eb-be22-432f-b26f-b1cadd1755b9})|({f5ffa269-fbca-4598-bbd8-a8aa9479e0b3})|({f6c543bf-2222-4230-8ecb-f5446095b63d})|({f6df4ef7-14bd-43b5-90c9-7bd02943789c})|({f6f98e6b-f67d-4c53-8b76-0b5b6df79218})|({f38b61f3-3fed-4249-bb3d-e6c8625c7afb})|({f50e0a8f-8c32-4880-bcef-ca978ccd1d83})|({f59c2d3d-58da-4f74-b8c9-faf829f60180})|({f82b3ad5-e590-4286-891f-05adf5028d2f})|({f92c1155-97b3-40f4-9d5b-7efa897524bb})|({f95a3826-5c8e-4f82-b353-21b6c0ca3c58})|({f5758afc-9faf-42bb-9543-a4cfb0bfce9d})|({f447670d-64f5-418f-9b4a-5352d6c8e127})|({f4262989-6de0-4604-918f-663b85fad605})|({fa8bd609-0e06-4ba9-8e2e-5989f0b2e197})|({fa0808f6-25ab-4a8b-bd17-3b275c55ff09})|({fac5816b-fd0f-4db2-a16e-52394b6db41d})|({fc99b961-5878-46b4-b091-6d2f507bf44d})|({fce89242-66d3-4946-9ed0-e66078f172fc})|({fcf72e24-5831-439e-bb07-fd53a9e87a30})|({fdc0601f-1fbb-40a5-84e1-8bbe96b22502})|({feb3c734-4529-4d69-9f3a-2dae18f1d896}))$/","prefs":[],"schema":1533411700296,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1479009","why":"Malicious add-ons disguising as updates or useful add-ons, but violating data collection policies, user-control, no surprises and security.","name":"Firefox Update (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cae5d906-0b1d-4d1c-b83f-f9727b8c4a29","last_modified":1533550294490},{"guid":"{5834f62d-6164-4cdd-a0a3-c00c66ec9d13}","prefs":[],"schema":1532704368947,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1479002","why":"This add-on violates our security and user-choice/no surprises policies.","name":"Youtube Dark Mode (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d0a401cb-0c70-4784-8288-b06a88b2ae8a","last_modified":1532705151926},{"guid":"/^((@asdfjhsdfuhw)|(@asdfsdfwe)|(@asdieieuss)|(@dghfghfgh)|(@difherk)|(@dsfgtftgjhrdf4)|(@fidfueir)|(@fsgergsdqtyy)|(@hjconsnfes)|(@isdifvdkf)|(@iweruewir)|(@oiboijdjfj)|(@safesearchavs)|(@safesearchavsext)|(@safesearchincognito)|(@safesearchscoutee)|(@sdfykhhhfg)|(@sdiosuff)|(@sdklsajd)|(@sduixcjksd)|(@sicognitores)|(@simtabtest)|(@sodiasudi)|(@test13)|(@test131)|(@test131ver)|(@test132)|(@test13s)|(@testmptys)|(\\{ac4e5b0c-13c4-4bfd-a0c3-1e73c81e8bac\\})|(\\{e78785c3-ec49-44d2-8aac-9ec7293f4a8f\\})|(general@filecheckerapp\\.com)|(general@safesearch\\.net))$/","prefs":[],"schema":1532703832328,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1475330","why":"These Add-ons violate our data collection, no surprises and user-choice policies.","name":"Safesearch (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d664412d-ed08-4892-b247-b007a70856ff","last_modified":1532704364007},{"guid":"{dd3d7613-0246-469d-bc65-2a3cc1668adc}","prefs":[],"schema":1532684052432,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1478731","why":"This add-on violates data practices outlined in the review policy.","name":"BlockSite"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.0.3","minVersion":"0"}],"id":"e04f98b5-4480-43a3-881d-e509e4e28cdc","last_modified":1532684085999},{"guid":"{bee8b1f2-823a-424c-959c-f8f76c8b2306}","prefs":[],"schema":1532547689407,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1478731","why":"This add-on violates data practices outlined in the review policy.","name":"Popup blocker for FireFox"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.0.7.3","minVersion":"0"}],"id":"f0713a5e-7208-484e-b3a0-4e6dc6a195be","last_modified":1532684052426},{"guid":"/^((\\{39bd8607-0af4-4d6b-bd69-9a63c1825d3c\\})|(\\{273f0bce-33f4-45f6-ae03-df67df3864c2\\})|(\\{a77fc9b9-6ebb-418d-b0b6-86311c191158\\})|(\\{c6c4a718-cf91-4648-aa9b-170d66163cf2\\})|(\\{d371abec-84bb-481b-acbf-235639451127\\})|(\\{e63b262a-f9b8-4496-9c4b-9d3cbd6aea90\\}))$/","prefs":[],"schema":1532386339902,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1477950","why":"Add-ons that contain malicious functionality like search engine redirect.","name":"Smash (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c37c7c24-e738-4d06-888c-108b4d63b428","last_modified":1532424286908},{"guid":"/^((\\{ac296b47-7c03-486f-a1d6-c48b24419749\\})|(\\{1cab8ccf-deff-4743-925d-a47cbd0a6b56\\})|(\\{5da81d3d-5db1-432a-affc-4a2fe9a70749\\})|(\\{071b9878-a7d3-4ae3-8ef0-2eaee1923403\\})|(\\{261476ea-bd0e-477c-abd7-33cdf626f81f\\})|(\\{224e66d0-6b11-4c4b-9bcf-41180889898a\\})|(\\{1e90cf52-c67c-4bd9-80c3-a2bf521fc981\\})|(\\{09c4799c-00f1-439e-9e60-3827c589b372\\})|(\\{d3d2095a-9faa-466f-82ae-3114179b34d6\\})|(\\{70389ea5-7e4d-4515-835c-fbd047f229dd\\})|(\\{2e8083a5-cd88-4aaa-bb8b-e54e9753f280\\})|(\\{fbf2480b-5c19-478e-bfd0-192ad9f84dc9\\})|(\\{6c7dc694-89f8-477e-88d5-c55af4d6a846\\})|(\\{915c12c6-901a-490d-9bfc-20f00d1ad31d\\})|(\\{d3a4aa3e-f74c-4382-876d-825f592f2976\\})|(\\{0ad91ec1-f7c4-4a39-9244-3310e9fdd169\\})|(\\{9c17aa27-63c5-470a-a678-dc899ab67ed3\\})|(\\{c65efef2-9988-48db-9e0a-9ff8164182b6\\})|(\\{d54c5d25-2d51-446d-8d14-18d859e3e89a\\})|(\\{e458f1f1-a331-4486-b157-81cba19f0993\\})|(\\{d2de7e1f-6e51-41d6-ba8a-937f8a5c92ff\\})|(\\{2b08a649-9bea-4dd4-91c8-f53a84d38e19\\})|(\\{312dd57e-a590-4e19-9b26-90e308cfb103\\})|(\\{82ce595a-f9b6-4db8-9c97-b1f1c933418b\\})|(\\{0a2e64f0-ea5a-4fff-902d-530732308d8e\\})|(\\{5fbdc975-17ab-4b4e-90d7-9a64fd832a08\\})|(\\{28820707-54d8-41f0-93e9-a36ffb2a1da6\\})|(\\{64a2aed1-5dcf-4f2b-aad6-9717d23779ec\\})|(\\{ee54794f-cd16-4f7d-a7dd-515a36086f60\\})|(\\{4d381160-b2d5-4718-9a05-fc54d4b307e7\\})|(\\{60393e0e-f039-4b80-bad4-10189053c2ab\\})|(\\{0997b7b2-52d7-4d14-9aa6-d820b2e26310\\})|(\\{8214cbd6-d008-4d16-9381-3ef1e1415665\\})|(\\{6dec3d8d-0527-49a3-8f12-b05f2a8b95b2\\})|(\\{0c0d8d8f-3ae0-4c98-81ac-06453a316d16\\})|(\\{84d5ef02-a283-484a-80da-7087836c74aa\\})|(\\{24413756-2c44-47c5-8bbf-160cb37776d8\\})|(\\{cf6ac458-06e8-45d0-9cbf-ec7fc0eb1710\\})|(\\{263a5792-933a-4de1-820a-d04198e17120\\})|(\\{b5fd7f37-190d-4c0a-b8dd-8b4850c986ac\\})|(\\{cb5ef07b-c2e7-47a6-be81-2ceff8df4dd5\\})|(\\{311b20bc-b498-493c-a5e1-22ec32b0e83c\\})|(\\{b308aead-8bc1-4f37-9324-834b49903df7\\})|(\\{3a26e767-b781-4e21-aaf8-ac813d9edc9f\\}))$/","prefs":[],"schema":1532361925873,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1476553","why":"Third-party websites try to trick users into installing add-ons that inject remote scripts.","name":"Various malicious add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"52842139-3d11-41ac-9d7f-8e51122a3141","last_modified":1532372344457},{"guid":"/^((@FirefoxUpdate)|(@googledashboard)|(@smash_mov)|(@smash_tv)|(@smashdashboard)|(@smashmovs)|(@smashtvs)|(\\{0be01832-7cce-4457-b8ad-73b743914085\\})|(\\{0e1c683e-9f34-45f1-b365-a283befb471a\\})|(\\{0c72a72d-6b2e-4a0e-8a31-16581176052d\\})|(\\{0ccfc208-8441-4c27-b1cb-799accb04908\\})|(\\{0ede8d39-26f2-49c4-8014-dfc484f54a65\\})|(\\{1fc1f8e6-3575-4a6f-a4d1-c4ca1c36bd2a\\})|(\\{3a1d6607-e6a8-4012-9506-f14cd157c171\\})|(\\{03b3ac4d-59a3-4cc6-aa4d-9b39dd8b3196\\})|(\\{3bb6e889-ac7a-46ca-8eed-45ba4fbe75b5\\})|(\\{3c841114-da8c-44ea-8303-78264edfe60b\\})|(\\{3f3bcb3e-dd73-4410-b102-60a87fcb8323\\})|(\\{3f951165-fd85-42ae-96ef-6ff589a1fe72\\})|(\\{04c86cb3-5f52-4083-9e9a-e322dd02181a\\})|(\\{4d8b44ef-9b8b-4d82-b668-a49648d2749d\\})|(\\{4d25d2b4-6ae7-4a66-abc0-c3fca4cdddf6\\})|(\\{5c9a2eca-2126-4a84-82c0-efbf3d989371\\})|(\\{6ecb9f49-90f0-43a1-8f8a-e809ea4f732b\\})|(\\{6fb8289d-c6c8-4fe5-9a92-7dc6cbf35349\\})|(\\{7fea697d-327c-4d20-80d5-813a6fb26d86\\})|(\\{08a3e913-0bbc-42ba-96d7-3fa16aceccbf\\})|(\\{8b04086b-94a5-4161-910b-59e3e31e4364\\})|(\\{08c28c16-9fb6-4b32-9868-db37c1668f94\\})|(\\{8cd69708-2f5e-4282-a94f-3feebc4bce35\\})|(\\{8dc21e24-3883-4d01-b486-ef1d1106fa3d\\})|(\\{8f8cc21a-2097-488f-a213-f5786a2ccbbf\\})|(\\{9c8b93f7-3bf8-4762-b221-40c912268f96\\})|(\\{9ce66491-ef06-4da6-b602-98c2451f6395\\})|(\\{1e1acc1c-8daa-4c2e-ad05-5ef01ae65f1e\\})|(\\{10b0f607-1efa-4762-82a0-e0d9bbae4e48\\})|(\\{24f338d7-b539-49f1-b276-c9edc367a32d\\})|(\\{40c9030f-7a2f-4a58-9d0a-edccd8063218\\})|(\\{41f97b71-c7c6-40b8-83b1-a4dbff76f73d\\})|(\\{42f3034a-0c4a-4f68-a8fd-8a2440e3f011\\})|(\\{52d456e5-245a-4319-b8d2-c14fbc9755f0\\})|(\\{57ea692b-f9fe-42df-bf5e-af6953fba05a\\})|(\\{060c61d8-b48f-465d-aa4b-23325ea757c3\\})|(\\{65c1967c-6a5c-44dd-9637-0d4d8b4c339b\\})|(\\{65d40b64-b52a-46d8-b146-580ff91889cb\\})|(\\{75b7af0d-b4ed-4320-95c8-7ffd8dd2cb7c\\})|(\\{77fe9731-b683-4599-9b06-a5dcea63d432\\})|(\\{84b20d0c-9c87-4340-b4f8-1912df2ae70d\\})|(\\{92b9e511-ac81-4d47-9b8f-f92dc872447e\\})|(\\{95afafef-b580-4f66-a0fe-7f3e74be7507\\})|(\\{116a0754-20eb-4fe5-bd35-575867a0b89e\\})|(\\{118bf5f6-98b1-4543-b133-42fdaf3cbade\\})|(\\{248eacc4-195f-43b2-956c-b9ad1ae67529\\})|(\\{328f931d-83c1-4876-953c-ddc9f63fe3b4\\})|(\\{447fa5d3-1c27-4502-9e13-84452d833b89\\})|(\\{476a1fa9-bce8-4cb4-beff-cb31980cc521\\})|(\\{507a5b13-a8a3-4653-a4a7-9a03099acf48\\})|(\\{531bf931-a8c6-407b-a48f-8a53f43cd461\\})|(\\{544c7f83-ef54-4d17-aa91-274fa27514ef\\})|(\\{546ea388-2839-4215-af49-d7289514a7b1\\})|(\\{635cb424-0cd5-4446-afaf-6265c4b711b5\\})|(\\{654b21c7-6a70-446c-b9ac-8cac9592f4a9\\})|(\\{0668b0a7-7578-4fb3-a4bd-39344222daa3\\})|(\\{944ed336-d750-48f1-b0b5-3c516bfb551c\\})|(\\{1882a9ce-c0e3-4476-8185-f387fe269852\\})|(\\{5571a054-225d-4b65-97f7-3511936b3429\\})|(\\{5921be85-cddd-4aff-9b83-0b317db03fa3\\})|(\\{7082ba5c-f55e-4cd8-88d6-8bc479d3749e\\})|(\\{7322a4cb-641c-4ca2-9d83-8701a639e17a\\})|(\\{90741f13-ab72-443f-a558-167721f64883\\})|(\\{198627a5-4a7b-4857-b074-3040bc8effb8\\})|(\\{5e5b9f44-2416-4669-8362-42a0b3f97868\\})|(\\{824985b9-df2a-401c-9168-749960596007\\})|(\\{4853541f-c9d7-42c5-880f-fd460dbb5d5f\\})|(\\{6e6ff0fd-4ae4-49ae-ac0c-e2527e12359b\\})|(\\{90e8aa72-a7eb-4337-81d4-538b0b09c653\\})|(\\{02e3137a-96a4-433d-bfb2-0aa1cd4aed08\\})|(\\{9e734c09-fcb1-4e3f-acab-04d03625301c\\})|(\\{a6ad792c-69a8-4608-90f0-ff7c958ce508\\})|(\\{a512297e-4d3a-468c-bd1a-f77bd093f925\\})|(\\{a71b10ae-b044-4bf0-877e-c8aa9ad47b42\\})|(\\{a33358ad-a3fa-4ca1-9a49-612d99539263\\})|(\\{a7775382-4399-49bf-9287-11dbdff8f85f\\})|(\\{afa64d19-ddba-4bd5-9d2a-c0ba4b912173\\})|(\\{b4ab1a1d-e137-4c59-94d5-4f509358a81d\\})|(\\{b4ec2f8e-57fd-4607-bf4f-bc159ca87b26\\})|(\\{b06bfc96-c042-4b34-944c-8eb67f35630a\\})|(\\{b9dcdfb0-3420-4616-a4cb-d41b5192ba0c\\})|(\\{b8467ec4-ff65-45f4-b7c5-f58763bf9c94\\})|(\\{b48e4a17-0655-4e8e-a5e2-3040a3d87e55\\})|(\\{b6166509-5fe0-4efd-906e-1e412ff07a04\\})|(\\{bd1f666e-d473-4d13-bc4d-10dde895717e\\})|(\\{be572ad4-5dd7-4b6b-8204-5d655efaf3b3\\})|(\\{bf2a3e58-2536-44d4-b87f-62633256cf65\\})|(\\{bfc5ac5f-80bd-43e5-9acb-f6d447e0d2ce\\})|(\\{bfe3f6c1-c5fe-44af-93b3-576812cb6f1b\\})|(\\{c0b8009b-57dc-45bc-9239-74721640881d\\})|(\\{c1cf1f13-b257-4271-b922-4c57c6b6e047\\})|(\\{c3d61029-c52f-45df-8ec5-a654b228cd48\\})|(\\{c39e7c0b-79d5-4137-bef0-57cdf85c920f\\})|(\\{ce043eac-df8a-48d0-a739-ef7ed9bdf2b5\\})|(\\{cf62e95a-8ded-4c74-b3ac-f5c037880027\\})|(\\{cff02c70-7f07-4592-986f-7748a2abd9e1\\})|(\\{d1b87087-09c5-4e58-b01d-a49d714da2a2\\})|(\\{d14adc78-36bf-4cf0-9679-439e8371d090\\})|(\\{d64c923e-8819-488c-947f-716473d381b2\\})|(\\{d734e7e3-1b8e-42a7-a9b3-11b16c362790\\})|(\\{d147e8c6-c36e-46b1-b567-63a492390f07\\})|(\\{db1a103d-d1bb-4224-a5e1-8d0ec37cff70\\})|(\\{dec15b3e-1d12-4442-930e-3364e206c3c2\\})|(\\{dfa4b2e3-9e07-45a4-a152-cde1e790511d\\})|(\\{dfcda377-b965-4622-a89b-1a243c1cbcaf\\})|(\\{e4c5d262-8ee4-47d3-b096-42b8b04f590d\\})|(\\{e82c0f73-e42c-41dd-a686-0eb4b65b411c\\})|(\\{e60616a9-9b50-49d8-b1e9-cecc10a8f927\\})|(\\{e517649a-ffd7-4b49-81e0-872431898712\\})|(\\{e771e094-3b67-4c33-8647-7b20c87c2183\\})|(\\{eff5951b-b6d4-48f5-94c3-1b0e178dcca5\\})|(\\{f26a8da3-8634-4086-872e-e589cbf03375\\})|(\\{f992ac88-79d3-4960-870e-92c342ed3491\\})|(\\{f4e4fc03-be50-4257-ae99-5cd0bd4ce6d5\\})|(\\{f73636fb-c322-40e1-82fb-e3d7d06d9606\\})|(\\{f5128739-78d5-4ad7-bac7-bd1af1cfb6d1\\})|(\\{fc11e7f0-1c31-4214-a88f-6497c27b6be9\\})|(\\{feedf4f8-08c1-451f-a717-f08233a64ec9\\}))$/","prefs":[],"schema":1532097654002,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1476369","why":"These add-ons contain unwanted features and try to prevent the user from uninstalling themselves.","name":"Smash/Upater (malware) and similar"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c7d7515d-563f-459f-821c-27d4cf825dbf","last_modified":1532101113096},{"guid":"^((@mixclouddownloader)|(all-down@james\\.burrow)|(d\\.lehr@chello\\.at)|(easy-video-downloader@addonsmash)|(easy-youtube-mp3@james\\.burrow)|(gid@addonsmash)|(gmail_panel@addon_clone)|(guid-reused-by-pk-907175)|(idm@addonsmash)|(image-picka@addonsmash)|(instant-idm@addon\\.host)|(jdm@awesome\\.addons)|(open-in-idm@addonsmash)|(open-in-idm@james\\.burrow)|(open-in-vlc@awesome\\.addons)|(saveimage@addonsmash)|(thundercross@addonsmash)|(vk-download@addon\\.host)|(vk-music-downloader@addonsmash)|(whatsapp_popup@addons\\.clone)|(ytb-down@james\\.burrow)|(ytb-mp3-downloader@james\\.burrow)|(\\{0df8d631-7d88-401e-ba7e-af1425dded8a\\})|(\\{3c74e141-1993-4c04-b755-a66dd491bb47\\})|(\\{5cdd95c7-5d92-40c5-8e2a-8c52c90191d9\\})|(\\{40efedc0-8e48-404a-a779-f4016b25c0e6\\})|(\\{53d605ce-599b-4352-8a06-5e594b3d1822\\})|(\\{3697c1e8-27d7-4c63-a27e-ac16191a1545\\})|(\\{170503FA-3349-4F17-BC86-001888A5C8E2\\})|(\\{649558df-9461-4824-ad18-f2d4d4845ac8\\})|(\\{27875553-afd5-4365-86dc-019bcd60594c\\})|(\\{27875553-afd5-4365-86dc-019bcd60594c\\})|(\\{6e7624fa-7f70-4417-93db-1ec29c023275\\})|(\\{b1aea1f1-6bed-41ef-9679-1dfbd7b2554f\\})|(\\{b9acc029-d62b-4d23-b921-8e7aea34266a\\})|(\\{b9b59e13-4ac5-4eff-8dbe-c345b7619b3c\\})|(\\{b0186d2d-3126-4537-9186-a6f198547901\\})|(\\{b3e8fde8-6d97-4ac3-95e0-57b797f4c56b\\})|(\\{e6a9a96e-4a08-4719-b9bd-0e91c35aaabc\\})|(\\{e69a36e6-ee12-4fe6-87ca-66b77fc0ffbf\\})|(\\{ee3601f1-78ab-48bf-89ae-0cfe4aed1f2e\\})|(\\{f4ce48b3-ad14-4900-86cb-4604474c5b08\\})|(\\{f5c1262d-b1e8-44a4-b820-a834f0f6d605\\}))$","prefs":[],"schema":1531762485603,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1476020","why":"Add-ons repeatedly violated several of review policies.","name":"Several youtube downloading add-ons and others"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0"}],"id":"ae8ae617-590d-430b-86d4-16364372b67f","last_modified":1531762863373},{"guid":"{46551EC9-40F0-4e47-8E18-8E5CF550CFB8}","prefs":[],"schema":1530711142817,"blockID":"i1900","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1472948","why":"This add-on violates data practices outlined in the review policy.","name":"Stylish"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.1.1","minVersion":"3.0.0"}],"id":"c635229f-7aa0-44c5-914f-80c590949071","last_modified":1530716488758},{"guid":"/^(contactus@unzipper.com|{72dcff4e-48ce-41d8-a807-823adadbe0c9}|{dc7d2ecc-9cc3-40d7-93ed-ef6f3219bd6f}|{994db3d3-ccfe-449a-81e4-f95e2da76843}|{25aef460-43d5-4bd0-aa3d-0a46a41400e6}|{178e750c-ae27-4868-a229-04951dac57f7})$/","prefs":[],"schema":1528400492025,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1460331","why":"Add-ons change search settings against our policies, affecting core Firefox features. Add-on is also reportedly installed without user consent.","name":"SearchWeb"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5afea853-d029-43f3-a387-64ce9980742a","last_modified":1528408770328},{"guid":"{38363d75-6591-4e8b-bf01-0270623d1b6c}","prefs":[],"schema":1526326889114,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1461625","why":"This add-on contains abusive functionality.","name":"Photobucket Hotlink Fix"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0f0764d5-a290-428b-a5b2-3767e1d72c71","last_modified":1526381862851},{"guid":"@vkmad","prefs":[],"schema":1526154098016,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1461410","why":"This add-on includes malicious functionality.","name":"VK Universal Downloader (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cbfa5303-c1bf-49c8-87d8-259738a20064","last_modified":1526322954850},{"guid":"/^(({41c14ab8-9958-44bf-b74e-af54c1f169a6})|({78054cb2-e3e8-4070-a8ad-3fd69c8e4707})|({0089b179-8f3d-44d9-bb18-582843b0757a})|({f44ddcb4-4cc0-4866-92fa-eefda60c6720})|({1893d673-7953-4870-8069-baac49ce3335})|({fb28cac0-c2aa-4e0c-a614-cf3641196237})|({d7dee150-da14-45ba-afca-02c7a79ad805})|(RandomNameTest@RandomNameTest\\.com )|(corpsearchengine@mail\\.ru)|(support@work\\.org))$/","prefs":[],"schema":1525377099963,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458330","why":"These are malicious add-ons that inject remote scripts and use deceptive names.","name":"\"Table\" add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3a123214-b4b6-410c-a061-bbaf0d168d31","last_modified":1525377135149},{"guid":"/((@extcorp\\.[a-z]+)|(@brcorporation\\.com)|(@brmodcorp\\.com)|(@teset\\.com)|(@modext\\.tech)|(@ext?mod\\.net)|(@browcorporation\\.org)|(@omegacorporation\\.org)|(@browmodule\\.com)|(@corpext\\.net)|({6b50ddac-f5e0-4d9e-945b-e4165bfea5d6})|({fab6484f-b8a7-4ba9-a041-0f948518b80c})|({b797035a-7f29-4ff5-bd19-77f1b5e464b1})|({0f612416-5c5a-4ec8-b482-eb546af9cac4}))$/","prefs":[],"schema":1525290095999,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458330","why":"These are malicious add-ons that inject remote scripts and use deceptive names.","name":"\"Table\" add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3ab9f100-e253-4080-b3e5-652f842ddb7a","last_modified":1525377099954},{"guid":"/^({b99ae7b1-aabb-4674-ba8f-14ed32d04e76})|({dfa77d38-f67b-4c41-80d5-96470d804d09})$/","prefs":[],"schema":1524146566650,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1455291","why":"These add-ons claim to be the flash plugin.","name":"Flash Plugin (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"96b137e6-8cb5-44d6-9a34-4a4a76fb5e38","last_modified":1524147337556},{"guid":"/^({6ecb9f49-90f0-43a1-8f8a-e809ea4f732b})|(@googledashboard)|(@smashdashboard)|(@smash_tv)|(@smash_mov)|(@smashmovs)|(@smashtvs)|(@FirefoxUpdate)|({92b9e511-ac81-4d47-9b8f-f92dc872447e})|({3c841114-da8c-44ea-8303-78264edfe60b})|({116a0754-20eb-4fe5-bd35-575867a0b89e})|({6e6ff0fd-4ae4-49ae-ac0c-e2527e12359b})|({f992ac88-79d3-4960-870e-92c342ed3491})|({6ecb9f49-90f0-43a1-8f8a-e809ea4f732b})|({a512297e-4d3a-468c-bd1a-f77bd093f925})|({08c28c16-9fb6-4b32-9868-db37c1668f94})|({b4ab1a1d-e137-4c59-94d5-4f509358a81d})|({feedf4f8-08c1-451f-a717-f08233a64ec9})$/","prefs":[],"schema":1524139371832,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1454691","why":"This malware prevents itself from getting uninstalled ","name":"Malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"feb2d0d7-1b76-4dba-bf84-42873a92af5f","last_modified":1524141477640},{"guid":"{872f20ea-196e-4d11-8835-1cc4c877b1b8}","prefs":[],"schema":1523734896380,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1454413","why":"Extension claims to be Flash Player","name":"Flash Player (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1e5f5cb2-346c-422a-9aaa-29d8760949d2","last_modified":1523897202689},{"guid":"/(__TEMPLATE__APPLICATION__@ruta-mapa\\.com)|(application-3@findizer\\.fr)|(application2@allo-pages\\.fr)|(application2@bilan-imc\\.fr)|(application2@lettres\\.net)|(application2@search-maps-finder\\.com)|(application-imcpeso@imc-peso\\.com)|(application-meuimc@meu-imc\\.com)|(application-us2@factorlove)|(application-us@misterdirections)|(application-us@yummmi\\.es)|(application@amiouze\\.fr)|(application@astrolignes\\.com)|(application@blotyn\\.com)|(application@bmi-result\\.com)|(application@bmi-tw\\.com)|(application@calcolo-bmi\\.com)|(application@cartes-itineraires\\.com)|(application@convertisseur\\.pro)|(application@de-findizer\\.fr)|(application@de-super-rezepte\\.com)|(application@dermabeauty\\.fr)|(application@dev\\.squel\\.v2)|(application@eu-my-drivingdirections\\.com)|(application@fr-allo-pages\\.fr)|(application@fr-catizz\\.com)|(application@fr-mr-traduction\\.com)|(application@good-recettes\\.com)|(application@horaires\\.voyage)|(application@imc-calcular\\.com)|(application@imc-peso\\.com)|(application@it-mio-percorso\\.com)|(application@iti-maps\\.fr)|(application@itineraire\\.info)|(application@lbc-search\\.com)|(application@les-pages\\.com)|(application@lovincalculator\\.com)|(application@lovintest\\.com)|(application@masowe\\.com)|(application@matchs\\.direct)|(application@mein-bmi\\.com)|(application@mes-resultats\\.com)|(application@mestaf\\.com)|(application@meu-imc\\.com)|(application@mon-calcul-imc\\.fr)|(application@mon-juste-poids\\.com)|(application@mon-trajet\\.com)|(application@my-drivingdirections\\.com)|(application@people-show\\.com)|(application@plans-reduc\\.fr)|(application@point-meteo\\.fr)|(application@poulixo\\.com)|(application@quipage\\.fr)|(application@quizdeamor\\.com)|(application@quizdoamor\\.com)|(application@quotient-retraite\\.fr)|(application@recettes\\.net)|(application@routenplaner-karten\\.com)|(application@ruta-mapa\\.com)|(application@satellite\\.dev\\.squel\\.v2)|(application@search-bilan-imc\\.fr)|(application@search-maps-finder\\.com)|(application@slimness\\.fr)|(application@start-bmi\\.com)|(application@tests-moi\\.com)|(application@tousmesjeux\\.fr)|(application@toutlannuaire\\.fr)|(application@tuto-diy\\.com)|(application@ubersetzung-app\\.com)|(application@uk-cookyummy\\.com)|(application@uk-howlogin\\.me)|(application@uk-myloap\\.com)|(application@voyagevoyage\\.co)|(application@wikimot\\.fr)|(application@www\\.plans-reduc\\.fr)|(application@yummmi\\.es)|(application@yummmies\\.be)|(application@yummmies\\.ch)|(application@yummmies\\.fr)|(application@yummmies\\.lu)|(application@zikplay\\.fr)|(applicationY@search-maps-finder\\.com)|(cmesapps@findizer\\.fr)|(findizer-shopping@jetpack)|(\\{8aaebb36-1488-4022-b7ec-29b790d12c17\\})/","prefs":[],"schema":1523216496621,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1452648","why":"Those add-ons do not provide a real functionality for users, other than silently tracking browsing behavior.","name":"Tracking Add-ons (harmful)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"36f97298-8bef-4372-a548-eb829413bee9","last_modified":1523286321447},{"guid":"adbeaver@adbeaver.org","prefs":[],"schema":1521630548030,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1445031","why":"This add-on generates numerous errors when loading Facebook, caused by ad injection included in it. Users who want to continue using this add-on can enable it in the Add-ons Manager.","name":"AdBeaver"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0"}],"id":"baf7f735-d6b6-410a-8cc8-25c60f7c57e2","last_modified":1522103097333},{"guid":"{44685ba6-68b3-4895-879e-4efa29dfb578}","prefs":[],"schema":1521565140013,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447042","why":"This add-on impersonates a Flash tool and runs remote code on users' systems.","name":"FF Flash Manager"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"547037f2-97ae-435a-863c-efd7532668cd","last_modified":1521630548023},{"guid":"/^.*extension.*@asdf\\.pl$/","prefs":[],"schema":1520451695869,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1444037","why":"These add-ons are using deceptive names and taking over Facebook accounts to post spam content.","name":"Facebook spammers"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3d55fab0-ec1a-4bca-84c9-3b74f5d01509","last_modified":1520527480321},{"guid":"/^(addon@fasterweb\\.com|\\{5f398d3f-25db-47f5-b422-aa2364ff6c0b\\}|addon@fasterp\\.com|addon@calculator)$/","prefs":[],"schema":1520338910918,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1443478","why":"These are malicious add-ons that use deceptive names and run remote scripts.","name":"FasterWeb add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f58729ec-f93c-41d9-870d-dd9c9fd811b6","last_modified":1520358450708},{"guid":"{42baa93e-0cff-4289-b79e-6ae88df668c4}","prefs":[],"schema":1520336325565,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1443196","why":"The add-on claims to be \"Adobe Shockwave Flash Player\"","name":"Adobe Shockwave Flash Player (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0cd723fe-d33d-43a0-b84f-7a3cad253212","last_modified":1520338780397},{"guid":"/{0c9970a2-6874-483b-a486-2296cfe251c2}|{01c9a4a4-06dd-426b-9500-2ea6fe841b88}|{1c981c7c-30e0-4ed2-955d-6b370e0a9d19}|{2aa275f8-fabc-4766-95b2-ecfc73db310b}|{2cac0be1-10a2-4a0d-b8c5-787837ea5955}|{2eb66f6c-94b3-44f5-9de2-22371236ec99}|{2f8aade6-8717-4277-b8b1-55172d364903}|{3c27c34f-8775-491a-a1c9-fcb15beb26d3}|{3f4dea3e-dbfc-428f-a88b-36908c459e20}|{3f4191fa-8f16-47d2-9414-36bfc9e0c2bf}|{4c140bc5-c2ad-41c3-a407-749473530904}|{05a21129-af2a-464c-809f-f2df4addf209}|{5da81d3d-5db1-432a-affc-4a2fe9a70749}|{5f4e63e4-351f-4a21-a8e5-e50dc72b5566}|{7c1df23b-1fd8-42b9-8752-71fff2b979de}|{7d5e24a1-7bef-4d09-a952-b9519ec00d20}|{7d932012-b4dd-42cc-8a78-b15ca82d0e61}|{7f8bc48d-1c7c-41a0-8534-54adc079338f}|{8a61507d-dc2f-4507-a9b7-7e33b8cbc31b}|{09c8fa16-4eec-4f78-b19d-9b24b1b57e1e}|{9ce2a636-0e49-4b8e-ad17-d0c156c963b0}|{11df9391-dba5-4fe2-bd48-37a9182b796d}|{23c65153-c21e-430a-a2dc-0793410a870d}|{36a4269e-4eef-4538-baea-9dafbf6a8e2f}|{37f8e483-c782-40ed-82e9-36f101b9e41f}|{63df223d-51cf-4f76-aad8-bbc94c895ed2}|{72c1ca96-c05d-46a7-bce1-c507ec3db4ea}|{76ce213c-8e57-4a14-b60a-67a5519bd7a7}|{79db6c96-d65a-4a64-a892-3d26bd02d2d9}|{81ac42f3-3d17-4cff-85af-8b7f89c8826b}|{83d38ac3-121b-4f28-bf9c-1220bd3c643b}|{86d98522-5d42-41d5-83c2-fc57f260a3d9}|{0111c475-01e6-42ea-a9b4-27bed9eb6092}|{214cb48a-ce31-4e48-82cf-a55061f1b766}|{216e0bcc-8a23-4069-8b63-d9528b437258}|{226b0fe6-f80f-48f1-9d8d-0b7a1a04e537}|{302ef84b-2feb-460e-85ca-f5397a77aa6a}|{408a506b-2336-4671-a490-83a1094b4097}|{419be4e9-c981-478e-baa0-937cf1eea1e8}|{0432b92a-bfcf-41b9-b5f0-df9629feece1}|{449e185a-dd91-4f7b-a23a-bbf6c1ca9435}|{591d1b73-5eae-47f4-a41f-8081d58d49bf}|{869b5825-e344-4375-839b-085d3c09ab9f}|{919fed43-3961-48d9-b0ef-893054f4f6f1}|{01166e60-d740-440c-b640-6bf964504b3c}|{2134e327-8060-441c-ba68-b167b82ff5bc}|{02328ee7-a82b-4983-a5f7-d0fc353698f0}|{6072a2a8-f1bc-4c9c-b836-7ac53e3f51e4}|{28044ca8-8e90-435e-bc63-a757af2fb6be}|{28092fa3-9c52-4a41-996d-c43e249c5f08}|{31680d42-c80d-4f8a-86d3-cd4930620369}|{92111c8d-0850-4606-904a-783d273a2059}|{446122cd-cd92-4d0c-9426-4ee0d28f6dca}|{829827cd-03be-4fed-af96-dd5997806fb4}|{4479446e-40f3-48af-ab85-7e3bb4468227}|{9263519f-ca57-4178-b743-2553a40a4bf1}|{71639610-9cc3-47e0-86ed-d5b99eaa41d5}|{84406197-6d37-437c-8d82-ae624b857355}|{93017064-dfd4-425e-a700-353f332ede37}|{a0ab16af-3384-4dbe-8722-476ce3947873}|{a0c54bd8-7817-4a40-b657-6dc7d59bd961}|{a2de96bc-e77f-4805-92c0-95c9a2023c6a}|{a3fbc8be-dac2-4971-b76a-908464cfa0e0}|{a42e5d48-6175-49e3-9e40-0188cde9c5c6}|{a893296e-5f54-43f9-a849-f12dcdee2c98}|{ac296b47-7c03-486f-a1d6-c48b24419749}|{b26bf964-7aa6-44f4-a2a9-d55af4b4eec0}|{be981b5e-1d9d-40dc-bd4f-47a7a027611c}|{be37931c-af60-4337-8708-63889f36445d}|{bfd92dfd-b293-4828-90c1-66af2ac688e6}|{c5cf4d08-0a33-4aa3-a40d-d4911bcc1da7}|{c488a8f5-ea3d-408d-809e-44e82c06ad9d}|{c661c2dc-00f9-4dc1-a9f6-bb2b7e1a4f8d}|{cd28aa38-d2f1-45a3-96c3-6cfd4702ef51}|{cd89045b-2e06-46bb-9e34-48e8799e5ef2}|{cf9d96ff-5997-439a-b32b-98214c621eee}|{d14acee6-f32b-4aa3-a802-6616003fc6a8}|{d97223b8-44e5-46c7-8ab5-e1d8986daf44}|{ddae89bd-6793-45d8-8ec9-7f4fb7212378}|{de3b1909-d4da-45e9-8da5-7d36a30e2fc6}|{df09f268-3c92-49db-8c31-6a25a6643896}|{e5bc3951-c837-4c98-9643-3c113fc8cf5e}|{e9ccb1f2-a8ba-4346-b43b-0d5582bce414}|{e341ed12-a703-47fe-b8dd-5948c38070e4}|{e2139287-2b0d-4f54-b3b1-c9a06c597223}|{ed352072-ddf0-4cb4-9cb6-d8aa3741c2de}|{f0b809eb-be22-432f-b26f-b1cadd1755b9}|{f1bce8e4-9936-495b-bf48-52850c7250ab}|{f01c3add-dc6d-4f35-a498-6b4279aa2ffa}|{f9e1ad25-5961-4cc5-8d66-5496c438a125}|{f4262989-6de0-4604-918f-663b85fad605}|{fc0d55bd-3c50-4139-9409-7df7c1114a9d}/","prefs":[],"schema":1519766961483,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1439702","why":"This malicious add-on claims to be a Firefox \"helper\" or \"updater\" or similar.","name":"FF updater (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"48b14881-5f6b-4e48-afc5-3d9a7fae26a3","last_modified":1519826648080},{"guid":"{44e4b2cf-77ba-4f76-aca7-f3fcbc2dda2f} ","prefs":[],"schema":1519414957616,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1440821","why":"This is a malicious add-on that uses a deceptive name and runs remote code.","name":"AntiVirus for Firefox"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2447476f-043b-4d0b-9d3c-8e859c97d950","last_modified":1519429178266},{"guid":"{f3c31b34-862c-4bc8-a98f-910cc6314a86}","prefs":[],"schema":1519242096699,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1440736","why":"This is a malicious add-on that is masked as an official Adobe Updater and runs malicious code.","name":"Adobe Updater (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"adfd98ef-cebc-406b-b1e0-61bd4c71e4b1","last_modified":1519409417397},{"guid":"/^(\\{fd0c36fa-6a29-4246-810b-0bb4800019cb\\}|\\{b9c1e5bf-6585-4766-93fc-26313ac59999\\}|\\{3de25fff-25e8-40e9-9ad9-fdb3b38bb2f4\\})$/","prefs":[],"schema":1519069296530,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1439432","why":"These are malicious add-ons that are masked as an official Adobe Updater and run malicious code.","name":"Adobe Updater"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"4e28ba5c-af62-4e53-a7a1-d33334571cf8","last_modified":1519078890592},{"guid":"/^(\\{01c9a4a4-06dd-426b-9500-2ea6fe841b88\\}|{5e024309-042c-4b9d-a634-5d92cf9c7514\\}|{f4262989-6de0-4604-918f-663b85fad605\\}|{e341ed12-a703-47fe-b8dd-5948c38070e4\\}|{cd89045b-2e06-46bb-9e34-48e8799e5ef2\\}|{ac296b47-7c03-486f-a1d6-c48b24419749\\}|{5da81d3d-5db1-432a-affc-4a2fe9a70749\\}|{df09f268-3c92-49db-8c31-6a25a6643896\\}|{81ac42f3-3d17-4cff-85af-8b7f89c8826b\\}|{09c8fa16-4eec-4f78-b19d-9b24b1b57e1e\\}|{71639610-9cc3-47e0-86ed-d5b99eaa41d5\\}|{83d38ac3-121b-4f28-bf9c-1220bd3c643b\\}|{7f8bc48d-1c7c-41a0-8534-54adc079338f\\})$/","prefs":[],"schema":1518550894975,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1438028","why":"These are malicious add-ons that inject remote scripts into popular websites.","name":"Page Marker add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cc5848e8-23d5-4655-b45c-dc239839b74e","last_modified":1518640450735},{"guid":"/^(https|youtube)@vietbacsecurity\\.com$/","prefs":[],"schema":1517909997354,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1435974","why":"These add-ons contain malicious functionality, violating the users privacy and security.","name":"HTTPS and Youtube downloader (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"646e2384-f894-41bf-b7fc-8879e0095109","last_modified":1517910100624},{"guid":"{ed352072-ddf0-4cb4-9cb6-d8aa3741c2de}","prefs":[],"schema":1517514097126,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1434893","why":"This is a malicious add-on that injects remote scripts into popular pages while pretending to do something else.","name":"Image previewer"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2104a522-bb2f-4b04-ad0d-b0c571644552","last_modified":1517577111194},{"guid":"/^(\\{0b24cf69-02b8-407d-83db-e7af04fc1f3e\\})|(\\{6feed48d-41d4-49b8-b7d6-ef78cc7a7cd7\\})| (\\{8a0699a0-09c3-4cf1-b38d-fec25441650c\\})$/","prefs":[],"schema":1517341295286,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1434759","why":"These add-ons use remote scripts to alter popular sites like Google or Amazon.","name":"Malicious remote script add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"32ffc62d-40c4-43ac-aa3f-7240978d0ad0","last_modified":1517439279474},{"guid":"/^({be5d0c88-571b-4d01-a27a-cc2d2b75868c})|({3908d078-e1db-40bf-9567-5845aa77b833})|({5b620343-cd69-49b8-a7ba-f9d499ee5d3d})|({6eee2d17-f932-4a43-a254-9e2223be8f32})|({e05ba06a-6d6a-4c51-b8fc-60b461ffecaf})|({a5808da1-5b4f-42f2-b030-161fd11a36f7})|({d355bee9-07f0-47d3-8de6-59b8eecba57b})|({a1f8e136-bce5-4fd3-9ed1-f260703a5582})$/","prefs":[],"schema":1517260691761,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.\n","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"70f37cc7-9f8a-4d0f-a881-f0c56934fa75","last_modified":1517260722621},{"guid":"/^({d78d27f4-9716-4f13-a8b6-842c455d6a46})|({bd5ba448-b096-4bd0-9582-eb7a5c9c0948})|({0b24cf69-02b8-407d-83db-e7af04fc1f3e})|({e08d85c5-4c0f-4ce3-9194-760187ce93ba})|({1c7d6d9e-325a-4260-8213-82d51277fc31})|({8a0699a0-09c3-4cf1-b38d-fec25441650c})|({1e68848a-2bb7-425c-81a2-524ab93763eb})$/","prefs":[],"schema":1517168490224,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"805ee80e-0929-4c92-93ed-062b98053f28","last_modified":1517260691755},{"guid":"/^({abec23c3-478f-4a5b-8a38-68ccd500ec42}|{a83c1cbb-7a41-41e7-a2ae-58efcb4dc2e4}|{62237447-e365-487e-8fc3-64ddf37bdaed}|{b12cfdc7-3c69-43cb-a3fb-38981b68a087}|{1a927d5b-42e7-4407-828a-fdc441d0daae}|{dd1cb0ec-be2a-432b-9c90-d64c824ac371}|{82c8ced2-e08c-4d6c-a12b-3e8227d7fc2a}|{87c552f9-7dbb-421b-8deb-571d4a2d7a21})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c92f2a05-73eb-454e-9583-f6d2382d8bca","last_modified":1516829074251},{"guid":"/^({618baeb9-e694-4c7b-9328-69f35b6a8839}|{b91fcda4-88b0-4a10-9015-9365e5340563}|{04150f98-2d7c-4ae2-8979-f5baa198a577}|{4b1050c6-9139-4126-9331-30a836e75db9}|{1e6f5a54-2c4f-4597-aa9e-3e278c617d38}|{e73854da-9503-423b-ab27-fafea2fbf443}|{a2427e23-d349-4b25-b5b8-46960b218079}|{f92c1155-97b3-40f4-9d5b-7efa897524bb}|{c8e14311-4b2d-4eb0-9a6b-062c6912f50e}|{45621564-b408-4c29-8515-4cf1f26e4bc3}|{27380afd-f42a-4c25-b57d-b9012e0d5d48})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2d4fe65b-6c02-4461-baa8-dda52e688cf6","last_modified":1516829040469},{"guid":"/^({4dac7c77-e117-4cae-a9f0-6bd89e9e26ab}|{cc689da4-203f-4a0c-a7a6-a00a5abe74c5}|{0eb4672d-58a6-4230-b74c-50ca3716c4b0}|{06a71249-ef35-4f61-b2c8-85c3c6ee5617}|{5280684d-f769-43c9-8eaa-fb04f7de9199}|{c2341a34-a3a0-4234-90cf-74df1db0aa49}|{85e31e7e-3e3a-42d3-9b7b-0a2ff1818b33}|{b5a35d05-fa28-41b5-ae22-db1665f93f6b}|{1bd8ba17-b3ed-412e-88db-35bc4d8771d7}|{a18087bb-4980-4349-898c-ca1b7a0e59cd}|{488e190b-d1f6-4de8-bffb-0c90cc805b62})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9a3fd797-0ab8-4286-9a1b-2b6c97f9075b","last_modified":1516829006347},{"guid":"/^({f6df4ef7-14bd-43b5-90c9-7bd02943789c}|{ccb7b5d6-a567-40a2-9686-a097a8b583dd}|{9b8df895-fcdd-452a-8c46-da5be345b5bc}|{5cf77367-b141-4ba4-ac2a-5b2ca3728e81}|{ada56fe6-f6df-4517-9ed0-b301686a34cc}|{95c7ae97-c87e-4827-a2b7-7b9934d7d642}|{e7b978ae-ffc2-4998-a99d-0f4e2f24da82}|{115a8321-4414-4f4c-aee6-9f812121b446}|{bf153de7-cdf2-4554-af46-29dabfb2aa2d}|{179710ba-0561-4551-8e8d-1809422cb09f}|{9d592fd5-e655-461a-9b28-9eba85d4c97f})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aae78cd5-6b26-472e-ab2d-db4105911250","last_modified":1516828973824},{"guid":"/^({30972e0a-f613-4c46-8c87-2e59878e7180}|{0599211f-6314-4bf9-854b-84cb18da97f8}|{4414af84-1e1f-449b-ac85-b79f812eb69b}|{2a8bec00-0ab0-4b4d-bd3d-4f59eada8fd8}|{bea8866f-01f8-49e9-92cd-61e96c05d288}|{046258c9-75c5-429d-8d5b-386cfbadc39d}|{c5d359ff-ae01-4f67-a4f7-bf234b5afd6e}|{fdc0601f-1fbb-40a5-84e1-8bbe96b22502}|{85349ea6-2b5d-496a-9379-d4be82c2c13d}|{640c40e5-a881-4d16-a4d0-6aa788399dd2}|{d42328e1-9749-46ba-b35c-cce85ddd4ace})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"750aa293-3742-46b5-8761-51536afecaef","last_modified":1516828938683},{"guid":"/^({d03b6b0f-4d44-4666-a6d6-f16ad9483593}|{767d394a-aa77-40c9-9365-c1916b4a2f84}|{a0ce2605-b5fc-4265-aa65-863354e85058}|{b7f366fa-6c66-46bf-8df2-797c5e52859f}|{4ad16913-e5cb-4292-974c-d557ef5ec5bb}|{3c3ef2a3-0440-4e77-9e3c-1ca8d48f895c}|{543f7503-3620-4f41-8f9e-c258fdff07e9}|{98363f8b-d070-47b6-acc6-65b80acac4f3}|{5af74f5a-652b-4b83-a2a9-f3d21c3c0010}|{484e0ba4-a20b-4404-bb1b-b93473782ae0}|{b99847d6-c932-4b52-9650-af83c9dae649})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a29aed6f-6546-4fa2-8131-df5c9a5427af","last_modified":1516828911059},{"guid":"/^({2bb68b03-b528-4133-9fc4-4980fbb4e449}|{231e58ac-0f3c-460b-bb08-0e589360bec7}|{a506c5af-0f95-4107-86f8-3de05e2794c9}|{8886a262-1c25-490b-b797-2e750dd9f36b}|{65072bef-041f-492e-8a51-acca2aaeac70}|{6fa41039-572b-44a4-acd4-01fdaebf608d}|{87ba49bd-daba-4071-aedf-4f32a7e63dbe}|{95d58338-ba6a-40c8-93fd-05a34731dc0e}|{4cbef3f0-4205-4165-8871-2844f9737602}|{1855d130-4893-4c79-b4aa-cbdf6fee86d3}|{87dcb9bf-3a3e-4b93-9c85-ba750a55831a})$/","prefs":[],"schema":1516822896448,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5c092b0d-7205-43a1-aa75-b7a42372fb52","last_modified":1516828883523},{"guid":"/^({fce89242-66d3-4946-9ed0-e66078f172fc})|({0c4df994-4f4a-4646-ae5d-8936be8a4188})|({6cee30bc-a27c-43ea-ac72-302862db62b2})|({e08ebf0b-431d-4ed1-88bb-02e5db8b9443})$/","prefs":[],"schema":1516650096284,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432560","why":"These are malicious add-ons that make it hard for the user to be removed.","name":"FF AntiVir Monitoring"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9dfeee42-e6a8-49e0-8979-0648f7368239","last_modified":1516744119329},{"guid":"/^(\\{1490068c-d8b7-4bd2-9621-a648942b312c\\})|(\\{d47ebc8a-c1ea-4a42-9ca3-f723fff034bd\\})|(\\{83d6f65c-7fc0-47d0-9864-a488bfcaa376\\})|(\\{e804fa4c-08e0-4dae-a237-8680074eba07\\})|(\\{ea618d26-780e-4f0f-91fd-2a6911064204\\})|(\\{ce93dcc7-f911-4098-8238-7f023dcdfd0d\\})|(\\{7eaf96aa-d4e7-41b0-9f12-775c2ac7f7c0\\})|(\\{b019c485-2a48-4f5b-be13-a7af94bc1a3e\\})|(\\{9b8a3057-8bf4-4a9e-b94b-867e4e71a50c\\})|(\\{eb3ebb14-6ced-4f60-9800-85c3de3680a4\\})|(\\{01f409a5-d617-47be-a574-d54325fe05d1\\})$/","prefs":[],"schema":1516394914836,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are a set of malicious add-ons that block the add-ons manager tab from opening so they can't be uninstalled.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5bf72f70-a611-4845-af3f-d4dabe8862b6","last_modified":1516394982586},{"guid":"/^(\\{ac06c6b2-3fd6-45ee-9237-6235aa347215\\})|(\\{d461cc1b-8a36-4ff0-b330-1824c148f326\\})|(\\{d1ab5ebd-9505-481d-a6cd-6b9db8d65977\\})|(\\{07953f60-447e-4f53-a5ef-ed060487f616\\})|(\\{2d3c5a5a-8e6f-4762-8aff-b24953fe1cc9\\})|(\\{f82b3ad5-e590-4286-891f-05adf5028d2f\\})|(\\{f96245ad-3bb0-46c5-8ca9-2917d69aa6ca\\})|(\\{2f53e091-4b16-4b60-9cae-69d0c55b2e78\\})|(\\{18868c3a-a209-41a6-855d-f99f782d1606\\})|(\\{47352fbf-80d9-4b70-9398-fb7bffa3da53\\})$/","prefs":[],"schema":1516311993443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are a set of malicious add-ons that block the add-ons manager tab from opening so they can't be uninstalled.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"4ca8206f-bc2a-4428-9439-7f3142dc08db","last_modified":1516394914828},{"guid":"{5b0f6d3c-10fd-414c-a135-dffd26d7de0f}","prefs":[],"schema":1516131689499,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430577","why":"This is a malicious add-on that executes remote scripts, redirects popular search URLs and tracks users.","name":"P Birthday"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8088b39a-3e6d-4a17-a22f-3f95c0464bd6","last_modified":1516303320468},{"guid":"{1490068c-d8b7-4bd2-9621-a648942b312c}","prefs":[],"schema":1515267698296,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1428754","why":"This add-on is using a deceptive name and performing unwanted actions on users' systems.","name":"FF Safe Helper"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"674b6e19-f087-4706-a91d-1e723ed6f79e","last_modified":1515433728497},{"guid":"{dfa727cb-0246-4c5a-843a-e4a8592cc7b9}","prefs":[],"schema":1514922095288,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1426582","why":"Version 2.0.0 shipped with a hidden coin miner, which degrades performance in users who have it enabled. Version 1.2.3 currently available on AMO is not affected.","name":"Open With Adobe PDF Reader 2.0.0"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.0","minVersion":"2.0.0"}],"id":"455772a3-8360-4f5a-9a5f-a45b904d0b51","last_modified":1515007270887},{"guid":"{d03b6b0f-4d44-4666-a6d6-f16ad9483593}","prefs":[],"schema":1513366896461,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1425581","why":"This is a malicious add-on posing as a legitimate update.","name":"FF Guard Tool (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"10d9ce89-b8d4-4b53-b3d7-ecd192681f4e","last_modified":1513376470395},{"guid":"{7e907a15-0a4c-4ff4-b64f-5eeb8f841349}","prefs":[],"schema":1510083698490,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate update.","name":"Manual Update"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f7569261-f575-4719-8202-552b20d013b0","last_modified":1510168860382},{"guid":"{3602008d-8195-4860-965a-d01ac4f9ca96}","prefs":[],"schema":1509120801051,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.\n","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"28c805a9-e692-4ef8-b3ae-14e085c19ecd","last_modified":1509120934909},{"guid":"{87010166-e3d0-4db5-a394-0517917201df}","prefs":[],"schema":1509120801051,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.\n","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"84dd8a02-c879-4477-8ea7-bf2f225b0940","last_modified":1509120881470},{"guid":"{8ab60777-e899-475d-9a4f-5f2ee02c7ea4}","prefs":[],"schema":1509120801051,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.\n","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ccebab59-7190-4258-8faa-a0b752dd5301","last_modified":1509120831329},{"guid":"{368eb817-31b4-4be9-a761-b67598faf9fa}","prefs":[],"schema":1509046897080,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9abc7502-bd6f-40d7-b035-abe721345360","last_modified":1509120801043},{"guid":"fi@dictionaries.addons.mozilla.org","prefs":[],"schema":1508701297180,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407147","why":"This add-on is causing frequent crashes in Firefox 56.","name":"Finnish spellchecker"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.1.0","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"56.0a1"}]}],"id":"22431713-a93b-40f4-8264-0b341b5f6454","last_modified":1508856488536},{"guid":"firefox@mega.co.nz","prefs":[],"schema":1506800496781,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1404290","why":"Add-on is causing tabs to load blank.","name":"Mega.nz"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.16.1","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"56.0a1"}]}],"id":"a84e6eba-4bc1-4416-b481-9b837d39f9f0","last_modified":1506963401477},{"guid":"@68eba425-7a05-4d62-82b1-1d6d5a51716b","prefs":[],"schema":1505072496256,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1398905","why":"Misleads users into thinking this is a security and privacy tool (also distributed on a site that makes it look like an official Mozilla product).","name":"SearchAssist Incognito"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0"}],"id":"595e0e53-b76b-4188-a160-66f29c636094","last_modified":1505211411253},{"guid":"{efda3854-2bd9-45a1-9766-49d7ff18931d}","prefs":[],"schema":1503344500341,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1392625","why":"Add-on injects remote code into privileged scope.","name":"Smart Referer"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.8.17.2","minVersion":"0"}],"id":"d83011de-67a4-479b-a778-916a7232095b","last_modified":1503411102265},{"guid":"@H99KV4DO-UCCF-9PFO-9ZLK-8RRP4FVOKD9O","prefs":[],"schema":1502483549048,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1340877","why":"This is a malicious add-on that is being installed silently.","name":"FF Adr (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5df16afc-c804-43c9-9de5-f1835403e5fb","last_modified":1502483601731},{"guid":"@DA3566E2-F709-11E5-8E87-A604BC8E7F8B","prefs":[],"schema":1502480491460,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1340877","why":"This is a malicious add-on that is being installed silently into users' systems.","name":"SimilarWeb (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0a47a2f7-f07c-489b-bd39-88122a2dfe6a","last_modified":1502483549043},{"guid":"xdict@www.iciba.com","prefs":[],"schema":1501098091500,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1384497","why":"This add-on has been discontinued and is creating a prompt loop that blocks users from using Firefox.","name":"PowerWord Grab Word Extension"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.3.1","minVersion":"0"}],"id":"28736359-700e-4b61-9c50-0b533a6bac55","last_modified":1501187580933},{"guid":"{3B4DE07A-DE43-4DBC-873F-05835FF67DCE}","prefs":[],"schema":1496950889322,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1371392","why":"This add-on performs hidden actions that cause the users' systems to act as a botnet.","name":"The Safe Surfing (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"510bbd9b-b883-4837-90ab-8e353e27e1be","last_modified":1496951442076},{"guid":"WebProtection@360safe.com","prefs":[],"schema":1496846005095,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1336635","who":"All users of Firefox 52 and above who have this add-on installed.","why":"This add-on breaks the Firefox user interface starting with version 52.","name":"360 Internet Protection versions 5.0.0.1009 and lower"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"5.0.0.1009","minVersion":"0"}],"id":"e16408c3-4e08-47fd-85a9-3cbbce534e95","last_modified":1496849965060},{"guid":"html5@encoding","prefs":[],"schema":1496788543767,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1370847","who":"All users.","why":"This malicious add-on targets a certain user group and spies on them.","name":"HTML5 Encoding (Malicious), all versions"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c806b01c-3352-4083-afd9-9a8ab6e00b19","last_modified":1496833261424},{"guid":"/^({95E84BD3-3604-4AAC-B2CA-D9AC3E55B64B}|{E3605470-291B-44EB-8648-745EE356599A}|{95E5E0AD-65F9-4FFC-A2A2-0008DCF6ED25}|{FF20459C-DA6E-41A7-80BC-8F4FEFD9C575}|{6E727987-C8EA-44DA-8749-310C0FBE3C3E}|{12E8A6C2-B125-479F-AB3C-13B8757C7F04}|{EB6628CF-0675-4DAE-95CE-EFFA23169743})$/","prefs":[],"schema":1494022576295,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1362585","why":"All of these add-ons have been identified as malware, and are being installed in Firefox globally, most likely via a malicious application installer.","name":"Malicious globally-installed add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3fd71895-7fc6-4f3f-aa22-1cbb0c5fd922","last_modified":1494024191520},{"guid":"@safesearchscoutee","prefs":[],"schema":1494013289942,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1362553","why":"This add-on intercepts queries sent to search engines and replaces them with its own, without user consent.","name":"SafeSearch Incognito (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"edad04eb-ea16-42f3-a4a7-20dded33cc37","last_modified":1494022568654},{"guid":"{0D2172E4-C5AE-465A-B80D-53A840275B5E}","prefs":[],"schema":1493332768943,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1359473","who":"All users of Thunderbird 52 and above, using a version of the Priority Switcher add-on before version 0.7","why":"This add-on is causing recurring startup crashes in Thunderbird.","name":"Priority Switcher for Thunderbird before version 0.7"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.6.999","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"52.0a1"}]}],"id":"8c8af415-46db-40be-a66e-38e3762493bd","last_modified":1493332986987},{"guid":"msktbird@mcafee.com","prefs":[],"schema":1493150718059,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1354912","why":"These versions of this add-on are known to cause frequent crashes in Thunderbird.","name":"McAfee Anti-Spam Thunderbird Extension 2.0 and lower"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.0","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"0"}]}],"id":"9e86d1ff-727a-45e3-9fb6-17f32666daf2","last_modified":1493332747360},{"guid":"/^(\\{11112503-5e91-4299-bf4b-f8c07811aa50\\})|(\\{501815af-725e-45be-b0f2-8f36f5617afc\\})$/","prefs":[],"schema":1491421290217,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1354045","why":"This add-on steals user credentials for popular websites from Facebook.","name":"Flash Player Updater (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c142360c-4f93-467e-9717-b638aa085d95","last_modified":1491472107658},{"guid":"fr@fbt.ovh","prefs":[],"schema":1490898754477,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1351689","why":"Scam add-on that silently steals user credentials of popular websites","name":"Adobe Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0f8344d0-8211-49a1-81be-c0084b3da9b1","last_modified":1490898787752},{"guid":"/^\\{(9321F452-96D5-11E6-BC3E-3769C7AD2208)|({18ED1ECA-96D3-11E6-A373-BD66C7AD2208})\\}$/","prefs":[],"schema":1490872899765,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1351710","why":"These add-ons modify websites and add deceptive or abusive content","name":"Scamming add-ons (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d6425f24-8c9e-4c0a-89b4-6890fc68d5c9","last_modified":1490898748265},{"guid":"/^(test2@test\\.com)|(test3@test\\.com)|(mozilla_cc2\\.2@internetdownloadmanager\\.com)$/","prefs":[],"schema":1490557289817,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1351095","who":"All users who have any of these add-ons installed.","why":"Old versions of the Internet Download Manager Integration add-on cause performance and stability problems in Firefox 53 and above.","name":"IDM Integration forks"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"53.0a1"}]}],"id":"9085fdba-8498-46a9-b9fd-4c7343a15c62","last_modified":1490653926191},{"guid":"mozilla_cc2@internetdownloadmanager.com","prefs":[],"schema":1489007018796,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1338832","who":"All users who have these versions of the add-on installed.","why":"Old versions of the Internet Download Manager Integration add-on cause performance and stability problems in Firefox 53 and above.","name":"IDM Integration"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"6.26.11","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"53.0a1"}]}],"id":"d33f6d48-a555-49dd-96ff-8d75473403a8","last_modified":1489514734167},{"guid":"InternetProtection@360safe.com","prefs":[],"schema":1489006712382,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1336635","who":"All Firefox users who have this add-on installed.","why":"This add-on breaks the Firefox user interface starting with version 52.","name":"360 Internet Protection"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"5.0.0.1002","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"52.0a1"}]}],"id":"89a61123-79a2-45d1-aec2-97afca0863eb","last_modified":1489006816246},{"guid":"{95E84BD3-3604-4AAC-B2CA-D9AC3E55B64B}","prefs":[],"schema":1487179851382,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1338690","who":"All users who have this add-on installed.","why":"This is a malicious add-on that is silently installed in users' systems.","name":"youtube adblock (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"04b25e3d-a725-493e-be07-cbd74fb37ea7","last_modified":1487288975999},{"guid":"ext@alibonus.com","prefs":[],"schema":1485297431051,"blockID":"i1524","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333471","who":"All Firefox users who have these versions installed.","why":"Versions 1.20.9 and lower of this add-on contain critical security issues.","name":"Alibonus 1.20.9 and lower","created":"2017-01-24T22:45:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.20.9","minVersion":"0","targetApplication":[]}],"id":"a015d5a4-9184-95db-0c74-9262af2332fa","last_modified":1485301116629},{"guid":"{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}","prefs":[],"schema":1485295513652,"blockID":"i1523","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314332","who":"All Firefox users who have these versions of the Web of Trust add-on installed.","why":"Versions 20170120 and lower of the Web of Trust add-on send excessive user data to its service, which has been reportedly shared with third parties without sufficient sanitization. These versions are also affected by a vulnerability that could lead to unwanted remote code execution.","name":"Web of Trust 20170120 and lower","created":"2017-01-24T22:01:08Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"20170120","minVersion":"0","targetApplication":[]}],"id":"2224c139-9b98-0900-61c1-04031de11ad3","last_modified":1485297214072},{"guid":"/^(ciscowebexstart1@cisco\\.com|ciscowebexstart_test@cisco\\.com|ciscowebexstart@cisco\\.com|ciscowebexgpc@cisco\\.com)$/","prefs":[],"schema":1485212610474,"blockID":"i1522","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333225","who":"All Firefox users who have any Cisco WebEx add-ons installed.","why":"A critical security vulnerability has been discovered in Cisco WebEx add-ons that enable malicious websites to execute code on the user's system.","name":"Cisco WebEx add-ons","created":"2017-01-23T22:55:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.1","minVersion":"1.0.0","targetApplication":[]}],"id":"30368779-1d3b-490a-0a34-253085af7754","last_modified":1485215014902},{"guid":"{de71f09a-3342-48c5-95c1-4b0f17567554}","prefs":[],"schema":1484335370642,"blockID":"i1493","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329654","who":"All users who have this add-on installed.","why":"This is a malicious add-on that is installed using a fake name. It changes search and homepage settings.","name":"Search for Firefox Convertor (malware)","created":"2017-01-12T22:17:59Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.3.9","minVersion":"0","targetApplication":[]}],"id":"d6ec9f54-9945-088e-ba68-40117eaba24e","last_modified":1484867614757},{"guid":"googlotim@gmail.com","prefs":[],"schema":1483389810787,"blockID":"i1492","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1328594","who":"All users who have Savogram version 1.3.2 installed. Version 1.3.1 doesn't have this problem and can be installed from the add-on page. Note that this is an older version, so affected users won't be automatically updated to it. New versions should correct this problem if they become available.","why":"Version 1.3.2 of this add-on loads remote code and performs DOM injection in an unsafe manner.","name":"Savogram 1.3.2","created":"2017-01-05T19:58:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.3.2","minVersion":"1.3.2","targetApplication":[]}],"id":"0756ed76-7bc7-ec1e-aba5-3a9fac2107ba","last_modified":1483646608603},{"guid":"support@update-firefox.com","prefs":[],"schema":1483387107003,"blockID":"i21","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629717","who":"All users of the add-on in all Mozilla applications.","why":"This add-on is adware/spyware masquerading as a Firefox update mechanism.","name":"Browser Update (spyware)","created":"2011-01-31T16:23:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dfb06be8-3594-28e4-d163-17e27119f15d","last_modified":1483389809169},{"guid":"{2224e955-00e9-4613-a844-ce69fccaae91}","prefs":[],"schema":1483387107003,"blockID":"i7","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=512406","who":"All users of Internet Saving Optimizer for all Mozilla applications.","why":"This add-on causes a high volume of Firefox crashes and is considered malware.","name":"Internet Saving Optimizer (extension)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b9efb796-97c2-6434-d28f-acc83436f8e5","last_modified":1483389809147},{"guid":"supportaccessplugin@gmail.com","prefs":[],"schema":1483387107003,"blockID":"i43","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=693673","who":"All users with Firefox Access Plugin installed","why":"This add-on is spyware that reports all visited websites to a third party with no user value.","name":"Firefox Access Plugin (spyware)","created":"2011-10-11T11:24:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ed230a4-e174-262a-55ab-0c33f93a2529","last_modified":1483389809124},{"guid":"{8CE11043-9A15-4207-A565-0C94C42D590D}","prefs":[],"schema":1483387107003,"blockID":"i10","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=541302","who":"All users of this add-on in all Mozilla applications.","why":"This add-on secretly hijacks all search results in most major search engines and masks as a security add-on.","name":"Internal security options editor (malware)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e2e0ac09-6d68-75f5-2424-140f51904876","last_modified":1483389809102},{"guid":"youtube@youtube2.com","prefs":[],"schema":1483387107003,"blockID":"i47","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=713050","who":"All users with any version of Free Cheesecake Factory installed on any Mozilla product.","why":"This add-on hijacks your Facebook account.","name":"Free Cheesecake Factory (malware)","created":"2011-12-22T13:11:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"85f5c1db-433b-bee3-2a3b-325165cacc6e","last_modified":1483389809079},{"guid":"admin@youtubespeedup.com","prefs":[],"schema":1483387107003,"blockID":"i48","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=714221","who":"All users with any version of Youtube Speed UP! installed on any Mozilla product.","why":"This add-on hijacks your Facebook account.","name":"Youtube Speed UP! (malware)","created":"2011-12-29T19:48:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a93922c4-8a8a-5230-8f76-76fecb0653b6","last_modified":1483389809057},{"guid":"{E8E88AB0-7182-11DF-904E-6045E0D72085}","prefs":[],"schema":1483387107003,"blockID":"i13","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578085","who":"All users of this add-on for all Mozilla applications.","why":"This add-on intercepts website login credentials and is malware. For more information, please read our security announcement.","name":"Mozilla Sniffer (malware)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ebbd6de9-fc8a-3e5b-2a07-232bee589c7c","last_modified":1483389809035},{"guid":"sigma@labs.mozilla","prefs":[],"schema":1483387107003,"blockID":"i44","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690819","who":"All users of Lab Kit in all versions of Firefox.","why":"The Lab Kit add-on has been retired due to compatibility issues with Firefox 7 and future Firefox browser releases. You can still install Mozilla Labs add-ons individually.\r\n\r\nFor more information, please read this announcement.","name":"Mozilla Labs: Lab Kit","created":"2011-10-11T11:51:34Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d614e9cd-220f-3a19-287b-57e122f8c4b5","last_modified":1483389809012},{"guid":"/^(jid0-S9kkzfTvEmC985BVmf8ZOzA5nLM@jetpack|jid1-qps14pkDB6UDvA@jetpack|jid1-Tsr09YnAqIWL0Q@jetpack|shole@ats.ext|{38a64ef0-7181-11e3-981f-0800200c9a66}|eochoa@ualberta.ca)$/","prefs":[],"schema":1483376308298,"blockID":"i1424","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","who":"All users who have any of the affected versions installed.","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked.","name":"Various vulnerable add-on versions","created":"2016-12-21T17:22:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0699488d-2a19-6735-809e-f229849fe00b","last_modified":1483378113482},{"guid":"pink@rosaplugin.info","prefs":[],"schema":1482945809444,"blockID":"i84","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743484","who":"All Firefox users who have this add-on installed","why":"Add-on acts like malware and performs user actions on Facebook without their consent.","name":"Facebook Rosa (malware)","created":"2012-04-09T10:13:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"66ad8de9-311d-076c-7356-87fde6d30d8f","last_modified":1482945810971},{"guid":"videoplugin@player.com","prefs":[],"schema":1482945809444,"blockID":"i90","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=752483","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as a Flash Player update. It can hijack Google searches and Facebook accounts.","name":"FlashPlayer 11 (malware)","created":"2012-05-07T08:58:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d25943f1-39ef-b9ec-ab77-baeef3498365","last_modified":1482945810949},{"guid":"youtb3@youtb3.com","prefs":[],"schema":1482945809444,"blockID":"i60","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723753","who":"All Firefox users who have this extension installed.","why":"Malicious extension installed under false pretenses.","name":"Video extension (malware)","created":"2012-02-02T16:38:41Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cae3093f-a7b3-5352-a264-01dbfbf347ce","last_modified":1482945810927},{"guid":"{8f42fb8b-b6f6-45de-81c0-d6d39f54f971}","prefs":[],"schema":1482945809444,"blockID":"i82","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743012","who":"All Firefox users who have installed this add-on.","why":"This add-on maliciously manipulates Facebook and is installed under false pretenses.","name":"Face Plus (malware)","created":"2012-04-09T10:04:28Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"09319ab3-55e7-fec1-44e0-84067d014b9b","last_modified":1482945810904},{"guid":"cloudmask@cloudmask.com","prefs":[],"schema":1482945809444,"blockID":"i1233","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280431","who":"Any user who has version 2.0.788, or earlier, installed.","why":"These versions of the add-on (before 2.0.788) execute code from a website in a privileged local browser context, potentially allowing dangerous, unreviewed, actions to affect the user's computer. This is fixed in later versions.","name":"CloudMask","created":"2016-06-17T14:31:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.788","minVersion":"0","targetApplication":[]}],"id":"2a8b40c7-a1d2-29f4-b7d7-ccfc5066bae1","last_modified":1482945810881},{"guid":"{95ff02bc-ffc6-45f0-a5c8-619b8226a9de}","prefs":[],"schema":1482945809444,"blockID":"i105","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n","name":"Eklenti D\u00fcnyas\u0131 (malware)","created":"2012-06-08T14:34:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"afbbc08d-2414-f51e-fdb8-74c0a2d90323","last_modified":1482945810858},{"guid":"{fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}","prefs":[],"schema":1482945809444,"blockID":"i77","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738419","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware that is installed under false pretenses as an Adobe plugin.","name":"Adobe Flash (malware)","created":"2012-03-22T14:39:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81753a93-382d-5f9d-a4ca-8a21b679ebb1","last_modified":1482945810835},{"guid":"youtube@youtube3.com","prefs":[],"schema":1482945809444,"blockID":"i57","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722823","who":"All Firefox users that have installed this add-on.","why":"Malware installed on false pretenses.","name":"Divx 2012 Plugin (malware)","created":"2012-01-31T13:54:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4a93a0eb-a513-7272-6199-bc4d6228ff50","last_modified":1482945810811},{"guid":"{392e123b-b691-4a5e-b52f-c4c1027e749c}","prefs":[],"schema":1482945809444,"blockID":"i109","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=769781","who":"All Firefox users who have this add-on installed.","why":"This add-on pretends to be developed by Facebook and injects scripts that manipulate users' Facebook accounts.","name":"Zaman Tuneline Hay\u0131r! (malware)","created":"2012-06-29T13:20:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b9a805aa-cae7-58d6-5a53-2af4442e4cf6","last_modified":1482945810788},{"guid":"msntoolbar@msn.com","prefs":[],"schema":1482945809444,"blockID":"i18","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","who":"Users of Bing Bar 6.0 and older for all versions of Firefox.","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see this article.","name":"Bing Bar","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"6.*","minVersion":" 0","targetApplication":[]}],"id":"9b2f2039-b997-8993-d6dc-d881bc1ca7a1","last_modified":1482945810764},{"guid":"yasd@youasdr3.com","prefs":[],"schema":1482945809444,"blockID":"i104","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n","name":"Play Now (malware)","created":"2012-06-08T14:33:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8a352dff-d09d-1e78-7feb-45dec7ace5a5","last_modified":1482945810740},{"guid":"fdm_ffext@freedownloadmanager.org","prefs":[],"schema":1482945809444,"blockID":"i2","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=408445","who":"Users of Firefox 3 and later with versions 1.0 through 1.3.1 of Free Download Manager","why":"This add-on causes a high volume of crashes.","name":"Free Download Manager","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.3.1","minVersion":"1.0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.0a1"}]}],"id":"fc46f8e7-0489-b90f-a373-d93109479ca5","last_modified":1482945810393},{"guid":"flash@adobe.com","prefs":[],"schema":1482945809444,"blockID":"i56","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","who":"All Firefox users who have this add-on installed.","why":"This add-on poses as an Adobe Flash update and injects malicious scripts into web pages. It hides itself in the Add-ons Manager.","name":"Adobe Flash Update (malware)","created":"2012-01-30T15:41:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"696db959-fb0b-8aa4-928e-65f157cdd77a","last_modified":1482945810371},{"guid":"youtubeer@youtuber.com","prefs":[],"schema":1482945809444,"blockID":"i66","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726787","who":"All Firefox users who have installed this add-on.","why":"Add-on behaves maliciously, and is installed under false pretenses.","name":"Plug VDS (malware)","created":"2012-02-13T15:44:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0878ce4e-b476-ffa3-0e06-21a65b7917a1","last_modified":1482945810348},{"guid":"{B13721C7-F507-4982-B2E5-502A71474FED}","prefs":[],"schema":1482945809444,"blockID":"i8","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","who":"Users of all versions of the original Skype Toolbar in all versions of Firefox.","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please update to the latest version. For more information, please read our announcement.","name":"Original Skype Toolbar","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5a320611-59a3-0eee-bb30-9052be870e00","last_modified":1482945810326},{"guid":"yslow@yahoo-inc.com","prefs":[],"schema":1482945809444,"blockID":"i11","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542686","who":"Users of YSlow version 2.0.5 for Firefox 3.5.7 and later.","why":"This add-on causes a high volume of Firefox crashes and other stability issues. Users should update to the latest version.","name":"YSlow","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.5","minVersion":"2.0.5","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.5.7"}]}],"id":"a9b34e8f-45ce-9217-b791-98e094c26352","last_modified":1482945810303},{"guid":"youtube@youtuber.com","prefs":[],"schema":1482945809444,"blockID":"i63","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724691","who":"All Firefox users who have installed this add-on.","why":"Installs under false pretenses and delivers malware.","name":"Mozilla Essentials (malware)","created":"2012-02-06T15:39:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"18216e6f-9d70-816f-4d4c-63861f43ff3c","last_modified":1482945810281},{"guid":"flash@adobee.com","prefs":[],"schema":1482945809444,"blockID":"i83","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743497","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware installed under false pretenses.","name":"FlashPlayer 11 (malware)","created":"2012-04-09T10:08:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"09bb4661-331c-f7ba-865b-9e085dc437af","last_modified":1482945810259},{"guid":"youtube@2youtube.com","prefs":[],"schema":1482945809444,"blockID":"i71","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730399","who":"All Firefox users who have installed this add-on.","why":"Extension is malware, installed under false pretenses.","name":"YouTube extension (malware)","created":"2012-02-27T10:23:23Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5d389c1f-b3a0-b06f-6ffb-d1e8aa055e3c","last_modified":1482945810236},{"guid":"webmaster@buzzzzvideos.info","prefs":[],"schema":1482945809444,"blockID":"i58","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722844","who":"All Firefox users who have installed this add-on.","why":"Malware add-on that is installed under false pretenses.","name":"Buzz Video (malware)","created":"2012-01-31T14:51:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f7aab105-e2c2-42f5-d9be-280eb9c0c8f7","last_modified":1482945810213},{"guid":"play5@vide04flash.com","prefs":[],"schema":1482945809444,"blockID":"i92","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755443","who":"All Firefox users who have this add-on installed.","why":"This add-on impersonates a Flash Player update (poorly), and inserts malicious scripts into Facebook.","name":"Lastest Flash PLayer (malware)","created":"2012-05-15T13:27:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7190860e-fc1f-cd9f-5d25-778e1e9043b2","last_modified":1482945810191},{"guid":"support3_en@adobe122.com","prefs":[],"schema":1482945809444,"blockID":"i97","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759164","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as the Flash Player plugin.","name":"FlashPlayer 11 (malware)","created":"2012-05-28T13:42:54Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"decf93a1-2bb0-148c-a1a6-10b3757b554b","last_modified":1482945810168},{"guid":"a1g0a9g219d@a1.com","prefs":[],"schema":1482945809444,"blockID":"i73","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=736275","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as Flash Player. It steals user cookies and sends them to a remote location.","name":"Flash Player (malware)","created":"2012-03-15T15:03:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6dd66b43-897d-874a-2227-54e240b8520f","last_modified":1482945810146},{"guid":"ghostviewer@youtube2.com","prefs":[],"schema":1482945809444,"blockID":"i59","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723683","who":"All Firefox users who have installed this add-on.","why":"Malicious add-on that automatically posts to Facebook.","name":"Ghost Viewer (malware)","created":"2012-02-02T16:32:15Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"06dfe833-8c3d-90ee-3aa8-37c3c28f7c56","last_modified":1482945810123},{"guid":"{46551EC9-40F0-4e47-8E18-8E5CF550CFB8}","prefs":[],"schema":1482945809444,"blockID":"i19","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=621660","who":"Users of Stylish version 1.1b1 for Firefox.","why":"Version 1.1b1 of this add-on causes compatibility issues with Firefox. Users should update to the latest version.","name":"Stylish","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.1b1","minVersion":"1.1b1","targetApplication":[]}],"id":"aaea37e1-ff86-4565-8bd5-55a6bf942791","last_modified":1482945810101},{"guid":"kdrgun@gmail.com","prefs":[],"schema":1482945809444,"blockID":"i103","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.","name":"Timeline Kapat (malware)","created":"2012-06-08T14:32:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a9a46ab2-2f56-1046-201c-5faa3435e248","last_modified":1482945810078},{"guid":"youtube2@youtube2.com","prefs":[],"schema":1482945809444,"blockID":"i67","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=728476","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware, installed under false pretenses.","name":"Youtube Online (malware)","created":"2012-02-18T09:10:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"14650ece-295b-a667-f9bc-a3d973e2228c","last_modified":1482945810055},{"guid":"masterfiler@gmail.com","prefs":[],"schema":1482945809444,"blockID":"i12","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542081","who":"All users of this add-on for all Mozilla applications.","why":"This add-on is malware and attempts to install a Trojan on the user's computer.","name":"Master File (malware)","created":"2010-02-05T15:01:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a256d79d-5af8-92e9-a29d-350adf822efe","last_modified":1482945810032},{"guid":"{847b3a00-7ab1-11d4-8f02-006008948af5}","prefs":[],"schema":1482945809444,"blockID":"i9","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=531047","who":"Users of Enigmail versions older than 0.97a for Thunderbird 3 and later.","why":"This add-on causes a high volume of crashes and other stability issues. Users should update Enigmail.","name":"Enigmail","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.97a","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"3.0pre"}]}],"id":"115f46b6-059d-202a-4373-2ca79b096347","last_modified":1482945810003},{"guid":"mozilla_cc@internetdownloadmanager.com","prefs":[],"schema":1482945809444,"blockID":"i14","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578443","who":"Users of Firefox 4 and later with Internet Download Manager version 6.9.8 and older.","why":"This add-on causes a high volume of crashes and has other stability issues.","name":"Internet Download Manager","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"6.9.8","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1pre"}]}],"id":"773ffcfb-75d1-081d-7431-ebe3fa5dbb44","last_modified":1482945809979},{"guid":"admin@youtubeplayer.com","prefs":[],"schema":1482945809444,"blockID":"i51","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=717165","who":"All Firefox users with this extension installed.","why":"This add-on is malware, doing nothing more than inserting advertisements into websites through iframes.","name":"Youtube player (malware)","created":"2012-01-18T14:34:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"16b2ce94-88db-0d79-33fc-a93070ceb509","last_modified":1482945809957},{"guid":"personas@christopher.beard","prefs":[],"schema":1482945809444,"blockID":"i15","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=590978","who":"All users of Personas Plus 1.6 in all versions of Firefox.","why":"This version of Personas Plus is incompatible with certain Firefox functionality and other add-ons. Users should upgrade to the latest version.","name":"Personas Plus","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.6","minVersion":"1.6","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"3.6.*","minVersion":"3.6"}]}],"id":"e36479c6-ca00-48d4-4fd9-ec677fd032da","last_modified":1482945809934},{"guid":"youtubeee@youtuber3.com","prefs":[],"schema":1482945809444,"blockID":"i96","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=758503","who":"All Firefox users who have installed this add-on.","why":"This is a malicious add-on that is disguised as a DivX plugin.","name":"Divx 2012 Plugins (malware)","created":"2012-05-25T09:26:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f01be9cb-5cf2-774a-a4d7-e210a24db5b9","last_modified":1482945809912},{"guid":"{3252b9ae-c69a-4eaf-9502-dc9c1f6c009e}","prefs":[],"schema":1482945809444,"blockID":"i17","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","who":"Users of version 2.2 of this add-on in all versions of Firefox.","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see this article.","name":"Default Manager (Microsoft)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.2","minVersion":"2.2","targetApplication":[]}],"id":"38be28ac-2e30-37fa-4332-852a55fafb43","last_modified":1482945809886},{"guid":"{68b8676b-99a5-46d1-b390-22411d8bcd61}","prefs":[],"schema":1482945809444,"blockID":"i93","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755635","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that post content on Facebook accounts and steals user data.","name":"Zaman T\u00fcnelini Kald\u0131r! (malware)","created":"2012-05-16T10:44:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"733aff15-9b1f-ec04-288f-b78a55165a1c","last_modified":1482945809863},{"guid":"applebeegifts@mozilla.doslash.org","prefs":[],"schema":1482945809444,"blockID":"i54","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721562","who":"All Firefox users that install this add-on.","why":"Add-on is malware installed under false pretenses.","name":"Applebees Gift Card (malware)","created":"2012-01-26T16:17:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1372c8ab-5452-745a-461a-aa78e3e12c4b","last_modified":1482945809840},{"guid":"activity@facebook.com","prefs":[],"schema":1482945112982,"blockID":"i65","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726803","who":"All Firefox users who have installed this add-on.","why":"Add-on behaves maliciously and poses as an official Facebook add-on.","name":"Facebook extension (malware)","created":"2012-02-13T15:41:02Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"79ad1c9b-0828-7823-4574-dd1cdd46c3d6","last_modified":1482945809437},{"guid":"jid0-EcdqvFOgWLKHNJPuqAnawlykCGZ@jetpack","prefs":[],"schema":1482945112982,"blockID":"i62","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724650","who":"All Firefox users who have installed this add-on.","why":"Add-on is installed under false pretenses and delivers malware.","name":"YouTube extension (malware)","created":"2012-02-06T14:46:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5ae1e642-b53c-54c0-19e7-5562cfdac3a3","last_modified":1482945809415},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","prefs":[],"schema":1482945112982,"blockID":"i25","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=637542","who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"McAfee SiteAdvisor","created":"2011-03-14T15:53:07Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.3.0.*","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1"}]}],"id":"c950501b-1f08-2ab2-d817-7c664c0d16fe","last_modified":1482945809393},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","prefs":[],"schema":1482945112982,"blockID":"i38","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=660111","who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"McAfee SiteAdvisor","created":"2011-05-27T13:55:02Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"3.3.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"5.0a1"}]}],"id":"f11de388-4511-8d06-1414-95d3b2b122c5","last_modified":1482945809371},{"guid":"{3f963a5b-e555-4543-90e2-c3908898db71}","prefs":[],"schema":1482945112982,"blockID":"i6","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=527135","who":"Users of AVG SafeSearch version 8.5 and older for all Mozilla applications.","why":"This add-on causes a high volume of crashes and causes other stability issues.","name":"AVG SafeSearch","created":"2009-06-17T13:12:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"8.5","minVersion":"0","targetApplication":[]}],"id":"0d6f7d4c-bf5d-538f-1ded-ea4c6b775617","last_modified":1482945809348},{"guid":"langpack-vi-VN@firefox.mozilla.org","prefs":[],"schema":1482945112982,"blockID":"i3","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=432406","who":"Users of Vietnamese Language Pack version 2.0 for all Mozilla applications.","why":"Corrupted files. For more information, please see this blog post.","name":"Vietnamese Language Pack","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0","minVersion":"2.0","targetApplication":[]}],"id":"51d4b581-d21c-20a1-6147-b17c3adc7867","last_modified":1482945809326},{"guid":"youtube@youtube7.com","prefs":[],"schema":1482945112982,"blockID":"i55","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721646","who":"All Firefox users with this add-on installed.","why":"This is malware posing as video software.","name":"Plugin Video (malware)","created":"2012-01-27T09:39:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"08ceedf5-c7c1-f54f-db0c-02f01f0e319a","last_modified":1482945809304},{"guid":"crossriderapp3924@crossrider.com","prefs":[],"schema":1482945112982,"blockID":"i76","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738282","who":"All Firefox users who have installed this add-on.","why":"This add-on compromises Facebook privacy and security and spams friends lists without user intervention.","name":"Fblixx (malware)","created":"2012-03-22T10:38:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39d0a019-62fb-837b-1f1f-6831e56442b5","last_modified":1482945809279},{"guid":"{45147e67-4020-47e2-8f7a-55464fb535aa}","prefs":[],"schema":1482945112982,"blockID":"i86","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748993","who":"All Firefox users who have this add-on installed.","why":"This add-on injects scripts into Facebook and performs malicious activity.","name":"Mukemmel Face+","created":"2012-04-25T16:33:21Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"960443f9-cf48-0b71-1ff2-b8c34a3411ea","last_modified":1482945809255},{"guid":"{4B3803EA-5230-4DC3-A7FC-33638F3D3542}","prefs":[],"schema":1482945112982,"blockID":"i4","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=441649","who":"Users of Firefox 3 and later with version 1.2 of Crawler Toolbar","why":"This add-on causes a high volume of crashes.","name":"Crawler Toolbar","created":"2008-07-08T10:23:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2","minVersion":"1.2","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.0a1"}]}],"id":"a9818d53-3a6a-8673-04dd-2a16f5644215","last_modified":1482945809232},{"guid":"flashupdate@adobe.com","prefs":[],"schema":1482945112982,"blockID":"i68","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","who":"All Firefox users who have this add-on installed.","why":"Add-on is malware, installed under false pretenses.","name":"Flash Update (malware)","created":"2012-02-21T13:55:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ba5b46e-790d-5af2-9580-a5f1e6e65522","last_modified":1482945809208},{"guid":"plugin@youtubeplayer.com","prefs":[],"schema":1482945112982,"blockID":"i127","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=783356","who":"All users who have this add-on installed.","why":"This add-on tries to pass as a YouTube player and runs malicious scripts on webpages.","name":"Youtube Facebook Player (malware)","created":"2012-08-16T13:03:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"17a8bece-e2df-a55d-8a72-95faff028b83","last_modified":1482945809185},{"guid":"GifBlock@facebook.com","prefs":[],"schema":1482945112982,"blockID":"i79","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739482","who":"All Firefox users who have installed this extension.","why":"This extension is malicious and is installed under false pretenses.","name":"Facebook Essentials (malware)","created":"2012-03-27T10:53:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"728451e8-1273-d887-37e9-5712b1cc3bff","last_modified":1482945809162},{"guid":"ff-ext@youtube","prefs":[],"schema":1482945112982,"blockID":"i52","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719296","who":"All Firefox users that have this add-on installed.","why":"This add-on poses as a YouTube player while posting spam into Facebook account.","name":"Youtube player (malware)","created":"2012-01-19T08:26:35Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cd2dd72a-dd52-6752-a0cd-a4b312fd0b65","last_modified":1482945809138},{"guid":"ShopperReports@ShopperReports.com","prefs":[],"schema":1482945112982,"blockID":"i22","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=630191","who":"Users of Shopper Reports version 3.1.22.0 in Firefox 4 and later.","why":"This add-on causes a high volume of Firefox crashes.","name":"Shopper Reports","created":"2011-02-09T17:03:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.1.22.0","minVersion":"3.1.22.0","targetApplication":[]}],"id":"f26b049c-d856-750f-f050-996e6bec7cbb","last_modified":1482945809115},{"guid":"{27182e60-b5f3-411c-b545-b44205977502}","prefs":[],"schema":1482945112982,"blockID":"i16","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","who":"Users of version 1.0 of this add-on in all versions of Firefox.","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see this article.","name":"Search Helper Extension (Microsoft)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0","minVersion":"1.0","targetApplication":[]}],"id":"2655f230-11f3-fe4c-7c3d-757d37d5f9a5","last_modified":1482945809092},{"guid":"{841468a1-d7f4-4bd3-84e6-bb0f13a06c64}","prefs":[],"schema":1482945112982,"blockID":"i46","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=712369","who":"Users of all versions of Nectar Search Toolbar in Firefox 9.","why":"This add-on causes crashes and other stability issues in Firefox.","name":"Nectar Search Toolbar","created":"2011-12-20T11:38:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.0","minVersion":"9.0a1"}]}],"id":"b660dabd-0dc0-a55c-4b86-416080b345d9","last_modified":1482945809069},{"guid":"support@daemon-tools.cc","prefs":[],"schema":1482945112982,"blockID":"i5","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=459850","who":"Users of Daemon Tools Toolbar version 1.0.0.5 and older for all Mozilla applications.","why":"This add-on causes a high volume of crashes.","name":"Daemon Tools Toolbar","created":"2009-02-13T18:39:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.0.5","minVersion":"0","targetApplication":[]}],"id":"8cabafd3-576a-b487-31c8-ab59e0349a0e","last_modified":1482945809045},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","prefs":[],"schema":1482945112982,"blockID":"i53","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719605","who":"All users of Firefox with this add-on installed.","why":"This add-on is being offered as an online movie viewer, when it reality it only inserts scripts and ads into known sites.","name":"Peliculas-FLV (malware)","created":"2012-01-19T15:58:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.0.3","minVersion":"2.0.3","targetApplication":[]}],"id":"07bc0962-60da-087b-c3ab-f2a6ab84d81c","last_modified":1482945809021},{"guid":"royal@facebook.com","prefs":[],"schema":1482945112982,"blockID":"i64","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=725777","who":"All Firefox users who have installed this add-on.","why":"Malicious add-on posing as a Facebook tool.","name":"Facebook ! (malware)","created":"2012-02-09T13:24:23Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dd1d2623-0d15-c93e-8fbd-ba07b0299a44","last_modified":1482945808997},{"guid":"{28bfb930-7620-11e1-b0c4-0800200c9a66}","prefs":[],"schema":1482945112982,"blockID":"i108","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=766852","who":"All Firefox user who have this add-on installed.","why":"This is malware disguised as an Adobe product. It spams Facebook pages.","name":"Aplicativo (malware)","created":"2012-06-21T09:24:11Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"908dc4fb-ebc9-cea1-438f-55e4507ba834","last_modified":1482945808973},{"guid":"socialnetworktools@mozilla.doslash.org","prefs":[],"schema":1482945112982,"blockID":"i78","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739441","who":"All Firefox users who have installed this add-on.","why":"This add-on hijacks the Facebook UI and adds scripts to track users.","name":"Social Network Tools (malware)","created":"2012-03-26T16:46:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1064cd25-3b87-64bb-b0a6-2518ad281574","last_modified":1482945808950},{"guid":"youtubeeing@youtuberie.com","prefs":[],"schema":1482945112982,"blockID":"i98","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759663","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as a Youtube add-on.","name":"Youtube Video Player (malware)","created":"2012-05-30T09:30:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3484f860-56e1-28e8-5a70-cdcd5ab9d6ee","last_modified":1482945808927},{"guid":"{3a12052a-66ef-49db-8c39-e5b0bd5c83fa}","prefs":[],"schema":1482945112982,"blockID":"i101","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761874","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as a Facebook timeline remover.","name":"Timeline Remove (malware)","created":"2012-06-05T18:37:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b01b321b-6628-7166-bd15-52f21a04d8bd","last_modified":1482945808904},{"guid":"pfzPXmnzQRXX6@2iABkVe.com","prefs":[],"schema":1482945112982,"blockID":"i99","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759950","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware disguised as a Flash Player update.","name":"Flash Player (malware)","created":"2012-05-30T17:10:18Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"29cc4abc-4f52-01f1-eb0b-cad84ba4db13","last_modified":1482945808881},{"guid":"/^(@pluginscribens_firefox|extension@vidscrab.com|firefox@jjj.ee|firefox@shop-reward.de|FxExtPasteNGoHtk@github.lostdj|himanshudotrai@gmail.com|jid0-bigoD0uivzAMmt07zrf3OHqa418@jetpack|jid0-iXbAR01tjT2BsbApyS6XWnjDhy8@jetpack)$/","prefs":[],"schema":1482341309012,"blockID":"i1423","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","who":"All users who have any of the affected versions installed.","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked.","name":"Various vulnerable add-on versions","created":"2016-12-21T17:21:10Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a58a2836-e4e7-74b5-c109-fa3d41e9ed56","last_modified":1482343886390},{"guid":"/^(pdftoword@addingapps.com|jid0-EYTXLS0GyfQME5irGbnD4HksnbQ@jetpack|jid1-ZjJ7t75BAcbGCX@jetpack)$/","prefs":[],"schema":1482341309012,"blockID":"i1425","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","who":"All users who have any of the affected versions installed.","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked.","name":"Various vulnerable add-on versions","created":"2016-12-21T17:23:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"150e639f-c832-63d0-a775-59313b2e1bf9","last_modified":1482343886365},{"guid":"{cc8f597b-0765-404e-a575-82aefbd81daf}","prefs":[],"schema":1480349193877,"blockID":"i380","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866332","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts and performs unwanted actions on behalf of the user.","name":"Update My Browser (malware)","created":"2013-06-19T13:03:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4950d7aa-c602-15f5-a7a2-d844182d5cbd","last_modified":1480349217152},{"guid":"extension@FastFreeConverter.com","prefs":[],"schema":1480349193877,"blockID":"i470","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"649dd933-debf-69b7-020f-496c2c9f99c8","last_modified":1480349217071},{"guid":"59D317DB041748fdB89B47E6F96058F3@jetpack","prefs":[],"schema":1480349193877,"blockID":"i694","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053540","who":"All Firefox users who have this add-ons installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This is a suspicious add-on that appears to be installed without user consent, in violation of the Add-on Guidelines.","name":"JsInjectExtension","created":"2014-08-21T13:46:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"75692bd4-18e5-a9be-7ec3-9327e159ef68","last_modified":1480349217005},{"guid":"/^({bfec236d-e122-4102-864f-f5f19d897f5e}|{3f842035-47f4-4f10-846b-6199b07f09b8}|{92ed4bbd-83f2-4c70-bb4e-f8d3716143fe})$/","prefs":[],"schema":1480349193877,"blockID":"i527","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and uses multiple IDs.","name":"KeyBar add-on","created":"2013-12-20T14:13:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6d68dd97-7965-0a84-8ca7-435aac3c8040","last_modified":1480349216927},{"guid":"support@vide1flash2.com","prefs":[],"schema":1480349193877,"blockID":"i246","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=830159","who":"All Firefox users who have this add-on installed.","why":"This is an add-on that poses as the Adobe Flash Player and runs malicious code in the user's system.","name":"Lastest Adobe Flash Player (malware)","created":"2013-01-14T09:17:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2004fba1-74bf-a072-2a59-6e0ba827b541","last_modified":1480349216871},{"guid":"extension21804@extension21804.com","prefs":[],"schema":1480349193877,"blockID":"i312","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"Coupon Companion","created":"2013-03-06T14:14:05Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b2cf1256-dadd-6501-1f4e-25902d408692","last_modified":1480349216827},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i602","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:18:05Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.8.*","minVersion":"3.15.8","targetApplication":[]}],"id":"b2b4236d-5d4d-82b2-99cd-00ff688badf1","last_modified":1480349216765},{"guid":"nosquint@urandom.ca","prefs":[],"schema":1480349193877,"blockID":"i1232","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279561","who":"Users on Firefox 47, and higher, using version 2.1.9.1, and earlier, of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"The add-on is breaking the in-built zoom functionality on Firefox 47.","name":"NoSquint","created":"2016-06-10T17:12:55Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.1.9.1-signed.1-signed","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"47"}]}],"id":"30e0a35c-056a-054b-04f3-ade68b83985a","last_modified":1480349216711},{"guid":"{FE1DEEEA-DB6D-44b8-83F0-34FC0F9D1052}","prefs":[],"schema":1480349193877,"blockID":"i364","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867670","who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager.","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons.","name":"IB Updater","created":"2013-06-10T16:14:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a59b967c-66ca-7ad9-2dc6-d0ad37ded5fd","last_modified":1480349216652},{"guid":"vpyekkifgv@vpyekkifgv.org","prefs":[],"schema":1480349193877,"blockID":"i352","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=872211","who":"All Firefox users who have this add-on installed.","why":"Uses a deceptive name and injects ads into pages without user consent.","name":"SQLlite Addon (malware)","created":"2013-05-14T13:42:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8fd981ab-7ee0-e367-d804-0efe29d63178","last_modified":1480349216614},{"guid":"/^firefox@(albrechto|swiftbrowse|springsmart|storimbo|squirrelweb|betterbrowse|lizardlink|rolimno|browsebeyond|clingclang|weblayers|kasimos|higher-aurum|xaven|bomlabio)\\.(com?|net|org|info|biz)$/","prefs":[],"schema":1480349193877,"blockID":"i549","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the Add-on Guidelines.","name":"Yontoo add-ons","created":"2014-01-30T15:08:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3a124164-b177-805b-06f7-70a358b37e08","last_modified":1480349216570},{"guid":"thefoxonlybetter@quicksaver","prefs":[],"schema":1480349193877,"blockID":"i702","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","who":"All Firefox users who have any of these versions of the add-on installed.","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"The Fox, Only Better (malicious versions)","created":"2014-08-27T10:05:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"1.10","targetApplication":[]}],"id":"60e54f6a-1b10-f889-837f-60a76a98fccc","last_modified":1480349216512},{"guid":"/@(ft|putlocker|clickmovie|m2k|sharerepo|smarter-?)downloader\\.com$/","prefs":[],"schema":1480349193877,"blockID":"i396","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881454","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"PutLockerDownloader and related","created":"2013-06-25T12:48:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e98ba6e3-f2dd-fdee-b106-3e0d2a03cda4","last_modified":1480349216487},{"guid":"my7thfakeid@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i1262","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1295616","who":"Anyone who has this add-on installed.","why":"This add-on is a keylogger that sends the data to a remote server, and goes under the name Real_player.addon.","name":"Remote Keylogger test 0 addon","created":"2016-08-17T10:54:59Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81b380c0-8092-ea5e-11cd-54c7f563ff5a","last_modified":1480349216460},{"guid":"{f0e59437-6148-4a98-b0a6-60d557ef57f4}","prefs":[],"schema":1480349193877,"blockID":"i304","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845975","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our installation guidelines and is dropped silently into user's profiles.","name":"WhiteSmoke B","created":"2013-02-27T13:10:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0469e643-1a90-f9be-4aad-b347469adcbe","last_modified":1480349216402},{"os":"Darwin,Linux","guid":"firebug@software.joehewitt.com","prefs":[],"schema":1480349193877,"blockID":"i75","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=718831","who":"All Firefox 9 users on Mac OS X or Linux who have Firebug 1.9.0 installed.","why":"Firebug 1.9.0 creates stability problems on Firefox 9, on Mac OS X and Linux. Upgrading to Firefox 10 or later, or upgrading to Firebug 1.9.1 or later fixes this problem.","name":"Firebug","created":"2012-03-21T16:00:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.9.0","minVersion":"1.9.0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.*","minVersion":"9.0a1"}]}],"id":"a1f9f055-ef34-1412-c39f-35605a70d031","last_modified":1480349216375},{"guid":"xz123@ya456.com","prefs":[],"schema":1480349193877,"blockID":"i486","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware and is installed silently in violation of the Add-on Guidelines.","name":"BetterSurf (malware)","created":"2013-11-15T13:34:53Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b9825a25-a96c-407e-e656-46a7948e5745","last_modified":1480349215808},{"guid":"{C7AE725D-FA5C-4027-BB4C-787EF9F8248A}","prefs":[],"schema":1480349193877,"blockID":"i424","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=860641","who":"Users of Firefox 23 or later who have RelevantKnowledge 1.0.0.2 or lower.","why":"Old versions of this add-on are causing startup crashes in Firefox 23, currently on the Beta channel. RelevantKnowledge users on Firefox 23 and above should update to version 1.0.0.3 of the add-on.","name":"RelevantKnowledge 1.0.0.2 and lower","created":"2013-07-01T10:45:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.0.2","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"23.0a1"}]}],"id":"c888d167-7970-4b3f-240f-2d8e6f14ded4","last_modified":1480349215779},{"guid":"{5C655500-E712-41e7-9349-CE462F844B19}","prefs":[],"schema":1480349193877,"blockID":"i966","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1175425","who":"All users who have this add-on installed.","why":"This add-on is vulnerable to a cross-site scripting attack, putting users at risk when using it in arbitrary websites.","name":"Quick Translator","created":"2015-07-17T13:42:28Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.1-signed","minVersion":"0","targetApplication":[]}],"id":"f34b00a6-c783-7851-a441-0d80fb1d1031","last_modified":1480349215743},{"guid":"superlrcs@svenyor.net","prefs":[],"schema":1480349193877,"blockID":"i545","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is in violation of the Add-on Guidelines, using multiple add-on IDs and potentially doing other unwanted activities.","name":"SuperLyrics","created":"2014-01-30T11:52:42Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"002cd4fa-4c2b-e28b-9220-4a520f4d9ec6","last_modified":1480349215672},{"guid":"mbrsepone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i479","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937331","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Mozilla Lightweight Pack (malware)","created":"2013-11-11T15:42:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0549645e-5f50-5089-1f24-6e7d3bfab8e0","last_modified":1480349215645},{"guid":"/^brasilescape.*\\@facebook\\.com$/","prefs":[],"schema":1480349193877,"blockID":"i453","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=918566","who":"All Firefox users who have these add-ons installed.","why":"This is a group of malicious add-ons that use deceitful names like \"Facebook Video Pack\" or \"Mozilla Service Pack\" and hijack Facebook accounts.","name":"Brasil Escape (malware)","created":"2013-09-20T09:54:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8e6b1176-1794-2117-414e-f0821443f27b","last_modified":1480349215591},{"guid":"foxyproxy-basic@eric.h.jung","prefs":[],"schema":1480349193877,"blockID":"i952","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","who":"All users who have this add-on installed on Thunderbird 38 and above.","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above.","name":"FoxyProxy Basic for Thunderbird","created":"2015-07-15T09:35:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.5.5","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"38.0a2"},{"guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*","minVersion":"2.35"}]}],"id":"81658491-feda-2ed3-3c6c-8e60c2b73aee","last_modified":1480349215536},{"guid":"mbroctone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i476","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936590","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks the users' Facebook account.","name":"Mozilla Storage Service (malware)","created":"2013-11-08T15:32:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"92198396-8756-8d09-7f18-a68d29894f71","last_modified":1480349215504},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i616","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:24:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.28.*","minVersion":"3.15.28","targetApplication":[]}],"id":"f11b485f-320e-233c-958b-a63377024fad","last_modified":1480349215479},{"guid":"/^({e9df9360-97f8-4690-afe6-996c80790da4}|{687578b9-7132-4a7a-80e4-30ee31099e03}|{46a3135d-3683-48cf-b94c-82655cbc0e8a}|{49c795c2-604a-4d18-aeb1-b3eba27e5ea2}|{7473b6bd-4691-4744-a82b-7854eb3d70b6}|{96f454ea-9d38-474f-b504-56193e00c1a5})$/","prefs":[],"schema":1480349193877,"blockID":"i494","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. It also uses multiple add-on IDs for no apparent reason. This violates our Add-on Guidelines.","name":"uTorrent and related","created":"2013-12-02T14:52:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"485210d0-8e69-3436-536f-5d1deeea4167","last_modified":1480349215454},{"guid":"{EB7508CA-C7B2-46E0-8C04-3E94A035BD49}","prefs":[],"schema":1480349193877,"blockID":"i162","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=799266","who":"All Firefox users who have installed any of these add-ons.","why":"This block covers a number of malicious add-ons that deceive users, using names like \"Mozilla Safe Browsing\" and \"Translate This!\", and claiming they are developed by \"Mozilla Corp.\". They hijack searches and redirects users to pages they didn't intend to go to.\r\n\r\nNote: this block won't be active until bug 799266 is fixed.","name":"Mozilla Safe Browsing and others (Medfos malware)","created":"2012-10-11T12:25:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"07566aa3-4ff9-ac4f-9de9-71c77454b4da","last_modified":1480349215428},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i614","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:23:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.26.*","minVersion":"3.15.26","targetApplication":[]}],"id":"ede541f3-1748-7b33-9bd6-80e2f948e14f","last_modified":1480349215399},{"guid":"/^({976cd962-e0ca-4337-aea7-d93fae63a79c}|{525ba996-1ce4-4677-91c5-9fc4ead2d245}|{91659dab-9117-42d1-a09f-13ec28037717}|{c1211069-1163-4ba8-b8b3-32fc724766be})$/","prefs":[],"schema":1480349193877,"blockID":"i522","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed and using multiple add-on IDs.","name":"appbario7","created":"2013-12-20T13:15:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"580aed26-dc3b-eef8-fa66-a0a402447b7b","last_modified":1480349215360},{"guid":"jid0-O6MIff3eO5dIGf5Tcv8RsJDKxrs@jetpack","prefs":[],"schema":1480349193877,"blockID":"i552","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","who":"All Firefox users who have this extension installed.","why":"This extension is malware that attempts to make it impossible for a second extension and itself to be disabled, and also forces the new tab page to have a specific URL.","name":"Extension_Protected (malware)","created":"2014-02-19T15:26:37Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e53063b4-5702-5b66-c860-d368cba4ccb6","last_modified":1480349215327},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i604","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:18:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.11.*","minVersion":"3.15.10","targetApplication":[]}],"id":"b910f779-f36e-70e1-b17a-8afb75988c03","last_modified":1480349215302},{"guid":"brasilescapefive@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i483","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938473","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Facebook Video Pack (malware)","created":"2013-11-14T09:37:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"85ee7840-f262-ad30-eb91-74b3248fd13d","last_modified":1480349215276},{"guid":"brasilescapeeight@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i482","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938476","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Mozilla Security Pack (malware)","created":"2013-11-14T09:36:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"457a5722-be90-5a9f-5fa0-4c753e9f324c","last_modified":1480349215249},{"guid":"happylyrics@hpyproductions.net","prefs":[],"schema":1480349193877,"blockID":"i370","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881815","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into Firefox without the users' consent, violating our Add-on Guidelines.","name":"Happy Lyrics","created":"2013-06-11T15:42:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"730e616d-94a7-df0c-d31a-98b7875d60c2","last_modified":1480349215225},{"guid":"search-snacks@search-snacks.com","prefs":[],"schema":1480349193877,"blockID":"i872","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082733","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Search Snacks","created":"2015-03-04T14:37:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7567b06f-98fb-9400-8007-5d0357c345d9","last_modified":1480349215198},{"os":"WINNT","guid":"{ABDE892B-13A8-4d1b-88E6-365A6E755758}","prefs":[],"schema":1480349193877,"blockID":"i107","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=764210","who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our support site for help.","name":"RealPlayer Browser Record Plugin","created":"2012-06-14T13:54:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"15.0.5","minVersion":"0","targetApplication":[]}],"id":"e3b89e55-b35f-8694-6f0e-f856e57a191d","last_modified":1480349215173},{"guid":"/(\\{7aeae561-714b-45f6-ace3-4a8aed6e227b\\})|(\\{01e86e69-a2f8-48a0-b068-83869bdba3d0\\})|(\\{77f5fe49-12e3-4cf5-abb4-d993a0164d9e\\})/","prefs":[],"schema":1480349193877,"blockID":"i436","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891606","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow the Add-on Guidelines, changing Firefox default settings and not reverting them on uninstall. If you want to continue using this add-on, it can be enabled in the Add-ons Manager.","name":"Visual Bee","created":"2013-08-09T15:04:44Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ad6dc811-ab95-46fa-4bff-42186c149980","last_modified":1480349215147},{"guid":"amo-validator-bypass@example.com","prefs":[],"schema":1480349193877,"blockID":"i1058","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1227605","who":"All users who install this add-on.","why":"This add-on is a proof of concept of a malicious add-on that bypasses the code validator.","name":" AMO Validator Bypass","created":"2015-11-24T09:03:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"86e38e3e-a729-b5a2-20a8-4738b376eea6","last_modified":1480349214743},{"guid":"6lIy@T.edu","prefs":[],"schema":1480349193877,"blockID":"i852","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"unIsaless","created":"2015-02-09T15:30:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39798bc2-9c75-f172-148b-13f3ca1dde9b","last_modified":1480349214613},{"guid":"{394DCBA4-1F92-4f8e-8EC9-8D2CB90CB69B}","prefs":[],"schema":1480349193877,"blockID":"i100","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761339","who":"All Firefox users who have Lightshot 2.5.0 installed.","why":"The Lightshot add-on, version 2.5.0, is causing widespread and frequent crashes in Firefox. Lightshot users are strongly recommended to update to version 2.6.0 as soon as possible.","name":"Lightshot","created":"2012-06-05T09:24:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.5.0","minVersion":"2.5.0","targetApplication":[]}],"id":"57829ea2-5a95-1b6e-953c-7c4a7b3b21ac","last_modified":1480349214568},{"guid":"{a7f2cb14-0472-42a1-915a-8adca2280a2c}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i686","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033809","who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"HomeTab","created":"2014-08-06T16:35:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"33a8f403-b2c8-cadf-e1ba-40b39edeaf18","last_modified":1480349214537},{"guid":"{CA8C84C6-3918-41b1-BE77-049B2BDD887C}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i862","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131230","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Ebay Shopping Assistant by Spigot","created":"2015-02-26T12:51:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9a9d6da2-90a1-5b71-8b24-96492d57dfd1","last_modified":1480349214479},{"guid":"update@firefox.com","prefs":[],"schema":1480349193877,"blockID":"i374","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781088","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks Facebook accounts.","name":"Premium Update (malware)","created":"2013-06-18T13:58:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bb388413-60ea-c9d6-9a3b-c90df950c319","last_modified":1480349214427},{"guid":"sqlmoz@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i350","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=871610","who":"All Firefox users who have this extension installed.","why":"This extension is malware posing as Mozilla software. It hijacks Facebook accounts and spams other Facebook users.","name":"Mozilla Service Pack (malware)","created":"2013-05-13T09:43:07Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"715082e8-7a30-b27b-51aa-186c38e078f6","last_modified":1480349214360},{"guid":"iobitapps@mybrowserbar.com","prefs":[],"schema":1480349193877,"blockID":"i562","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=948695","who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is installed silently and changes users settings without reverting them, in violation of the Add-on Guidelines.","name":"IObit Apps Toolbar","created":"2014-02-27T10:00:54Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"be9a54f6-20c1-7dee-3aea-300b336b2ae5","last_modified":1480349214299},{"guid":"{9e09ac65-43c0-4b9d-970f-11e2e9616c55}","prefs":[],"schema":1480349193877,"blockID":"i376","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=857847","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware that hijacks Facebook accounts and posts content on it.","name":"The Social Networks (malware)","created":"2013-06-18T14:16:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"753638b4-65ca-6d71-f1f5-ce32ba2edf3b","last_modified":1480349214246},{"guid":"mozillahmpg@mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i140","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=791867","who":"All Firefox users who have installed this add-on.","why":"This is a malicious add-on that tries to monetize on its users by embedding unauthorized affiliate codes on shopping websites, and sometimes redirecting users to alternate sites that could be malicious in nature.","name":"Google YouTube HD Player (malware)","created":"2012-09-17T16:04:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"98150e2e-cb45-1fee-8458-28d3602ec2ec","last_modified":1480349214216},{"guid":"astrovia@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i489","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942699","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Facebook Security Service (malware)","created":"2013-11-25T12:40:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6f365ff4-e48f-8a06-d19d-55e19fba81f4","last_modified":1480349214157},{"guid":"{bbea93c6-64a3-4a5a-854a-9cc61c8d309e}","prefs":[],"schema":1480349193877,"blockID":"i1126","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","who":"All users who have this add-on installed.","why":"This is a malicious add-on that disables various security checks in Firefox.","name":"Tab Extension (malware)","created":"2016-02-29T21:58:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5acb9dcc-59d4-46d1-2a11-1194c4948239","last_modified":1480349214066},{"guid":"ffxtlbr@iminent.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i628","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the Add-on Guidelines.","name":"Iminent Minibar","created":"2014-06-26T15:47:15Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4387ad94-8500-d74d-68e3-20564a9aac9e","last_modified":1480349214036},{"guid":"{28387537-e3f9-4ed7-860c-11e69af4a8a0}","prefs":[],"schema":1480349193877,"blockID":"i40","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"MediaBar (2)","created":"2011-07-19T10:19:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.3.1.00","minVersion":"0.1","targetApplication":[]}],"id":"ff95664b-93e4-aa73-ac20-5ffb7c87d8b7","last_modified":1480349214002},{"guid":"{41e5ef7a-171d-4ab5-8351-951c65a29908}","prefs":[],"schema":1480349193877,"blockID":"i784","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"HelpSiteExpert","created":"2014-11-14T14:37:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0c05a0bb-30b4-979e-33a7-9f3955eba17d","last_modified":1480349213962},{"guid":"/^({2d7886a0-85bb-4bf2-b684-ba92b4b21d23}|{2fab2e94-d6f9-42de-8839-3510cef6424b}|{c02397f7-75b0-446e-a8fa-6ef70cfbf12b}|{8b337819-d1e8-48d3-8178-168ae8c99c36}|firefox@neurowise.info|firefox@allgenius.info)$/","prefs":[],"schema":1480349193877,"blockID":"i762","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082599","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"These add-ons are silently installed into users' systems, in violation of the Add-on Guidelines.","name":"SaveSense, neurowise, allgenius","created":"2014-10-17T16:58:10Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c5439f55-ace5-ad73-1270-017c0ba7b2ce","last_modified":1480349213913},{"guid":"{462be121-2b54-4218-bf00-b9bf8135b23f}","prefs":[],"schema":1480349193877,"blockID":"i226","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal.","name":"WhiteSmoke","created":"2012-11-29T16:27:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"994c6084-e864-0e4e-ac91-455083ee46c7","last_modified":1480349213879},{"guid":"firefox@browsefox.com","prefs":[],"schema":1480349193877,"blockID":"i546","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936244","who":"All Firefox users who have this add-on installed. If you want to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed, in violation of the Add-on Guidelines.","name":"BrowseFox","created":"2014-01-30T12:26:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"407d8c84-8939-cd28-b284-9b680e529bf6","last_modified":1480349213853},{"guid":"{6926c7f7-6006-42d1-b046-eba1b3010315}","prefs":[],"schema":1480349193877,"blockID":"i382","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844956","who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it again in the Add-ons Manager.","why":"This add-on is silently installed, bypassing the Firefox opt-in screen and violating our Add-on Guidelines.","name":"appbario7","created":"2013-06-25T12:05:34Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2367bd94-2bdd-c615-de89-023ba071a443","last_modified":1480349213825},{"guid":"faststartff@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i866","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131217","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Fast Start","created":"2015-02-26T13:12:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9e730bca-c7d1-da82-64f6-c74de216cb7d","last_modified":1480349213799},{"guid":"05dd836e-2cbd-4204-9ff3-2f8a8665967d@a8876730-fb0c-4057-a2fc-f9c09d438e81.com","prefs":[],"schema":1480349193877,"blockID":"i468","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935135","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be part of a Trojan software package.","name":"Trojan.DownLoader9.50268 (malware)","created":"2013-11-07T14:43:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2fd53d9b-7096-f1fb-fbcb-2b40a6193894","last_modified":1480349213774},{"guid":"jid1-0xtMKhXFEs4jIg@jetpack","prefs":[],"schema":1480349193877,"blockID":"i586","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011286","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware installed without user consent.","name":"ep (malware)","created":"2014-06-03T15:50:19Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"50ca2179-83ab-1817-163d-39ed2a9fbd28","last_modified":1480349213717},{"guid":"/^({16e193c8-1706-40bf-b6f3-91403a9a22be}|{284fed43-2e13-4afe-8aeb-50827d510e20}|{5e3cc5d8-ed11-4bed-bc47-35b4c4bc1033}|{7429e64a-1fd4-4112-a186-2b5630816b91}|{8c9980d7-0f09-4459-9197-99b3e559660c}|{8f1d9545-0bb9-4583-bb3c-5e1ac1e2920c})$/","prefs":[],"schema":1480349193877,"blockID":"i517","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing the add-on, and using multiple add-on IDs.","name":"Re-markit","created":"2013-12-20T12:54:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e88a28ab-5569-f06d-b0e2-15c51bb2a4b7","last_modified":1480349213344},{"guid":"safebrowse@safebrowse.co","prefs":[],"schema":1480349193877,"blockID":"i782","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1097696","who":"All Firefox users who have this add-on installed.","why":"This add-on loads scripts with malicious code that appears intended to steal usernames, passwords, and other private information.","name":"SafeBrowse","created":"2014-11-12T14:20:44Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"edd81c91-383b-f041-d8f6-d0b9a90230bd","last_modified":1480349213319},{"guid":"{af95cc15-3b9b-45ae-8d9b-98d08eda3111}","prefs":[],"schema":1480349193877,"blockID":"i492","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945126","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Facebook (malware)","created":"2013-12-02T12:45:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7064e9e2-fba4-7b57-86d7-6f4afbf6f560","last_modified":1480349213294},{"guid":"{84a93d51-b7a9-431e-8ff8-d60e5d7f5df1}","prefs":[],"schema":1480349193877,"blockID":"i744","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the Add-on Guidelines.","name":"Spigot Shopping Assistant","created":"2014-10-17T15:47:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dbc7ef8b-2c48-5dae-73a0-f87288c669f0","last_modified":1480349213264},{"guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","prefs":[],"schema":1480349193877,"blockID":"i918","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-02T09:58:16Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"7f2a68f3-aa8a-ae41-1e48-d1f8f63d53c7","last_modified":1480349213231},{"guid":"831778-poidjao88DASfsAnindsd@jetpack","prefs":[],"schema":1480349193877,"blockID":"i972","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190962","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video patch (malware)","created":"2015-08-04T15:18:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39471221-6926-e11b-175a-b28424d49bf6","last_modified":1480349213194},{"guid":"lbmsrvfvxcblvpane@lpaezhjez.org","prefs":[],"schema":1480349193877,"blockID":"i342","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863385","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. It also appears to install itself both locally and globally, producing a confusing uninstall experience.","name":"RapidFinda","created":"2013-05-06T16:18:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"98fb4536-07a4-d03a-f7c5-945acecc8203","last_modified":1480349213128},{"guid":"{babb9931-ad56-444c-b935-38bffe18ad26}","prefs":[],"schema":1480349193877,"blockID":"i499","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946086","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Facebook Credits (malware)","created":"2013-12-04T15:22:02Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"be1d19fa-1662-322a-13e6-5fa5474f33a7","last_modified":1480349213100},{"guid":"{18d5a8fe-5428-485b-968f-b97b05a92b54}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i802","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astromenda Search Addon","created":"2014-12-15T10:52:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bc846147-cdc1-141f-5846-b705c48bd6ed","last_modified":1480349213074},{"guid":"{b6ef1336-69bb-45b6-8cba-e578fc0e4433}","prefs":[],"schema":1480349193877,"blockID":"i780","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Power-SW","created":"2014-11-12T14:00:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3b080157-2900-d071-60fe-52b0aa376cf0","last_modified":1480349213024},{"guid":"info@wxdownloadmanager.com","prefs":[],"schema":1480349193877,"blockID":"i196","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Codec (malware)","created":"2012-11-05T09:24:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b62597d0-d2cb-d597-7358-5143a1d13658","last_modified":1480349212999},{"os":"WINNT","guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","prefs":[],"schema":1480349193877,"blockID":"i111","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=771802","who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our support site for help.","name":"RealPlayer Browser Record Plugin","created":"2012-07-10T15:28:16Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"15.0.5","minVersion":"0","targetApplication":[]}],"id":"d3f96257-7635-555f-ef48-34d426322992","last_modified":1480349212971},{"guid":"l@AdLJ7uz.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i728","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines","name":"GGoSavee","created":"2014-10-16T16:34:54Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e6bfa340-7d8a-1627-5cdf-40c0c4982e9d","last_modified":1480349212911},{"guid":"{6b2a75c8-6e2e-4267-b955-43e25b54e575}","prefs":[],"schema":1480349193877,"blockID":"i698","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052611","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"BrowserShield","created":"2014-08-21T15:46:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"492e4e43-f89f-da58-9c09-d99528ee9ca9","last_modified":1480349212871},{"guid":"/^({65f9f6b7-2dae-46fc-bfaf-f88e4af1beca}|{9ed31f84-c8b3-4926-b950-dff74047ff79}|{0134af61-7a0c-4649-aeca-90d776060cb3}|{02edb56b-9b33-435b-b7df-b2843273a694}|{da51d4f6-3e7e-4ef8-b400-9198e0874606}|{b24577db-155e-4077-bb37-3fdd3c302bb5})$/","prefs":[],"schema":1480349193877,"blockID":"i525","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and using multiple IDs.","name":"KeyBar add-on","created":"2013-12-20T14:11:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"78562d79-9a64-c259-fb63-ce24e29bb141","last_modified":1480349212839},{"guid":"adsremoval@adsremoval.net","prefs":[],"schema":1480349193877,"blockID":"i560","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=962793","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes various user settings, in violation of the Add-on Guidelines.","name":"Ad Removal","created":"2014-02-27T09:57:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4d150ad4-dc22-9790-07a9-36e0a23f857f","last_modified":1480349212798},{"guid":"firefoxaddon@youtubeenhancer.com","prefs":[],"schema":1480349193877,"blockID":"i445","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=911966","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that imitates a popular video downloader extension, and attempts to hijack Facebook accounts. The add-on available in the add-ons site is safe to use.","name":"YouTube Enhancer Plus (malware)","created":"2013-09-04T16:53:37Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"208.7.0","minVersion":"208.7.0","targetApplication":[]}],"id":"41d75d3f-a57e-d5ad-b95b-22f5fa010b4e","last_modified":1480349212747},{"guid":"suchpony@suchpony.de","prefs":[],"schema":1480349193877,"blockID":"i1264","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have version 1.6.7 or less of this add-on installed.","why":"Old versions of this add-on contained code from YouTube Unblocker, which was originally blocked due to malicious activity. Version 1.6.8 is now okay.","name":"Suchpony (pre 1.6.8)","created":"2016-08-24T10:48:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.6.7","minVersion":"0","targetApplication":[]}],"id":"1bbf00f3-53b5-3777-43c7-0a0b11f9c433","last_modified":1480349212719},{"guid":"{336D0C35-8A85-403a-B9D2-65C292C39087}","prefs":[],"schema":1480349193877,"blockID":"i224","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812292","who":"All Firefox users who have this add-on installed.","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons.","name":"IB Updater","created":"2012-11-29T16:22:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c87666e6-ec9a-2f1e-ad03-a722d2fa2a25","last_modified":1480349212655},{"guid":"G4Ce4@w.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i718","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the Add-on Guidelines.","name":"YoutUbeAdBlaocke","created":"2014-10-02T12:21:22Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3e1e9322-93e9-4ce1-41f5-46ad4ef1471b","last_modified":1480349212277},{"guid":"extension@Fast_Free_Converter.com","prefs":[],"schema":1480349193877,"blockID":"i533","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949597","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing it.","name":"FastFreeConverter","created":"2013-12-20T15:04:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"726f5645-c0bf-66dc-a97a-d072b46e63e7","last_modified":1480349212247},{"guid":"@stopad","prefs":[],"schema":1480349193877,"blockID":"i1266","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298780","who":"Users who have version 0.0.4 and earlier of the add-on installed.","why":"Stop Ads sends each visited url to a third party server which is not necessary for the add-on to work or disclosed in a privacy policy or user opt-in. Versions 0.0.4 and earlier are affected.","name":"Stop Ads Addon","created":"2016-08-30T12:24:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.0.4","minVersion":"0","targetApplication":[]}],"id":"3d1893dd-2092-d1f7-03f3-9629b7d7139e","last_modified":1480349212214},{"guid":"703db0db-5fe9-44b6-9f53-c6a91a0ad5bd@7314bc82-969e-4d2a-921b-e5edd0b02cf1.com","prefs":[],"schema":1480349193877,"blockID":"i519","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing the add-on, and using multiple add-on IDs.","name":"Re-markit","created":"2013-12-20T12:57:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a27d0f9f-7708-3d5f-82e1-e3f29e6098a0","last_modified":1480349212183},{"guid":"imbaty@taringamp3.com","prefs":[],"schema":1480349193877,"blockID":"i662","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin.","name":"Taringa MP3 / Adobe Flash","created":"2014-07-10T15:39:44Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f43859d4-46b7-c028-4738-d40a73ddad7b","last_modified":1480349212157},{"guid":"{13c9f1f9-2322-4d5c-81df-6d4bf8476ba4}","prefs":[],"schema":1480349193877,"blockID":"i348","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867359","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. It also fails to revert settings changes on removal.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"mywebsearch","created":"2013-05-08T15:55:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"372cf3df-0810-85d8-b5d7-faffff309a11","last_modified":1480349212102},{"guid":"{a6e67e6f-8615-4fe0-a599-34a73fc3fba5}","prefs":[],"schema":1480349193877,"blockID":"i346","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867333","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. Also, it doesn't reset its settings changes on uninstall.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Startnow","created":"2013-05-06T17:06:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1caf911c-ff2f-b0f6-0d32-29ef74be81bb","last_modified":1480349212077},{"guid":"garg_sms@yahoo.in","prefs":[],"schema":1480349193877,"blockID":"i652","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Save My YouTube Day! extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Save My YouTube Day!, version 67.9","created":"2014-07-10T15:17:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"67.9","minVersion":"67.9","targetApplication":[]}],"id":"e50c0189-a7cd-774d-702b-62eade1bf18e","last_modified":1480349212044},{"guid":"9518042e-7ad6-4dac-b377-056e28d00c8f@f1cc0a13-4df1-4d66-938f-088db8838882.com","prefs":[],"schema":1480349193877,"blockID":"i308","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=846455","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our Add-on Guidelines.","name":"Solid Savings","created":"2013-02-28T13:48:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"df25ee07-74d4-ccd9-dbbe-7eb053015144","last_modified":1480349212020},{"guid":"jufa098j-LKooapd9jasJ9jliJsd@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1000","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201163","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Secure Video (malware)","created":"2015-09-07T14:00:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c3a98025-0f4e-3bb4-b475-97329e7b1426","last_modified":1480349211979},{"guid":"{46eddf51-a4f6-4476-8d6c-31c5187b2a2f}","prefs":[],"schema":1480349193877,"blockID":"i750","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Slick Savings","created":"2014-10-17T16:17:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b4ef650-e1ad-d55f-c420-4f26dbb4139c","last_modified":1480349211953},{"guid":"{DAC3F861-B30D-40dd-9166-F4E75327FAC7}","prefs":[],"schema":1480349193877,"blockID":"i924","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:28:17Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"be57998b-9e4d-1040-e6bb-ed9de056338d","last_modified":1480349211896},{"guid":"JMLv@njMaHh.org","prefs":[],"schema":1480349193877,"blockID":"i790","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1103516","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"YouttubeAdBlocke","created":"2014-11-24T14:14:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"070d5747-137d-8500-8713-cfc6437558a3","last_modified":1480349211841},{"guid":"istart_ffnt@gmail.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i888","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152553","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the Add-on Guidelines.","name":"Istart","created":"2015-04-10T16:27:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"32fad759-38d9-dad9-2295-e44cc6887040","last_modified":1480349211785},{"guid":"gystqfr@ylgga.com","prefs":[],"schema":1480349193877,"blockID":"i449","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912742","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Define Ext","created":"2013-09-13T16:19:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8fe8f509-c530-777b-dccf-d10d58ae78cf","last_modified":1480349211748},{"guid":"e9d197d59f2f45f382b1aa5c14d82@8706aaed9b904554b5cb7984e9.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i844","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128324","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the Add-on Guidelines.","name":"Sense","created":"2015-02-06T15:01:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f8f8695c-a356-a1d6-9291-502b377c63c2","last_modified":1480349211713},{"guid":"{184AA5E6-741D-464a-820E-94B3ABC2F3B4}","prefs":[],"schema":1480349193877,"blockID":"i968","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1164243","who":"All users who have this add-on installed.","why":"This is a malicious add-on that poses as a Java extension.","name":"Java String Helper (malware)","created":"2015-08-04T09:41:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fac1d2cb-eed7-fcef-5d5a-43c556371bd7","last_modified":1480349211687},{"guid":"7d51fb17-b199-4d8f-894e-decaff4fc36a@a298838b-7f50-4c7c-9277-df6abbd42a0c.com","prefs":[],"schema":1480349193877,"blockID":"i455","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=919792","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks Facebook accounts and posts spam to the users' friends.","name":"Video Console (malware)","created":"2013-09-25T10:28:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dd4d2e17-4ce6-36b0-3035-93e9cc5846d4","last_modified":1480349211660},{"guid":"prositez@prz.com","prefs":[],"schema":1480349193877,"blockID":"i764","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"ProfSitez","created":"2014-10-29T16:43:15Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"684ad4fd-2cbd-ce2a-34cd-bc66b20ac8af","last_modified":1480349211628},{"guid":"/^toolbar[0-9]*@findwide\\.com$/","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i874","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082758","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.\r\n","name":"FindWide Toolbars","created":"2015-03-04T14:54:10Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a317ad9f-af4d-e086-4afd-cd5eead1ed62","last_modified":1480349211601},{"guid":"{25D77636-38B1-1260-887C-2D4AFA92D6A4}","prefs":[],"schema":1480349193877,"blockID":"i536","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=959279","who":"All Firefox users who have this extension installed.","why":"This is a malicious extension that is installed alongside a trojan. It hijacks searches on selected sites.","name":"Microsoft DirectInput Object (malware)","created":"2014-01-13T10:36:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cd174588-940e-f5b3-12ea-896c957bd4b3","last_modified":1480349211555},{"guid":"fdm_ffext@freedownloadmanager.org","prefs":[],"schema":1480349193877,"blockID":"i216","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=789700","who":"All Firefox users who have installed version 1.5.7.5 of the Free Download Manager extension.","why":"Version 1.5.7.5 of the Free Download Manager extension is causing frequent crashes in recent versions of Firefox. Version 1.5.7.6 corrects this problem, but it is currently not available on addons.mozilla.org. We recommend all users to update to the new version once it becomes available.","name":"Free Download Manager","created":"2012-11-27T12:47:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.5.7.5","minVersion":"1.5.7.5","targetApplication":[]}],"id":"736417a2-6161-9973-991a-aff566314733","last_modified":1480349211163},{"guid":"{badea1ae-72ed-4f6a-8c37-4db9a4ac7bc9}","prefs":[],"schema":1480349193877,"blockID":"i543","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963809","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is apparently malware that is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Address Bar Search","created":"2014-01-28T14:28:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8c1dd68e-7df6-0c37-2f41-107745a7be54","last_modified":1480349211119},{"guid":"addon@gemaoff","prefs":[],"schema":1480349193877,"blockID":"i1230","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"These add-ons are copies of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker (addon@gemaoff)","created":"2016-06-08T16:15:11Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6bc49e9f-322f-9952-15a6-0a723a61c2d9","last_modified":1480349211044},{"guid":"{d87d56b2-1379-49f4-b081-af2850c79d8e}","prefs":[],"schema":1480349193877,"blockID":"i726","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Xplorer Lite","created":"2014-10-13T16:01:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7b0895b4-dd4f-1c91-f4e3-31afdbdf3178","last_modified":1480349211007},{"guid":"OKitSpace@OKitSpace.es","prefs":[],"schema":1480349193877,"blockID":"i469","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:35:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6a11aa68-0dae-5524-cc96-a5053a31c466","last_modified":1480349210982},{"guid":"{c96d1ae6-c4cf-4984-b110-f5f561b33b5a}","prefs":[],"schema":1480349193877,"blockID":"i808","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Better Web","created":"2014-12-19T09:36:52Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0413d46b-8205-d9e0-65df-4caa3e6355c4","last_modified":1480349210956},{"guid":"lightningnewtab@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i554","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed in Firefox and includes a companion extension that also performs malicious actions.","name":"Lightning SpeedDial","created":"2014-02-19T15:28:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"875513e1-e6b1-a383-2ec5-eb4deb87eafc","last_modified":1480349210931},{"guid":"/^ext@bettersurfplus/","prefs":[],"schema":1480349193877,"blockID":"i506","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware and is installed silently in violation of the Add-on Guidelines.","name":"BetterSurf (malware)","created":"2013-12-10T15:10:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b4da06d2-a0fd-09b6-aadb-7e3b29c3be3a","last_modified":1480349210905},{"guid":"thefoxonlybetter@quicksaver","prefs":[],"schema":1480349193877,"blockID":"i706","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","who":"All Firefox users who have any of these versions of the add-on installed.","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"The Fox, Only Better (malicious versions)","created":"2014-08-27T14:50:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.6.160","minVersion":"1.6.160","targetApplication":[]}],"id":"bb2b2114-f8e7-511d-04dc-abc8366712cc","last_modified":1480349210859},{"guid":"CortonExt@ext.com","prefs":[],"schema":1480349193877,"blockID":"i336","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=864551","who":"All Firefox users who have this add-on installed.","why":"This add-on is reported to be installed without user consent, with a non-descriptive name, and ties a number of browser features to Amazon URLs, probably monetizing on affiliate codes.","name":"CortonExt","created":"2013-04-22T16:10:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a5bdd05d-eb4c-ce34-9909-a677b4322384","last_modified":1480349210805},{"guid":"1chtw@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i430","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks.","name":" Mozilla Service Pack (malware)","created":"2013-08-05T16:42:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bf1e31c7-ba50-1075-29ae-47368ac1d6de","last_modified":1480349210773},{"guid":"lrcsTube@hansanddeta.com","prefs":[],"schema":1480349193877,"blockID":"i344","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866944","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"LyricsTube","created":"2013-05-06T16:44:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"424b9f39-d028-b1fb-d011-d8ffbbd20fe9","last_modified":1480349210718},{"guid":"{341f4dac-1966-47ff-aacf-0ce175f1498a}","prefs":[],"schema":1480349193877,"blockID":"i356","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=868129","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"MyFreeGames","created":"2013-05-23T14:45:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"560e08b1-3471-ad34-8ca9-463f5ca5328c","last_modified":1480349210665},{"guid":"/^({d6e79525-4524-4707-9b97-1d70df8e7e59}|{ddb4644d-1a37-4e6d-8b6e-8e35e2a8ea6c}|{e55007f4-80c5-418e-ac33-10c4d60db01e}|{e77d8ca6-3a60-4ae9-8461-53b22fa3125b}|{e89a62b7-248e-492f-9715-43bf8c507a2f}|{5ce3e0cb-aa83-45cb-a7da-a2684f05b8f3})$/","prefs":[],"schema":1480349193877,"blockID":"i518","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing the add-on, and using multiple add-on IDs.","name":"Re-markit","created":"2013-12-20T12:56:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"145b0f22-501e-39eb-371e-ec8342a5add9","last_modified":1480349210606},{"guid":"{72b98dbc-939a-4e0e-b5a9-9fdbf75963ef}","prefs":[],"schema":1480349193877,"blockID":"i772","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"SitezExpert","created":"2014-10-31T16:15:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"386cb2c9-e674-ce2e-345f-d30a785f90c5","last_modified":1480349210536},{"guid":"hha8771ui3-Fo9j9h7aH98jsdfa8sda@jetpack","prefs":[],"schema":1480349193877,"blockID":"i970","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190963","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video fix (malware)","created":"2015-08-04T15:15:07Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3ca577d8-3685-4ba9-363b-5b2d8d8dd608","last_modified":1480349210477},{"guid":"{7e8a1050-cf67-4575-92df-dcc60e7d952d}","prefs":[],"schema":1480349193877,"blockID":"i478","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935796","who":"All Firefox users who have this add-on installed.","why":"This add-on violates the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"SweetPacks","created":"2013-11-08T15:42:28Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1519eb45-fcaa-b531-490d-fe366490ed45","last_modified":1480349210416},{"guid":"/^({66b103a7-d772-4fcd-ace4-16f79a9056e0}|{6926c7f7-6006-42d1-b046-eba1b3010315}|{72cabc40-64b2-46ed-8648-26d831761150}|{73ee2cf2-7b76-4c49-b659-c3d8cf30825d}|{ca6446a5-73d5-4c35-8aa1-c71dc1024a18}|{5373a31d-9410-45e2-b299-4f61428f0be4})$/","prefs":[],"schema":1480349193877,"blockID":"i521","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed and using multiple add-on IDs.","name":"appbario7","created":"2013-12-20T13:14:29Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"983cb7fe-e0b4-6a2e-f174-d2670876b2cd","last_modified":1480349210351},{"guid":"{dd6b651f-dfb9-4142-b0bd-09912ad22674}","prefs":[],"schema":1480349193877,"blockID":"i400","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:16:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"975d2126-f727-f5b9-ca01-b83345b80c56","last_modified":1480349210301},{"guid":"25p@9eAkaLq.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i730","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines\r\n","name":"YYOutoubeAdBlocke","created":"2014-10-16T16:35:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5a0c5818-693f-43ae-f85a-c6928d9c2cc4","last_modified":1480349210275},{"os":"Darwin","guid":"thunder@xunlei.com","prefs":[],"schema":1480349193877,"blockID":"i568","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=988490","who":"All Firefox users who have versions 2.0.6 or lower of the Thunder add-on installed on Mac OS.","why":"Versions 2.0.6 and lower of the Thunder add-on are causing startup crashes on Mac OS.","name":"Thunder, 2.0.6 and lower","created":"2014-03-28T15:48:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.6","minVersion":"0","targetApplication":[]}],"id":"cee484f6-2d5d-f708-88be-cd12d825a79a","last_modified":1480349210242},{"guid":"tmbepff@trendmicro.com","prefs":[],"schema":1480349193877,"blockID":"i1222","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"Add-on is causing a high-frequency crash in Firefox","name":"Trend Micro BEP 9.1.0.1035 and lower","created":"2016-05-24T12:10:34Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"9.1.0.1035","minVersion":"0","targetApplication":[]}],"id":"8045c799-486a-927c-b972-b9da1c2dab2f","last_modified":1480349209818},{"guid":"pricepeep@getpricepeep.com","prefs":[],"schema":1480349193877,"blockID":"i220","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811433","who":"All Firefox users who have Pricepeed below 2.1.0.20 installed.","why":"Versions older than 2.1.0.20 of the PricePeep add-on were silently side-installed with other software, injecting advertisements in Firefox. Versions 2.1.0.20 and above don't have the install problems are not blocked.","name":"PricePeep","created":"2012-11-29T16:18:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.1.0.19.99","minVersion":"0","targetApplication":[]}],"id":"227b9a8d-c18d-239c-135e-d79e614fe392","last_modified":1480349209794},{"guid":"ytd@mybrowserbar.com","prefs":[],"schema":1480349193877,"blockID":"i360","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845969","who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager tab.","why":"The installer that includes this add-on performs Firefox settings changes separately from the add-on install, making it very difficult to opt-out to these changes.","name":"YouTube Downloader","created":"2013-06-06T12:29:13Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"63669524-93fe-4823-95ba-37cf6cbd4914","last_modified":1480349209770},{"guid":"hoverst@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i498","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946029","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Adobe Flash Player (malware)","created":"2013-12-04T15:17:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2b25ba3e-45db-0e6c-965a-3acda1a44117","last_modified":1480349209745},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i606","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:20:07Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.13.*","minVersion":"3.15.13","targetApplication":[]}],"id":"c3d88e22-386a-da3b-8aba-3cb526e08053","last_modified":1480349209713},{"guid":"advance@windowsclient.com","prefs":[],"schema":1480349193877,"blockID":"i508","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950773","who":"All Firefox users who have this add-on installed.","why":"This is not the Microsoft .NET Framework Assistant created and distributed by Microsoft. It is a malicious extension that is distributed under the same name to trick users into installing it, and turns users into a botnet that conducts SQL injection attacks on visited websites.","name":"Microsoft .NET Framework Assistant (malware)","created":"2013-12-16T10:15:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e5d30a74-732e-c3fa-f13b-097ee28d4b27","last_modified":1480349209674},{"guid":"{5eeb83d0-96ea-4249-942c-beead6847053}","prefs":[],"schema":1480349193877,"blockID":"i756","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080846","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"SmarterPower","created":"2014-10-17T16:30:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e101dbc0-190c-f6d8-e168-0c1380581cc9","last_modified":1480349209625},{"guid":"/^({7e8a1050-cf67-4575-92df-dcc60e7d952d}|{b3420a9c-a397-4409-b90d-bcf22da1a08a}|{eca6641f-2176-42ba-bdbe-f3e327f8e0af}|{707dca12-3f99-4d94-afea-06dcc0ae0108}|{aea20431-87fc-40be-bc5b-18066fe2819c}|{30ee6676-1ba6-455a-a7e8-298fa863a546})$/","prefs":[],"schema":1480349193877,"blockID":"i523","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"SweetPacks","created":"2013-12-20T13:42:15Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a3a6bc8e-46a1-b3d5-1b20-58b90ba099c3","last_modified":1480349209559},{"guid":"{e0352044-1439-48ba-99b6-b05ed1a4d2de}","prefs":[],"schema":1480349193877,"blockID":"i710","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Site Counselor","created":"2014-09-30T15:28:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b8fedf07-dcaf-f0e3-b42b-32db75c4c304","last_modified":1480349209491},{"guid":"{bee6eb20-01e0-ebd1-da83-080329fb9a3a}","prefs":[],"schema":1480349193877,"blockID":"i642","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Flash and Video Download extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Flash and Video Download, between 40.10.1 and 44.10.1","created":"2014-07-10T15:02:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"44.10.1","minVersion":"40.10.1","targetApplication":[]}],"id":"16db0c85-02ec-4f7c-24a3-a504fbce902d","last_modified":1480349209443},{"guid":"addlyrics@addlyrics.net","prefs":[],"schema":1480349193877,"blockID":"i426","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891605","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Add Lyrics","created":"2013-07-09T15:25:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81678e9e-ebf0-47d6-e409-085c25e67c7e","last_modified":1480349209383},{"guid":"{7b1bf0b6-a1b9-42b0-b75d-252036438bdc}","prefs":[],"schema":1480349193877,"blockID":"i638","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036137","who":"All Firefox users who have this version of the add-on installed.","why":"Versions 27.8 and 27.9 of the YouTube High Definition extension weren't developed by the original developer, and are likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube High Definition 27.8 and 27.9","created":"2014-07-08T16:07:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"27.9","minVersion":"27.8","targetApplication":[]}],"id":"ffdc8ba0-d548-dc5b-d2fd-79a20837124b","last_modified":1480349209260},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i610","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:21:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.22.*","minVersion":"3.15.22","targetApplication":[]}],"id":"935dfec3-d017-5660-db5b-94ae7cea6e5f","last_modified":1480349209128},{"guid":"info@allpremiumplay.info","prefs":[],"schema":1480349193877,"blockID":"i163","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Codec-C (malware)","created":"2012-10-29T16:40:07Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6afbf9b8-ae3a-6a48-0f6c-7a3e065ec043","last_modified":1480349209076},{"guid":"now.msn.com@services.mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i490","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=926378","who":"All Firefox users who have this add-on installed.","why":"As part of their ongoing work to fine-tune their editorial mix, msnNOW has decided that msnNOW will stop publishing on Dec. 3, 2013. Rather than having a single home for trending content, they will continue integrating that material throughout all MSN channels. A big thank you to everyone who followed msnNOW stories using the Firefox sidebar","name":"MSNNow (discontinued social provider)","created":"2013-11-27T08:06:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"de7d699d-016d-d973-5e39-52568de6ffde","last_modified":1480349209021},{"guid":"fftoolbar2014@etech.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i858","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131078","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and changes users' settings, in violation of the Add-on Guidelines.","name":"FF Toolbar","created":"2015-02-11T15:32:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6877bf40-9e45-7017-4dac-14d09e7f0ef6","last_modified":1480349208988},{"guid":"mbrnovone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i477","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936249","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Mozilla Security Service (malware)","created":"2013-11-08T15:35:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"758c2503-766d-a2f5-4c58-7cea93acfe05","last_modified":1480349208962},{"guid":"{739df940-c5ee-4bab-9d7e-270894ae687a}","prefs":[],"schema":1480349193877,"blockID":"i530","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949558","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"WhiteSmoke New","created":"2013-12-20T14:49:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f8097aa6-3009-6dfc-59df-353ba6b1142b","last_modified":1480349208933},{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","prefs":[],"schema":1480349193877,"blockID":"i115","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=779014","who":"All Firefox users who have this add-on installed.","why":"This extension is malware that is installed under false pretenses, and it conducts attacks against certain video websites.","name":"Adobe Flash Player (malware)","created":"2012-08-01T13:53:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aef9312d-5f2e-a44d-464d-6113394148e3","last_modified":1480349208904},{"guid":"g99hiaoekjoasiijdkoleabsy278djasi@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1022","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208708","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"WatchIt (malware)","created":"2015-09-28T15:23:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"25e057ea-f500-67df-d078-ec3f37f99036","last_modified":1480349208877},{"guid":"firefoxaddon@youtubeenhancer.com","prefs":[],"schema":1480349193877,"blockID":"i636","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033120","who":"All Firefox users who have this version of the add-on installed.","why":"Version 199.7.0 of the YoutubeEnhancer extension isn't developed by the original developer, and is likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YoutubeEnhancer - Firefox","created":"2014-07-08T15:58:12Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"199.7.0","minVersion":"199.7.0","targetApplication":[]}],"id":"204a074b-da87-2784-f15b-43a9ea9a6b36","last_modified":1480349208851},{"guid":"extacylife@a.com","prefs":[],"schema":1480349193877,"blockID":"i505","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947741","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks users' Facebook accounts.","name":"Facebook Haber (malware)","created":"2013-12-09T15:08:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5acadb8d-d3be-e0e0-4656-9107f9de0ea9","last_modified":1480349208823},{"guid":"{746505DC-0E21-4667-97F8-72EA6BCF5EEF}","prefs":[],"schema":1480349193877,"blockID":"i842","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128325","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Shopper-Pro","created":"2015-02-06T14:45:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5f19c5fb-1c78-cbd6-8a03-1678efb54cbc","last_modified":1480349208766},{"guid":"{51c77233-c0ad-4220-8388-47c11c18b355}","prefs":[],"schema":1480349193877,"blockID":"i580","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004132","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed into Firefox, in violation of the Add-on Guidelines.","name":"Browser Utility","created":"2014-04-30T13:55:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.1.9999999","minVersion":"0","targetApplication":[]}],"id":"daa2c60a-5009-2c65-a432-161d50bef481","last_modified":1480349208691},{"guid":"{a2bfe612-4cf5-48ea-907c-f3fb25bc9d6b}","prefs":[],"schema":1480349193877,"blockID":"i712","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Xplorer","created":"2014-09-30T15:28:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"13450534-93d7-f2a2-7f0a-e4e3948c4dc1","last_modified":1480349208027},{"guid":"ScorpionSaver@jetpack","prefs":[],"schema":1480349193877,"blockID":"i539","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963826","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is being silently installed, in violation of the Add-on Guidelines","name":"ScorpionSaver","created":"2014-01-28T14:00:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3499c968-6e8b-37f1-5f6e-2384807c2a6d","last_modified":1480349207972},{"guid":"unblocker20@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1212","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"This add-on is a copy of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker 2.0","created":"2016-05-05T18:13:29Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.0.0","minVersion":"0","targetApplication":[]}],"id":"57785030-909f-e985-2a82-8bd057781227","last_modified":1480349207912},{"guid":"{D19CA586-DD6C-4a0a-96F8-14644F340D60}","prefs":[],"schema":1480349193877,"blockID":"i42","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690184","who":"Users of McAfee ScriptScan versions 14.4.0 and below for all versions of Firefox and SeaMonkey.","why":"This add-on causes a high volume of crashes.","name":"McAfee ScriptScan","created":"2011-10-03T09:38:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"14.4.0","minVersion":"0.1","targetApplication":[]}],"id":"1d35ac9d-49df-23cf-51f5-f3c228ad0dc9","last_modified":1480349207877},{"guid":"gjhrjenrengoe@jfdnkwelfwkm.com","prefs":[],"schema":1480349193877,"blockID":"i1042","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212174","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Avant Player (malware)","created":"2015-10-07T13:12:54Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d6453893-becc-7617-2050-0db284e0e0db","last_modified":1480349207840},{"guid":"/^(@9338379C-DD5C-4A45-9A36-9733DC806FAE|9338379C-DD5C-4A45-9A36-9733DC806FAE|@EBC7B466-8A28-4061-81B5-10ACC05FFE53|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4222|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4|@b2d6a97c0-4b18-40ed-bce7-3b7d3309e3c4222)$/","prefs":[],"schema":1480349193877,"blockID":"i1079","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240597","who":"All Firefox users who have these add-ons installed.","why":"These add-ons are malicious, manipulating registry and search settings for users.","name":"Default SearchProtected (malware)","created":"2016-01-18T12:32:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ddc5237e-42e4-1bf1-54d3-a5e5799dd828","last_modified":1480349207815},{"guid":"{33e0daa6-3af3-d8b5-6752-10e949c61516}","prefs":[],"schema":1480349193877,"blockID":"i282","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835683","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on violates our add-on guidelines, bypassing the third party opt-in screen.","name":"Complitly","created":"2013-02-15T12:19:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.1.999","minVersion":"0","targetApplication":[]}],"id":"1f94bc8d-9d5f-c8f5-45c0-ad1f6e147c71","last_modified":1480349207789},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i608","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:20:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.20.*","minVersion":"3.15.18","targetApplication":[]}],"id":"e7d50ff2-5948-d571-6711-37908ccb863f","last_modified":1480349207761},{"guid":"chiang@programmer.net","prefs":[],"schema":1480349193877,"blockID":"i340","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867156","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that logs keyboard input and sends it to a remote server.","name":"Cache Manager (malware)","created":"2013-04-30T07:44:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d50d0434-78e4-faa7-ce2a-9b0a8bb5120e","last_modified":1480349207736},{"guid":"{63eb5ed4-e1b3-47ec-a253-f8462f205350}","prefs":[],"schema":1480349193877,"blockID":"i786","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"FF-Plugin","created":"2014-11-18T12:33:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ca4558a2-8ce4-3ca0-3d29-63019f680c8c","last_modified":1480349207705},{"guid":"jid1-4vUehhSALFNqCw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i634","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","who":"All Firefox users who have this version of the add-on installed.","why":"Version 99.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube Plus Plus 99.7","created":"2014-07-04T14:13:57Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"99.7","minVersion":"99.7","targetApplication":[]}],"id":"a6d017cb-e33f-2239-4e42-ab4e7cfb19fe","last_modified":1480349207680},{"guid":"{aab02ab1-33cf-4dfa-8a9f-f4e60e976d27}","prefs":[],"schema":1480349193877,"blockID":"i820","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems without their consent, in violation of the Add-on Guidelines.","name":"Incredible Web","created":"2015-01-13T09:27:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"847ecc6e-1bc1-f7ff-e1d5-a76e6b8447d2","last_modified":1480349207654},{"guid":"torntv@torntv.com","prefs":[],"schema":1480349193877,"blockID":"i320","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"TornTV","created":"2013-03-20T16:35:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cdd492b8-8101-74a9-5760-52ff709fd445","last_modified":1480349207608},{"guid":"crossriderapp12555@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i674","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=877836","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"The add-on is silently installed, in violation of our Add-on Guidelines.","name":"JollyWallet","created":"2014-07-22T16:26:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d4467e20-0f71-f0e0-8cd6-40c82b6c7379","last_modified":1480349207561},{"guid":"pluggets@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i435","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903544","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks users' Facebook accounts and posts spam on their behalf. ","name":"Facebook Pluggets Plugin (malware)","created":"2013-08-09T13:12:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3a63fd92-9290-02fb-a2e8-bc1b4424201a","last_modified":1480349207535},{"guid":"344141-fasf9jas08hasoiesj9ia8ws@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1038","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211169","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video Plugin (malware)","created":"2015-10-05T16:42:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f7986b7b-9b5a-d372-8147-8b4bd6f5a29b","last_modified":1480349207485},{"guid":"meOYKQEbBBjH5Ml91z0p9Aosgus8P55bjTa4KPfl@jetpack","prefs":[],"schema":1480349193877,"blockID":"i998","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201164","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Smooth Player (malware)","created":"2015-09-07T13:54:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"30c3e511-9e8d-15ee-0867-d61047e56515","last_modified":1480349207370},{"guid":"{8dc5c42e-9204-2a64-8b97-fa94ff8a241f}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i770","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astrmenda Search","created":"2014-10-30T14:52:52Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8a9c7702-0349-70d6-e64e-3a666ab084c6","last_modified":1480349207320},{"guid":"savingsslider@mybrowserbar.com","prefs":[],"schema":1480349193877,"blockID":"i752","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Slick Savings","created":"2014-10-17T16:18:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b1faf30-5725-7847-d993-b5cdaabc9829","last_modified":1480349207290},{"guid":"youtubeunblocker__web@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1129","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons.","name":"YouTube Unblocker","created":"2016-03-01T21:20:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aa246b36-0a80-81e3-2129-4847e872d5fe","last_modified":1480349207262},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i612","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:23:00Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.24.*","minVersion":"3.15.24","targetApplication":[]}],"id":"e0ff9df4-60e4-dbd0-8018-57f395e6610a","last_modified":1480349206818},{"guid":"{1e4ea5fc-09e5-4f45-a43b-c048304899fc}","prefs":[],"schema":1480349193877,"blockID":"i812","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Great Finder","created":"2015-01-06T13:22:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ea40b9f-2423-a2fd-a5e9-4ec1df2715f4","last_modified":1480349206784},{"guid":"psid-vhvxQHMZBOzUZA@jetpack","prefs":[],"schema":1480349193877,"blockID":"i70","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730059","who":"All Firefox users who have installed this add-on.","why":"Add-on spams Facebook accounts and blocks Facebook warnings.","name":"PublishSync (malware)","created":"2012-02-23T13:44:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f1528b02-7cef-0e80-f747-8bbf1f0f2f06","last_modified":1480349206758},{"guid":"{B18B1E5C-4D81-11E1-9C00-AFEB4824019B}","prefs":[],"schema":1480349193877,"blockID":"i447","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","why":"This add-on is installed silently, in violation of our Add-on Guidelines.","name":"My Smart Tabs","created":"2013-09-06T16:00:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"40332fae-0444-a141-ade9-8d9e50370f56","last_modified":1480349206733},{"guid":"crossriderapp8812@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i314","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"Coupon Companion","created":"2013-03-06T14:14:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"06c07e28-0a34-e5ee-e724-491a2f6ce586","last_modified":1480349206708},{"guid":"/^(ffxtlbr@mixidj\\.com|{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}|{67097627-fd8e-4f6b-af4b-ecb65e50112e}|{f6f0f973-a4a3-48cf-9a7a-b7a69c30d71a}|{a3d0e35f-f1da-4ccb-ae77-e9d27777e68d}|{1122b43d-30ee-403f-9bfa-3cc99b0caddd})$/","prefs":[],"schema":1480349193877,"blockID":"i540","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","who":"All Firefox users who have this add-on installed.","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the Add-on Guidelines.","name":"MixiDJ (malware)","created":"2014-01-28T14:07:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4c03ddda-bb3f-f097-0a7b-b7b77b050584","last_modified":1480349206678},{"guid":"hansin@topvest.id","prefs":[],"schema":1480349193877,"blockID":"i836","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130406","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Inside News (malware)","created":"2015-02-06T14:17:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0945a657-f28d-a02c-01b2-5115b3f90d7a","last_modified":1480349206628},{"guid":"lfind@nijadsoft.net","prefs":[],"schema":1480349193877,"blockID":"i358","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=874131","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Lyrics Finder","created":"2013-05-24T14:09:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2307f11c-6216-0dbf-a464-b2921055ce2b","last_modified":1480349206603},{"guid":"plugin@getwebcake.com","prefs":[],"schema":1480349193877,"blockID":"i484","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938264","who":"All Firefox users who have this add-on installed.","why":"This add-on violates the Add-on Guidelines and is broadly considered to be malware. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"WebCake","created":"2013-11-14T09:55:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2865addd-da1c-20c4-742f-6a2270da2e78","last_modified":1480349206578},{"guid":"{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}","prefs":[],"schema":1480349193877,"blockID":"i354","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=837838","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Mixi DJ","created":"2013-05-23T14:31:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"03a745c3-0ee7-e262-ba31-62d4f78ddb62","last_modified":1480349206525},{"guid":"/^({7316e43a-3ebd-4bb4-95c1-9caf6756c97f}|{0cc09160-108c-4759-bab1-5c12c216e005}|{ef03e721-f564-4333-a331-d4062cee6f2b}|{465fcfbb-47a4-4866-a5d5-d12f9a77da00}|{7557724b-30a9-42a4-98eb-77fcb0fd1be3}|{b7c7d4b0-7a84-4b73-a7ef-48ef59a52c3b})$/","prefs":[],"schema":1480349193877,"blockID":"i520","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed and using multiple add-on IDs.","name":"appbario7","created":"2013-12-20T13:11:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e3901c48-9c06-fecb-87d3-efffd9940c22","last_modified":1480349206491},{"guid":"{354dbb0a-71d5-4e9f-9c02-6c88b9d387ba}","prefs":[],"schema":1480349193877,"blockID":"i538","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964081","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Show Mask ON (malware)","created":"2014-01-27T10:13:17Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aad90253-8921-b5df-3658-45a70d75f3d7","last_modified":1480349206465},{"guid":"{8E9E3331-D360-4f87-8803-52DE43566502}","prefs":[],"schema":1480349193877,"blockID":"i461","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=906071","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This is a companion add-on for the SweetPacks Toolbar which is blocked due to guideline violations.","name":"Updater By SweetPacks","created":"2013-10-17T16:10:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ae8cca6e-4258-545f-9a69-3d908264a701","last_modified":1480349206437},{"guid":"info@bflix.info","prefs":[],"schema":1480349193877,"blockID":"i172","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","who":"All Firefox users who have this add-on installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Bflix (malware)","created":"2012-10-30T13:39:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7a9062f4-218d-51d2-9b8c-b282e6eada4f","last_modified":1480349206384},{"guid":"{dff137ae-1ffd-11e3-8277-b8ac6f996f26}","prefs":[],"schema":1480349193877,"blockID":"i450","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=917861","who":"All Firefox users who have this add-on installed.","why":"This is add-on is malware that silently redirects popular search queries to a third party.","name":"Addons Engine (malware)","created":"2013-09-18T16:19:34Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8e583fe4-1c09-9bea-2473-faecf3260685","last_modified":1480349206312},{"guid":"12x3q@3244516.com","prefs":[],"schema":1480349193877,"blockID":"i493","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware and is installed silently in violation of the Add-on Guidelines.","name":"BetterSurf (malware)","created":"2013-12-02T12:49:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"af2a9e74-3753-9ff1-d899-5d1e79ed3dce","last_modified":1480349206286},{"guid":"{20AD702C-661E-4534-8CE9-BA4EC9AD6ECC}","prefs":[],"schema":1480349193877,"blockID":"i626","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1027886","who":"All Firefox users who have this add-on installed.","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the Add-on Guidelines.","name":"V-Bates","created":"2014-06-19T15:16:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b9ccabe-8f9a-e3d1-a689-1aefba1f33b6","last_modified":1480349206261},{"guid":"{c5e48979-bd7f-4cf7-9b73-2482a67a4f37}","prefs":[],"schema":1480349193877,"blockID":"i736","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080842","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"ClearThink","created":"2014-10-17T15:22:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6e8b3e4f-2f59-cde3-e6d2-5bc6e216c506","last_modified":1480349206231},{"guid":"{41339ee8-61ed-489d-b049-01e41fd5d7e0}","prefs":[],"schema":1480349193877,"blockID":"i810","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"FireWeb","created":"2014-12-23T10:32:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a35f2ca6-aec4-c01d-170e-650258ebcd2c","last_modified":1480349206165},{"guid":"jid0-l9BxpNUhx1UUgRfKigWzSfrZqAc@jetpack","prefs":[],"schema":1480349193877,"blockID":"i640","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036640","who":"All Firefox users who have this add-on installed.","why":"This add-on attempts to gather private user data and send it to a remote location. It doesn't appear to be very effective at it, but its malicious nature is undeniable.","name":"Bitcoin Mining Software","created":"2014-07-09T14:35:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8fe3c35e-1a6f-a89a-fa96-81bda3b71db1","last_modified":1480349206133},{"guid":"{845cab51-d8d2-472f-8bd9-2b44642d97c2}","prefs":[],"schema":1480349193877,"blockID":"i460","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=927456","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and handles users' settings, violating some of the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Vafmusic9","created":"2013-10-17T15:50:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8538ccb4-3b71-9858-3f6d-c0fff7af58b0","last_modified":1480349205746},{"guid":"SpecialSavings@SpecialSavings.com","prefs":[],"schema":1480349193877,"blockID":"i676","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881511","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This is add-on is generally considered to be unwanted and is probably silently installed, in violation of the Add-on Guidelines.","name":"SpecialSavings","created":"2014-07-22T16:31:56Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5e921810-fc3a-0729-6749-47e38ad10a22","last_modified":1480349205688},{"guid":"afurladvisor@anchorfree.com","prefs":[],"schema":1480349193877,"blockID":"i434","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","who":"All Firefox users who have this add-on installed.","why":"This add-on bypasses the external install opt in screen in Firefox, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Hotspot Shield Helper","created":"2013-08-09T11:26:11Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"083585eb-d7e7-e228-5fbf-bf35c52044e4","last_modified":1480349205645},{"guid":"addonhack@mozilla.kewis.ch","prefs":[],"schema":1480349193877,"blockID":"i994","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1200848","who":"All users who have this add-on installed.","why":"This add-on is a proof of concept of malicious behavior in an add-on. In itself it doesn't cause any harm, but it still needs to be blocked for security reasons.","name":"Addon Hack","created":"2015-09-01T15:32:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81f75571-ca2a-0e50-a925-daf2037ce63c","last_modified":1480349205584},{"guid":"info@thebflix.com","prefs":[],"schema":1480349193877,"blockID":"i174","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Bflix (malware)","created":"2012-10-30T13:40:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"811a61d4-9435-133e-6262-fb72486c36b0","last_modified":1480349205526},{"guid":"{EEE6C361-6118-11DC-9C72-001320C79847}","prefs":[],"schema":1480349193877,"blockID":"i392","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our Add-on Guidelines.","name":"SweetPacks Toolbar","created":"2013-06-25T12:38:45Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c1dc6607-4c0a-4031-9f14-70ef1ae1edcb","last_modified":1480349205455},{"guid":"/^(4cb61367-efbf-4aa1-8e3a-7f776c9d5763@cdece6e9-b2ef-40a9-b178-291da9870c59\\.com|0efc9c38-1ec7-49ed-8915-53a48b6b7600@e7f17679-2a42-4659-83c5-7ba961fdf75a\\.com|6be3335b-ef79-4b0b-a0ba-b87afbc6f4ad@6bbb4d2e-e33e-4fa5-9b37-934f4fb50182\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i531","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and using multiple IDs.","name":"Feven","created":"2013-12-20T15:01:22Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"46aa79a9-d329-f713-d4f2-07d31fe7071e","last_modified":1480349205287},{"guid":"afext@anchorfree.com","prefs":[],"schema":1480349193877,"blockID":"i466","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=933988","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't respect user choice, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Hotspot Shield Extension","created":"2013-11-07T13:32:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8176f879-bd73-5468-e908-2d7cfc115ac2","last_modified":1480349205108},{"guid":"{FCE04E1F-9378-4f39-96F6-5689A9159E45}","prefs":[],"schema":1480349193877,"blockID":"i920","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:26:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"eb191ff0-20f4-6e04-4344-d880af4faf51","last_modified":1480349204978},{"guid":"{9CE11043-9A15-4207-A565-0C94C42D590D}","prefs":[],"schema":1480349193877,"blockID":"i503","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947384","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that uses a deceptive name to stay in users' systems.","name":"XUL Cache (malware)","created":"2013-12-06T11:58:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dcdae267-8d3a-5671-dff2-f960febbbb20","last_modified":1480349204951},{"guid":"/^[a-z0-9]+@foxysecure[a-z0-9]*\\.com$/","prefs":[],"schema":1480349193877,"blockID":"i766","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088615","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Fox Sec 7","created":"2014-10-30T14:22:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"503fbd7c-04cd-65f3-9d0e-3ecf427b4a8f","last_modified":1480349204925},{"guid":"/^(jid1-W4CLFIRExukJIFW@jetpack|jid1-W4CLFIRExukJIFW@jetpack_1|jid1-W3CLwrP[a-z]+@jetpack)$/","prefs":[],"schema":1480349193877,"blockID":"i1078","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240561","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that tries to pass itself for the Adobe Flash Player and hides itself in the Add-ons Manager.","name":"Adobe Flash Player (malware)","created":"2016-01-18T10:31:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b026fe67-ec77-a240-2fa1-e78f581a6fe4","last_modified":1480349204899},{"guid":"{0153E448-190B-4987-BDE1-F256CADA672F}","prefs":[],"schema":1480349193877,"blockID":"i914","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","who":"All Firefox users who have this add-on installed in Firefox 39 and above.","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.","name":"RealPlayer Browser Record Plugin","created":"2015-06-02T09:56:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"2bfe0d89-e458-9d0e-f944-ddeaf8c4db6c","last_modified":1480349204871},{"guid":"{77beece6-3997-403a-92fa-0055bfcf88e5}","prefs":[],"schema":1480349193877,"blockID":"i452","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Entrusted11","created":"2013-09-18T16:34:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d348f91f-caeb-a803-dfd9-fd5d285aa0fa","last_modified":1480349204844},{"guid":"dealcabby@jetpack","prefs":[],"schema":1480349193877,"blockID":"i222","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811435","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed with other software, injecting advertisements in Firefox.","name":"DealCabby","created":"2012-11-29T16:20:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6585f0bd-4f66-71e8-c565-d9762c5c084a","last_modified":1480349204818},{"guid":"{3c9a72a0-b849-40f3-8c84-219109c27554}","prefs":[],"schema":1480349193877,"blockID":"i510","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=951301","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks users' Facebook accounts.","name":"Facebook Haber (malware)","created":"2013-12-17T14:27:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7cfa3d0b-0ab2-5e3a-8143-1031c180e32f","last_modified":1480349204778},{"guid":"{4ED1F68A-5463-4931-9384-8FFF5ED91D92}","prefs":[],"schema":1480349193877,"blockID":"i1245","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286368","who":"All users who have McAfee SiteAdvisor lower than 4.0. \r\n\r\nTo resolve this issue, users will need to uninstall McAfee SiteAdvisor/WebAdvisor, reboot the computer, and then reinstall McAfee SiteAdvisor/WebAdvisor. \r\n\r\nFor detailed instructions, please refer to the McAfee support knowledge base.","why":"Old versions of McAfee SiteAdvisor cause startup crashes starting with Firefox 48.0 beta.","name":"McAfee SiteAdvisor lower than 4.0","created":"2016-07-14T21:24:02Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.9.9","minVersion":"0","targetApplication":[]}],"id":"d727d8c5-3329-c98a-7c7e-38b0813ca516","last_modified":1480349204748},{"guid":"{2aab351c-ad56-444c-b935-38bffe18ad26}","prefs":[],"schema":1480349193877,"blockID":"i500","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946087","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Adobe Photo (malware)","created":"2013-12-04T15:29:44Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f7a76d34-ddcd-155e-9fae-5967bd796041","last_modified":1480349204716},{"guid":"jid1-4P0kohSJxU1qGg@jetpack","prefs":[],"schema":1480349193877,"blockID":"i488","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942935","who":"All Firefox users who have version 1.2.50 of the Hola extension. Updating to the latest version should remove the block.","why":"Version 1.2.50 of the Hola extension is causing frequent crashes in Firefox. All users are strongly recommended to update to the latest version, which shouldn't have this problem.","name":"Hola, version 1.2.50","created":"2013-11-25T12:14:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2.50","minVersion":"1.2.50","targetApplication":[]}],"id":"5c7f1635-b39d-4278-5f95-9042399c776e","last_modified":1480349204668},{"guid":"{0A92F062-6AC6-8180-5881-B6E0C0DC2CC5}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i864","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131220","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems and makes unwanted settings changes, in violation of our Add-on Guidelines.","name":"BlockAndSurf","created":"2015-02-26T12:56:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"acb16d1c-6274-93a3-7c1c-7ed36ede64a9","last_modified":1480349204612},{"guid":"jid0-Y6TVIzs0r7r4xkOogmJPNAGFGBw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i322","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=847018","who":"All users who have this add-on installed.","why":"This extension is malware, installed pretending to be the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-03-22T14:39:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"54df22cd-19ce-a7f0-63cc-ffe3113748b9","last_modified":1480349204532},{"guid":"trackerbird@bustany.org","prefs":[],"schema":1480349193877,"blockID":"i986","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1189264","who":"All Thunderbird users who have this version of the add-on installed on Thunderbird 38.0a2 and above.","why":"This add-on is causing consistent crashes on Thunderbird 38.0a2 and above.","name":"trackerbird 1.2.6","created":"2015-08-17T15:56:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2.6","minVersion":"1.2.6","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"38.0a2"}]}],"id":"bb1c699e-8790-4528-0b6d-4f83b7a3152d","last_modified":1480349204041},{"guid":"{0134af61-7a0c-4649-aeca-90d776060cb3}","prefs":[],"schema":1480349193877,"blockID":"i448","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912746","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines. It manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"KeyBar add-on","created":"2013-09-13T16:15:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cf428416-4974-8bb4-7928-c0cb2cfe7957","last_modified":1480349203968},{"guid":"/^(firefox@vebergreat\\.net|EFGLQA@78ETGYN-0W7FN789T87\\.COM)$/","prefs":[],"schema":1480349193877,"blockID":"i564","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","why":"These add-ons are silently installed by the Free Driver Scout installer, in violation of our Add-on Guidelines.","name":"veberGreat and vis (Free Driver Scout bundle)","created":"2014-03-05T13:02:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"487538f1-698e-147e-6395-986759ceed7e","last_modified":1480349203902},{"guid":"69ffxtbr@PackageTracer_69.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i882","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1153001","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on appears to be malware, hijacking user's settings, in violation of the Add-on Guidelines.","name":"PackageTracer","created":"2015-04-10T16:18:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0d37b4e0-3c60-fdad-dd8c-59baff6eae87","last_modified":1480349203836},{"guid":"{ACAA314B-EEBA-48e4-AD47-84E31C44796C}","prefs":[],"schema":1480349193877,"blockID":"i496","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making settings changes that can't be easily reverted.","name":"DVDVideoSoft Menu","created":"2013-12-03T16:07:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"70d2c912-8d04-8065-56d6-d793b13d5f67","last_modified":1480349203779},{"guid":"jid1-4vUehhSALFNqCw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i632","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","who":"All Firefox users who have this version of the add-on installed.","why":"Version 100.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube Plus Plus 100.7","created":"2014-07-01T13:16:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"100.7","minVersion":"100.7","targetApplication":[]}],"id":"8bef6026-6697-99cd-7c1f-812877c4211d","last_modified":1480349203658},{"guid":"{a9bb9fa0-4122-4c75-bd9a-bc27db3f9155}","prefs":[],"schema":1480349193877,"blockID":"i404","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:16:43Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fb7a1dc7-16a0-4f70-8289-4df494e0d0fa","last_modified":1480349203633},{"guid":"P2@D.edu","prefs":[],"schema":1480349193877,"blockID":"i850","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"unIsaless","created":"2015-02-09T15:29:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"49536a29-fc7e-9fd0-f415-e15ac090fa56","last_modified":1480349203605},{"guid":"linksicle@linksicle.com","prefs":[],"schema":1480349193877,"blockID":"i472","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b5b15b3-6da7-cb7c-3c44-30b4fe079d52","last_modified":1480349203581},{"guid":"{377e5d4d-77e5-476a-8716-7e70a9272da0}","prefs":[],"schema":1480349193877,"blockID":"i398","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:15:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ea94df32-2a85-23da-43f7-3fc5714530ec","last_modified":1480349203519},{"guid":"{4933189D-C7F7-4C6E-834B-A29F087BFD23}","prefs":[],"schema":1480349193877,"blockID":"i437","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=900695","who":"All Firefox users.","why":"This add-on is widely reported to be malware.","name":"Win32.SMSWebalta (malware)","created":"2013-08-09T15:14:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cbef1357-d6bc-c8d3-7a82-44af6b1c390f","last_modified":1480349203486},{"guid":"{ADFA33FD-16F5-4355-8504-DF4D664CFE10}","prefs":[],"schema":1480349193877,"blockID":"i306","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844972","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our Add-on Guidelines. It's also possible that it changes user settings without their consent.","name":"Nation Toolbar","created":"2013-02-28T12:56:48Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"017fd151-37ca-4646-4763-1d303fb918fa","last_modified":1480349203460},{"guid":"detgdp@gmail.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i884","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152614","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware, hijacking user settings, in violation of the Add-on Guidelines.","name":"Security Protection (malware)","created":"2015-04-10T16:21:34Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1b5cc88e-499d-2a47-d793-982d4c05e6ee","last_modified":1480349203433},{"guid":"/^(67314b39-24e6-4f05-99f3-3f88c7cddd17@6c5fa560-13a3-4d42-8e90-53d9930111f9\\.com|ffxtlbr@visualbee\\.com|{7aeae561-714b-45f6-ace3-4a8aed6e227b}|{7093ee04-f2e4-4637-a667-0f730797b3a0}|{53c4024f-5a2e-4f2a-b33e-e8784d730938})$/","prefs":[],"schema":1480349193877,"blockID":"i514","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by using multiple add-on IDs and making unwanted settings changes.","name":"VisualBee Toolbar","created":"2013-12-20T12:25:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5f91eee1-7303-3f97-dfe6-1e897a156c7f","last_modified":1480349203408},{"guid":"FXqG@xeeR.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i720","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the Add-on Guidelines.","name":"GoSSave","created":"2014-10-02T12:23:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8ebbc061-a4ff-b75b-ec42-eb17c42a2956","last_modified":1480349203341},{"guid":"{87934c42-161d-45bc-8cef-ef18abe2a30c}","prefs":[],"schema":1480349193877,"blockID":"i547","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=798621","who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed and makes various unwanted changes, in violation of the Add-on Guidelines.","name":"Ad-Aware Security Toolbar","created":"2014-01-30T12:42:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.7.9999999999","minVersion":"0","targetApplication":[]}],"id":"bcfbc502-24c2-4699-7435-e4837118f05a","last_modified":1480349203310},{"guid":"kallow@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i495","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945426","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Facebook Security Service (malware)","created":"2013-12-02T15:09:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1a2c37a9-e7cc-2d03-2043-098d36b8aca2","last_modified":1480349203247},{"guid":"support@lastpass.com","prefs":[],"schema":1480349193877,"blockID":"i1261","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289907","who":"All users who install affected versions of this add-on - beta versions 4.0 to 4.1.20a from addons.mozilla.org or lastpass.com.","why":"LastPass have announced there are security issues that would allow a malicious website to perform some actions (e.g. deleting passwords) without the user's knowledge. Beta versions 4.0 to 4.1.20a of their add-on that were available from addons.mozilla.org are affected and Lastpass also distributed these versions direct from their website.","name":"LastPass addon","created":"2016-07-29T14:17:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.1.20a","minVersion":"4.0.0a","targetApplication":[]}],"id":"ffe94023-b4aa-87ac-962c-5beabe34b1a0","last_modified":1480349203208},{"guid":"008abed2-b43a-46c9-9a5b-a771c87b82da@1ad61d53-2bdc-4484-a26b-b888ecae1906.com","prefs":[],"schema":1480349193877,"blockID":"i528","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949565","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed.","name":"weDownload Manager Pro","created":"2013-12-20T14:40:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"da46065f-1c68-78f7-80fc-8ae07b5df68d","last_modified":1480349203131},{"guid":"{25dd52dc-89a8-469d-9e8f-8d483095d1e8}","prefs":[],"schema":1480349193877,"blockID":"i714","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Web Counselor","created":"2014-10-01T15:36:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e46c31ad-0ab3-e48a-47aa-9fa91b675fda","last_modified":1480349203066},{"guid":"{B1FC07E1-E05B-4567-8891-E63FBE545BA8}","prefs":[],"schema":1480349193877,"blockID":"i926","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:28:46Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"09868783-261a-ac24-059d-fc772218c1ba","last_modified":1480349202708},{"guid":"/^(torntv@torntv\\.com|trtv3@trtv\\.com|torntv2@torntv\\.com|e2fd07a6-e282-4f2e-8965-85565fcb6384@b69158e6-3c3b-476c-9d98-ae5838c5b707\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i529","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949559","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed.","name":"TornTV","created":"2013-12-20T14:46:03Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"040e5ec2-ea34-816a-f99f-93296ce845e8","last_modified":1480349202677},{"guid":"249911bc-d1bd-4d66-8c17-df533609e6d8@c76f3de9-939e-4922-b73c-5d7a3139375d.com","prefs":[],"schema":1480349193877,"blockID":"i532","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and using multiple IDs.","name":"Feven","created":"2013-12-20T15:02:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d32b850d-82d5-b63d-087c-fb2041b2c232","last_modified":1480349202631},{"guid":"thefoxonlybetter@quicksaver","prefs":[],"schema":1480349193877,"blockID":"i704","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","who":"All Firefox users who have any of these versions of the add-on installed.","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"The Fox, Only Better (malicious versions)","created":"2014-08-27T14:49:02Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"0.*","minVersion":"0","targetApplication":[]}],"id":"79ea6621-b414-17a4-4872-bfc4af7fd428","last_modified":1480349202588},{"guid":"{B40794A0-7477-4335-95C5-8CB9BBC5C4A5}","prefs":[],"schema":1480349193877,"blockID":"i429","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=899178","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that spreads spam through Facebook.","name":"Video Player 1.3 (malware)","created":"2013-07-30T14:31:17Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d98b2b76-4082-3387-ae33-971d973fa278","last_modified":1480349202541},{"guid":"firefoxaddon@youtubeenhancer.com","prefs":[],"schema":1480349193877,"blockID":"i648","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the YouTube Enhancer Plus extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube Enhancer Plus, versions between 199.7.0 and 208.7.0","created":"2014-07-10T15:12:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"208.7.0","minVersion":"199.7.0","targetApplication":[]}],"id":"7e64d7fc-ff16-8687-dbd1-bc4c7dfc5097","last_modified":1480349202462},{"guid":"addon@defaulttab.com","prefs":[],"schema":1480349193877,"blockID":"i362","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863387","who":"All users who have this add-on installed. Users who wish to enable it again can do so in the Add-ons Manager tab.","why":"Old versions of this add-on had been silently installed into users' systems, without showing the opt-in install page that is built into Firefox.","name":"Default Tab","created":"2013-06-06T12:57:29Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.4.4","minVersion":"0","targetApplication":[]}],"id":"df3fe753-5bae-bfb4-022b-6b6bfc534937","last_modified":1480349202429},{"guid":"{7D4F1959-3F72-49d5-8E59-F02F8AA6815D}","prefs":[],"schema":1480349193877,"blockID":"i394","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This is a companion add-on for the SweetPacks Toolbar which is blocked due to guideline violations.","name":"Updater By SweetPacks","created":"2013-06-25T12:40:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"851c2b8e-ea19-3a63-eac5-f931a8da5d6e","last_modified":1480349202341},{"guid":"g@uzcERQ6ko.net","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i776","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines","name":"GoSave","created":"2014-10-31T16:23:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ee1e1a44-b51b-9f12-819d-64c3e515a147","last_modified":1480349202307},{"guid":"ffxtlbr@incredibar.com","prefs":[],"schema":1480349193877,"blockID":"i318","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812264","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"IncrediBar","created":"2013-03-20T14:40:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9e84b07c-84d5-c932-85f2-589713d7e380","last_modified":1480349202280},{"guid":"M1uwW0@47z8gRpK8sULXXLivB.com","prefs":[],"schema":1480349193877,"blockID":"i870","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131159","who":"All users who have this add-on installed.","why":"This is a malicious add-on that goes by the the name \"Flash Player 11\".","name":"Flash Player 11 (malware)","created":"2015-03-04T14:34:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"71d961b2-37d1-d393-76f5-3afeef57e749","last_modified":1480349202252},{"guid":"jid1-qj0w91o64N7Eeg@jetpack","prefs":[],"schema":1480349193877,"blockID":"i650","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the YouTube ALL HTML5 extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube ALL HTML5, versions between 39.5.1 and 47.0.4","created":"2014-07-10T15:14:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"47.0.4","minVersion":"39.5.1","targetApplication":[]}],"id":"b30b1f7a-2a30-a6cd-fc20-6c9cb23c7198","last_modified":1480349202186},{"guid":"4zffxtbr-bs@VideoDownloadConverter_4z.com","prefs":[],"schema":1480349193877,"blockID":"i507","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949266","who":"All Firefox users who have this add-on installed.","why":"Certain versions of this add-on contains an executable that is flagged by multiple tools as malware. Newer versions no longer use it.","name":"VideoDownloadConverter","created":"2013-12-12T15:37:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"5.75.3.25126","minVersion":"0","targetApplication":[]}],"id":"0a0f106a-ecc6-c537-1818-b36934943e91","last_modified":1480349202156},{"guid":"hdv@vovcacik.addons.mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i656","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the High Definition Video extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"High Definition Video, version 102.0","created":"2014-07-10T15:22:59Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"102.0","minVersion":"102.0","targetApplication":[]}],"id":"972249b2-bba8-b508-2ead-c336631135ac","last_modified":1480349202125},{"guid":"@video_downloader_pro","prefs":[],"schema":1480349193877,"blockID":"i1265","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298335","who":"Users of versions of 1.2.1 to 1.2.5 inclusive.","why":"Versions 1.2.1 to 1.2.5 of Video Downloader Pro included code that violated our polices - affected versions send every visited url to a remote server without the user's consent. Versions older than 1.2.1 and more recent than 1.2.5 are okay.","name":"Video Downloader Pro","created":"2016-08-26T18:26:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2.5","minVersion":"1.2.1","targetApplication":[]}],"id":"ff9c8def-7d50-66b4-d42a-f9a4b04bd224","last_modified":1480349202099},{"guid":"contato@facefollow.net","prefs":[],"schema":1480349193877,"blockID":"i509","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950846","who":"All Firefox users who have this add-on installed.","why":"This add-on spams users' Facebook accounts.","name":"Face follow","created":"2013-12-16T16:15:15Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"56f15747-af8c-342c-6877-a41eeacded84","last_modified":1480349202067},{"guid":"wecarereminder@bryan","prefs":[],"schema":1480349193877,"blockID":"i666","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=818614","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is being silently installed by various software packages, in violation of the Add-on Guidelines.","name":"We-Care Reminder","created":"2014-07-10T16:18:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"51e0ead7-144c-c1f4-32f2-25fc5fcde870","last_modified":1480349202039},{"guid":"/^({83a8ce1b-683c-4784-b86d-9eb601b59f38}|{ef1feedd-d8da-4930-96f1-0a1a598375c6}|{79ff1aae-701f-4ca5-aea3-74b3eac6f01b}|{8a184644-a171-4b05-bc9a-28d75ffc9505}|{bc09c55d-0375-4dcc-836e-0e3c8addfbda}|{cef81415-2059-4dd5-9829-1aef3cf27f4f})$/","prefs":[],"schema":1480349193877,"blockID":"i526","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and uses multiple IDs.","name":"KeyBar add-on","created":"2013-12-20T14:12:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9dfa4e92-bbf2-66d1-59a9-51402d1d226c","last_modified":1480349202010},{"guid":"{d9284e50-81fc-11da-a72b-0800200c9a66}","prefs":[],"schema":1480349193877,"blockID":"i806","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1106948","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable the add-on in the Add-on Manager.","why":"Starting with Firefox 34, current versions of the Yoono add-on cause all tabs to appear blank.","name":"Yoono","created":"2014-12-16T08:35:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"7.7.34","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"34.0a1"}]}],"id":"ccdceb04-3083-012f-9d9f-aac85f10b494","last_modified":1480349201976},{"guid":"{f2548724-373f-45fe-be6a-3a85e87b7711}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i768","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astro New Tab","created":"2014-10-30T14:52:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8510e9e2-c7d8-90d0-a2ff-eb09293acc6e","last_modified":1480349201854},{"guid":"KSqOiTeSJEDZtTGuvc18PdPmYodROmYzfpoyiCr2@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1032","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211172","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video Player (malware)","created":"2015-10-05T16:22:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3d9188ac-235f-773a-52a2-261b3ea9c03c","last_modified":1480349201504},{"guid":"{849ded12-59e9-4dae-8f86-918b70d213dc}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i708","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047102","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes homepage and search settings without the user's consent, in violation of the Add-on Guidelines.","name":"Astromenda New Tab","created":"2014-09-02T16:29:08Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a319bfee-464f-1c33-61ad-738c52842fbd","last_modified":1480349201453},{"guid":"grjkntbhr@hgergerherg.com","prefs":[],"schema":1480349193877,"blockID":"i1018","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208196","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"GreenPlayer (malware)","created":"2015-09-24T16:04:53Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9c47d940-bdd9-729f-e32e-1774d87f24b5","last_modified":1480349201425},{"guid":"quick_start@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i588","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011316","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware that is installed without user consent.","name":"Quick Start (malware)","created":"2014-06-03T15:53:15Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2affbebe-8776-3edb-28b9-237cb8b85f97","last_modified":1480349201398},{"guid":"/^(matchersite(pro(srcs?)?)?\\@matchersite(pro(srcs?)?)?\\.com)|((pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\@(pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i668","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1039892","who":"All Firefox users who have any of these add-ons installed. User who wish to continue using these add-ons can enable them in the Add-ons Manager.","why":"This is a group of add-ons that are being distributed under multiple different IDs and likely being silently installed, in violation of the Add-on Guidelines.","name":"Site Matcher","created":"2014-07-17T14:35:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"52e1a2de-ab35-be27-4810-334f681ccc4a","last_modified":1480349201372},{"guid":"{EEF73632-A085-4fd3-A778-ECD82C8CB297}","prefs":[],"schema":1480349193877,"blockID":"i165","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Codec-M (malware)","created":"2012-10-29T16:41:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e5ecd02a-20ee-749b-d5cf-3d74d1173a1f","last_modified":1480349201262},{"guid":"firefox-extension@mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i688","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1049533","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hides itself under the name Java_plugin, among others.","name":"FinFisher (malware)","created":"2014-08-06T17:13:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"98aca74a-69c7-9960-cccc-096a4a4adc6c","last_modified":1480349201235},{"guid":"jid1-vW9nopuIAJiRHw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i570","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=990291","who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed, reverts settings changes to enforce its own, and is also causing stability problems in Firefox, all in violation of the Add-on Guidelines.","name":"SmileysWeLove","created":"2014-03-31T16:17:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bf2abd66-f910-650e-89aa-cd1d5c2f8a89","last_modified":1480349201204},{"guid":"87aukfkausiopoawjsuifhasefgased278djasi@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1050","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1220461","who":"All users who have this add-on installed.","why":"This is a malicious add-on that poses as a video update and hijacks Facebook accounts.","name":"Trace Video (malware)","created":"2015-11-02T14:53:21Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cb4cfac0-79c2-0fbf-206a-324aa3abbea5","last_modified":1480349201157},{"guid":"{e44a1809-4d10-4ab8-b343-3326b64c7cdd}","prefs":[],"schema":1480349193877,"blockID":"i451","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Entrusted","created":"2013-09-18T16:33:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ad5f53ed-7a43-cb1f-cbd7-41808fac1791","last_modified":1480349201128},{"guid":"{21EAF666-26B3-4A3C-ABD0-CA2F5A326744}","prefs":[],"schema":1480349193877,"blockID":"i620","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024752","who":"All Firefox users who have this add-on installed.","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the Add-on Guidelines.","name":"V-Bates","created":"2014-06-12T15:27:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2d8833db-01a7-a758-080f-19e47abc54cb","last_modified":1480349201096},{"guid":"{1FD91A9C-410C-4090-BBCC-55D3450EF433}","prefs":[],"schema":1480349193877,"blockID":"i338","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844979","who":"All Firefox users who have this add-on installed.","why":"This extension overrides search settings, and monitors any further changes done to them so that they can be reverted. This violates our add-on guidelines.","name":"DataMngr (malware)","created":"2013-04-24T11:30:28Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2e35995f-bec6-aa2b-3372-346d3325f72e","last_modified":1480349201059},{"guid":"9598582LLKmjasieijkaslesae@jetpack","prefs":[],"schema":1480349193877,"blockID":"i996","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201165","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Secure Player (malware)","created":"2015-09-07T13:50:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"52f9c6e7-f7d5-f52e-cc35-eb99ef8b4b6a","last_modified":1480349201029},{"guid":"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}","prefs":[],"schema":1480349193877,"blockID":"i406","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our Add-on Guidelines.","name":"uTorrentBar","created":"2013-06-27T10:46:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3bcefc4b-110c-f3b8-17ad-f9fc97c1120a","last_modified":1480349201000},{"guid":"{ce7e73df-6a44-4028-8079-5927a588c948}","prefs":[],"schema":1480349193877,"blockID":"i117","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781269","who":"All Firefox users who have this add-on installed.","why":"The Search By Image (by Google) extension causes very high CPU utilization during regular browsing, often damaging user experience significantly, in a way that is very difficult to associate with the extension.\r\n\r\nUsers who want to continue using the add-on regardless of its performance impact can enable it in the Add-ons Manager.","name":"Search By Image (by Google)","created":"2012-08-10T08:50:52Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.8","minVersion":"0","targetApplication":[]}],"id":"fb1f9aed-2f1f-3e2c-705d-3b34ca9168b6","last_modified":1480349200972},{"guid":"{424b0d11-e7fe-4a04-b7df-8f2c77f58aaf}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i800","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astromenda NT","created":"2014-12-15T10:51:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"07bdf6aa-cfc8-ed21-6b36-6f90af02b169","last_modified":1480349200939},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i618","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:25:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.31.*","minVersion":"3.15.31","targetApplication":[]}],"id":"825feb43-d6c2-7911-4189-6f589f612c34","last_modified":1480349200911},{"guid":"{167d9323-f7cc-48f5-948a-6f012831a69f}","prefs":[],"schema":1480349193877,"blockID":"i262","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal.","name":"WhiteSmoke (malware)","created":"2013-01-29T13:33:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a8f249fe-3db8-64b8-da89-7b584337a7af","last_modified":1480349200885},{"guid":"/^({988919ff-0cd8-4d0c-bc7e-60d55a49eb64}|{494b9726-9084-415c-a499-68c07e187244}|{55b95864-3251-45e9-bb30-1a82589aaff1}|{eef3855c-fc2d-41e6-8d91-d368f51b3055}|{90a1b331-c2b4-4933-9f63-ba7b84d60d58}|{d2cf9842-af95-48cd-b873-bfbb48cd7f5e})$/","prefs":[],"schema":1480349193877,"blockID":"i541","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","who":"All Firefox users who have this add-on installed","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the Add-on Guidelines.","name":"MixiDJ (malware)","created":"2014-01-28T14:09:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"36196aed-9d0d-ebee-adf1-d1f7fadbc48f","last_modified":1480349200819},{"guid":"{29b136c9-938d-4d3d-8df8-d649d9b74d02}","prefs":[],"schema":1480349193877,"blockID":"i598","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011322","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed, in violation with our Add-on Guidelines.","name":"Mega Browse","created":"2014-06-12T13:21:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"63b1c965-27c3-cd06-1b76-8721add39edf","last_modified":1480349200775},{"guid":"{6e7f6f9f-8ce6-4611-add2-05f0f7049ee6}","prefs":[],"schema":1480349193877,"blockID":"i868","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1086574","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Word Proser","created":"2015-02-26T14:58:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f54797da-cdcd-351a-c95e-874b64b0d226","last_modified":1480349200690},{"guid":"{02edb56b-9b33-435b-b7df-b2843273a694}","prefs":[],"schema":1480349193877,"blockID":"i438","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=896581","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"KeyBar Toolbar","created":"2013-08-09T15:27:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"896710d2-5a65-e9b0-845b-05aa72c2bd51","last_modified":1480349200338},{"guid":"{e1aaa9f8-4500-47f1-9a0a-b02bd60e4076}","prefs":[],"schema":1480349193877,"blockID":"i646","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Youtube Video Replay extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Youtube Video Replay, version 178.7.0","created":"2014-07-10T15:10:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"178.7.0","minVersion":"178.7.0","targetApplication":[]}],"id":"ac5d1083-6753-bbc1-a83d-c63c35371b22","last_modified":1480349200312},{"guid":"{1cdbda58-45f8-4d91-b566-8edce18f8d0a}","prefs":[],"schema":1480349193877,"blockID":"i724","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Counselor Pro","created":"2014-10-13T16:00:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7b70bd36-d2f7-26fa-9038-8b8dd132cd81","last_modified":1480349200288},{"guid":"{b12785f5-d8d0-4530-a3ea-5c4263b85bef}","prefs":[],"schema":1480349193877,"blockID":"i988","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1161573","who":"All users who have this add-on installed. Those who wish continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on overrides user's preferences without consent, in violation of the Add-on Guidelines.","name":"Hero Fighter Community Toolbar","created":"2015-08-17T16:04:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3e6d73f2-e8e3-af69-866e-30d3977b09e4","last_modified":1480349200171},{"guid":"{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}","prefs":[],"schema":1480349193877,"blockID":"i39","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"MediaBar","created":"2011-07-19T10:18:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.3.1.00","minVersion":"0.1","targetApplication":[]}],"id":"e928a115-9d8e-86a4-e2c7-de39627bd9bf","last_modified":1480349200047},{"guid":"{9edd0ea8-2819-47c2-8320-b007d5996f8a}","prefs":["browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i684","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033857","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is believed to be silently installed in Firefox, in violation of the Add-on Guidelines.","name":"webget","created":"2014-08-06T13:33:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d38561f5-370f-14be-1443-a74dad29b1f3","last_modified":1480349199962},{"guid":"/^({ad9a41d2-9a49-4fa6-a79e-71a0785364c8})|(ffxtlbr@mysearchdial\\.com)$/","prefs":["browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i670","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036740","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on has been repeatedly been silently installed into users' systems, and is known for changing the default search without user consent, in violation of the Add-on Guidelines.","name":"MySearchDial","created":"2014-07-18T15:47:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a04075e6-5df2-2e1f-85a6-3a0171247349","last_modified":1480349199927},{"guid":"odtffplugin@ibm.com","prefs":[],"schema":1480349193877,"blockID":"i982","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190630","who":"All users who have these versions installed. The latest versions of this add-on aren't blocked, so updating to them should be sufficient to fix this problem.","why":"Certain versions of the IBM Remote Control add-on could leave a machine vulnerable to run untrusted code.","name":"IBM Endpoint Manager for Remote Control 9.0.1.1 to 9.0.1.100","created":"2015-08-11T11:25:43Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"9.0.1.100","minVersion":"9.0.1.1","targetApplication":[]}],"id":"f6e3e5d2-9331-1097-ba4b-cf2e484b7187","last_modified":1480349199886},{"guid":"support@todoist.com","prefs":[],"schema":1480349193877,"blockID":"i1030","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205479","who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is sending all sites visited by the user to a remote server, additionally doing so in an unsafe way.","name":"Todoist","created":"2015-10-01T16:53:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.9","minVersion":"0","targetApplication":[]}],"id":"d0a84aab-0661-b3c5-c184-a2fd3f9dfb9c","last_modified":1480349199850},{"guid":"/^({1f43c8af-e9e4-4e5a-b77a-f51c7a916324}|{3a3bd700-322e-440a-8a6a-37243d5c7f92}|{6a5b9fc2-733a-4964-a96a-958dd3f3878e}|{7b5d6334-8bc7-4bca-a13e-ff218d5a3f17}|{b87bca5b-2b5d-4ae8-ad53-997aa2e238d4}|{bf8e032b-150f-4656-8f2d-6b5c4a646e0d})$/","prefs":[],"schema":1480349193877,"blockID":"i1136","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox.","name":"Watcher (malware)","created":"2016-03-04T17:56:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a2d0378f-ebe4-678c-62d8-2e4c6a613c17","last_modified":1480349199818},{"guid":"liiros@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i814","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119657","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations.","name":"One Tab (malware)","created":"2015-01-09T12:49:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"387c054d-cc9f-7ebd-c814-b4c1fbcb2880","last_modified":1480349199791},{"guid":"youtubeunblocker@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1128","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons.","name":"YouTube Unblocker","created":"2016-03-01T21:18:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3395fce1-42dd-e31a-1466-2da3f32456a0","last_modified":1480349199768},{"guid":"{97E22097-9A2F-45b1-8DAF-36AD648C7EF4}","prefs":[],"schema":1480349193877,"blockID":"i916","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-02T09:57:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"94fba774-c4e6-046a-bc7d-ede787a9d0fe","last_modified":1480349199738},{"guid":"{b64982b1-d112-42b5-b1e4-d3867c4533f8}","prefs":[],"schema":1480349193877,"blockID":"i167","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=805973","who":"All Firefox users who have this add-on installed.","why":"This add-on is a frequent cause for browser crashes and other problems.","name":"Browser Manager","created":"2012-10-29T17:17:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"00bbe501-2d27-7a1c-c344-6eea1c707473","last_modified":1480349199673},{"guid":"{58bd07eb-0ee0-4df0-8121-dc9b693373df}","prefs":[],"schema":1480349193877,"blockID":"i286","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=842206","who":"All Firefox users who have this extension installed.","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same BrowserProtect extension that is listed on our add-ons site. That one is safe to use.","name":"Browser Protect / bProtector (malware)","created":"2013-02-18T10:54:28Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b40a60d3-b9eb-09eb-bb02-d50b27aaac9f","last_modified":1480349199619},{"guid":"trtv3@trtv.com","prefs":[],"schema":1480349193877,"blockID":"i465","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"TornTV","created":"2013-11-01T15:21:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3d4d8a33-2eff-2556-c699-9be0841a8cd4","last_modified":1480349199560},{"guid":"youtube@downloader.yt","prefs":[],"schema":1480349193877,"blockID":"i1231","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1278932","who":"All users who have this add-on installed.","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that can being exploited through this website (downloader.yt) to change security settings in Firefox and/or install malicious add-ons. \r\n","name":"YouTube downloader","created":"2016-06-09T14:50:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8514eaee-850c-e27a-a058-8badeeafc26e","last_modified":1480349199528},{"guid":"low_quality_flash@pie2k.com","prefs":[],"schema":1480349193877,"blockID":"i658","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Low Quality Flash extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Low Quality Flash, versions between 46.2 and 47.1","created":"2014-07-10T15:27:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"47.1","minVersion":"46.2","targetApplication":[]}],"id":"b869fae6-c18c-0d39-59a2-603814656404","last_modified":1480349199504},{"guid":"{d2cf9842-af95-48cd-b873-bfbb48cd7f5e}","prefs":[],"schema":1480349193877,"blockID":"i439","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902569","who":"All Firefox users who have this add-on installed.","why":"This is another instance of the previously blocked Mixi DJ add-on, which doesn't follow our Add-on Guidelines. If you wish to continue using it, it can be enabled in the Add-ons Manager.","name":"Mixi DJ V45","created":"2013-08-09T16:08:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e81c31fc-265e-61b9-d4c1-0e2f31f1652e","last_modified":1480349199478},{"guid":"/^({b95faac1-a3d7-4d69-8943-ddd5a487d966}|{ecce0073-a837-45a2-95b9-600420505f7e}|{2713b394-286f-4d7c-89ea-4174eeab9f5a}|{da7a20cf-bef4-4342-ad78-0240fdf87055})$/","prefs":[],"schema":1480349193877,"blockID":"i624","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the Add-on Guidelines.\r\n","name":"WiseConvert","created":"2014-06-18T13:50:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ed57d7a6-5996-c7da-8e07-1ad125183e84","last_modified":1480349199446},{"guid":"{f894a29a-f065-40c3-bb19-da6057778493}","prefs":[],"schema":1480349193877,"blockID":"i742","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the Add-on Guidelines.","name":"Spigot Shopping Assistant","created":"2014-10-17T15:46:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39d8334e-4b7c-4336-2d90-e6aa2d783967","last_modified":1480349199083},{"guid":"plugin@analytic-s.com","prefs":[],"schema":1480349193877,"blockID":"i467","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935797","who":"All Firefox users who have this add-on installed.","why":"This add-on bypasses the external install opt in screen in Firefox, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Analytics","created":"2013-11-07T14:08:48Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ffbed3f3-e5c9-bc6c-7530-f68f47b7efd6","last_modified":1480349199026},{"guid":"{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}","prefs":[],"schema":1480349193877,"blockID":"i678","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=895668","who":"All Firefox users who have this add-on installed. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on is generally silently installed, in violation of the Add-on Guidelines.","name":"DataMngr","created":"2014-07-23T14:12:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"151021fc-ce4e-a734-e075-4ece19610f64","last_modified":1480349198947},{"guid":"HxLVJK1ioigz9WEWo8QgCs3evE7uW6LEExAniBGG@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1036","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211170","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Mega Player (malware)","created":"2015-10-05T16:37:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"32e34b41-a73c-72d4-c96c-136917ad1d4d","last_modified":1480349198894},{"guid":"{6af08a71-380e-42dd-9312-0111d2bc0630}","prefs":[],"schema":1480349193877,"blockID":"i822","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1126353","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware, hiding itself in the Add-ons Manager, and keeping track of certain user actions.","name":"{6af08a71-380e-42dd-9312-0111d2bc0630} (malware)","created":"2015-01-27T09:50:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"96d0c12b-a6cf-4539-c1cf-a1c75c14ff24","last_modified":1480349198826},{"guid":"colmer@yopmail.com","prefs":[],"schema":1480349193877,"blockID":"i550","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=968445","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Video Plugin Facebook (malware)","created":"2014-02-06T15:49:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c394d10b-384e-cbd0-f357-9c521715c373","last_modified":1480349198744},{"guid":"fplayer@adobe.flash","prefs":[],"schema":1480349193877,"blockID":"i444","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=909433","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware disguised as the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-08-26T14:49:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c6557989-1b59-72a9-da25-b816c4a4c723","last_modified":1480349198667},{"guid":"ascsurfingprotection@iobit.com","prefs":[],"schema":1480349193877,"blockID":"i740","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963776","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Advanced SystemCare Surfing Protection","created":"2014-10-17T15:39:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4405f99d-c9b7-c496-1b45-268163ce29b7","last_modified":1480349198637},{"guid":"{6E19037A-12E3-4295-8915-ED48BC341614}","prefs":[],"schema":1480349193877,"blockID":"i24","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=615518","who":"Users of RelevantKnowledge version 1.3.328.4 and older in Firefox 4 and later.","why":"This add-on causes a high volume of Firefox crashes.","name":"comScore RelevantKnowledge","created":"2011-03-02T17:42:56Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.3.328.4","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1pre"}]}],"id":"7c189c5e-f95b-0aef-e9e3-8e879336503b","last_modified":1480349198606},{"guid":"crossriderapp4926@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i91","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=754648","who":"All Firefox users who have installed this add-on.","why":"Versions of this add-on prior to 0.81.44 automatically post message to users' walls and hide them from their view. Version 0.81.44 corrects this.","name":"Remove My Timeline (malware)","created":"2012-05-14T14:16:43Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.81.43","minVersion":"0","targetApplication":[]}],"id":"5ee3e72e-96fb-c150-fc50-dd581e960963","last_modified":1480349198547},{"guid":"/^(93abedcf-8e3a-4d02-b761-d1441e437c09@243f129d-aee2-42c2-bcd1-48858e1c22fd\\.com|9acfc440-ac2d-417a-a64c-f6f14653b712@09f9a966-9258-4b12-af32-da29bdcc28c5\\.com|58ad0086-1cfb-48bb-8ad2-33a8905572bc@5715d2be-69b9-4930-8f7e-64bdeb961cfd\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i544","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is in violation of the Add-on Guidelines, using multiple add-on IDs and potentially doing other unwanted activities.","name":"SuperLyrics","created":"2014-01-30T11:51:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d8d25967-9814-3b65-0787-a0525c16e11e","last_modified":1480349198510},{"guid":"wHO@W9.net","prefs":[],"schema":1480349193877,"blockID":"i980","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1192468","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"BestSavEFOrYoU (malware)","created":"2015-08-11T11:20:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4beb917f-68f2-1f91-beed-dff6d83006f8","last_modified":1480349198483},{"guid":"frhegnejkgner@grhjgewfewf.com","prefs":[],"schema":1480349193877,"blockID":"i1040","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212451","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Async Codec (malware)","created":"2015-10-07T13:03:37Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fb6ab4ce-5517-bd68-2cf7-a93a109a528a","last_modified":1480349198458},{"guid":"firefox@luckyleap.net","prefs":[],"schema":1480349193877,"blockID":"i471","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3a9e04c7-5e64-6297-8442-2816915aad77","last_modified":1480349198433},{"guid":"auto-plugin-checker@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1210","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on reports every visited URL to a third party without disclosing it to the user.","name":"auto-plugin-checker","created":"2016-05-04T16:25:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3e202419-5318-2025-b579-c828af24a06e","last_modified":1480349198401},{"guid":"lugcla21@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i432","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902072","who":"All Firefox users who have this add-on installed.","why":"This add-on includes malicious code that spams users' Facebook accounts with unwanted messages.","name":"FB Color Changer (malware)","created":"2013-08-06T13:16:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b6943f35-9429-1f8e-bf8e-fe37979fe183","last_modified":1480349198372},{"guid":"{99079a25-328f-4bd4-be04-00955acaa0a7}","prefs":[],"schema":1480349193877,"blockID":"i402","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:16:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"16008331-8b47-57c8-a6f7-989914d1cb8a","last_modified":1480349198341},{"guid":"{81b13b5d-fba1-49fd-9a6b-189483ac548a}","prefs":[],"schema":1480349193877,"blockID":"i473","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:43Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"76debc7b-b875-6da4-4342-1243cbe437f6","last_modified":1480349198317},{"guid":"{e935dd68-f90d-46a6-b89e-c4657534b353}","prefs":[],"schema":1480349193877,"blockID":"i732","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Sites Pro","created":"2014-10-16T16:38:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"97fdc235-ac1a-9f20-1b4a-17c2f0d89ad1","last_modified":1480349198260},{"guid":"{32da2f20-827d-40aa-a3b4-2fc4a294352e}","prefs":[],"schema":1480349193877,"blockID":"i748","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Start Page","created":"2014-10-17T16:02:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6c980c8e-4a3c-7912-4a3a-80add457575a","last_modified":1480349198223},{"guid":"chinaescapeone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i431","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks.","name":"F-Secure Security Pack (malware)","created":"2013-08-05T16:43:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fbd89a9d-9c98-8481-e4cf-93e327ca8be1","last_modified":1480349198192},{"guid":"{cc6cc772-f121-49e0-b1f0-c26583cb0c5e}","prefs":[],"schema":1480349193877,"blockID":"i716","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Counselor","created":"2014-10-02T12:12:34Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"debcd28c-884b-ca42-d983-6fabf91034dd","last_modified":1480349198148},{"guid":"{906000a4-88d9-4d52-b209-7a772970d91f}","prefs":[],"schema":1480349193877,"blockID":"i474","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"326d05b9-ace7-67c6-b094-aad926c185a5","last_modified":1480349197744},{"guid":"{A34CAF42-A3E3-11E5-945F-18C31D5D46B0}","prefs":["security.csp.enable","security.fileuri.strict_origin_policy","security.mixed_content.block_active_content"],"schema":1480349193877,"blockID":"i1227","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1274995","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on downgrades the security of all iframes from https to http and changes important Firefox security preferences.","name":"Mococheck WAP browser","created":"2016-05-31T15:45:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2230a5ce-a8f8-a20a-7974-3b960a03aba9","last_modified":1480349197699},{"guid":"{AB2CE124-6272-4b12-94A9-7303C7397BD1}","prefs":[],"schema":1480349193877,"blockID":"i20","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","who":"Users of Skype extension versions below 5.2.0.7165 for all versions of Firefox.","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please update to the latest version. For more information, please read our announcement.","name":"Skype extension","created":"2011-01-20T18:39:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"5.2.0.7164","minVersion":"0.1","targetApplication":[]}],"id":"60e16015-1803-197a-3241-484aa961d18f","last_modified":1480349197667},{"guid":"f6682b47-e12f-400b-9bc0-43b3ccae69d1@39d6f481-b198-4349-9ebe-9a93a86f9267.com","prefs":[],"schema":1480349193877,"blockID":"i682","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1043017","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is being silently installed, in violation of the Add-on Guidelines.","name":"enformation","created":"2014-08-04T16:07:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a7ae65cd-0869-67e8-02f8-6d22c56a83d4","last_modified":1480349197636},{"guid":"rally_toolbar_ff@bulletmedia.com","prefs":[],"schema":1480349193877,"blockID":"i537","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950267","who":"All Firefox users who have this extension installed. If you want to continue using it, you can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing it.","name":"Rally Toolbar","created":"2014-01-23T15:51:48Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4ac6eb63-b51a-3296-5b02-bae77f424032","last_modified":1480349197604},{"guid":"x77IjS@xU.net","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i774","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines\r\n","name":"YoutubeAdBlocke","created":"2014-10-31T16:22:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4771da14-bcf2-19b1-3d71-bc61a1c7d457","last_modified":1480349197578},{"guid":"{49c53dce-afa0-49a1-a08b-2eb8e8444128}","prefs":[],"schema":1480349193877,"blockID":"i441","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844985","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"ytbyclick","created":"2013-08-09T16:58:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5f08d720-58c2-6acb-78ad-7af45c82c90b","last_modified":1480349197550},{"guid":"searchengine@gmail.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i886","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152555","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the Add-on Guidelines.","name":"Search Enginer","created":"2015-04-10T16:25:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"46de4f6e-2b29-7334-ebbb-e0048f114f7b","last_modified":1480349197525},{"guid":"{bb7b7a60-f574-47c2-8a0b-4c56f2da9802}","prefs":[],"schema":1480349193877,"blockID":"i754","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080850","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"AdvanceElite","created":"2014-10-17T16:27:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f222ceb2-9b69-89d1-8dce-042d8131a12e","last_modified":1480349197500},{"guid":"/^(test3@test.org|test2@test.org|test@test.org|support@mozilla.org)$/","prefs":[],"schema":1480349193877,"blockID":"i1119","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1242721","who":"All users who have these add-ons installed.","why":"These add-ons are malicious, or at least attempts at being malicious, using misleading names and including risky code.","name":"test.org add-ons (malware)","created":"2016-01-25T13:31:43Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"afd2a0d7-b050-44c9-4e45-b63696d9b22f","last_modified":1480349197468},{"guid":"/^((34qEOefiyYtRJT@IM5Munavn\\.com)|(Mro5Fm1Qgrmq7B@ByrE69VQfZvZdeg\\.com)|(KtoY3KGxrCe5ie@yITPUzbBtsHWeCdPmGe\\.com)|(9NgIdLK5Dq4ZMwmRo6zk@FNt2GCCLGyUuOD\\.com)|(NNux7bWWW@RBWyXdnl6VGls3WAwi\\.com)|(E3wI2n@PEHTuuNVu\\.com)|(2d3VuWrG6JHBXbQdbr@3BmSnQL\\.com))$/","prefs":[],"schema":1480349193877,"blockID":"i324","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","who":"All users who have this add-on installed.","why":"This extension is malware, installed pretending to be the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-03-22T14:48:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5be3a399-af3e-644e-369d-628273b3fdc2","last_modified":1480349197432},{"guid":"axtara__web@axtara.com","prefs":[],"schema":1480349193877,"blockID":"i1263","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have version 1.1.1 or less of this add-on installed.","why":"Old versions of this add-on contained code from YouTube Unblocker, which was originally blocked due to malicious activity. Version 1.1.2 is now okay.","name":"AXTARA Search (pre 1.1.2)","created":"2016-08-17T16:47:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.1.1","minVersion":"0","targetApplication":[]}],"id":"c58be1c9-3d63-a948-219f-e3225e1eec8e","last_modified":1480349197404},{"guid":"{8f894ed3-0bf2-498e-a103-27ef6e88899f}","prefs":[],"schema":1480349193877,"blockID":"i792","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"ExtraW","created":"2014-11-26T13:49:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bebc9e15-59a1-581d-0163-329d7414edff","last_modified":1480349197368},{"guid":"profsites@pr.com","prefs":[],"schema":1480349193877,"blockID":"i734","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.\r\n","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"ProfSites","created":"2014-10-16T16:39:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0d6d84d7-0b3f-c5ab-57cc-6b66b0775a23","last_modified":1480349197341},{"guid":"{872b5b88-9db5-4310-bdd0-ac189557e5f5}","prefs":[],"schema":1480349193877,"blockID":"i497","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making settings changes that can't be easily reverted.","name":"DVDVideoSoft Menu","created":"2013-12-03T16:08:09Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e8da89c4-c585-77e4-9872-591d20723a7e","last_modified":1480349197240},{"guid":"123456789@offeringmedia.com","prefs":[],"schema":1480349193877,"blockID":"i664","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin.","name":"Taringa MP3 / Adobe Flash","created":"2014-07-10T15:41:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6d0a7dda-d92a-c8e2-21be-c92b0a88ac8d","last_modified":1480349197208},{"guid":"firefoxdav@icloud.com","prefs":[],"schema":1480349193877,"blockID":"i1214","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1271358","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on is causing frequent and persistent crashing.","name":"iCloud Bookmarks","created":"2016-05-17T16:55:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.4.22","minVersion":"0","targetApplication":[]}],"id":"2dddd7a7-b081-45e2-3eeb-2a7f76a1465f","last_modified":1480349197172},{"guid":"youplayer@addons.mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i660","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the YouPlayer extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"YouPlayer, versions between 79.9.8 and 208.0.1","created":"2014-07-10T15:31:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"208.0.1","minVersion":"79.9.8","targetApplication":[]}],"id":"82dca22b-b889-5d9d-3fc9-b2184851f2d1","last_modified":1480349197136},{"guid":"{df6bb2ec-333b-4267-8c4f-3f27dc8c6e07}","prefs":[],"schema":1480349193877,"blockID":"i487","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940681","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Facebook 2013 (malware)","created":"2013-11-19T14:59:45Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5867c409-b342-121e-3c3b-426e2f0ba1d4","last_modified":1480349197109},{"guid":"/^({4e988b08-8c51-45c1-8d74-73e0c8724579}|{93ec97bf-fe43-4bca-a735-5c5d6a0a40c4}|{aed63b38-7428-4003-a052-ca6834d8bad3}|{0b5130a9-cc50-4ced-99d5-cda8cc12ae48}|{C4CFC0DE-134F-4466-B2A2-FF7C59A8BFAD})$/","prefs":[],"schema":1480349193877,"blockID":"i524","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"SweetPacks","created":"2013-12-20T13:43:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1a3a26a2-cdaa-e5ba-f6ac-47b98ae2cc26","last_modified":1480349197082},{"guid":"foxyproxy@eric.h.jung","prefs":[],"schema":1480349193877,"blockID":"i950","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","who":"All users who have this add-on installed on Thunderbird 38 and above.","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above.","name":"FoxyProxy Standard for Thunderbird","created":"2015-07-15T09:34:44Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.5.5","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"38.0a2"},{"guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*","minVersion":"2.35"}]}],"id":"5ee8203d-bea2-6cd5-9ba0-d1922ffb3d21","last_modified":1480349197056},{"guid":"{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}","prefs":[],"schema":1480349193877,"blockID":"i1056","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1225639","who":"All users who have this add-on installed in Firefox 43 and above. User who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is associated with frequent shutdown crashes in Firefox.","name":"Skype Click to Call","created":"2015-11-17T14:03:05Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"7.5.0.9082","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"43.0a1"}]}],"id":"484f8386-c415-7499-a8a0-f4e16f5a142f","last_modified":1480349197027},{"guid":"{22119944-ED35-4ab1-910B-E619EA06A115}","prefs":[],"schema":1480349193877,"blockID":"i45","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=699134","who":"Users of version 7.9.20.6 of RoboForm Toolbar and earlier on Firefox 48 and above.","why":"Older versions of the RoboForm Toolbar add-on are causing crashes in Firefox 48 and above. The developer has released a fix, available in versions 7.9.21+.","name":"Roboform","created":"2011-11-19T06:14:56Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"7.9.20.6","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"8.0a1"}]}],"id":"5f7f9e13-d3e8-ea74-8341-b83e36d67d94","last_modified":1480349196995},{"guid":"{87b5a11e-3b54-42d2-9102-0a7cb1f79ebf}","prefs":[],"schema":1480349193877,"blockID":"i838","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"Cyti Web (malware)","created":"2015-02-06T14:29:12Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ba0e57c-4c0c-4eb6-26e7-c2016769c343","last_modified":1480349196965},{"guid":"/^({bf67a47c-ea97-4caf-a5e3-feeba5331231}|{24a0cfe1-f479-4b19-b627-a96bf1ea3a56})$/","prefs":[],"schema":1480349193877,"blockID":"i542","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","who":"All Firefox users who have this add-on installed.","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the Add-on Guidelines.","name":"MixiDJ (malware)","created":"2014-01-28T14:10:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fc442b64-1b5d-bebb-c486-f431b154f3db","last_modified":1480349196622},{"guid":"/^({ebd898f8-fcf6-4694-bc3b-eabc7271eeb1}|{46008e0d-47ac-4daa-a02a-5eb69044431a}|{213c8ed6-1d78-4d8f-8729-25006aa86a76}|{fa23121f-ee7c-4bd8-8c06-123d087282c5}|{19803860-b306-423c-bbb5-f60a7d82cde5})$/","prefs":[],"schema":1480349193877,"blockID":"i622","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the Add-on Guidelines.","name":"WiseConvert","created":"2014-06-18T13:48:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ffd184fa-aa8f-8a75-ff00-ce285dec5b22","last_modified":1480349196597},{"guid":"/^({fa95f577-07cb-4470-ac90-e843f5f83c52}|ffxtlbr@speedial\\.com)$/","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i696","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1031115","who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using these add-ons can enable them in the Add-ons Manager.","why":"These add-ons are silently installed and change homepage and search defaults without user consent, in violation of the Add-on Guidelines. They are also distributed under more than one add-on ID.","name":"Speedial","created":"2014-08-21T13:55:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"130c7419-f727-a2fb-3891-627bc69a43bb","last_modified":1480349196565},{"guid":"pennerdu@faceobooks.ws","prefs":[],"schema":1480349193877,"blockID":"i442","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=904050","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Console Video (malware)","created":"2013-08-13T14:00:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fb83e48e-a780-9d06-132c-9ecc65b43674","last_modified":1480349196541},{"guid":"anttoolbar@ant.com","prefs":[],"schema":1480349193877,"blockID":"i88","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748269","who":"All Firefox users who have installed version 2.4.6.4 of the Ant Video Downloader and Player add-on.","why":"Version 2.4.6.4 of the Ant Video Downloader and Player add-on is causing a very high number of crashes in Firefox. There's an updated version 2.4.6.5 that doesn't have this problem. All users are recommended to update as soon as possible.","name":"Ant Video Downloader and Player","created":"2012-05-01T10:32:11Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.4.6.4","minVersion":"2.4.6.4","targetApplication":[]}],"id":"9eef435b-39d4-2b73-0810-44b0d3ff52ad","last_modified":1480349196509},{"guid":"{E90FA778-C2B7-41D0-9FA9-3FEC1CA54D66}","prefs":[],"schema":1480349193877,"blockID":"i446","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","why":"This add-on is installed silently, in violation of our Add-on Guidelines.","name":"YouTube to MP3 Converter","created":"2013-09-06T15:59:29Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"83eb6337-a3b6-84e4-e76c-ee9200b80796","last_modified":1480349196471},{"guid":"{ad7ce998-a77b-4062-9ffb-1d0b7cb23183}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i804","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astromenda Search Addon","created":"2014-12-15T10:53:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"633f9999-c81e-bd7a-e756-de7d34feb39d","last_modified":1480349196438},{"guid":"{52b0f3db-f988-4788-b9dc-861d016f4487}","prefs":[],"schema":1480349193877,"blockID":"i584","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","why":"Versions of this add-on are silently installed by the Free Driver Scout installer, in violation of our Add-on Guidelines.","name":"Web Check (Free Driver Scout bundle)","created":"2014-05-22T11:07:00Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.1.9999999","minVersion":"0","targetApplication":[]}],"id":"cba0ac44-90f9-eabb-60b0-8da2b645e067","last_modified":1480349196363},{"guid":"dodatek@flash2.pl","prefs":[],"schema":1480349193877,"blockID":"i1279","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","who":"Any user with version 1.3 or newer of this add-on installed.","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server.","name":"Aktualizacja Flash WORK addon","created":"2016-10-27T15:52:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"1.3","targetApplication":[]}],"id":"2dab5211-f9ec-a1bf-c617-6f94f28b5ee1","last_modified":1480349196331},{"guid":"{2d069a16-fca1-4e81-81ea-5d5086dcbd0c}","prefs":[],"schema":1480349193877,"blockID":"i440","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903647","who":"All Firefox users who have this add-on installed.","why":"This add-on is installed silently and doesn't follow many other of the Add-on Guidelines. If you want to continue using this add-on, you can enable it in the Add-ons Manager.","name":"GlitterFun","created":"2013-08-09T16:26:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e3f77f3c-b1d6-3b29-730a-846007b9cb16","last_modified":1480349196294},{"guid":"xivars@aol.com","prefs":[],"schema":1480349193877,"blockID":"i501","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946420","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Video Plugin Facebook (malware)","created":"2013-12-04T15:34:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3303d201-7006-3c0d-5fd5-45503e2e690c","last_modified":1480349196247},{"guid":"2bbadf1f-a5af-499f-9642-9942fcdb7c76@f05a14cc-8842-4eee-be17-744677a917ed.com","prefs":[],"schema":1480349193877,"blockID":"i700","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052599","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is widely considered malware and is apparently installed silently into users' systems, in violation of the Add-on Guidelines.","name":"PIX Image Viewer","created":"2014-08-21T16:15:16Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1b72889b-90e6-ea58-4fe8-d48257df7d8b","last_modified":1480349196212},{"guid":"/^[0-9a-f]+@[0-9a-f]+\\.info/","prefs":[],"schema":1480349193877,"blockID":"i256","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have installed any of these add-ons.","why":"The set of extensions labeled as Codec, Codec-M, Codec-C and other names are malware being distributed as genuine add-ons.\r\n\r\nIf you think an add-on you installed was incorrectly blocked and the block dialog pointed you to this page, please comment on this blog post.","name":"Codec extensions (malware)","created":"2013-01-22T12:16:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0c654540-00f2-0ad4-c9be-7ca2ace5341e","last_modified":1480349196184},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i600","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:16:08Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.5.*","minVersion":"3.15.5","targetApplication":[]}],"id":"51c4ab3b-9ad3-c5c3-98c8-a220025fc5a3","last_modified":1480349196158},{"guid":"{729c9605-0626-4792-9584-4cbe65b243e6}","prefs":[],"schema":1480349193877,"blockID":"i788","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Browser Ext Assistance","created":"2014-11-20T10:07:19Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3c588238-2501-6a53-65ea-5c8ff0f3e51d","last_modified":1480349196123},{"guid":"unblocker20__web@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1213","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"This add-on is a copy of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker 2.0","created":"2016-05-09T17:28:18Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"de305335-e9f3-f410-cf5c-f88b7ad4b088","last_modified":1480349196088},{"guid":"webbooster@iminent.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i630","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the Add-on Guidelines.","name":"Iminent Minibar","created":"2014-06-26T15:49:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d894ea79-8215-7a0c-b0e9-be328c3afceb","last_modified":1480349196032},{"guid":"jid1-uabu5A9hduqzCw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1016","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208051","who":"All users who have this add-on installed.","why":"This add-on is injecting unwanted and unexpected advertisements into all web pages, and masking this behavior as ad-blocking in its code.","name":"SpeedFox (malware)","created":"2015-09-24T09:49:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"31397419-3dfa-9db3-f1aa-e812d4220669","last_modified":1480349196001},{"guid":"/^firefox@(jumpflip|webconnect|browsesmart|mybuzzsearch|outobox|greygray|lemurleap|divapton|secretsauce|batbrowse|whilokii|linkswift|qualitink|browsefox|kozaka|diamondata|glindorus|saltarsmart|bizzybolt|websparkle)\\.(com?|net|org|info|biz)$/","prefs":[],"schema":1480349193877,"blockID":"i548","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the Add-on Guidelines.","name":"Yontoo add-ons","created":"2014-01-30T15:06:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bfaf3510-397e-48e6-cc4f-74202aaaed54","last_modified":1480349195955},{"guid":"firefox@bandoo.com","prefs":[],"schema":1480349193877,"blockID":"i23","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629634","who":"Users of Bandoo version 5.0 for Firefox 3.6 and later.","why":"This add-on causes a high volume of Firefox crashes.","name":"Bandoo","created":"2011-03-01T23:30:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"5.0","minVersion":"5.0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1pre"}]}],"id":"bd487cf4-3f6a-f956-a6e9-842ac8deeac5","last_modified":1480349195915},{"guid":"5nc3QHFgcb@r06Ws9gvNNVRfH.com","prefs":[],"schema":1480349193877,"blockID":"i372","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=875752","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware pretending to be the Flash Player plugin.","name":"Flash Player 11 (malware)","created":"2013-06-18T13:23:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dc71fcf5-fae4-5a5f-6455-ca7bbe4202db","last_modified":1480349195887},{"guid":"/^(7tG@zEb\\.net|ru@gfK0J\\.edu)$/","prefs":[],"schema":1480349193877,"blockID":"i854","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952255","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"youtubeadblocker (malware)","created":"2015-02-09T15:41:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cfe42207-67a9-9b88-f80c-994e6bdd0c55","last_modified":1480349195851},{"guid":"{a7aae4f0-bc2e-a0dd-fb8d-68ce32c9261f}","prefs":[],"schema":1480349193877,"blockID":"i378","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=865090","who":"All Firefox users who have installed this add-on.","why":"This extension is malware that hijacks Facebook accounts for malicious purposes.","name":"Myanmar Extension for Facebook (malware)","created":"2013-06-18T15:58:54Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"30ecd9b9-4023-d9ef-812d-f1a75bb189b0","last_modified":1480349195823},{"guid":"a88a77ahjjfjakckmmabsy278djasi@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1034","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211171","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Fast Unlock (malware)","created":"2015-10-05T16:28:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f801f112-3e8f-770f-10db-384349a36026","last_modified":1480349195798},{"guid":"crossriderapp5060@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i228","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=810016","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed by other software, and it overrides user preferences and inserts advertisements in web content.","name":"Savings Sidekick","created":"2012-11-29T16:31:13Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a37f76ac-7b77-b5a3-bac8-addaacf34bae","last_modified":1480349195769},{"guid":"/^(saamazon@mybrowserbar\\.com)|(saebay@mybrowserbar\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i672","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011337","who":"All Firefox users who have these add-ons installed. Users wishing to continue using these add-ons can enable them in the Add-ons Manager.","why":"These add-ons are being silently installed, in violation of the Add-on Guidelines.","name":"Spigot Shopping Assistant","created":"2014-07-22T15:13:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e072a461-ee5a-c83d-8d4e-5686eb585a15","last_modified":1480349195347},{"guid":"{b99c8534-7800-48fa-bd71-519a46cdc7e1}","prefs":[],"schema":1480349193877,"blockID":"i596","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011325","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed, in violation with our Add-on Guidelines.","name":"BrowseMark","created":"2014-06-12T13:19:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f411bb0f-7c82-9061-4a80-cabc8ff45beb","last_modified":1480349195319},{"guid":"/^({94d62e35-4b43-494c-bf52-ba5935df36ef}|firefox@advanceelite\\.com|{bb7b7a60-f574-47c2-8a0b-4c56f2da9802})$/","prefs":[],"schema":1480349193877,"blockID":"i856","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130323","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"AdvanceElite (malware)","created":"2015-02-09T15:51:11Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e3d52650-d3e2-4cef-71f7-e6188f56fe4d","last_modified":1480349195286},{"guid":"{458fb825-2370-4973-bf66-9d7142141847}","prefs":["app.update.auto","app.update.enabled","app.update.interval","app.update.url"],"schema":1480349193877,"blockID":"i1024","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1209588","who":"All users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on hides itself in the Add-ons Manager, interrupts the Firefox update process, and reportedly causes other problems to users, in violation of the Add-on Guidelines.","name":"Web Shield","created":"2015-09-29T09:25:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"32c5baa7-d547-eaab-302d-b873c83bfe2d","last_modified":1480349195258},{"guid":"{f2456568-e603-43db-8838-ffa7c4a685c7}","prefs":[],"schema":1480349193877,"blockID":"i778","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Sup-SW","created":"2014-11-07T13:53:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"93568fa2-0cb7-4e1d-e893-d7261e81547c","last_modified":1480349195215},{"guid":"{77BEC163-D389-42c1-91A4-C758846296A5}","prefs":[],"schema":1480349193877,"blockID":"i566","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964594","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-on Manager.","why":"This add-on is silently installed into Firefox, in violation of the Add-on Guidelines.","name":"V-Bates","created":"2014-03-05T13:20:54Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"080edbac-25d6-e608-abdd-feb1ce7a9a77","last_modified":1480349195185},{"guid":"helper@vidscrab.com","prefs":[],"schema":1480349193877,"blockID":"i1077","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1231010","who":"All Firefox users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on injects remote scripts and injects unwanted content into web pages.","name":"YouTube Video Downloader (from AddonCrop)","created":"2016-01-14T14:32:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"36b2e1e0-5fda-bde3-db55-dfcbe24dfd04","last_modified":1480349195157},{"guid":"/^ext@WebexpEnhancedV1alpha[0-9]+\\.net$/","prefs":[],"schema":1480349193877,"blockID":"i535","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952717","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","why":"This add-on is generally unwanted by users and uses multiple random IDs in violation of the Add-on Guidelines.","name":"Webexp Enhanced","created":"2014-01-09T11:22:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c7d6a30d-f3ee-40fb-5256-138dd4593a61","last_modified":1480349195123},{"guid":"jid1-XLjasWL55iEE1Q@jetpack","prefs":[],"schema":1480349193877,"blockID":"i578","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002037","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that presents itself as \"Flash Player\" but is really injecting unwanted content into Facebook pages.","name":"Flash Player (malware)","created":"2014-04-28T16:25:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1e75b2f0-02fc-77a4-ad2f-52a4caff1a71","last_modified":1480349195058},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","prefs":[],"schema":1480349193877,"blockID":"i142","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=792132","who":"Todos los usuarios de Firefox que instalaron la versi\u00f3n 4.2 del complemento Cuevana Stream.\r\n\r\nAll Firefox users who have installed version 4.2 of the Cuevana Stream add-on.","why":"Espa\u00f1ol\r\nUna versi\u00f3n maliciosa del complemento Cuevana Stream (4.2) fue colocada en el sitio Cuevana y distribuida a muchos usuarios del sitio. Esta versi\u00f3n recopila informaci\u00f3n de formularios web y los env\u00eda a una direcci\u00f3n remota con fines maliciosos. Se le recomienda a todos los usuarios que instalaron esta versi\u00f3n que cambien sus contrase\u00f1as inmediatamente, y que se actualicen a la nueva versi\u00f3n segura, que es la 4.3.\r\n\r\nEnglish\r\nA malicious version of the Cuevana Stream add-on (4.2) was uploaded to the Cuevana website and distributed to many of its users. This version takes form data and sends it to a remote location with malicious intent. It is recommended that all users who installed this version to update their passwords immediately, and update to the new safe version, version 4.3.\r\n\r\n","name":"Cuevana Stream (malicious version)","created":"2012-09-18T13:37:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"4.2","minVersion":"4.2","targetApplication":[]}],"id":"91e551b9-7e94-60e2-f1bd-52f25844ab16","last_modified":1480349195007},{"guid":"{34712C68-7391-4c47-94F3-8F88D49AD632}","prefs":[],"schema":1480349193877,"blockID":"i922","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:27:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"dd350efb-34ac-2bb5-5afd-eed722dbb916","last_modified":1480349194976},{"guid":"PDVDZDW52397720@XDDWJXW57740856.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i846","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128320","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the Add-on Guidelines.","name":"Ge-Force","created":"2015-02-06T15:03:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c33e950c-c977-ed89-c86a-3be8c4be1967","last_modified":1480349194949},{"guid":"{977f3b97-5461-4346-92c8-a14c749b77c9}","prefs":[],"schema":1480349193877,"blockID":"i69","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=729356","who":"All Firefox users who have this add-on installed.","why":"This add-on adds apps to users' accounts, with full access permissions, and sends spam posts using these apps, all without any consent from users.","name":"Zuperface+","created":"2012-02-22T16:41:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f105bdc7-7ebd-587c-6344-1533249f50b3","last_modified":1480349194919},{"guid":"discoverypro@discoverypro.com","prefs":[],"schema":1480349193877,"blockID":"i582","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004231","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enabled it in the Add-ons Manager.","why":"This add-on is silently installed by the CNET installer for MP3 Rocket and probably other software packages. This is in violation of the Add-on Guidelines.","name":"Website Discovery Pro","created":"2014-04-30T16:10:03Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"34eab242-6fbc-a459-a89e-0dc1a0b8355d","last_modified":1480349194878},{"guid":"jid1-bKSXgRwy1UQeRA@jetpack","prefs":[],"schema":1480349193877,"blockID":"i680","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=979856","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into user's systems, in violation of the Add-on Guidelines.","name":"Trusted Shopper","created":"2014-08-01T16:34:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f701b790-b266-c69d-0fba-f2d189cb0f34","last_modified":1480349194851},{"guid":"bcVX5@nQm9l.org","prefs":[],"schema":1480349193877,"blockID":"i848","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128266","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"boomdeal","created":"2015-02-09T15:21:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f8d6d4e1-b9e6-07f5-2b49-192106a45d82","last_modified":1480349194799},{"guid":"aytac@abc.com","prefs":[],"schema":1480349193877,"blockID":"i504","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947341","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks users' Facebook accounts.","name":"Facebook Haber (malware)","created":"2013-12-06T12:07:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bfaf8298-dd69-165c-e1ed-ad55584abd18","last_modified":1480349194724},{"guid":"Adobe@flash.com","prefs":[],"schema":1480349193877,"blockID":"i136","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=790100","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware posing as a legitimate Adobe product.","name":"Adobe Flash (malware)","created":"2012-09-10T16:09:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"47ac744e-3176-5cb6-1d02-b460e0c7ada0","last_modified":1480349194647},{"guid":"{515b2424-5911-40bd-8a2c-bdb20286d8f5}","prefs":[],"schema":1480349193877,"blockID":"i491","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940753","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"Connect DLC","created":"2013-11-29T14:52:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6d658443-b34a-67ad-934e-cbf7cd407460","last_modified":1480349194580},{"guid":"/^({3f3cddf8-f74d-430c-bd19-d2c9147aed3d}|{515b2424-5911-40bd-8a2c-bdb20286d8f5}|{17464f93-137e-4646-a0c6-0dc13faf0113}|{d1b5aad5-d1ae-4b20-88b1-feeaeb4c1ebc}|{aad50c91-b136-49d9-8b30-0e8d3ead63d0})$/","prefs":[],"schema":1480349193877,"blockID":"i516","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947478","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and being distributed under multiple add-on IDs.","name":"Connect DLC","created":"2013-12-20T12:38:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"96f8e157-8b8b-8e2e-76cd-6850599b4370","last_modified":1480349194521},{"guid":"wxtui502n2xce9j@no14","prefs":[],"schema":1480349193877,"blockID":"i1012","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206157","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Video fix (malware)","created":"2015-09-21T13:04:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"246798ac-25fa-f4a4-258c-a71f9f6ae091","last_modified":1480349194463},{"guid":"flashX@adobe.com","prefs":[],"schema":1480349193877,"blockID":"i168","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=807052","who":"All Firefox users who have this add-on installed.","why":"This is an exploit proof-of-concept created for a conference presentation, which will probably be copied and modified for malicious purposes. \r\n","name":"Zombie Browser Pack","created":"2012-10-30T12:07:41Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d7c69812-801c-8d8e-12cb-c5171bdc48a1","last_modified":1480349194428},{"guid":"/^(ff\\-)?dodate(kKKK|XkKKK|k|kk|kkx|kR)@(firefox|flash(1)?)\\.pl|dode(ee)?k@firefoxnet\\.pl|(addon|1)@upsolutions\\.pl$/","prefs":[],"schema":1480349193877,"blockID":"i1278","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","who":"Any user with a version of this add-on installed.","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server.","name":"Aktualizacja dodatku Flash Add-on","created":"2016-10-27T10:52:53Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"389aec65-a15d-8276-c7a8-691ac283c9f1","last_modified":1480349194386},{"guid":"tmbepff@trendmicro.com","prefs":[],"schema":1480349193877,"blockID":"i1223","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"Add-on is causing a high-frequency crash in Firefox.","name":"Trend Micro BEP 9.2 to 9.2.0.1023","created":"2016-05-30T17:07:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"9.2.0.1023","minVersion":"9.2","targetApplication":[]}],"id":"46f75b67-2675-bdde-be93-7ea03475d405","last_modified":1480349194331},{"guid":"{4889ddce-7a83-45e6-afc9-1e4f1149fff4}","prefs":[],"schema":1480343836083,"blockID":"i840","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"Cyti Web (malware)","created":"2015-02-06T14:30:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"be600f35-0633-29f3-c571-819e19d85db9","last_modified":1480349193867},{"guid":"{55dce8ba-9dec-4013-937e-adbf9317d990","prefs":[],"schema":1480343836083,"blockID":"i690","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048647","who":"All Firefox users. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is being silently installed in users' systems, in violation of the Add-on Guidelines.","name":"Deal Keeper","created":"2014-08-12T16:23:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"512b0d40-a10a-5ddc-963b-b9c487eb1422","last_modified":1480349193833},{"guid":"/^new@kuot\\.pro|{13ec6687-0b15-4f01-a5a0-7a891c18e4ee}|rebeccahoppkins(ty(tr)?)?@gmail\\.com|{501815af-725e-45be-b0f2-8f36f5617afc}|{9bdb5f1f-b1e1-4a75-be31-bdcaace20a99}|{e9d93e1d-792f-4f95-b738-7adb0e853b7b}|dojadewaskurwa@gmail\\.com$/","prefs":[],"schema":1480343836083,"blockID":"i1414","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","who":"All users who have this add-on installed.","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server.","name":"Aktualizacja dodatku Flash (malware)","created":"2016-10-28T18:06:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5cebc983-bc88-d5f8-6807-bd1cbfcd82fd","last_modified":1480349193798},{"guid":"/^pink@.*\\.info$/","prefs":[],"schema":1480343836083,"blockID":"i238","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806543","who":"All Firefox users (Firefox 19 and above) who have any of these add-ons installed.","why":"This is a set of malicious add-ons that affect many users and are installed without their consent.","name":"Pink add-ons (malware)","created":"2012-12-07T13:46:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"18.0"}]}],"id":"0d964264-8bd6-b78d-3c6c-92046c7dc8d0","last_modified":1480349193764},{"guid":"{58d2a791-6199-482f-a9aa-9b725ec61362}","prefs":[],"schema":1480343836083,"blockID":"i746","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Start Page","created":"2014-10-17T16:01:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8ebbc7d0-635c-b74a-de9f-16eb5837b36a","last_modified":1480349193730},{"guid":"{94cd2cc3-083f-49ba-a218-4cda4b4829fd}","prefs":[],"schema":1480343836083,"blockID":"i590","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013678","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' profiles, in violation of the Add-on Guidelines.","name":"Value Apps","created":"2014-06-03T16:12:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"556b8d4d-d6c2-199d-9f33-8eccca07e8e7","last_modified":1480349193649},{"guid":"contentarget@maildrop.cc","prefs":[],"schema":1480343836083,"blockID":"i818","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119971","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks Facebook accounts.","name":"Astro Play (malware)","created":"2015-01-12T09:29:19Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"440e9923-027a-6089-e036-2f78937dc193","last_modified":1480349193622},{"guid":"unblocker30__web@unblocker.yt","prefs":[],"schema":1480343836083,"blockID":"i1228","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"This add-on is a copy of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker 3.0","created":"2016-06-01T15:17:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2d83e640-ef9d-f260-f5a3-a1a5c8390bfc","last_modified":1480349193595},{"guid":"noOpus@outlook.com","prefs":[],"schema":1480343836083,"blockID":"i816","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119659","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations.","name":"Full Screen (malware)","created":"2015-01-09T12:52:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b64d7cef-8b6c-2575-16bc-732fca7db377","last_modified":1480349193537},{"guid":"{c95a4e8e-816d-4655-8c79-d736da1adb6d}","prefs":[],"schema":1480343836083,"blockID":"i433","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","who":"All Firefox users who have this add-on installed.","why":"This add-on bypasses the external install opt in screen in Firefox, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Hotspot Shield","created":"2013-08-09T11:25:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b3168278-a8ae-4882-7f26-355bc362bed0","last_modified":1480349193510},{"guid":"{9802047e-5a84-4da3-b103-c55995d147d1}","prefs":[],"schema":1480343836083,"blockID":"i722","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Web Finder Pro","created":"2014-10-07T12:58:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"50097c29-26b1-bf45-ffe1-83da217eb127","last_modified":1480349193482},{"guid":"/^({bf9194c2-b86d-4ebc-9b53-1c08b6ff779e}|{61a83e16-7198-49c6-8874-3e4e8faeb4f3}|{f0af464e-5167-45cf-9cf0-66b396d1918c}|{5d9968c3-101c-4944-ba71-72d77393322d}|{01e86e69-a2f8-48a0-b068-83869bdba3d0})$/","prefs":[],"schema":1480343836083,"blockID":"i515","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by using multiple add-on IDs and making unwanted settings changes.","name":"VisualBee Toolbar","created":"2013-12-20T12:26:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"029fa6f9-2351-40b7-5443-9a66e057f199","last_modified":1480349193449},{"guid":"/^({d50bfa5f-291d-48a8-909c-5f1a77b31948}|{d54bc985-6e7b-46cd-ad72-a4a266ad879e}|{d89e5de3-5543-4363-b320-a98cf150f86a}|{f3465017-6f51-4980-84a5-7bee2f961eba}|{fae25f38-ff55-46ea-888f-03b49aaf8812})$/","prefs":[],"schema":1480343836083,"blockID":"i1137","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox.","name":"Watcher (malware)","created":"2016-03-04T17:56:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"252e18d0-85bc-7bb3-6197-5f126424c9b3","last_modified":1480349193419},{"guid":"ffxtlbr@claro.com","prefs":[],"schema":1480343836083,"blockID":"i218","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=816762","who":"All Firefox users who have installed this add-on.","why":"The Claro Toolbar is side-installed with other software, unexpectedly changing users' settings and then making it impossible for these settings to be reverted by users.","name":"Claro Toolbar","created":"2012-11-29T16:07:00Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e017a3b2-9b37-b8a0-21b0-bc412ae8a7f4","last_modified":1480349193385},{"guid":"/^(.*@(unblocker\\.yt|sparpilot\\.com))|(axtara@axtara\\.com)$/","prefs":[],"schema":1480343836083,"blockID":"i1229","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"These add-ons are copies of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker (various)","created":"2016-06-03T15:28:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c677cc5d-5b1e-8aa2-5cea-5a8dddce2ecf","last_modified":1480349193344},{"guid":"/^(j003-lqgrmgpcekslhg|SupraSavings|j003-dkqonnnthqjnkq|j003-kaggrpmirxjpzh)@jetpack$/","prefs":[],"schema":1480343836083,"blockID":"i692","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048656","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is being silently installed in users' systems, in violation of the Add-on Guidelines.","name":"SupraSavings","created":"2014-08-12T16:27:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b0d30256-4581-1489-c241-d2e85b6c38f4","last_modified":1480349193295},{"guid":"helperbar@helperbar.com","prefs":[],"schema":1480343836083,"blockID":"i258","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=817786","who":"All Firefox users who have this add-on installed. This only applies to version 1.0 of Snap.do. Version 1.1 fixed all the issues for which this block was created.","why":"This extension violates a number of our Add-on Guidelines, particularly on installation and settings handling. It also causes some stability problems in Firefox due to the way the toolbar is handled.\r\n\r\nUsers who wish to keep the add-on enabled can enable it again in the Add-ons Manager.","name":"Snap.do","created":"2013-01-28T13:52:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0","minVersion":"0","targetApplication":[]}],"id":"f1ede5b8-7757-5ec5-d8ed-1a01889154aa","last_modified":1480349193254},{"guid":"/^((support2_en@adobe14\\.com)|(XN4Xgjw7n4@yUWgc\\.com)|(C7yFVpIP@WeolS3acxgS\\.com)|(Kbeu4h0z@yNb7QAz7jrYKiiTQ3\\.com)|(aWQzX@a6z4gWdPu8FF\\.com)|(CBSoqAJLYpCbjTP90@JoV0VMywCjsm75Y0toAd\\.com)|(zZ2jWZ1H22Jb5NdELHS@o0jQVWZkY1gx1\\.com))$/","prefs":[],"schema":1480343836083,"blockID":"i326","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","who":"All users who have this add-on installed.","why":"This extension is malware, installed pretending to be the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-03-22T14:49:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3142020b-8af9-1bac-60c5-ce5ad0ff3d42","last_modified":1480349193166},{"guid":"newmoz@facebook.com","prefs":[],"schema":1480343836083,"blockID":"i576","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=997986","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook user accounts and sends spam on the user's behalf.","name":"Facebook Service Pack (malware)","created":"2014-04-22T14:34:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d85798d3-9b87-5dd9-ace2-64914b93df77","last_modified":1480349193114},{"guid":"flvto@hotger.com","prefs":[],"schema":1480343836083,"blockID":"i1211","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on reports every visited URL to a third party without disclosing it to the user.","name":"YouTube to MP3 Button","created":"2016-05-04T16:26:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a14d355f-719f-3b97-506c-083cc97cebaa","last_modified":1480349193088},{"guid":"{0F827075-B026-42F3-885D-98981EE7B1AE}","prefs":[],"schema":1480343836083,"blockID":"i334","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=862272","who":"All Firefox users who have this extension installed.","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same BrowserProtect extension that is listed on our add-ons site. That one is safe to use.","name":"Browser Protect / bProtector (malware)","created":"2013-04-16T13:25:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aad4545f-8f9d-dd53-2aa8-e8945cad6185","last_modified":1480349192987}]} \ No newline at end of file +{"data":[{"guid":"/^((premium-enhancer@ext\\.com)|(notif-rm-unlisted@ext\\.com)|(search-updater@ext\\.com)|(updt-lite-unlisted@ext\\.com)|(coldsearch@ext\\.com)|(reader@ext\\.com)|(local@ext\\.com)|(fptool@ext\\.com)|(gflash@ext\\.com)|(advplayer@ext\\.com)|(yfp@ext\\.com)|(ytbenhancer@ext\\.com)|(yoump@ext\\.com)|(floating@ext\\.com)|(ytbhelper@ext\\.com))$/","prefs":[],"schema":1556792823258,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1547311","why":"This add-on violates Mozilla\u2019s add-on policies by overriding search behavior without user consent or control.","name":"Various fake player/search add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9efe3274-2bd2-44a3-aa7f-92934581470b","last_modified":1556794746654},{"guid":"{a38141d9-ef67-4d4b-a9da-e3e4d0b7ba6a}","prefs":[],"schema":1556787949626,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1548473","why":"This add-on violates Mozilla's add-on policies by changing search behavior without users consent or control.","name":"ReStyle"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"b0ff609b-c98e-4d29-8323-61c3e064ec9c","last_modified":1556791242742},{"guid":"{0beedf0b-dc79-48bd-adff-2ed36acdb806}","prefs":[],"schema":1556787897696,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1547930","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"71475499-ca6f-4b71-8bef-2b95cf59ee30","last_modified":1556787931409},{"guid":"{c11adb01-56bc-44d6-ac05-6f364e2afe01}","prefs":[],"schema":1556787838618,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1547934","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e6371474-8681-4498-8e89-421f25fd2e12","last_modified":1556787897686},{"guid":"{a1f6fa05-26cd-4399-a97a-7996067d04b0}","prefs":[],"schema":1556739699995,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1548134","why":"This add-on violates Mozilla's add-on policies by changing search behavior without users consent or control.","name":"TC"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3659d4a2-3121-45cd-b8b6-5b2c96ebc17f","last_modified":1556787838607},{"guid":"{c65b18e1-cd3d-4773-a901-15a0753e7d81}","prefs":[],"schema":1556224830338,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1546994","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"PrincipalInterceptor"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"af62a050-b136-4d56-ab3a-af85a2510bc4","last_modified":1556224874229},{"guid":"{4bf110f8-5f50-4a35-b7fa-64228bfa2d0b}","prefs":[],"schema":1556224790813,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1547048","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"Predicate Property"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5968da82-1d7e-407e-bf93-5d2247ce55c1","last_modified":1556224830329},{"guid":"{0bd4e0af-664d-4273-a670-7cb3d0b5a4a5}","prefs":[],"schema":1556224295744,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1547046","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"ConsumerWatcher"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6a6cc6fb-dce1-49cd-b624-7b44afacf157","last_modified":1556224790803},{"guid":"{bbddf452-1a72-4a5d-a833-0416ac7fd76f}","prefs":[],"schema":1556197615318,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1546989","why":"This add-on violates Mozilla's add-on policy by executing remote code.","name":"AV Scanner (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"20c25379-aed8-4ab4-9e7f-f2d3f5d948a7","last_modified":1556206274610},{"guid":"/^((\\{1601769e-0b0d-4c43-97a7-723ce374996b\\})|(\\{d714118b-5cdd-4829-9299-1066fecc0867\\})|(\\{e8671db6-24be-4744-808c-a63fb744ccca\\}))$/","prefs":[],"schema":1556133515829,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1545834","why":"This add-on violates Mozilla\u2019s add-on policies by overriding search behavior without user consent or control.","name":"XPC and Tabs"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1b536121-fd82-4639-bc70-30d7060e42d3","last_modified":1556133806451},{"guid":"{3f5f741d-a980-4b58-8552-b1ae328841f4}","prefs":[],"schema":1556099103820,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1546480","why":"This add-on violates Mozilla's add-on policy by intentionally weakening website security and adding fraudulent content to web pages.","name":"Google Translate (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ae288e5e-78d5-4b49-8b4d-fa9f25c3baa2","last_modified":1556112119390},{"guid":"{3fab603e-3ee1-1222-a859-5f85a3441216}","prefs":[],"schema":1555527937277,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1545213","why":"This add-on violates Mozilla's add-on policy by overriding search behavior without user consent or control.","name":"Add security (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"74ad8c8b-a65a-470c-aa2f-ca14e1e8774d","last_modified":1555528639011},{"guid":"/^((\\{880cacfe-5793-4346-89ce-fbbd368d394c\\})|(\\{f0780038-50b9-11e9-9c72-4ba2d8f2ec9f\\})|(\\{22ffe411-2b0e-11e9-87f9-c329f1f9c8d2\\})|(\\{cf4bae43-026f-4e7e-a85a-952a7ca697a1\\})|(\\{17052516-09be-11e9-a008-03419f6c8bc6\\})|(\\{333fb3de-18a8-18e8-b6d3-e73213911efb\\})|(\\{aa4abac2-1ffa-12aa-bbdd-9305cb2c1254\\})|(\\{72222e70-2fd6-11e9-956b-27f7787b8d2d\\})|(\\{637212d8-3484-11e9-9812-005056b22b42\\})|(\\{4a222e60-31de-1eca-8476-37565daf6afb\\})|(\\{7fc6d222-48d5-11e9-b586-17e94c73a1b1\\})|(\\{e111c358-121b-13fa-bf23-bb57da32d184\\})|(\\{9674445c-8dff-4580-96b2-99442a7ae9af\\}))$/","prefs":[],"schema":1555525532852,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544315","why":"This add-on violates Mozilla's add-on policy by executing remote code.","name":"Various"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cbd7444f-e62a-4639-b172-845548b6d4a7","last_modified":1555527929174},{"guid":"{674fff65-6cd0-488a-9453-fb91fc3d7397}","prefs":[],"schema":1555406446874,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543924","why":"This add-on violates Mozilla\u2019s add-on policies by executing remote code.","name":"Assistant"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8aff4cb0-4d5f-4e74-8db7-b04f616c3b60","last_modified":1555503879816},{"guid":"{40cd7fd2-a3e4-43f9-9d86-0e0a70376203}","prefs":[],"schema":1555184501005,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544268","why":"This add-on maliciously injects remote code for execution.","name":"Scan Tech"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"881d3476-f18a-4560-b065-cded406783d2","last_modified":1555228377222},{"guid":"{8ee8602c-aba6-4e2a-9faa-1724c3f4f9ba}","prefs":[],"schema":1555102738661,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544205","why":"The add-on is maliciously loading remote code for execution.","name":"Service Proccesor"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"94621e2f-28a0-4b18-97c6-5f6203f5912e","last_modified":1555161086175},{"guid":"{d8b03707-e39f-4b17-8e56-56354fb14af5}","prefs":[],"schema":1555100104657,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1544103","why":"This add-on maliciously injects scripts, violating our policies.","name":"Interruptible Observer"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3a921aa8-d44a-4272-be63-0fd102577f59","last_modified":1555100575898},{"guid":"{132cb2fd-a6ae-45d2-84cf-b48d591f037d}","prefs":[],"schema":1555099951278,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543922","why":"This add-on injects remote scripts and overrides search behavior without user consent or control. It also masks as an add-on with a different purpose.","name":"Player"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"371796e4-387a-4dd0-9ddc-47ba1dd85be7","last_modified":1555100104648},{"guid":"H.264.Addon.Test@firefox.com","prefs":[],"schema":1555099832659,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543919","why":"This add-on exfiltrates user data without consent or control and may be misleading the user into believing this is an add-on by Firefox.","name":"H.264 Video Codec Fake"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"53ef1aad-7bdb-4f4e-8d46-55d6ec2d78ab","last_modified":1555099951269},{"guid":"{608f71eb-5bd6-45d8-bc93-b9e812cf17b7}","prefs":[],"schema":1555099501294,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543801","why":"This add-on maliciously injects remote scripts, violating our policies.","name":"Consumer Tech"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ea00841e-8dc2-4e11-9119-7a599e47d800","last_modified":1555099832650},{"guid":"/^((\\{8220ccaf-15a4-4f47-a670-a4119a4296a4\\})|(\\{9da72c11-44d7-423c-b19c-c75cd6188c3e\\})|(\\{99d0e4d0-c5ef-4567-b74c-80c5ed21ad99\\}))$/","prefs":[],"schema":1555011689511,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543848","why":"This add-on violates Mozilla's add-on policy by overriding search behavior without user's consent or control.","name":"Search overriding add-on"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"03554696-58fe-4b90-89d1-72b72f88f82e","last_modified":1555069748234},{"guid":"/^((\\{b37f383f-e60f-4eb1-ac0f-9147e0e8f2f7\\})|(\\{8ad567d2-3fe2-446b-bce9-a3acbe878dba\\}))$/","prefs":[],"schema":1554997740201,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543673","why":"These add-ons are overriding search behavior without user's consent or control.","name":"Hash"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"036e2e7d-5403-49be-92cf-b5187ceef7ec","last_modified":1554997910212},{"guid":"{be6ab6a9-7004-4c5c-8df9-8d36122d8b14}","prefs":[],"schema":1554997613727,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543705","why":"This add-on injects remote scripts with malicious intent.","name":"asin"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6fd3ab94-8e38-47f3-b129-3ca8396d0a22","last_modified":1554997740187},{"guid":"/^((\\{61f433aa-45fd-42a9-9c90-c1d7820661d5\\})|(\\{86cd46b6-433a-439c-bff2-722846709f44\\})|(\\{98e126a4-4e70-4300-b893-3b2cca19bc9b\\})|(\\{8f42dc3a-1c46-4fc2-8c7f-dd76a63b1cf7\\})|(\\{a24d3582-2fc2-475c-8440-335736e17c6e\\})|(\\{cf0b5280-cd08-465d-ad7d-70308538f30a\\})|(\\{936f3c79-5dc9-4694-bca8-47932de3357a\\})|(\\{e48d5888-8736-4858-83ba-e816378ffef8\\})|(\\{5305f89c-ceec-4217-8bae-c9c376c7462b\\})|(\\{a2ac47e5-d225-4718-9b57-18a932f87610\\})|(\\{79f60f07-6aee-42cd-9105-c0a52f401316\\}))$/","prefs":[],"schema":1554981266268,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543664","why":"These add-ons exfiltrate user data while masking as a legit add-on.","name":"Adobe Flash Player Fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"fc38e782-d55b-4fb7-8f9c-374aa18af09c","last_modified":1554997613713},{"guid":"/^((\\{0913599d-3094-44a7-8cc2-b8467d5afc7c\\})|(\\{7bee7f1b-d8ad-424d-807d-e69e6634988e\\}))$/","prefs":[],"schema":1554898779160,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543462","why":"This add-on violates Mozilla's policies by exfiltrating user data without their consent or control.","name":"Malware exfiltrating user data"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0d86ba71-7baa-4cb3-b3b8-da4ccdfa36b9","last_modified":1554976164809},{"guid":"/^((\\{9946bf2f-0aef-4040-bc57-cdae2bde196a\\})|(\\{d511784e-d088-4fce-b77c-14c186f08641\\})|(\\{fe59312a-97bd-4ca7-bce3-b0db95b1e251\\}))$/","prefs":[],"schema":1554897771015,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543118","why":"This add-on violates Mozilla's add-on policies by overriding search behavior without user consent or control.","name":"Invert (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ed01b7e5-73d1-42a6-9fc8-af2d83879854","last_modified":1554898652923},{"guid":"{c75432cb-980d-4e64-98c8-d7947b382a2c}","prefs":[],"schema":1554897109129,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543255","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Concrete Tech"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7fd0eb9c-9f6c-40ea-ba39-645cafb1d5a0","last_modified":1554897390260},{"guid":"/^((\\{6a99a9ec-f149-4ad3-b644-15e44290d00c\\})|(\\{cd9d1582-13dc-4ce1-9c83-4aaa31c6bc36\\})|(\\{3414a827-ee54-4331-85eb-736a824bb7e0\\}))$/","prefs":[],"schema":1554896836686,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543181","why":"This add-on violates Mozilla's add-on policies by overriding search behavior without users' consent or control.","name":"Drag (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a4f0ac78-ba85-4b5a-9d1f-f3f2c6ae4f7c","last_modified":1554897104624},{"guid":"/^((\\{4b6e66db-ee0b-4fc3-abe6-b97cb4798faf\\})|(\\{8aff5f41-86f8-40f1-896d-954eae7fb670\\}))$/","prefs":[],"schema":1554817097951,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543049","why":"Search hijacking","name":"Fit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8a7efe6b-8670-4714-b4b2-08ce5f202ee7","last_modified":1554818136441},{"guid":"{81425b21-cc8c-42d0-98e8-69844bcb7404}","prefs":[],"schema":1554811583185,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543048","why":"Remote Script Injection","name":"Tech Chip"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"dafcc63d-37e0-42e2-b439-59727cf9de48","last_modified":1554811754967},{"guid":"{d85aa6ef-639b-43a1-8560-ddeb59935d10}","prefs":[],"schema":1554803024628,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1543047","why":"Remote Script Injection","name":"BatchSerialize"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"204b7b05-d8e1-4de3-86f9-fcf95edb40c0","last_modified":1554811583171},{"guid":"/^((\\{bf163ed1-e9f9-4c98-ae4b-8391133472d1\\})|(\\{ec283482-2d66-49b2-9dc5-0d03bcbffe65\\})|(\\{0a19856e-4168-4765-a8ab-a3a34fa88ec1\\})|(\\{e2019dd1-4591-42e2-864a-535a99972b1a\\})|(\\{88a65f0c-f952-41f0-8868-f22fa12597b3\\}))$/","prefs":[],"schema":1554754247858,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540998","why":"Exfiltrating user data to a remote site while masking as a different add-on","name":"More Flash Player Clones"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ddd97fae-7040-4758-811f-1dd53116e6ab","last_modified":1554755273775},{"guid":"/^((\\{743fc0de-1085-4078-8611-848024989608\\})|(\\{02acc043-f402-4e48-aa15-56ee1364e17c\\})|(\\{1b7892ab-6dbe-49d1-9c71-bbb70458c830\\})|(\\{25b3b5bc-b77a-49d1-ab56-c0e760fe02ff\\})|(\\{2c78aa89-8cdd-4a96-821a-e35628aea2fb\\})|(\\{2f154b99-05c2-4629-b687-f2aa031d9f65\\})|(\\{36df6f78-16c4-42c2-a6b8-9210a2953739\\})|(\\{40ada62f-72a8-46b7-8e50-4153f660ce34\\})|(\\{49f58462-fc24-472c-b85a-4a3dbbf48741\\})|(\\{4a8cb3fd-0400-47b3-a799-9f2964229bfa\\})|(\\{5429f6da-d7fe-4f1b-a85e-6dc721ec0037\\})|(\\{74480b2f-1198-45b3-86b3-ca0778482216\\})|(\\{777f1169-a824-459d-8a2d-ca2ffaf59424\\})|(\\{81e610be-656a-4a71-866d-dd94b5096c60\\})|(\\{81ee3e70-b6e4-44d0-b5c2-94ded26bb5ac\\})|(\\{881c71c1-6800-4e8b-89de-0d14ef67d588\\})|(\\{9b5d7f59-be9c-4f1e-bf0c-31f085c17726\\})|(\\{9eff0ead-25a4-429c-b4b2-280ba3c6f2d9\\})|(\\{ad1b7e87-e260-4aee-a602-ef234743443e\\})|(\\{b54a530a-cacc-4c76-a7c3-feafd4ce0b13\\})|(\\{bd0d7634-770e-4d9f-8309-d264a5fbbfa9\\})|(\\{bdf16cc8-3da6-4317-a1eb-2ab8adce6b66\\})|(\\{bf484a7f-49fd-4681-afa5-8a063d010a14\\})|(\\{c7cf6d86-207b-4231-a96a-bbfdc9fe59aa\\})|(\\{d33f83c2-dbc6-41d2-a8b9-28fdaa96985e\\})|(\\{d71757ee-edc7-44d5-b536-cb0370d7d9f6\\})|(\\{daf86db4-7dd4-47d4-a1d1-7c31f6b9bbe3\\})|(\\{e27060a0-5fb5-4844-b446-d2655d7681fa\\})|(\\{fae0d133-05dd-44e6-88e1-e218ca2b2caf\\})|(\\{fbf69005-55d8-4360-a562-255a8c285fea\\})|(\\{fd6d1b53-89f5-4d91-9234-fb3e1b067c1b\\}))$/","prefs":[],"schema":1554753973658,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540998","why":"Exfiltrating user data to a remote site while masking as a different add-on","name":"Adobe Flash fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e12a97c7-2c83-4e1c-a2c3-66a653bc6048","last_modified":1554754247845},{"guid":"{ea173fdc-f27a-482a-8a0a-61fd1aa2ee2e}","prefs":[],"schema":1554744706554,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541005","why":"Masks as a legit add-on and includes a remote script that is against our policies","name":"InterpreterInvocation"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8742ec6a-2e51-4e94-bc6a-653dac08521b","last_modified":1554753973644},{"guid":"{16768af9-4120-4566-95cf-c4234effa084}","prefs":[],"schema":1554733900697,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540999","why":"This add-on changes the search settings in a way that is not allowed per our policies","name":"Unknown search hijacking add-on"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3fb0ed8e-6e5d-489e-8c9d-b6f48705a742","last_modified":1554736392840},{"guid":"{35b9640e-ebbb-44b7-85af-d9ec3af3c6a6}","prefs":[],"schema":1554730607333,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540690","why":"Malicious remote script injection","name":"Patagonia Bit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0eb3a151-ca6b-4dbb-81b3-c10635660c84","last_modified":1554733900683},{"guid":"{d574e1f8-537d-4b6c-97bb-9f7a138f4d67}","prefs":[],"schema":1554728269766,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540686","why":"Injects remote scripts and masks as a different add-on","name":"DistributedConsumer"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a158055b-3387-4961-a4a3-a820d9299e15","last_modified":1554730607318},{"guid":"one-search@mozzilla.xpi","prefs":[],"schema":1554666099983,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1542208","why":"The add-on violates Mozilla's add-on policies by overriding search behavior without user consent or control.","name":"One Search"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1344c583-9593-412f-a565-c6cc96a07c28","last_modified":1554718843138},{"guid":"/^((\\{00b4b65b-79d9-4e92-bc1e-2b926918b91c\\})|(\\{0cb66591-e935-47e4-95c2-3063786f6555\\})|(\\{6cf25884-f86d-4a4e-a924-d95282ce5b71\\})|(\\{22cce9c6-a1de-457f-8938-c981b976b6f4\\})|(\\{89d99d4c-e7c4-4601-91a8-216e597a826b\\})|(\\{998d3ac7-b475-410e-ad3d-2eeb526c1853\\})|(\\{9423e8df-6200-45c0-877a-479c46e91b30\\})|(\\{64937e0b-6e00-4d5f-bf19-190d6614aae2\\})|(\\{91507dc4-c005-4534-80af-d8fbdeac29ed\\})|(\\{a2247e60-7b89-4857-a2fa-0eaee1cad460\\})|(\\{c9c28751-5865-449f-8e45-b3363edf9fb7\\})|(\\{cdfd004f-cddc-4ad7-8e2d-a58457e42b1f\\})|(\\{d3e7f35d-7d9f-4d38-9a2b-1581f6b3e870\\})|(\\{df574ffe-cce0-42db-857b-627cb164a4d4\\})|(\\{e06afe6e-ed52-40f8-82bf-d070a37387fb\\})|(\\{e7e7fb96-cfab-4a5b-85fe-20f621e1bc2e\\})|(\\{e12e5afd-bd1e-43c6-9288-321dc485cb1c\\})|(\\{e92d8545-0396-4808-96de-830c61c0d1b3\\})|(\\{e883b012-1987-4f37-8053-02e59e20c242\\})|(\\{ed3386c6-76c6-4786-a37b-9816d5f2a260\\}))$/","prefs":[],"schema":1554462951082,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541662","why":"These add-ons violate Mozilla's add-on policies by overriding search preferences without user control or consent.","name":"Search overriding malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a1c376fe-20c5-4da3-9126-3fe95b874dce","last_modified":1554463075420},{"guid":"sourcegraph-for-firefox@sourcegraph.com","prefs":[],"schema":1554375072708,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541010","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Sourcegraph for Firefox"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"19.4.2.1038","minVersion":"0"}],"id":"9fde5729-9be6-4955-9627-67742c5ed62a","last_modified":1554395912709},{"guid":"/^((\\{6ab41e83-2a91-4c2a-babb-86107a1d1f75\\})|(\\{d84a9d0d-7a31-459e-b45a-2ad111884d1f\\}))$/","prefs":[],"schema":1554293659259,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1541405","why":"This add-on violates Mozilla's add-on policies by overriding search settings without user control or notice.","name":"PopWin (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"04b2954e-4f83-4557-968e-2139a277bf1c","last_modified":1554301860877},{"guid":"/^((@searchlock-staging-automation)|(@searchlock-automation)|(@searchlock-fx)|(@searchlock-staging)|(jid1-vRJA7N8VwBoiXw@jetpack))$/","prefs":[],"schema":1554293340413,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540868","why":"This add-on violates Mozilla's add-on policies by executing remote code and overriding search preferences.","name":"SearchLock"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aacb25e1-71c5-4bee-ad16-e39e732210ba","last_modified":1554293606641},{"guid":"{03dfffe0-509f-11e9-aa00-e7e13d49f3de}","prefs":[],"schema":1554290590697,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540113","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Addon (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9c75fe89-7011-47ad-b213-57f5a81a4c89","last_modified":1554290693618},{"guid":"{e555c358-121b-13fa-bf23-bb57da32d184}","prefs":[],"schema":1554290541557,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540111","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Security (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1809ea7a-8155-4ae7-8c83-ee7c749d30f5","last_modified":1554290590689},{"guid":"{a9c33302-4c97-11e9-9a9d-af400df725e1}","prefs":[],"schema":1554147700324,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539514","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Security (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5b4e4e75-cc96-4ca9-aa9f-6a2d2f6cd96a","last_modified":1554290541548},{"guid":"{a3f765c3-8dde-4467-ad6e-fd70c3333e50}","prefs":[],"schema":1554119395186,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538143","why":"Remote script injection","name":"Angelic Bit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"93dc42cc-4ff3-460d-a8f2-12f1d947b530","last_modified":1554119427564},{"guid":"{91f77263-866e-4acb-a569-f66ac47889f8}","prefs":[],"schema":1553974898434,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539226","why":"Remote script injection","name":"Bit Apex"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c528f48a-9b2c-48ca-8b4a-eac442cc0bd0","last_modified":1554119395177},{"guid":"{2256fabf-19f1-4e12-9951-5d126dd9e928}","prefs":[],"schema":1553899022464,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540086","why":"Search hijacking","name":"Twit"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7c705f73-9d1d-4ee9-ad11-347d18729adb","last_modified":1553900528324},{"guid":"/^((\\{00f77164-eca9-4353-916d-8ea493a54c8d\\})|(\\{0716b2a5-8181-45b8-b675-915e38903761\\})|(\\{26124967-7e32-4577-b998-7296c68d3eb9\\})|(\\{273052bc-fc67-4fc1-a6fd-e62acc3ddad1\\})|(\\{4b5f53ac-36ac-4018-80cb-f1106f60ef96\\})|(\\{61065f61-51aa-462c-aca0-f1addbfa202b\\})|(\\{63383006-d617-4a00-9ca7-30a6864782ee\\})|(\\{7629c987-59ea-4e2f-bcde-b55646ecd268\\})|(\\{78e8c8fa-32ce-432b-9a40-b615bff7cd96\\})|(\\{8e9c05df-e0f5-479f-abb9-858650cb471e\\})|(\\{947f1ac0-09f2-4016-a345-dad0d2ee8f57\\})|(\\{9b9f8124-47bc-4699-8557-45573995b0af\\})|(\\{ab159932-d1dd-4d16-9332-8302a01e0ced\\})|(\\{b7340504-f6ba-43cb-8bd6-5ead88d29898\\})|(\\{bcb9265f-20fd-4311-a33f-212c2d08043a\\})|(\\{f8701822-2814-4d5d-af01-cf7fde4fd510\\}))$/","prefs":[],"schema":1553898687988,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539910","why":"Data exfiltration, is not actually a flash player","name":"Adobe Flash Player fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"64fc6369-b504-4920-abab-f2cf3cc5424a","last_modified":1553899022456},{"guid":"/^((\\{7dd03112-82a0-4c82-9957-117dedaac14a\\})|(\\{59fd3cac-1a4d-4f0f-a129-c241b203eb51\\}))$/","prefs":[],"schema":1553897736388,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540287","why":"Search hijacking","name":"Song"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"b32b14f5-0024-48fb-a4b6-1496add1dac0","last_modified":1553898687980},{"guid":"/^((\\{70c2cef0-6cc6-41b8-ad6b-bbd11182a101\\})|(\\{a0366612-376e-47e3-b5fa-b805c7176088\\}))$/","prefs":[],"schema":1553810805293,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1540055","why":"Search hijacking, masking as legit add-on","name":"Pix"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d78262b0-ecfc-475e-9759-f7319451cb43","last_modified":1553847044919},{"guid":"/^((\\{10f1b84d-79ca-41d0-97f6-abb53cec0765\\})|(\\{7891c029-0071-4534-b7f0-7288f14ee0ad\\}))$/","prefs":[],"schema":1553810612956,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538476","why":"Remote script injection, search hijacking","name":"FX"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"50197dbd-71bc-492f-a0f1-6658ec454df4","last_modified":1553810696456},{"guid":"/^((\\{058769c7-784e-47a9-a2c4-dfd81bbf6c8c\\})|(\\{2a58598a-f951-4fb0-af2b-12fb7482bf33\\}))$/","prefs":[],"schema":1553810234714,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539910","why":"Keylogger","name":"Fake adobe flash player"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e1355888-e1cd-4d21-9652-c3000662ed88","last_modified":1553810612947},{"guid":"/^((\\{54c7e57f-8ef0-48d5-92a0-6e95d193a12c\\})|(\\{32d262da-e3cd-4300-aa0b-c284eb4e17bf\\}))$/","prefs":[],"schema":1553802101395,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538536","why":"Search hijacking, masking as legit add-on","name":"TxP"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"fa6c7cdb-e477-4478-8dd4-3e1106be6aa3","last_modified":1553810234705},{"guid":"/^((\\{36261798-4c2a-4206-89cc-6c28932b2e98\\})|(\\{b2b9bb64-78d5-43ca-b0cf-a9ee8460521b\\}))$/","prefs":[],"schema":1553616425198,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538234","why":"Clone of Feedbro with added remote scripts and search hijacking","name":"Feedbro Fake"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e00b2639-8a4f-427a-80d8-7c4937c58f31","last_modified":1553620435398},{"guid":"new-tab-search@mozzilla.xpi","prefs":[],"schema":1553616311575,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538500","why":"Search hijacking","name":"New Tab Search"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a4dca16a-9fa1-4b55-899c-0f8d5eda1a57","last_modified":1553616386570},{"guid":"{a9c33302-4c97-11e9-9a9d-af400df725e3}","prefs":[],"schema":1553616259023,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538141","why":"remote code execution","name":"Fake Security add-on"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0c09f067-6e5f-4ee0-9040-08b4297ebe02","last_modified":1553616311567},{"guid":"{7ab5c514-4ebe-22e9-a925-9b7c7317c373}","prefs":[],"schema":1553548654429,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538266","why":"remote code injection","name":"Eval"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a1f04f09-f4d5-4875-b4b1-a2c772178e8e","last_modified":1553616158755},{"guid":"{bc919484-f20e-48e2-a7c8-6642e111abce}","prefs":[],"schema":1553519202849,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538962","why":"Inserting monetization iframes and masking as a legit add-on. Contains patterns for known malicious add-ons.","name":"Pinterest Save Button clone"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7abbecfb-5512-47d1-ba9b-96d6a61b85ee","last_modified":1553548325261},{"guid":"/^((\\{157cd8f9-48f0-43a1-9bcf-c4316753e087\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e086\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e088\\}))$/","prefs":[],"schema":1553186907495,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1537895","why":"This add-on violates Mozilla's add-on policies by overriding search settings.","name":"SD App (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e263fbec-7155-442f-aa82-cdf218f9e3d7","last_modified":1553193746700},{"guid":"/^((\\{1c94bc8a-3ac1-12e1-aae7-0b314772229c\\})|(\\{8a22255c-4737-11e9-a86b-0bb66337cb31\\})|(\\{3fab603e-3ee1-1222-a859-5f85a3441216\\}))$/","prefs":[],"schema":1553166786114,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535655","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"'Security' add-ons (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6cf1b676-f0b8-4fea-8a5f-64957650dc2e","last_modified":1553172061896},{"guid":"{28ac81f1-b04d-448f-94be-1b8cc8fbd58d}","prefs":[],"schema":1553079961735,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1536513","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"UtilsBridge (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f60b3eec-b8b8-4bd7-8d2b-3f7912c3451f","last_modified":1553080348264},{"guid":"/^((\\{9332d73d-7991-46bf-8b67-6db1a21f0167\\})|(\\{b33715d3-eff8-4186-a252-0af5094b8644\\})|(\\{eb7aff78-6145-4a31-a7f5-f3c353ddb312\\})|(\\{6c5cd693-2919-4458-b776-2ac5b6ab1cb0\\})|(\\{daacefee-aaba-4f10-8d4d-059904d8a153\\})|(\\{94d8d504-838c-4392-9971-cd2f6e21ca21\\})|(\\{6574bb31-c971-454f-b08c-a75bfee00855\\})|(\\{1688ecb0-e382-481f-8c70-541d70bdd2e9\\})|(\\{f7b9f777-7b01-4f73-8eb8-f2ad85d4da1c\\})|(\\{598d7ac6-1789-4573-ae6a-5798ed7f6d83\\})|(\\{c0eb4d03-d18e-40bf-b21b-8237ee1bed76\\})|(\\{d0513185-1f20-4045-a232-f3a4252af379\\})|(\\{9ae8269f-eea1-4097-87fd-b7d2f102184d\\})|(\\{5683f95b-2517-4ca7-9d19-83d7f309b62a\\})|(\\{013d3691-0dd6-471b-bf0d-2750d7406a22\\})|(\\{ae73a262-1a27-4d1d-9be7-4b41a84dfd23\\})|(\\{1d92fc5d-5353-401f-8c5f-373b3b6dae67\\})|(\\{e8a81b54-3728-4a9c-8c63-18ef803ef9be\\})|(\\{d604961b-3a3d-4f60-87ae-35977c10b787\\})|(\\{cbe9b620-fac0-407a-b3be-b0a61b319ef8\\})|(\\{1cdb403e-11c7-421b-9c87-0c0d90263626\\})|(\\{f5fa0bfe-a981-48ff-b809-8faa3126f0bc\\})|(\\{7dc6d0d2-b2f0-4334-979d-6ebeff77785a\\})|(\\{13623b47-de82-4226-85f8-d3ae343e619b\\})|(\\{db7b6ea7-2605-44c7-807b-2419d7eec531\\})|(\\{b9298a4a-acca-446d-aa72-d37f5e1576cd\\})|(\\{2e689bc0-735f-445c-bcc7-2cc495f5eb40\\})|(\\{04acd977-4c2b-4162-af33-8c585bea90c5\\})|(\\{2436dde0-3230-4933-9020-c15b3b9e693b\\})|(\\{dcb556aa-ef6e-4778-9f60-c5ae18a72cfb\\})|(\\{5a24385f-ada4-455d-95ad-62cb6256360d\\})|(\\{97f88a13-5b79-4345-a85e-2560d54f577c\\})|(\\{12f4cde8-7d1c-4a9e-9ef7-431f5ecd53a4\\})|(\\{18a93813-7deb-40cf-b3a6-402369e6d817\\})|(\\{9cee5c92-eb1e-4892-86ff-d2d1c627f5b9\\})|(\\{cb1c544e-d444-4c85-8224-64aa26e82230\\})|(\\{1c3b247f-2ef4-4483-93a6-0a3da7bc3548\\})|(\\{1f6913f2-dead-4f96-bf96-0e64affd46ae\\})|(\\{109adc7d-f308-43a5-aa0e-07ccdc5dad2c\\})|(\\{7170e23c-c706-48a7-919f-c1c22548dbfb\\})|(\\{6aa47f05-1f3f-4798-908a-0ed01b2361e0\\})|(\\{33ef0e7b-15ea-4b08-a779-173731ac20b3\\})|(\\{a0361564-9461-4da0-8ec0-7dc6f418f707\\})|(\\{c12631ed-993a-4c2e-9bf0-37867ae40491\\})|(\\{00b79649-3f0e-4b12-a8f0-376a7b2db716\\})|(\\{89096e44-c8b4-4ce5-aad2-f5bac765f608\\})|(\\{6f4eff89-0e32-42bd-a5c1-354adc8417fd\\})|(\\{482c54ae-e080-4596-bf7c-ae972fdff9a3\\})|(\\{04868575-532f-4b43-9325-7e707c109c25\\})|(\\{042c3065-1291-4409-bae5-8d11f3c268e2\\})|(\\{126e7fc4-bf2d-4467-88b1-f3b17bc10da4\\})|(\\{cea21739-b9ce-46c7-ad3e-3607b1ff6538\\})|(\\{06eea1e7-a8be-4794-8cd5-ed12e5f86161\\})|(\\{50993bc5-011c-4322-b522-41e6f3997163\\})|(\\{219a2146-5d9b-472a-8630-4c96a0994bec\\})|(\\{1db94c2f-d957-4b12-a1dc-903bb28f5ff5\\})|(\\{2f7d887c-7d56-41fa-bf9b-eadf6e500427\\})|(\\{2b16f4ab-a2a9-43fd-8fd6-ad6f354b0d28\\})|(\\{034d2b14-29e6-42ad-b2db-2c31286f3fb7\\})|(\\{77058195-5ae1-440c-8f86-c60a96d12ca9\\})|(\\{8082ff2f-2151-4281-8134-1423e5961ca1\\})|(\\{9fa797e8-d7d4-4851-b7e9-76b61ecf046f\\})|(\\{87178fbe-17a5-4d8d-b5ed-48d17179b101\\})|(\\{f010d9e9-0878-4c83-af45-df966cbe8d26\\})|(\\{2aa8c5cd-18fa-4991-b354-d6f459efeca9\\})|(\\{4021839d-3f4a-4866-94fb-9fa809c5245b\\}))$/","prefs":[],"schema":1553024292304,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535088","why":"This add-on violates Mozilla's add-on policies by exfiltration user data and tracking online activities.","name":"Search overriding malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"478d4acd-3c01-4dd5-b784-4e06b69d1c05","last_modified":1553079818962},{"guid":"{781b89d4-fa53-45a1-bea4-151dd4c8b288}","prefs":[],"schema":1553013598703,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535280","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Drop Tech (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"81759002-967e-4856-9f55-61d7c30cdb3b","last_modified":1553013656506},{"guid":"{3b52063a-0683-4de2-b6e1-6192c78b6ba3}","prefs":[],"schema":1553013551744,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1536042","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Project Tech (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6a7f932a-3911-4884-8cb9-d282d282c0cc","last_modified":1553013598695},{"guid":"{47610aad-982f-4822-93ca-8c27dc96a13b}","prefs":[],"schema":1552938092086,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534773","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Tech Hand (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"12874e4d-28b5-4e98-8c33-b6cf5eb032bf","last_modified":1553013551736},{"guid":"amqp-dwn-all-vd@artur.brown","prefs":[],"schema":1552916969263,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1536052","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Video Downloader Plus (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a3f5ce2f-d8ef-4dae-9fce-1d7fb69d2b37","last_modified":1552917123606},{"guid":"/^((\\{1d758385-fddd-478e-85a0-13eef59f60e5\\})|(\\{1ec3e92a-fd3c-4e16-82e2-56d44bd7bdf4\\})|(\\{3dadda0d-d67c-4452-9475-246c33198192\\})|(\\{4a48f6a8-c9d6-4ae2-8513-a7e9fe785a56\\})|(\\{4d2da172-b160-42b5-9fea-0ede63e0ab52\\})|(\\{5bcd4feb-ce52-4e6f-9da6-eef2a75a4f70\\})|(\\{5eb45d74-0f46-4269-bc0e-8a2a49d64267\\})|(\\{7e8c27c0-b94c-4026-8068-2d152143f073\\})|(\\{9ede19b2-bb97-4d1c-abab-b1d72e7d4c74\\})|(\\{19abb7a0-fb4d-41ff-97d4-65f1680c1348\\})|(\\{25efbdeb-04fa-4998-a9f8-99c1293c7b7f\\})|(\\{0049a401-f02d-4d16-8b5e-5933e5855a4c\\})|(\\{65b91ca5-cd06-42a6-9637-8ecde3a69fd6\\})|(\\{146ec14e-f623-4cb2-88ed-7d3bb8101090\\})|(\\{790d2797-82f3-4bc3-8759-c00d426bbf2f\\})|(\\{865f42b5-e073-4a36-84b1-47d09096b48b\\})|(\\{90055a5b-45a8-45c1-b0a0-979ab2a9064f\\})|(\\{a4f5c163-7b64-46c4-bfd3-348ecc99873a\\})|(\\{a8c40ee7-a376-417b-8022-40909a10181b\\})|(\\{a1031346-14d3-464f-9e50-c30dfd88ad92\\})|(\\{abd16535-2fa8-4bfd-b84e-ed09c9c60e53\\})|(\\{b5ee8c58-b5e5-4ba0-a899-9a54a2f0e386\\})|(\\{b246bb42-577e-4587-adf2-7274b378b0b4\\})|(\\{bb43765b-fe06-4d50-9802-0c6742b220aa\\})|(\\{bf3f628d-9e52-4727-b940-054c65a5a304\\})|(\\{c6bc710d-8cc8-4224-9287-44ecfa452a81\\})|(\\{c232edce-83c9-4184-9782-22df800f65e2\\})|(\\{c5397be4-b756-45b8-a247-339846fada52\\})|(\\{c6675bc5-f7ea-4a11-8252-1152d3783ae3\\})|(\\{cc6a088b-5a84-4e48-8de8-d2f6be3abae7\\})|(\\{e6c12219-f67e-4ea0-a9c3-2c541febeff1\\})|(\\{eb3a7ef7-a4d0-49a4-8b21-2a91c1758100\\})|(\\{ec34588b-86b4-4de3-a3bf-f4d1d8386475\\})|(\\{f4fd8825-648f-4b63-a499-3fd702d42149\\})|(\\{fc4f31f6-c5ed-4afd-8c19-df96e107ce7d\\})|(\\{fe337ef5-bb69-44bf-82a8-ee5c13406165\\})|(\\{ff285a1c-5672-44c3-890e-6c4f25976b83\\}))$/","prefs":[],"schema":1552908996320,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535421","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"25f18cc5-6ecc-419f-b093-b79e9f261062","last_modified":1552916969252},{"guid":"{a4491aab-e273-4bc3-b45e-a7b9b9414a5f}","prefs":[],"schema":1552695264438,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534792","why":"Search takeover not according to policies, masking as a different add-on","name":"FFCop"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d2da9c45-59f8-4257-9d7e-07c4fa5de958","last_modified":1552695747900},{"guid":"/^((\\{0f6b717d-1625-4434-b770-5ae33eb64b16\\})|(\\{6d092be7-0bad-46af-9489-04e4b3988644\\})|(\\{7f6049d6-e8b0-4c42-8028-204d1458ddb6\\})|(\\{12b75028-c038-40bd-be5b-2809b7d18d78\\})|(\\{46f35a01-faaf-4fab-95e6-7dfc8b6d8b73\\})|(\\{55d2c6f7-62fa-4091-988b-7f4c4b3c1bff\\})|(\\{75aeaeec-d415-404d-84ba-bd70bcc5e70c\\})|(\\{76b8cf24-227d-4e2b-af4c-39ec5b47babf\\})|(\\{77b725cc-5d0e-4b82-88f0-ec6961acd697\\})|(\\{90fc8426-06ba-43ab-8110-7478ff86f531\\})|(\\{90fc8426-06ba-43ab-8110-7478ff86f539\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e084\\})|(\\{157cd8f9-48f0-43a1-9bcf-c4316753e085\\})|(\\{201ec7f7-57b1-48dd-945c-b1ea7489195d\\})|(\\{280fc0f5-6dfb-4a3c-92ae-acb2d5352175\\})|(\\{388f6d65-4a1b-43ac-b791-387882c30599\\})|(\\{0575cabd-38f3-4964-bdc3-0141a2f062e9\\})|(\\{927e4189-4f56-437e-a0d4-5e232612b5c7\\})|(\\{7277d7cf-c598-420b-ab6e-ab066e1e2fdd\\})|(\\{67775ec2-c879-438b-9409-89fba7ffc684\\})|(\\{397386d2-bb76-4b69-8121-86fad15c5216\\})|(\\{bd7f03dc-b362-4744-b118-43ab916205f9\\})|(\\{c133fb29-c967-4aec-953a-4974e8cbdb26\\})|(\\{cc94c8a7-efa3-435c-91fe-ca305f70e39d\\})|(\\{cfd2ff68-6579-4448-8a26-561bdb63877c\\})|(\\{d00f0050-a66c-49fc-9236-1498d4d29f67\\})|(\\{daa287a2-5916-413e-9b61-52c00b5aa061\\})|(\\{dcfac76f-2fd2-4477-9a60-22d167cabcb4\\})|(\\{dd1bbcf4-bff3-4f15-8a2c-3d52ce987f70\\})|(\\{ddb546b5-6490-4af5-8813-8e701bc06e26\\})|(\\{ead6848b-4bd6-4f9a-93bd-b8460c6f6973\\})|(\\{eb8f7a97-ffb0-40f1-9321-5ab1de884f1c\\})|(\\{ec3e8a3d-df39-4f84-ab31-dae369a225e4\\})|(\\{ef986f55-2dc9-4e39-8c87-618cf4fe5e69\\})|(\\{f8b4b601-7917-40c1-94ec-8efbbf125a46\\})|(\\{f8bc456c-0fb4-4d5d-a85f-dfeb25459e76\\})|(\\{f0458469-cc09-407e-a891-be8606553341\\})|(\\{fa73622c-8b41-45b8-9d93-6d66e7633765\\})|(@loveroms)|(loveroms-ash1280@jetpack)|(searchdimension@gmail\\.com))$/","prefs":[],"schema":1552655172725,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535402","why":" This add-on violates Mozilla add-on policies by including abusive search behavior.","name":"Add-ons including abusive search behavior"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f9cd41dd-9e52-4506-bb58-a31e189f4ab9","last_modified":1552655392045},{"guid":"{b6f5f2d0-1aa3-4e43-b536-6db1b1bf7d1c}","prefs":[],"schema":1552592498693,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535601","why":"This add-on violates Mozilla's add-on policies by exfiltrating user data.","name":"FFcanu (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5b807d5f-a192-450a-a0b3-98113c4beff1","last_modified":1552655172717},{"guid":"{e19fed8c-637a-42e3-b62a-3a6c4040ded8}","prefs":[],"schema":1552570939014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535345","why":"This add-on violates Mozilla's add-policies by executing remote code.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5027a1c1-e050-434f-ba77-56417bc2d7cf","last_modified":1552589019976},{"guid":"{fb62e856-f09b-4cbc-ba07-642ab55f6cb4}","prefs":[],"schema":1552567880022,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534781","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"EncDNA module (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ce66baec-1237-481c-87db-ccc1bcf0359d","last_modified":1552567941331},{"guid":"{54fc344c-e8ba-462a-a6d9-9ce1b794ce46}","prefs":[],"schema":1552567837850,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534817","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"4bec4aaf-dd5b-4754-bd01-461fdc7ea5ca","last_modified":1552567880014},{"guid":"{7b6def45-d585-431a-a479-5bb2badf2506}","prefs":[],"schema":1552567781490,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1535055","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"PredicitionR (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"e9227d28-b627-48b8-8392-e9fb5a00d9b6","last_modified":1552567837842},{"guid":"{6fb28b6b-abf2-4937-af28-340851faa971}","prefs":[],"schema":1552567721181,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534769","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"metamedian (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ed853ce8-83e0-42b7-8d93-7f48041d4987","last_modified":1552567781482},{"guid":"{ae5b30dd-b29d-4ae6-844b-5d7bfc3d7915}","prefs":[],"schema":1552567676370,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534807","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"Crypto Valuator (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3cfd9af5-a7d0-49d3-971b-7af5e2eab78f","last_modified":1552567721173},{"guid":"web-private@ext.com","prefs":[],"schema":1552567616148,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534828","why":"This add-on violates Mozilla's add-on policies by overriding search preferences.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3d52fe32-71e5-47bd-8eda-d98fa0c489e9","last_modified":1552567676362},{"guid":"/^((ads@firefox\\.pl)|(adsfinland@firefox\\.pl)|(adsfrance@firefox\\.pl)|(dodateknowy@o2\\.pl)|(dodateksuper1@firefox\\.pl)|(dodateksuper2@firefox\\.pl)|(dodateksuper3@firefox\\.pl)|(dodateksuper5@firefox\\.pl)|(dodateksuper6@firefox\\.pl)|(dodateksuper@firefox\\.pl)|(test_b@iext\\.pro)|(\\{697be03c-cdd2-430e-b6cf-0f9b5f0556ee\\})|(\\{c9ced03f-a5cf-4dbf-b5ba-67673e442590\\})|(\\{cbe59f66-a23a-45c1-81ac-d0cbedf9ea4e\\})|(\\{dbf0a186-d41c-40ae-8841-e9d8a6b49d8d\\}))$/","prefs":[],"schema":1552493457658,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534940","why":"This add-on violates Mozilla's add-on policies by using a deceiving name and exfiltrating user data.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"67025e3b-860c-4680-949f-ec472cd72fae","last_modified":1552567437766},{"guid":"/^((\\{86c18738-11ed-4c16-af92-786aa036c83c\\})|(\\{d0fee16a-f4eb-4dc1-9961-82b913e5943d\\})|(\\{1c4937a1-c678-4607-8665-a16384ee302e\\})|(\\{22caeb02-38a3-415d-b168-64fadccbb4a4\\})|(\\{1c9372e7-5f0e-4541-99cf-dfbf2ab00b01\\})|(\\{9fe66994-8ed1-4317-a20a-1d0544ca062f\\})|(\\{6df222d8-97c7-42bf-9683-1cf8119c1e9e\\})|(\\{4c2dda03-bad0-4160-a8a1-6d089200420e\\})|(\\{7aae7d4f-55b9-42eb-b683-932591265e17\\})|(\\{e6f8ab99-3c96-410c-95d1-267ad48ed3e2\\})|(\\{6d8c5068-d0cb-47a5-af5e-3f23064f4608\\})|(\\{90481f38-d06a-465e-a54c-206bbb1ee9ae\\})|(\\{4b75aeb8-f14a-4ef3-b1ad-09733b40dac3\\})|(\\{3a8ca495-f5ab-4320-b070-4f44266fe3d1\\})|(\\{84f8914f-0dec-48ed-a0fd-4a7712c06793\\})|(\\{aa613fce-603c-41df-bf49-9b09614cebe6\\})|(\\{30314350-199a-4951-9c05-c3537a946492\\})|(\\{a2edce1d-10ab-483d-8c01-5e5fe0c82902\\})|(\\{ec91a3d4-8311-4700-aa15-b3941f21a052\\})|(\\{e9049687-164a-4cf3-be1f-1291cfb0f44a\\})|(\\{2be73925-ebaf-43ca-8b26-bd820887f591\\})|(\\{840eadea-1c68-411f-b4e9-08d9f236385d\\})|(\\{0a89d040-5fb1-46d7-bf81-43b55e83695d\\})|(\\{6a1e76ed-4ac2-4a0c-8beb-43ae63558b36\\})|(\\{1b90c930-e7d7-486a-9085-8b57129489c7\\})|(\\{eab649ca-af76-4de9-95b0-8036e35a66cc\\})|(\\{0628e652-98f4-4e58-9ecb-ad996b061aef\\})|(elfr@geckoaddon\\.org)|(else@geckoaddon\\.org)|(fr_b@iext\\.pro)|(it_b@iext\\.pro)|(sv_b@iext\\.pro)|(no_b1@iext\\.pro)|(fi_b@iext\\.pro)|(au_b@iext\\.pro)|(elfr12@geckoaddon\\.org)|(test@informations\\.to)|(se_pop@informations\\.to)|(it@spongebog\\.funny-ok\\.com)|(it@tsunami\\.funny-ok\\.com)|(fi@spongebog\\.funny-ok\\.com)|(fi@tsunami\\.funny-ok\\.com)|(no@spongebog\\.funny-ok\\.com)|(no@tsunami\\.funny-ok\\.com)|(fr@tsunami\\.funny-ok\\.com)|(fr@spongebog\\.funny-ok\\.com)|(se@tsunami\\.funny-ok\\.com)|(se@spongebog\\.funny-ok\\.com)|(au@spongebog\\.funny-ok\\.com)|(au@tsunami\\.funny-ok\\.com)|(nz@spongebog\\.funny-ok\\.com)|(nz@tsunami\\.funny-ok\\.com)|(gr@spongebog\\.funny-ok\\.com)|(gr@tsunami\\.funny-ok\\.com)|(nz_fnew@tsunami\\.funny-ok\\.com))$/","prefs":[],"schema":1552320039514,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1534103","why":"Stealing cookies, browsing history and other information","name":"Rogue Updater add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"b57d9505-21bf-4a24-accb-05ceac50dadc","last_modified":1552323475989},{"guid":"{c04d9d7d-1c8c-4eab-a51a-828c47e1b8b7}","prefs":[],"schema":1552246898392,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1533780","why":"This add-on violates Mozilla's add-on policies by executing remote code.","name":"asin (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2c739daa-ffee-48d9-a825-e53c8fd2bb3c","last_modified":1552300402314},{"guid":"/^((\\{ee2d725e-9726-43ac-8040-60ce9ff2831b\\})|(\\{55417a80-e6f7-4d77-8d73-f59045e5e890\\}))$/","prefs":[],"schema":1551728497880,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1532269","why":"This add-on violates Mozilla's add-on policies by using a deceptive name.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aca80fb4-760e-4cd4-9fec-649fb38b2947","last_modified":1551794995188},{"guid":"/^((\\{5084f455-bc8f-483c-b145-91245bcbfd64\\})|(\\{bd69d5d0-4b2f-48cb-bab5-dcf1e0f9c63b\\}))$/","prefs":[],"schema":1551398716775,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1531416","why":"Maliciously collecting form data and cookie modification","name":"Adblock/Adobe Flash fakes"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7718be46-8e84-4bc7-a5a9-4c5de18378ee","last_modified":1551399019543},{"guid":"/^((\\{6745ccb4-833d-497e-b582-d98a5e790e8c\\})|(\\{cd205ddb-b106-4d2a-a965-5d1c610b5072\\})|(\\{218ec82e-2839-42da-acaa-e527454f4237\\})|(\\{7af25a3d-1caf-49f8-8be9-8ae6065db7c5\\}))$/","prefs":[],"schema":1551397746059,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530911","why":"Search hijacking, remote scripts","name":"Emoj1 clones"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"77a32be3-94ce-49c2-b129-fa2562a7f47b","last_modified":1551398716765},{"guid":"Youtube-video@Myaddons.com","prefs":[],"schema":1551397521494,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529887","why":"Remote script injection and data exfiltration","name":"YouTube Video and MP3 Downloader"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a30f9f2a-aa68-48b7-88cc-8a582405b385","last_modified":1551397746049},{"guid":"Youtube-downloader@Myaddons.com","prefs":[],"schema":1551396963937,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529873","why":"Remote script injection, data exfiltration","name":"YouTube MP3 Converter"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1d596a69-157f-4743-9465-f86d6452206b","last_modified":1551397521482},{"guid":"{ba74c7ee-32b1-11e9-ade5-1f2222a4f325}","prefs":[],"schema":1551382900634,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529573","why":"Remote script injection and user data exfiltration","name":"GET Security"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"01825fea-8c5c-4d76-bd06-e1019c188056","last_modified":1551396963926},{"guid":"/^((\\{e0686c32-99b4-44d8-972f-88bf08b68f88\\})|(\\{b2225e4c-9d1d-472b-8aeb-5ff203bcff9a\\}))$/","prefs":[],"schema":1551210091992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530932","why":"This add-on is distributed violates Mozilla's add-on policies by being distributed through a fake Firefox update page.","name":"Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"37252271-9e38-46a9-b23a-2b6d7048c0db","last_modified":1551250023025},{"guid":"{9d7cfde2-39ae-11e9-bde0-02427e2eba50}","prefs":[],"schema":1551104404768,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530640","why":"This add-on violates Mozilla's add-on policies by including abusive remote functionality, negatively affecting security and performance.","name":"Unnamed malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"7bb234b0-cfda-4a23-bf02-9c82fb3500a3","last_modified":1551204284998},{"guid":"/^((\\{8387ccbe-b9ac-438d-b049-c86b30a6dacb\\})|(\\{2ef58672-740c-46bd-a50d-b9880986b574\\})|(\\{7ff51e81-f4b1-4682-9f45-43a771d80748\\})|(\\{ecb03616-f3c2-4580-99dd-6a233047abdd\\})|(\\{850be3a2-ca5f-47ad-838c-fe39b006e0da\\})|(\\{df9f6ab1-c82c-41d4-85ce-86dcfe839ce9\\})|(\\{a59679da-f097-4db4-b2bc-6ad7b645e127\\}))$/","prefs":[],"schema":1551100033342,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1530194","why":"This add-on violates Mozilla add-on policies by including abusive search behavior.","name":"Safe Browsing (Malware) and similar"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ec121e9e-d56d-436b-bb2d-735fdcff3c03","last_modified":1551100630159},{"guid":"{4603d01d-ae80-4653-9288-d5ef98b99a17}","prefs":[],"schema":1551099702949,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529924","why":"This add-on violates Mozilla add-on policies by including abusive remote code.","name":"IMmailgun (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"32227de6-a7bf-454c-bf44-4478ddd96abe","last_modified":1551099805258},{"guid":"{157cd8f9-48f0-43a1-9bcf-c4316753e083}","prefs":[],"schema":1551037300209,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529926","why":"This add-on violates Mozilla add-on policies by including abusive search behavior.","name":"SD App (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5b3fe8de-6d05-4d95-a6d2-cd5695f1b0c0","last_modified":1551099426266},{"guid":"{5288d05d-253f-4675-be3b-152bf02aa3ec}","prefs":[],"schema":1550683849233,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529328","why":"Remote script injection along with deceptive code to hide the fact","name":"Unicode & Emoji Support"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9600b4cd-da02-4947-a4f5-c56c657ba197","last_modified":1550684288501},{"guid":"restore.old@youtube.com","prefs":[],"schema":1550580649249,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1529126","why":"This add-ons does remote script injection in a way that attempts to hide the injection. The code being executed runs on all pages which is contrary to what the add-on is described to do.","name":"Restore Old Youtube"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"27917953-17fb-4ffc-bcf1-5fc2727174b4","last_modified":1550617105595},{"guid":"/^((pohhpifegcbplaijeeonlbkjgocfgjbf@chrome-store-foxified-18573537)|(pohhpifegcbplaijeeonlbkjgocfgjbf@chrome-store-foxified-570932499)|(aackamlchlgmalkmcphbhhcjebbpnfdf@chrome-store-foxified-233164420)|(pohhpifegcbplaijeeonlbkjgocfgjbf@chrome-store-foxified-1808417494)|(nnfhjlgginbfdejaajhbboeemajpjgfp@chrome-store-foxified-699139867)|(dilkapnoekabmkkhhdlpnpfgjcmddlia@chrome-store-foxified-1808417494)|(dilkapnoekabmkkhhdlpnpfgjcmddlia@chrome-store-foxified-1190639722)|(nnfhjlgginbfdejaajhbboeemajpjgfp@chrome-store-foxified-2745518014)|(fibaefnljghpmdibfkhnlaniblfkkndi@chrome-store-foxified-1955364993)|(dilkapnoekabmkkhhdlpnpfgjcmddlia@chrome-store-foxified-1516694386)|(generated-rk4dtanssk56goquir78sz@chrome-store-foxified--1594555229)|(nnfhjlgginbfdejaajhbboeemajpjgfp@chrome-store-foxified-1388315457)|(oaoebpgbkehlcdggaeeohgfpopdhjell@chrome-store-foxified-1823310541)|(fibaefnljghpmdibfkhnlaniblfkkndi@chrome-store-foxified--1031675095)|(ancjheohbkbnkgcmfaldcaepoeeplkgh@chrome-store-foxified-1823310541)|(generated-lwcbpuj27wcknyyl6pkap7@chrome-store-foxified-1823310541)|(generated-bmtr2hbgikv399aj6aeycd@chrome-store-foxified-1823310541)|(generated-8w9odie82h2ugbsrofooj3@chrome-store-foxified-1823310541)|(\\{4170faaa-ee87-4a0e-b57a-1aec49282887\\})|(\\{b66dd4bc-7f5e-41d9-bc43-84c5736d0c87\\})|(\\{507ad1fb-08ae-43ac-a596-fd5b6e7dea9a\\})|(\\{8bf85207-66df-4eb7-b913-ac162498c687\\})|(\\{b063895a-8077-452d-b049-ebc20a39f882\\})|(\\{5776bd90-3d09-43b5-a769-8da373e9820f\\})|(\\{f6bdce44-3d5a-4f88-9a64-e39fcb4f0717\\})|(\\{1c22e687-6a02-440c-a6d5-c1ccaf520e10\\})|(\\{f7be824f-7287-466a-8590-2f48007a223b\\})|(\\{89ffc0b4-97f7-447c-bd6f-9c519b0188bd\\})|(\\{3a67084b-c231-4b4b-a924-ffa741f90921\\})|(\\{fac8b1d0-f321-491d-9234-c40d89b3660d\\})|(\\{a8053a83-8d1a-4f0e-9f88-d31cfe00cf83\\})|(\\{d10fa57e-37d3-43d3-39f8-e6d5b2a7759d\\})|(savetube_downloader@savetube\\.co)|(\\{95a8a08c-53a8-7e1d-5a80-f1a5cd4751bf\\})|(\\{5037bd74-c23b-4bbf-8865-6b5a09e07342\\})|(\\{830c558c-70f0-4b07-95f1-8e06ad34ee2c\\})|(\\{e4d93c37-1299-452f-9b60-adee15ad3802\\})|(googlemaps@search))$/","prefs":[],"schema":1550502645324,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528761","why":"Malicious add-ons injecting remote scripts and exfiltrating data for monetization purposes. Some of the add-ons are masking themselves as legit add-ons and using various obfuscation tactics to hide their injections.","name":"Rogue Youtube downloaders and related add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f2483d7d-1895-4ae6-9901-7321e59062a6","last_modified":1550502978653},{"guid":"/^((((generated-e0yf8zkhypow3jjifkqzwo)|(iiinclagpealgnaglbmkdbfbgchjjbpg)|(jaehkpjddfdgiiefcnhahapilbejohhj))@chrome-store-foxified--?\\d+)|(jid1-9ETkKdBARv7Iww@jetpack)|(\\{813fe658-5a29-4dcc-ba6c-3941676e4f19\\}))$/","prefs":[],"schema":1550254444783,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1528308","why":"This add-on violates Mozilla's add-on policies by tracking user behavior and including remote code.","name":"BuyHatke Best Price Comparison, Graph, Coupons (and similar)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d6b2dbad-31e9-4984-b649-19036cd38e1d","last_modified":1550265430182},{"guid":"/^((odnenajaeicndaeiapagpglohiklndhe@chrome-store-foxified-2174031944)|(akdibckdjeocfbcjaikipkhhbggcbgkg@chrome-store-foxified-699805590)|(\\{bd9f5830-bf8c-4e38-933d-09f85b24d744\\})|(youtube-downloader@addoncrop\\.com)|(dailymotion-downloader@addoncrop\\.com)|(youtube-mp3-iframe-downloader@addoncrop\\.com)|(youtube-downloader-lite@addoncrop\\.com)|(dailymotion-downloader-lite@addoncrop\\.com)|(generated-p5qj07ef5ceqfktp5v8whw@chrome-store-foxified--505607522)|(generated-tuag2j5gwq73xzp8fbw3j8@chrome-store-foxified--505607522)|(generated-uj53d5j612ap5pz11hwgv2@chrome-store-foxified--505607522)|(\\{f51f0244-bfb0-40ce-bf9d-af49f5949e61\\})|(\\{81751484-2dc9-47bf-aec3-b8e556237178\\})|(\\{d89d1e20-57af-4164-82cc-650af45cf0a5\\})|(\\{a5e28713-14c3-4967-befe-2ec253e317cd\\})|(\\{335ac35b-6c16-4304-93f0-64a418e5bf81\\})|(\\{d3fdb429-ef84-40a4-b160-010745ee0098\\})|(\\{d66db057-7d38-4df4-a0ba-63c272be25ee\\})|(\\{ff7f7151-09e3-4e35-9052-b21e23e7e2c1\\})|(\\{1479da02-e759-4a6f-8f62-c08096583806\\})|(\\{42d59cda-c117-459e-b244-1b850c27ccc9\\})|(\\{bec48f33-7869-4158-8cbc-5cf1606f9afa\\})|(\\{08ca656c-4973-46a8-85a9-3d771399c86e\\})|(\\{dc5336c8-5624-4f74-a794-bb15f3760f34\\})|(\\{6a3d97de-1b42-4624-880a-1a68bc917142\\})|(\\{ad965166-3a34-449d-8230-a636fb5cae57\\})|(video-view@vv\\.us)|(video-view@excoe\\.com)|(xeco@rama\\.com)|(ghj@brem\\.com)|(fgtr@rembgr\\.com)|(xero@saltam\\.com)|(sora@remjem\\.com)|(repo@saram\\.com)|(tora@empoytr\\.net)|(saving@ropbart\\.com)|(japa@vbgt\\.com)|(rtya@nop\\.net)|(asan@khazan\\.com)|(xerb@tangot\\.com)|(audiotools@ramdeen\\.com)|(webat@extrolm\\.com)|(media@medplus\\.com)|(audio@audequl\\.com)|(control@medcontrols\\.com)|(sabqo@rimjim\\.com)|(repto@secroa\\.com)|(meters@videobf\\.com)|(betro@diskra\\.com)|(codeca@vxmrop\\.com)|(revoca@feronx\\.com)|(brota@vidbrghta\\.com))$/","prefs":[],"schema":1550173301925,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1527603","why":"This add-on violates Mozilla's add-on policy by including malicious remote code.","name":"Various add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d94f7e0f-7088-43c9-a8da-eae102781079","last_modified":1550253583075},{"guid":"superzoom@funnerapps.com","prefs":[],"schema":1549578756953,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1525405","why":"This add-on includes abusive functionality including violating the user's security and privacy.","name":"SuperZoom (Abusive)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f7c4b329-7a54-48d3-9494-81783fe99d90","last_modified":1549627400713},{"guid":"/^((\\{0bf1c111-c256-4a17-891d-1bc69338162e\\})|(\\{0ffbc4b1-f269-4cff-9552-5f77337ebc1a\\})|(\\{1bbdc69d-55d3-4872-bd03-14eb05e7a7ad\\})|(\\{1ce00b82-ac47-43e6-a69c-f7dc9344168a\\})|(\\{2b01628b-0110-4965-972c-7a0b624fb99f\\})|(\\{3a84e0b0-3151-449e-b6e8-1062036afac6\\})|(\\{3bbcc16b-23f7-40a6-b88c-9ced9d009c93\\})|(\\{3ea48f4a-b585-44a7-aff5-faeb5e5b47d5\\})|(\\{7b161d2c-ee98-4321-a78a-433950672c8a\\})|(\\{8a8d97d8-b879-4024-8321-765e0f395b84\\})|(\\{9c0d6766-debe-4461-b14f-68ddfc13a78a\\})|(\\{014f9781-c104-41a4-a983-fc6aa4690664\\})|(\\{27ffdb27-0a34-4dea-a483-3b357bc6a5fe\\})|(\\{81ba256a-4f32-40df-86b5-e6b9861481e1\\})|(\\{338c7503-fb54-4b69-a84b-916f7452c7fa\\})|(\\{400e053f-55df-4e86-a91a-eae8d7b7bcd1\\})|(\\{617e0484-8346-44f2-851e-60ab89a919f9\\})|(\\{656a0095-d852-4dcc-a107-764df7ad0ec4\\})|(\\{754a330b-efbe-4016-8526-bf0f2e11e45e\\})|(\\{802ba900-013c-42f6-a11a-093c4bf35baa\\})|(\\{2771ce08-4898-4f58-89a5-e2b9d00bfab2\\})|(\\{3906b944-92f3-4d43-89dc-31ad6484a77c\\})|(\\{6516cdbc-9332-437f-89ac-b57470655542\\})|(\\{6847c507-1793-4be2-be86-4c2cc0b445bf\\})|(\\{9687db9b-410c-47f2-8c36-fde63c7c29e4\\})|(\\{0035237e-97ab-40eb-ba9d-c453fb6aa079\\})|(\\{20143127-e0bd-4396-aee9-52229cf9b5eb\\})|(\\{33254399-d5b2-4d84-b90b-9c4d4dc71112\\})|(\\{34621968-1952-4428-909d-df5b220efe74\\})|(\\{83769978-21cf-417c-b4a9-582b4161e395\\})|(\\{aa369db0-4232-47b8-bbbb-49ad31d49dce\\})|(\\{aff733de-d7d8-49c2-824a-7f2b2e282927\\})|(\\{c0b587fe-766b-446f-9aae-bc6edc9f6f4c\\})|(\\{c47a75b9-c6d2-4009-a245-c6dcedeea932\\})|(\\{c51bd197-28bd-442f-8537-dea5ae129047\\})|(\\{cac044a2-b93c-4f24-bf2f-b902741d29a8\\})|(\\{de17ce6f-389f-4368-9675-b9ed93133f17\\})|(\\{e2b105bc-1821-4838-bdf9-0fa4f6781b18\\})|(\\{e6c8bc7f-0133-418a-86ed-ba2c0a6925df\\})|(\\{f4acda5f-a75b-4b3b-8a73-8ca3df8d5f57\\})|(\\{f4fd18ee-8f6a-4708-8338-7e7981b73453\\})|(\\{f2320322-1fff-4998-bc28-4ad61621012a\\})|(\\{ff939f5e-a97c-4c14-b853-9c82519dbf73\\})|(@complete-youtube-downloader)|(@swsearchassist)|(@swsearchassist2)|(@youtube-download-helper-addon-1)|(@youtube-download-helper-addon-3)|(@ytd-support)|(@ytmp4-support)|(@ytu-support)|(18-plus-bypass@agebypass\\.org)|(18plus@sweetytweety\\.jp)|(addon@firefox-addon-s\\.com)|(ageverify@doubletrouble\\.net)|(auto-fill-dhruv\\.techapps@gmail\\.com)|(awesomeaddons@gmail\\.com)|(blndkmebkmenignoajhoemebccmmfjib@chrome-store-foxified--730948579)|(boomerang-for-gmailtm@chrome-store-foxified--1895216441)|(boomerang-for-gmailtm@chrome-store-foxified-1472004183)|(browsing_certificate@easycerts\\.in)|(certs-js@verify\\.org)|(clear-flash-cookies@tubedownload\\.org)|(dghpnfeglanbbjaggjegpbijhcbnfdno@chrome-store-foxified--1026618965)|(dghpnfeglanbbjaggjegpbijhcbnfdno@chrome-store-foxified--1382673267)|(dghpnfeglanbbjaggjegpbijhcbnfdno@chrome-store-foxified-3810896411)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-1917762393)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-2539369515)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-3411285726)|(dhiaggccakkgdfcadnklkbljcgicpckn@chrome-store-foxified-3957753373)|(dhruv@gmail\\.com)|(easy\\.download@youtube\\.com)|(easy18plusverify@agehelper\\.com)|(EasyQR@johndoe)|(easytranslate@johndoehits)|(ecaieeiecbdhkcgknidmfelflleobbnp@chrome-store-foxified-2878848146)|(eurekasakamika@chrome-store-foxified-unsigned)|(faeeclonpikbempnbjbbajfjjajjgfio@chrome-store-foxified--1071037210)|(faeeclonpikbempnbjbbajfjjajjgfio@chrome-store-foxified-335403930)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified--546579415)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified--929033716)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified--1776201342)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-411918147)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-711293137)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-1406852911)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-1805495496)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-2344964585)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-2515600300)|(gefiaaeadjbmhjndnhedfccdjjlgjhho@chrome-store-foxified-2947667317)|(generated-c5el8k8zv2b1gcncleefj9@chrome-store-foxified--1160265316)|(guid-reused-by-pk-720807)|(guid-reused-by-pk-881137)|(html5-video-everywhere@lejenome\\.me)|(iapifmceeokikomajpccajhjpacjmibe@chrome-store-foxified-6029610)|(info@ytdownloader\\.info)|(jabcajffpafebcdcaddoegpenicdipdk@chrome-store-foxified-1110252619)|(jpegcert@freeverify\\.org)|(kmrfree@yahoo\\.com)|(lets-kingw@empotrm\\.com)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-29039950)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-77744803)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-357866719)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-447115206)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-549146896)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-1084455972)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-1602969934)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-2271560562)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-2595595173)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-3103352300)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-3116340547)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-3959272483)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-4076222235)|(mdanidgdpmkimeiiojknlnekblgmpdll@chrome-store-foxified-4090031097)|(media-certificates@auth0\\.io)|(mingle-cash-extension@minglecash\\.com)|(MiningBlocker@MiningBlockerAddOn\\.com)|(multimedia@certifications\\.us)|(nominer-block-coin-miners@tubedownload\\.org)|(open-in-idm@tubedownload\\.org)|(sabqo@yolla\\.net)|(search-by-image@addonsmash)|(selfdestructingcookies@addonsmash)|(streaming-certficate@mdn\\.org)|(swt@gobck\\.com)|(tabs-re-open@gtk\\.cc)|(user-agent-rewriter@a\\.org)|(vba@vba\\.com)|(verification@bexp\\.co)|(vidcert@certs\\.org)|(xplayer@gobck\\.com)|(youtube_download_express@free-downloader\\.online)|(youtube_downloader@downloaders\\.xyz)|(youtube_grabber@utubegrabber\\.co)|(youtube-lyrics-by-rob-w@awesome\\.addons)|(youtube-mp4-downloader@tubedownload\\.org)|(ytdownloader@ytdownloader\\.org)|(yttools\\.download@youtube\\.com))$/","prefs":[],"schema":1549482092694,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1525880","why":"Add-ons that include abusive or malicious remote code.","name":"Various abusive add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"be96c9a1-0b01-468e-ac9b-761ba3587162","last_modified":1549541801862},{"guid":"/^((addon@firefox-updater\\.com)|(downloader@youtube-download\\.org)|(downloader2@youtube-download\\.org)|(downloader1@youtube-download\\.org))$/","prefs":[],"schema":1549369087422,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1525153","why":"These add-ons include abusive behavior.","name":"\"FF Manual Update (Required)\" and \"Easy Youtube Video Downloader Express\" (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6b72e942-af54-469c-b9f2-9e436ad2c0d1","last_modified":1549373215201},{"guid":"/^((\\{0b347362-773f-4527-a006-f96e9db437e5\\})|(\\{9edb10ad-67af-4ad0-af45-efe452479321\\})|(\\{202e2671-6153-450d-bc66-5e67cee3603f\\}))$/","prefs":[],"schema":1548963700621,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1524357","why":"This add-on includes hidden abusive functionality.","name":"Video download add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"680a99e9-c972-4a14-9b15-e56eeeed75eb","last_modified":1549037404012},{"guid":"/^((\\{a9bc520e-68ab-49c2-a8df-75a0349d54fd\\})|(\\{bfc5d009-c6bd-4526-92ce-a9d27102f7f2\\}))$/","prefs":[],"schema":1548699141208,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1522959","why":"Add-ons that contain abusive functionality.","name":"Unnamed (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"97c4ee31-4009-40de-ae02-f1b349c87d01","last_modified":1548699177099},{"guid":"{4e47160d-ec83-417c-ab01-cda978378d9e}","prefs":[],"schema":1548699076839,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1522970","why":"The add-on contains abusive functionality.","name":"mlflow (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"62c54642-73ab-4641-b5c2-47e4ae29bbc5","last_modified":1548699141199},{"guid":"/^((\\{feff5ea4-ed4a-46a3-9331-12fec01d52a9\\})|(\\{8ffc339c-0ca1-46e3-acb3-3bfd889f9a21\\})|(\\{1fe481b5-baad-44e9-b410-082cf0f2acbb\\})|(\\{92c85192-b325-4599-82e2-a110f193eae6\\})|(\\{5bc21266-26f1-469a-bc1a-a49d7b70ecb9\\})|(\\{dc2dd143-f2e7-4f46-a8ff-4dc1a985e889\\})|(\\{c1233bb6-31a9-4c7d-8469-f8f44adee9ba\\})|(\\{d0d48905-1065-43dc-ab96-434d100602ed\\})|(\\{11deae99-2675-4d5e-86cd-7bd55b88daf2\\})|(\\{a7014e8e-eacf-4ba0-9047-c897c4ed3387\\})|(\\{b9c545a5-0ffa-490a-8071-2fee09478cfe\\})|(\\{39e8eebb-4d9e-4a03-93a8-4468fdd7a186\\})|(\\{8ccc00b1-2010-4155-a07c-f4d7c4d6dec2\\})|(\\{a1056511-4919-43b7-a9e5-ac2b770de810\\})|(\\{90a6da19-9165-44c1-819c-e3b53409f9c9\\})|(\\{e3862078-8f9f-4f8e-99dc-55ba558f0619\\})|(\\{d89fcf34-2615-4efc-a267-1e83ab6a19d0\\})|(\\{588151ce-eab4-4acf-83a7-bb5ccaf4d867\\})|(\\{6ab6312d-5fd4-42a9-ab10-08b954e53f9d\\})|(\\{24a6cbde-be68-4b7d-9f1b-d4d5dfd178a3\\})|(\\{55ae1a08-105f-4f7f-9d4e-e448b517db2b\\})|(\\{74fe9d83-df17-4812-bd3f-27b84b0086b7\\})|(\\{21140e51-713a-4bf8-865b-e2ee07282409\\})|(\\{24f39610-2958-4dc8-a73b-75cc9665bffa\\})|(\\{c50a45a5-efa4-44af-8946-6f20e4748d47\\})|(\\{41d0b7e0-0d93-4f67-bed9-da6d7688ad16\\})|(\\{c2bee222-2163-4c0f-89f5-4ac502f06810\\})|(\\{4be4602e-2b20-473f-8f2b-85e8c53d17dc\\})|(\\{dec2e9b5-e787-4fb5-a7bc-5894f80f7367\\})|(\\{179526e1-1824-49f7-afb3-49fdaadaa503\\})|(\\{4f07d826-ca9e-4370-a508-b984f54758de\\})|(\\{d0558df2-714f-4793-9d85-d2d648de4f2e\\})|(\\{daf1a69b-f47b-4936-bd25-5ac21f4e27ec\\}))$/","prefs":[],"schema":1548099697813,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521975","why":"Remote script injection and deceptive tactics to hide the fact","name":"ext-affiliate add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"87c17ce6-aaef-4d47-a662-588efff34041","last_modified":1548198338831},{"guid":"hlper@xero.com","prefs":[],"schema":1548076840649,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521533","why":"This add-on executes abusive remote code.","name":"Av Player Helper (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1e2ae4c0-66cd-40bc-9cf6-5ca0ce9548f7","last_modified":1548084072622},{"guid":"/^((xtera@soravem\\.net)|(nozl@ssave\\.net))$/","prefs":[],"schema":1547926889113,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521429","why":"This add-on injects abusive remote code.","name":"Video Assist (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c69997df-0b61-4de5-a351-b640123a9c3b","last_modified":1548073537411},{"guid":"/^((\\{94f608b3-76b6-4b7b-8cef-7360df22a930\\})|(\\{9648b74f-35ea-4218-acf0-ec2191f509f6\\}))$/","prefs":[],"schema":1547754101798,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1520813","why":"Add-ons that leak private user data.","name":"Instagram Register and Google Register (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a15e8d7e-0726-4190-8187-c75e2b46d429","last_modified":1547810271416},{"guid":"reopen@closedtab.com","prefs":[],"schema":1547067530457,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1518847","why":"This add-on contains unwanted abusive behavior unrelated to the add-ons functionality.","name":"Reopen Closed Tabs (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"451d950f-ca89-491b-87e7-45123e4f5ab4","last_modified":1547206877909},{"guid":"{43ecded1-f7cb-4bb6-a03d-4bec23b9f22d}","prefs":[],"schema":1547025691087,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1518580","why":"This add-on violates Mozilla's policy and user's security/privacy by loading abusive code from remote.","name":"lamme (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"06c6868e-055f-4e7d-aa8f-5ba577f43e85","last_modified":1547027153061},{"guid":"youtube_downloader@addon.partners","prefs":[],"schema":1546890104853,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1518032","why":"This add-on contains unwanted abusive functionality.","name":"YouTube Download Tool HD (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5a42c5bb-9cb4-4d96-b978-8d9f816322e6","last_modified":1547025691078},{"guid":"/^((\\{00cf6ee0-14f3-4e35-a4fd-d2160fe2f05e\\})|(\\{0da583da-e623-41f2-b2d2-0ac61b493171\\})|(\\{105c14a6-8b6f-49ef-b0d6-41bad99ad5e8\\})|(\\{10a15a74-271f-4098-a662-bd827db4f8bc\\})|(\\{13e02b9b-2797-4100-8144-65b73c4145c4\\})|(\\{1eb56568-8a30-42b1-a646-ad9f485f60fe\\})|(\\{1eb8a08c-82a8-4d1d-8b80-f7b5cd4751bf\\})|(\\{2f8220a8-b2a7-4277-ba6b-bdcb6958f669\\})|(\\{33f39a5d-137c-4757-9f9d-e86395c8bf20\\})|(\\{347ca189-9e63-43d2-8a2f-5d5141598bdc\\})|(\\{396056fc-1697-4954-b535-06de8d62fe1b\\})|(\\{3d530918-dbe8-442c-8faf-1f4ca7ca8ab9\\})|(\\{3e283c2e-cde3-4baa-8076-226ca8fb90ef\\})|(\\{591468f8-ebbd-497a-92f1-fa0a1206adb4\\})|(\\{5f6c3eb8-aa32-489a-bb01-b12b23d2001a\\})|(\\{6cbb397a-d865-42b2-8454-25a75b710dff\\})|(\\{7ae2bde0-f7ea-4bf3-a055-06953f9fcf31\\})|(\\{7b402578-ddec-4eee-9c8b-98e4e8db0059\\})|(\\{7fb00cf7-40d3-4415-a0c8-a48d3fbe847f\\})|(\\{87a8a08c-82a8-4d1d-8b80-f7b5cd4751bf\\})|(\\{888220a8-b2a7-4277-ba6b-bdcb6958f669\\})|(\\{8b1dd8f3-224b-4975-bda2-cb2dd184d4d8\\})|(\\{8bcdc9cc-f6be-4203-ae43-a9d281f0bcdb\\})|(\\{8cda9ce6-7893-4f47-ac70-a65215cec288\\})|(\\{8dc9b946-0bb9-4264-9c76-fd9ff1e159a2\\})|(\\{942e0fec-19f2-4ebc-8a74-009da7fa625d\\})|(\\{b2a720a8-b2a7-4277-aa6b-bdeb6958f669\\})|(\\{bdcf953b-d2aa-4e7a-8176-aeb1e95a0caf\\})|(\\{cae82615-f7be-4aff-875d-33da1bc93923\\})|(\\{d2aa953b-bdcf-4f7a-8476-ddb1e9500caf\\})|(\\{da0fa57e-17d3-40d3-99f8-e9d5b2a7759d\\})|(\\{da1237ca-e35d-4653-b2b5-d98043f33781\\})|(\\{e164563a-1512-4b81-99ff-95f2644c4075\\})|(\\{e2a720a8-b3a7-1277-aa2b-bdeb2958f669\\})|(\\{e6a90490-6ef7-407d-863a-7dd120f6f7dc\\})|(\\{f15cfa53-fa9b-43cf-84e8-16ece6695922\\})|(\\{f722c845-2d8b-4a0a-b518-4f39af703e79\\})|(\\{ff1c4e62-7c11-4ea7-b734-3462417ceeb5\\})|(\\{ffa0a57e-17d2-41d3-96f8-e8d5b2a0759d\\}))$/","prefs":[],"schema":1546378806655,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1517154","why":"Executing remote code containing coin mining and other undisclosed monetization","name":"Various remote iframe add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"53c5fb08-1001-471e-87ce-31185a84bcbc","last_modified":1546439268437},{"guid":"{02267dc4-36f2-4c22-8103-9e26477b48ef}","prefs":[],"schema":1545922885656,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1516539","why":"Google Search hijacking and affiliate injection","name":"Markdown"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"6dd73da4-cb2f-4eb8-8850-890e80c8d57b","last_modified":1545926512914},{"guid":"{d064563a-1542-4b8b-99ff-95f1644c4075}","prefs":[],"schema":1545921144932,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1516488","why":"Obfuscated remote script injection stealing data","name":"PDF Print and Save"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"875bc1c6-257e-438a-8624-3bfe963747b0","last_modified":1545922824252},{"guid":"/^((\\{83768008-e10c-48c0-b303-5a0f1de763a1\\})|(\\{430b0612-bfad-463b-8783-cf2e32801513\\})|(\\{519adb83-4abb-4a66-8e94-243754b8adce\\})|(\\{228a707d-55c1-465b-a759-a2129eb6602e\\}))$/","prefs":[],"schema":1545853297809,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1516131","why":"Remote script injection and data exfiltration","name":"Various malicious remote script injection add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c0cb1a85-c6c6-453e-b126-0e6e26ceaf88","last_modified":1545870108716},{"guid":"/^((\\{4c4ceb83-f3f1-ad73-bfe0-259a371ed872\\})|(\\{a941b5ab-8894-41e1-a2ca-c5a6e2769c5f\\})|(\\{56488007-bd74-4702-9b6d-aee8f6cc05ea\\})|(\\{9eebac07-ac86-4be7-928f-e1015f858eee\\})|(\\{5a993517-5be7-480e-a86c-b8e8109fa774\\})|(\\{309ad78e-efff-43cf-910c-76361c536b20\\})|(\\{cefcf45b-dfec-4072-9ffc-317094c69c28\\})|(\\{5b04980b-25e9-4bc6-b6ea-02c58d86cc5e\\})|(\\{0021a844-360f-480e-ac53-47391b7b17b4\\})|(\\{2bed9f51-62a8-4471-b23c-827e6727c794\\})|(\\{7d2130d3-d724-4f58-b6b7-8537a9e09d4c\\})|(\\{ccd3847a-e5ec-4d28-bf98-340230dcbd4d\\})|(\\{83716b9b-6e6e-4471-af76-2d846f5804f3\\})|(\\{5154c03a-4bfc-4b13-86a9-0581a7d8c26d\\})|(\\{24f51c5c-e3f5-4667-bd6c-0be4f6ef5cc2\\})|(\\{73554774-4390-4b00-a5b9-84e8e06d6f3c\\})|(\\{c70cfd12-6dc3-4021-97f2-68057b3b759b\\})|(\\{ef5fe17b-eb6a-4e5e-9c18-9d423525bbbd\\})|(\\{461eb9b4-953c-4412-998e-9452a7cb42e0\\})|(\\{966b00fe-40b0-4d4b-8fde-6deca31c577b\\})|(\\{dab908ac-e1b0-4d7e-bc2e-86a15f37621f\\})|(\\{01a067d3-7bfa-44ac-8da7-2474a0114a7e\\})|(\\{6126261f-d025-4254-a1db-068a48113b11\\})|(\\{6c80453f-05ec-4243-bb71-e1aac5e59cae\\})|(\\{f94ec34b-5590-4518-8546-c1c3a94a5731\\})|(\\{5d4c049e-7433-485a-ac62-dd6e41af1a73\\})|(\\{507f643d-6db8-47fe-af9c-7a7b85a86d83\\})|(\\{5c56eeb4-f97c-4b0d-a72f-8e639fbaf295\\})|(\\{2ef98f55-1e26-40d3-a113-a004618a772e\\})|(\\{77d58874-d516-4b00-b68a-2d987ef83ec5\\})|(\\{7a0755d3-3ba2-4b19-98ce-efcdc36423fc\\})|(\\{47ee3ba1-8974-4f71-b8a4-8033d8c2155f\\})|(\\{a477f774-bc36-4cc8-85bd-99f6b04ea255\\})|(\\{1a2e41e3-4343-4a00-90cd-ce77ac77a8af\\})|(\\{7b180e9a-afd6-4693-94a1-c7b5ed9b46fa\\})|(\\{51f76862-f222-414d-8724-6063f61bbabf\\})|(\\{d47a0c63-ac4c-48ce-8fc7-c5abc81d7f75\\})|(\\{b8adf653-f262-413c-b955-100213b105ad\\})|(\\{ccedf35b-dfd6-417a-80de-fb432948861d\\})|(\\{70e29b0e-7cd8-40df-b560-cf6eb066350d\\})|(\\{9926f8ad-b4c3-4122-a033-1b8a5db416db\\})|(\\{62eefb1c-a2d8-40ba-ab94-9fc2f2d31b2f\\})|(\\{17f14919-00bd-44a4-8c14-78ab9728038f\\})|(\\{20e36a3e-672c-4448-9efb-5750cbffe90c\\})|(\\{6070c95f-6460-4ffd-9846-2bbd7238697f\\})|(\\{1edb8a4e-f105-4623-9e19-e40fb082b132\\})|(\\{223a1503-772d-45eb-8cb8-e2e49563703d\\})|(\\{59e0f01c-1f70-445c-a572-7be5d85549bd\\})|(\\{8ec160b7-1089-4944-a999-a1d6afa71c5d\\})|(\\{d2d111d6-0ea1-4880-ae7b-2e82dff3a719\\})|(\\{cfacacd6-191c-46c4-b78c-8a48289b2829\\})|(\\{1155e72f-2b21-433f-ba9a-5af6ed40c8ee\\})|(\\{583910bd-759f-40f6-b96a-1d678d65650f\\}))$/","prefs":[],"schema":1545162093238,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1514865","why":"Remote script injection and data exfiltration","name":"Various add-ons using .cool domains"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"53168513-103a-4ea0-a48f-bc291354cc9f","last_modified":1545232187960},{"guid":"{56a1e8d2-3ced-4919-aca5-ddd58e0f31ef}","prefs":[],"schema":1544470901949,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491312","why":"The add-on introduces unwanted functionality for users.","name":"Web Guard (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1dc366d6-c774-4eca-af19-4f9495c2c55e","last_modified":1544544484935},{"guid":"/^((\\{a99e680b-4349-42a5-b292-79b349bf4f3d\\})|(\\{f09a2393-1e6d-4ae4-a020-4772e94040ae\\})|(\\{c9ed9184-179f-485f-adb8-8bd8e9b7cee6\\})|(\\{085e53da-25a2-4162-906e-6c158ec977ac\\})|(\\{bd6960ba-7c06-493b-8cc4-0964a9968df5\\})|(\\{6eeec42e-a844-4bfd-a380-cfbfc988bd78\\})|(\\{3bbfb999-1c82-422e-b7a8-9e04649c7c51\\})|(\\{bfd229b6-089d-49e8-a09c-9ad652f056f6\\})|(\\{ab23eb77-1c96-4e20-b381-14dec82ee9b8\\})|(\\{ebcce9f0-6210-4cf3-a521-5c273924f5ba\\})|(\\{574aba9d-0573-4614-aec8-276fbc85741e\\})|(\\{12e75094-10b0-497b-92af-5405c053c73b\\})|(\\{99508271-f8c0-4ca9-a5f8-ee61e4bd6e86\\})|(\\{831beefc-cd8c-4bd5-a581-bba13d374973\\})|(\\{c8fe42db-b7e2-49e6-98c4-14ac369473a4\\})|(\\{f8927cca-e6cb-4faf-941d-928f84eb937f\\})|(\\{17e9f867-9402-4b19-8686-f0c2b02d378f\\})|(\\{f12ac367-199b-4cad-8e5a-0a7a1135cad0\\})|(\\{487003ce-5253-4eab-bf76-684f26365168\\})|(\\{487003ce-5213-2ecb-bf16-684f25365161\\}))$/","prefs":[],"schema":1543088493623,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1509864","why":"Add-ons that track users and load remote code, while pretending to provide cursor customization features.","name":"Various cursor and update add-ons (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a8d942b3-779d-4391-a39c-58c746c13b70","last_modified":1543241996691},{"guid":"{97f19f1f-dbb0-4e50-8b46-8091318617bc}","prefs":[],"schema":1542229276053,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1507191","why":"Fraudulent Adobe Reader add-on","name":"Adobe Reader (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"03120522-ee87-4cf8-891a-acfb248536ff","last_modified":1542272674851},{"guid":"/^((video-downloader@vd\\.io)|(image-search-reverse@an\\.br)|(YouTube\\.Downloader@2\\.8)|(eMoji@ems-al\\.io))$/","prefs":[],"schema":1542023230755,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1506560","why":"Add-ons that contain malicious copies of third-party libraries.","name":"Malware containing unwanted behavior"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cd079abe-8e8d-476f-a550-63f75ac09fe8","last_modified":1542025588071},{"guid":"/^({b384b75c-c978-4c4d-b3cf-62a82d8f8f12})|({b471eba0-dc87-495e-bb4f-dc02c8b1dc39})|({36f623de-750c-4498-a5d3-ac720e6bfea3})$/","prefs":[],"schema":1541360505662,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504619","why":"Add-ons that contain unwanted behavior.","name":"Google Translate (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aa5eefa7-716a-45a6-870b-4697b023d894","last_modified":1541435973146},{"guid":"{80869932-37ba-4dd4-8dfe-2ef30a2067cc}","prefs":[],"schema":1538941301306,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1497161","why":"Malicious page redirection","name":"Iridium (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"dd5b0fa4-48fd-4bf6-943d-34de125bf502","last_modified":1538996335645},{"guid":"admin@vietbacsecurity.com","prefs":[],"schema":1537309741764,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491716","why":"Logging and sending keystrokes to a remote server.","name":"Vietnamese Input Method (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"89d714f6-9f35-4107-b8af-a16777f66337","last_modified":1537309752952},{"guid":"Safe@vietbacsecurity.com","prefs":[],"schema":1537309684266,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491717","why":"Logging and sending keystrokes to a remote server.","name":"SafeKids (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c651780e-c185-4d6c-b509-d34673c158a3","last_modified":1537309741758},{"guid":"/^((\\{c9226c62-9948-4038-b247-2b95a921135b\\})|(\\{5de34d4f-b891-4575-b54b-54c53b4e6418\\})|(\\{9f7ac3be-8f1c-47c6-8ebe-655b29eb7f21\\})|(\\{bb33ccaf-e279-4253-8946-cfae19a35aa4\\}))$/","prefs":[],"schema":1537305338753,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491298","why":"These add-ons inject remote malicious scripts on Google websites.","name":"Dll and similar (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"54b3e69a-40ae-4be5-b7cf-cf51c526dcfb","last_modified":1537306138745},{"guid":"updater-pro-unlisted@mozilla.com","prefs":[],"schema":1537305285414,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1491306","why":"Redirects search queries.","name":"Updater Pro (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3108c151-9f25-4eca-8d80-a2fbb2d9bd07","last_modified":1537305338747},{"guid":"/^((\\{686fc9c5-c339-43db-b93a-5181a217f9a6\\})|(\\{eb4b28c8-7f2d-4327-a00c-40de4299ba44\\})|(\\{58d735b4-9d6c-4e37-b146-7b9f7e79e318\\})|(\\{ff608c10-2abc-415c-9fe8-0fdd8e988de8\\})|(\\{5a8145e2-6cbb-4509-a268-f3121429656c\\})|(\\{6d451f29-1d6b-4c34-a510-c1234488b0a3\\})|(\\{de71f09a-3342-48c5-95c1-4b0f17567554\\})|(\\{df106b04-984e-4e27-97b6-3f3150e98a9e\\})|(\\{70DE470A-4DC0-11E6-A074-0C08D310C1A8\\})|(\\{4dcde019-2a1b-499b-a5cd-322828e1279b\\})|(\\{1ec3563f-1567-49a6-bb5c-75d52334b01c\\})|(\\{c140c82e-98e6-49fd-ae17-0627e6f7c5e1\\})|(\\{2581c1f6-5ad9-48d4-8008-4c37dcea1984\\})|(\\{a2bcc6f7-14f7-4083-b4b0-c335edc68612\\})|(\\{4c726bb6-a2af-44ed-b498-794cfd8d8838\\})|(\\{fa6c39a6-cd11-477b-966d-f388f0ba4203\\})|(\\{26c7bd04-18d3-47f5-aeec-bb54e562acf2\\})|(\\{7a961c90-2071-4f94-9d9a-d4e3bbf247c0\\})|(\\{a0481ea2-03f0-4e56-a0e1-030908ecb43e\\})|(\\{c98fb54e-d25f-43f4-bd72-dfaa736391e2\\})|(\\{da57263d-adfc-4768-91f7-b3b076c20d63\\})|(\\{3abb352c-8735-4fb6-9fd6-8117aea3d705\\})|(contactus@unzipper\\.com)|(\\{a1499769-6978-4647-ac0f-78da4652716d\\})|(\\{581D0A4C-1013-11E7-938B-FCD2A0406E17\\})|(\\{68feffe4-bfd8-4fc3-8320-8178a3b7aa67\\})|(\\{823489ae-1bf8-4403-acdd-ea1bdc6431da\\})|(\\{4c0d11c3-ee81-4f73-a63c-da23d8388abd\\})|(\\{dc7d2ecc-9cc3-40d7-93ed-ef6f3219bd6f\\})|(\\{21f29077-6271-46fc-8a79-abaeedb2002b\\})|(\\{55d15d4d-da76-44ab-95a3-639315be5ef8\\})|(\\{edfbec6b-8432-4856-930d-feb334fb69c1\\})|(\\{f81a3bf7-d626-48cf-bd24-64e111ddc580\\})|(\\{4407ab94-60ae-4526-b1ab-2521ffd285c7\\})|(\\{4aa2ba11-f87b-4950-8250-cd977252e556\\})|(\\{646b0c4d-4c6f-429d-9b09-37101b36ed1c\\})|(\\{1b2d76f1-4906-42d2-9643-0ce928505dab\\})|(\\{1869f89d-5f15-4c0d-b993-2fa8f09694fb\\})|(\\{7e4edd36-e3a6-4ddb-9e98-22b4e9eb4721\\})|(\\{e9c9ad8c-84ba-43f2-9ae2-c1448694a2a0\\})|(\\{6b2bb4f0-78ea-47c2-a03a-f4bf8f916eda\\})|(\\{539e1692-5841-4ac6-b0cd-40db15c34738\\}))$/","prefs":[],"schema":1536183366865,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1488578","why":"These add-ons take away user control by redirecting search.","name":"Tightrope search add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"81eb67a5-3fdb-448c-aadd-5f4d3b7cf281","last_modified":1536186868443},{"guid":"/^((\\{f01a138a-c051-4bc7-a90a-21151ce05755\\})|(\\{50f78250-63ce-4191-b7c3-e0efc6309b64\\})|(\\{3d2b2ff4-126b-4874-a57e-ed7dac670230\\})|(\\{e7c1abd4-ec8e-4519-8f3a-7bd763b8a353\\})|(\\{4d40bf75-fbe2-45f6-a119-b191c2dd33b0\\})|(\\{08df7ff2-dee0-453c-b85e-f3369add18ef\\}))$/","prefs":[],"schema":1535990752587,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1488248","why":"Add-ons that inject malicious remote code.","name":"Various Malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"67f72634-e170-4860-a5a3-133f160ebc32","last_modified":1535992146430},{"guid":"/^((\\{1cfaec8b-a1cb-4fc5-b139-897a22a71390\\})|(\\{2ed89659-09c1-4280-9dd7-1daf69272a86\\})|(\\{5c82f5cc-31f8-4316-bb7d-45a5c05227e6\\})|(\\{6a98a401-378c-4eac-b93c-da1036a00c6c\\})|(\\{6d83ebde-6396-483c-b078-57c9d445abfa\\})|(\\{07efb887-b09f-4028-8f7f-c0036d0485ea\\})|(\\{36f4882f-ff0b-4865-8674-ef02a937f7da\\})|(\\{61dea9e9-922d-4218-acdd-cfef0fdf85e7\\})|(\\{261be583-9695-48e0-bd93-a4feafaa18e6\\})|(\\{401ae092-6c5c-4771-9a87-a6827be80224\\})|(\\{534b7a84-9fc6-4d7c-9d67-e3365d2ae088\\})|(\\{552a949f-6d0e-402d-903d-1550075541ba\\})|(\\{579b8de8-c461-4301-ab09-695579f9b7c7\\})|(\\{754d3be3-7337-488e-a5bb-86487e495495\\})|(\\{2775f69b-75e4-46cb-a5aa-f819624bd9a6\\})|(\\{41290ec4-b3f0-45ad-b8f3-7bcbca01ed0d\\})|(\\{0159131f-d76f-4365-81cd-d6831549b90a\\})|(\\{01527332-1170-4f20-a65b-376e25438f3d\\})|(\\{760e6ff0-798d-4291-9d5f-12f48ef7658b\\})|(\\{7e31c21c-156a-4783-b1ce-df0274a89c75\\})|(\\{8e247308-a68a-4280-b0e2-a14c2f15180a\\})|(\\{b6d36fe8-eca1-4d85-859e-a4cc74debfed\\})|(\\{bab0e844-2979-407f-9264-c87ebe279e72\\})|(\\{d00f78fe-ee73-4589-b120-5723b9a64aa0\\})|(\\{d59a7294-6c08-4ad5-ba6d-a3bc41851de5\\})|(\\{d145aa5b-6e66-40cb-8a08-d55a53fc7058\\})|(\\{d79962e3-4511-4c44-8a40-aed6d32a53b1\\})|(\\{e3e2a47e-7295-426f-8517-e72c31da3f23\\})|(\\{e6348f01-841d-419f-8298-93d6adb0b022\\})|(\\{eb6f8a22-d96e-4727-9167-be68c7d0a7e9\\})|(\\{fdd72dfe-e10b-468b-8508-4de34f4e95e3\\}))$/","prefs":[],"schema":1535830899087,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487472","why":"Several add-ons that change forcefully override search settings.","name":"Various malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"43f11241-88e3-4139-9f02-ac39489a241f","last_modified":1535990735167},{"guid":"/^((application2@fr-metoun\\.com)|(application@br-annitop\\.com)|(application@br-atoleg\\.com)|(application@br-cholty\\.com)|(application@br-debozoiz\\.com)|(application@br-echite\\.com)|(application@br-estracep\\.com)|(application@br-exatrom\\.com)|(application@br-iginot\\.com)|(application@br-imastifi\\.com)|(application@br-isobiv\\.com)|(application@br-ludimaro\\.com)|(application@br-pintoula\\.com)|(application@br-proufta\\.com)|(application@br-qhirta\\.com)|(application@br-qibizar\\.com)|(application@br-qopletr\\.com)|(application@br-roblaprouf\\.com)|(application@br-rosalop\\.com)|(application@br-samalag\\.com)|(application@br-sopreni\\.com)|(application@br-stoumo\\.com)|(application@br-villonat\\.com)|(application@br-zoobre\\.com)|(application@de-barbuna\\.com)|(application@de-bicelou\\.com)|(application@de-blabuma\\.com)|(application@de-dalofir\\.com)|(application@de-elplic\\.com)|(application@de-erotah\\.com)|(application@de-ertuck\\.com)|(application@de-eurosty\\.com)|(application@de-ezigat\\.com)|(application@de-lorelam\\.com)|(application@de-losimt\\.com)|(application@de-luchil\\.com)|(application@de-miligap\\.com)|(application@de-open-dog\\.com)|(application@de-rydima\\.com)|(application@de-slapapi\\.com)|(application@de-soqano\\.com)|(application@de-treboola\\.com)|(application@de-vasurk\\.com)|(application@de-ygivas\\.com)|(application@es-biloufer\\.com)|(application@es-boulass\\.com)|(application@es-cemaseur\\.com)|(application@es-elixet\\.com)|(application@es-gestona\\.com)|(application@es-glicalol\\.com)|(application@es-griloup\\.com)|(application@es-iblep\\.com)|(application@es-iglere\\.com)|(application@es-jounyl\\.com)|(application@es-klepst\\.com)|(application@es-nofinaj\\.com)|(application@es-ofarnut\\.com)|(application@es-phistouquet\\.com)|(application@es-pronzal\\.com)|(application@es-roterf\\.com)|(application@es-taapas\\.com)|(application@es-tatoflex\\.com)|(application@fr-acomyl\\.com)|(application@fr-avortep\\.com)|(application@fr-blicac\\.com)|(application@fr-bloubil\\.com)|(application@fr-carazouco\\.com)|(application@fr-cichalou\\.com)|(application@fr-consimis\\.com)|(application@fr-cropam\\.com)|(application@fr-deplitg\\.com)|(application@fr-doadoto\\.com)|(application@fr-domeoco\\.com)|(application@fr-domlaji\\.com)|(application@fr-eferif\\.com)|(application@fr-eivlot\\.com)|(application@fr-eristrass\\.com)|(application@fr-ertike\\.com)|(application@fr-esiliq\\.com)|(application@fr-fedurol\\.com)|(application@fr-grilsta\\.com)|(application@fr-hyjouco\\.com)|(application@fr-intramys\\.com)|(application@fr-istrubil\\.com)|(application@fr-javelas\\.com)|(application@fr-jusftip\\.com)|(application@fr-lolaji\\.com)|(application@fr-macoulpa\\.com)|(application@fr-mareps\\.com)|(application@fr-metoun\\.com)|(application@fr-metyga\\.com)|(application@fr-mimaloy\\.com)|(application@fr-monstegou\\.com)|(application@fr-oplaff\\.com)|(application@fr-ortisul\\.com)|(application@fr-pastamicle\\.com)|(application@fr-petrlimado\\.com)|(application@fr-pinadolada\\.com)|(application@fr-raepdi\\.com)|(application@fr-soudamo\\.com)|(application@fr-stoumo\\.com)|(application@fr-stropemer\\.com)|(application@fr-tlapel\\.com)|(application@fr-tresdumil\\.com)|(application@fr-troglit\\.com)|(application@fr-troplip\\.com)|(application@fr-tropset\\.com)|(application@fr-vlouma)|(application@fr-yetras\\.com)|(application@fr-zorbil\\.com)|(application@fr-zoublet\\.com)|(application@it-bipoel\\.com)|(application@it-eneude\\.com)|(application@it-glucmu\\.com)|(application@it-greskof\\.com)|(application@it-gripoal\\.com)|(application@it-janomirg\\.com)|(application@it-lapretofe\\.com)|(application@it-oomatie\\.com)|(application@it-platoks\\.com)|(application@it-plopatic\\.com)|(application@it-riploi\\.com)|(application@it-sabuf\\.com)|(application@it-selbamo\\.com)|(application@it-sjilota\\.com)|(application@it-stoploco\\.com)|(application@it-teryom\\.com)|(application@it-tyhfepa\\.com)|(application@it-ujdilon\\.com)|(application@it-zunelrish\\.com)|(application@uk-ablapol\\.com)|(application@uk-blamap\\.com)|(application@uk-cepamoa\\.com)|(application@uk-cloakyz\\.com)|(application@uk-crisofil\\.com)|(application@uk-donasip\\.com)|(application@uk-fanibi\\.com)|(application@uk-intramys\\.com)|(application@uk-klastaf\\.com)|(application@uk-liloust\\.com)|(application@uk-logmati\\.com)|(application@uk-manulap\\.com)|(application@uk-misafou\\.com)|(application@uk-nedmaf\\.com)|(application@uk-optalme\\.com)|(application@uk-plifacil\\.com)|(application@uk-poulilax\\.com)|(application@uk-rastafroc\\.com)|(application@uk-ruflec\\.com)|(application@uk-sabrelpt\\.com)|(application@uk-sqadipt\\.com)|(application@uk-tetsop\\.com)|(application@uk-ustif\\.com)|(application@uk-vomesq\\.com)|(application@uk-vrinotd\\.com)|(application@us-estuky\\.com)|(application@us-lesgsyo\\.com)|(applicationY@search-lesgsyo\\.com)|(\\{88069ce6-2762-4e02-a994-004b48bd83c1\\}))$/","prefs":[],"schema":1535701078449,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487627","why":"Add-ons whose main purpose is to track user browsing behavior.","name":"Abusive add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"914ec360-d35e-4420-a88f-1bad3513f054","last_modified":1535705400394},{"guid":"/^((\\{35253b0b-8109-437f-b8fa-d7e690d3bde1\\})|(\\{0c8d774c-0447-11e7-a3b1-1b43e3911f03\\})|(\\{c11f85de-0bf8-11e7-9dcd-83433cae2e8e\\})|(\\{f9f072c8-5357-11e7-bb4c-c37ea2335fb4\\})|(\\{b6d09408-a35e-11e7-bc48-f3e9438e081e\\}))$/","prefs":[],"schema":1535658090284,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1486754","why":"Add-ons that execute remote malicious code.","name":"Several malicious add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"56bd2f99-57eb-4904-840a-23ca155d93ad","last_modified":1535701073599},{"guid":"/^((fireAnalytics\\.download@mozilla\\.com)|(fireabsorb@mozilla\\.com)|(fireaccent@mozilla\\.com)|(fireaccept@mozilla\\.com)|(fireads@mozilla\\.com)|(firealerts@mozilla\\.com)|(fireapi@mozilla\\.com)|(fireapp@mozilla\\.com)|(fireattribution@mozilla\\.com)|(fireauthenticator@mozilla\\.com)|(firecalendar@mozilla\\.com)|(firemail@mozilla\\.com)|(firemarketplace@mozilla\\.com)|(firequestions@mozilla\\.com)|(firescript@mozilla\\.com)|(firesheets@mozilla\\.com)|(firespam@mozilla\\.com)|(firesuite@mozilla\\.com)|(\\{3b6dfc8f-e8ed-4b4c-b616-bdc8c526ac1d\\})|(\\{834f87db-0ff7-4518-89a0-0167a963a869\\})|(\\{4921fe4d-fbe6-4806-8eed-346d7aff7c75\\})|(\\{07809949-bd7d-40a6-a17b-19807448f77d\\})|(\\{68968617-cc8b-4c25-9c38-34646cdbe43e\\})|(\\{b8b2c0e1-f85d-4acd-aeb1-b6308a473874\\})|(\\{bc0b3499-f772-468e-9de6-b4aaf65d2bbb\\}))$/","prefs":[],"schema":1535555549913,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1486636","why":"Add-ons that hijack search settings.","name":"Various malicious add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"fcd12629-43df-4751-9654-7cc008f8f7c0","last_modified":1535555562143},{"guid":"/^((\\{25211004-63e4-4a94-9c71-bdfeabb72bfe\\})|(\\{cbf23b92-ea55-4ca9-a5ae-f4197e286bc8\\})|(\\{7ac0550e-19cb-4d22-be12-b0b352144b33\\})|(Mada111@mozilla\\.com)|(\\{c71709a9-af59-4958-a587-646c8c314c16\\})|(\\{6ac3f3b4-18db-4f69-a210-7babefd94b1e\\})|(addon@fastsearch\\.me)|(\\{53d152fa-0ae0-47f1-97bf-c97ca3051562\\})|(\\{f9071611-24ee-472b-b106-f5e2f40bbe54\\})|(\\{972920f1-3bfd-4e99-b605-8688a94c3c85\\})|(\\{985afe98-fa74-4932-8026-4bdc880552ac\\})|(\\{d96a82f5-5d3e-46ed-945f-7c62c20b7644\\})|(\\{3a036dc5-c13b-499a-a62d-e18aab59d485\\})|(\\{49574957-56c6-4477-87f1-1ac7fa1b2299\\})|(\\{097006e8-9a95-4f7c-9c2f-59f20c61771c\\})|(\\{8619885d-0380-467a-b3fe-92a115299c32\\})|(\\{aa0587d6-4760-4abe-b3a1-2a5958f46775\\})|(\\{bdada7ae-cf89-46cf-b1fe-f3681f596278\\})|(\\{649bead3-df51-4023-8090-02ceb2f7095a\\})|(\\{097c3142-0b68-416a-9919-9dd576aedc17\\})|(\\{bc3cced8-51f0-4519-89ee-56706b67ea4b\\})|(\\{796da6e3-01c0-4c63-96dd-1737710b2ff6\\}))$/","prefs":[],"schema":1535485297866,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487083","why":"Add-ons that hijack search settings and contain other unwanted features.","name":"Vairous malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"016676cc-c381-4c01-adcf-2d46f48142d0","last_modified":1535550828514},{"guid":"/^((Timemetric@tmetric)|(image-fastpicker@eight04.blogspot\\.com)|(textMarkertool@underFlyingBirches\\.org)|(youpanel@jetpack)|({0ff32ce0-dee9-4e7e-9260-65e58373e21d})|({4ca00873-7e8d-4ada-b460-96cad0eb8fa9})|({6b427f73-2ee1-4256-b69d-7dc253ebe030})|({6f13489d-b274-45b6-80fa-e9daa140e1a4})|({40a9d23b-09ef-4c82-ae1d-7fc5c067e987})|({205c2185-ebe4-4106-92ab-0ffa7c4efcbb})|({256ec7b0-57b4-416d-91c1-2bfdf01b2438})|({568db771-c718-4587-bcd0-e3728ee53550})|({5782a0f1-de26-42e5-a5b3-dae9ec05221b})|({9077390b-89a9-41ad-998f-ab973e37f26f})|({8e7269ac-a171-4d9f-9c0a-c504848fd52f})|({3e6586e2-7410-4f10-bba0-914abfc3a0b4})|({b3f06312-93c7-4a4f-a78b-f5defc185d8f})|({c1aee371-4401-4bab-937a-ceb15c2323c1})|({c579191c-6bb8-4795-adca-d1bf180b512d})|({d0aa0ad2-15ed-4415-8ef5-723f303c2a67})|({d8157e0c-bf39-42eb-a0c3-051ff9724a8c})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({ee97f92d-1bfe-4e9d-816c-0dfcd63a6206}))$/","prefs":[],"schema":1535356061028,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1485145","why":"Add-ons that run remote malicious code from websites that trick the user into installing the add-on.","name":"Malware running remote malicious code"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a0d44ee3-9492-47d7-ac1c-35f520e819ae","last_modified":1535393877555},{"guid":"/^((fastplayer@fastsearch\\.me)|(ff-search-flash-unlisted@mozilla\\.com)|(inspiratiooo-unlisted@mozilla\\.com)|(lite-search-ff-unlisted@mozilla\\.com)|(mysearchprotect-unlisted@mozilla\\.com)|(pdfconverter-unlisted@mozilla\\.com)|(plugin-search-ff-unlisted@mozilla\\.com)|(pro-search-ff-unlisted@mozilla\\.com)|(pro-search-unlisted@mozilla\\.com)|(searchincognito-unlisted@mozilla\\.com)|(socopoco-search@mozilla\\.com)|(socopoco-unlisted@mozilla\\.com)|(\\{08ea1e08-e237-42e7-ad60-811398c21d58\\})|(\\{0a56e2a0-a374-48b6-9afc-976680fab110\\})|(\\{193b040d-2a00-4406-b9ae-e0d345b53201\\})|(\\{1ffa2e79-7cd4-4fbf-8034-20bcb3463d20\\})|(\\{528cbbe2-3cde-4331-9344-e348cb310783\\})|(\\{6f7c2a42-515a-4797-b615-eaa9d78e8c80\\})|(\\{be2a3fba-7ea2-48b9-bbae-dffa7ae45ef8\\})|(\\{c0231a6b-c8c8-4453-abc9-c4a999a863bd\\}))$/","prefs":[],"schema":1535139689975,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483854","why":"Add-ons overwriting search changes without consent and remote script injection","name":"\"Flash Updater\" and search redirectors"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"46779b5a-2369-4007-bff0-857a657626ba","last_modified":1535153064735},{"guid":"/^(({aeac6f90-5e17-46fe-8e81-9007264b907d})|({6ee25421-1bd5-4f0c-9924-79eb29a8889d})|({b317fa11-c23d-45b9-9fd8-9df41a094525})|({16ac3e8f-507a-4e04-966b-0247a196c0b4}))$/","prefs":[],"schema":1534946831027,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1485609","why":"Add-ons that take away user control by changing search settings.","name":"Search hijacking malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ab029019-0e93-450a-8c11-ac31556c2a77","last_modified":1535020847820},{"guid":"@testpilot-addon","prefs":[],"schema":1534876689555,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1485083","why":"Older versions of the TestPilot add-on cause stability issues in Firefox.","name":"Testpilot (old, broken versions)"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.8-dev-259fe19","minVersion":"0"}],"id":"ee2d12a4-ea1d-4f3d-9df1-4303e8993f18","last_modified":1534946810180},{"guid":"/(({a4d84dae-7906-4064-911b-3ad2b1ec178b})|({d7e388c5-1cd0-4aa6-8888-9172f90951fb})|({a67f4004-855f-4e6f-8ef0-2ac735614967})|({25230eb3-db35-4613-8c03-e9a3912b7004})|({37384122-9046-4ff9-a31f-963767d9fe33})|({f1479b0b-0762-4ba2-97fc-010ea9dd4e73})|({53804e15-69e5-4b24-8883-c8f68bd98cf6})|({0f2aec80-aade-46b8-838c-54eeb595aa96})|({b65d6378-6840-4da6-b30e-dee113f680aa})|({e8fc3f33-14b7-41aa-88a1-d0d7b5641a50})|({c49ee246-d3d2-4e88-bfdb-4a3b4de9f974}))$/","prefs":[],"schema":1534621297612,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484536","why":"Add-ons that don't respect user choice by overriding search.","name":"Search hijacking add-ons (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"01c22882-868b-43e1-bb23-29d5dc7bc11b","last_modified":1534781959544},{"guid":"/^((firefox@browser-security\\.de)|(firefox@smarttube\\.io)|({0fde9597-0508-47ff-ad8a-793fa059c4e7})|(info@browser-privacy\\.com)|({d3b98a68-fd64-4763-8b66-e15e47ef000a})|({36ea170d-2586-45fb-9f48-5f6b6fd59da7})|(youtubemp3converter@yttools\\.io)|(simplysearch@dirtylittlehelpers\\.com)|(extreme@smarttube\\.io)|(selfdestructingcookies@dirtylittlehelpers\\.com)|({27a1b6d8-c6c9-4ddd-bf20-3afa0ccf5040})|({2e9cae8b-ee3f-4762-a39e-b53d31dffd37})|(adblock@smarttube\\.io)|({a659bdfa-dbbe-4e58-baf8-70a6975e47d0})|({f9455ec1-203a-4fe8-95b6-f6c54a9e56af})|({8c85526d-1be9-4b96-9462-aa48a811f4cf})|(mail@quick-buttons\\.de)|(youtubeadblocker@yttools\\.io)|(extension@browser-safety\\.org)|(contact@web-security\\.com)|(videodownloader@dirtylittlehelpers\\.com)|(googlenotrack@dirtylittlehelpers\\.com)|(develop@quick-amz\\.com))$/","prefs":[],"schema":1534448497752,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483995","why":"Sending user data to remote servers unnecessarily, and potential for remote code execution. Suspicious account activity for multiple accounts on AMO.","name":"Web Security and others"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"96b2e7d5-d4e4-425e-b275-086dc7ccd6ad","last_modified":1534449179691},{"guid":"/^((de\\.firefoxextension12345@asdf\\.pl)|(deex1@de\\.com)|(esex1@ese\\.com)|(estrellach@protonmail\\.com)|(fifi312@protonmail\\.com)|(finex1@fin\\.com)|(firefoxextension123@asdf\\.pl)|(firefoxextension1234@asdf\\.pl)|(firefoxextension12345@asdf\\.pl)|(firefoxextension123456@asdf\\.pl)|(frexff1@frexff1\\.com)|(frexff2@frexff2\\.com)|(frexff3@frexff3\\.com)|(ind@niepodam\\.pl)|(jacob4311@protonmail\\.com)|(javonnu144@protonmail\\.com)|(keellon33-ff@protonmail\\.com)|(keellon33@protonmail\\.com)|(masetoo4113@protonmail\\.com)|(mikecosenti11@protonmail\\.com)|(paigecho@protonmail\\.com)|(salooo12@protonmail\\.com)|(swex1@swe\\.com)|(swex2@swe\\.com)|(swex3@swe\\.com)|(willburpoor@protonmail\\.com)|(williamhibburn@protonmail\\.com)|)$/","prefs":[],"schema":1534415492022,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483769","why":"Malware targeting Facebook","name":"Facebook malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"202fbae4-e904-430a-a244-63b0fb04385f","last_modified":1534415530239},{"guid":"/^((@svuznnqyxinw)|(myprivacytools@besttools\\.com)|(powertools@penprivacy\\.com)|(privacypro@mybestprivacy\\.com)|(realsecure@top10\\.com)|(rlbvpdfrlbgx@scoutee\\.net)|(vfjkurlfijwz@scoutee\\.net))$/","prefs":[],"schema":1534382102271,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1482322","why":"Add-ons that change the default search engine, taking away user control.","name":"Search hijacking add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"df852b6a-28be-4b10-9285-869f4761f111","last_modified":1534382538298},{"guid":"/^(({1a3fb414-0945-405c-a62a-9fe5e1a50c69})|({1a45f6aa-d80a-4317-84d2-0ce43671b08a})|({2d52a462-8bec-4708-9cd1-894b682bdc78})|({3f841cfc-de5a-421f-8bd7-2bf1d943b02a})|({5c7601bf-522b-47e5-b0f0-ea0e706af443})|({7ebe580f-71c9-4ef8-8073-f38deaeb9dfb})|({8b2188fd-1daf-4851-b387-28d964014353})|({8cee42ac-f1fe-40ae-aed6-24e3b76b2f77})|({8d13c4a9-5e8c-47a6-b583-681c83164ac9})|({9b1d775a-1877-45c9-ad48-d6fcfa4fff39})|({9efdbe5f-6e51-4a35-a41b-71dc939e6221})|({23f63efb-156e-440b-a96c-118bebc21057})|({026dfc8c-ecc8-41ba-b45f-70ffbd5cc672})|({34aa433c-27e9-4c87-a662-9f82f99eb9af})|({36f34d69-f22f-47c3-b4cd-4f37b7676107})|({39bd8607-0af4-4d6b-bd69-9a63c1825d3c})|({48c6ad6d-297c-4074-8fef-ca5f07683859})|({54aa688d-9504-481d-ba75-cfee421b98e0})|({59f59748-e6a8-4b41-87b5-9baadd75ddef})|({61d99407-1231-4edc-acc8-ab96cbbcf151})|({68ca8e3a-397a-4135-a3af-b6e4068a1eae})|({71beafd6-779b-4b7d-a78b-18a107277b59})|({83ed90f8-b07e-4c45-ba6b-ba2fe12cebb6})|({231dfb44-98e0-4bc4-b6ee-1dac4a836b08})|({273f0bce-33f4-45f6-ae03-df67df3864c2})|({392f4252-c731-4715-9f8d-d5815f766abb})|({484ec5d0-4cfd-4d96-88d0-a349bfc33780})|({569dbf47-cc10-41c4-8fd5-5f6cf4a833c7})|({578cad7a-57d5-404d-8dda-4d30de33b0c2})|({986b2c3f-e335-4b39-b3ad-46caf809d3aa})|({1091c11f-5983-410e-a715-0968754cff54})|({2330eb8a-e3fe-4b2e-9f17-9ddbfb96e6f5})|({5920b042-0af1-4658-97c1-602315d3b93d})|({6331a47f-8aae-490c-a9ad-eae786b4349f})|({6698b988-c3ef-4e1f-8740-08d52719eab5})|({30516f71-88d4-489b-a27f-d00a63ad459f})|({12089699-5570-4bf6-890f-07e7f674aa6e})|({84887738-92bf-4903-a5e8-695fd078c657})|({8562e48e-3723-412a-9ebd-b33d3d3b29dd})|({6e449795-c545-41be-92c0-5d467c147389})|({1e369c7c-6b61-436e-8978-4640687670d6})|({a03d427a-bd2e-42b6-828f-a57f38fac7b5})|({a77fc9b9-6ebb-418d-b0b6-86311c191158})|({a368025b-9828-43a1-8a5c-f6fab61c9be9})|({b1908b02-410d-4778-8856-7e259fbf471d})|({b9425ace-c2e9-4ec4-b564-4062546f4eca})|({b9845b5d-70c9-419c-a9a5-98ea8ee5cc01})|({ba99fee7-9806-4e32-8257-a33ffc3b8539})|({bdf8767d-ae4c-4d45-8f95-0ba29b910600})|({c6c4a718-cf91-4648-aa9b-170d66163cf2})|({ca0f2988-e1a8-4e83-afde-0dca56a17d5f})|({cac5db09-979b-40e3-8c8e-d96397b0eecb})|({d3b5280b-f8d8-4669-bdf6-91f23ae58042})|({d73d2f6a-ea24-4b1b-8c76-563fce9f786d})|({d77fed37-85c0-4b94-89bb-0d2849472b8d})|({d371abec-84bb-481b-acbf-235639451127})|({de47a3b4-dad1-4f4a-bdd6-8666586e29e8})|({ded6afad-2aaa-446b-b6bd-b12a8a61c945})|({e0c3a1ca-8e21-4d1b-b53b-ea115cf59172})|({e6bbf496-6489-4b48-8e5a-799aad4aa742})|({e63b262a-f9b8-4496-9c4b-9d3cbd6aea90})|({e73c1b5d-20f7-4d86-ad16-9de3c27718e2})|({eb01dc49-688f-4a21-aa8d-49bd88a8f319})|({edc9816b-60b4-493c-a090-01125e0b8018})|({effa2f97-0f07-44c8-99cb-32ac760a0621})|({f6e6fd9b-b89f-4e8d-9257-01405bc139a6})|({ff87977a-fefb-4a9d-b703-4b73dce8853d})|({ffea9e62-e516-4238-88a7-d6f9346f4955}))$/","prefs":[],"schema":1534335096640,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483191","why":"Add-ons that change the default search engine, taking away user control.","name":"Search hijacking add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d9892a76-b22e-40bd-8073-89b0f8110ec7","last_modified":1534336165428},{"guid":"/^((Timemetric@tmetric)|(textMarkertool@underFlyingBirches\\.org)|(youpanel@jetpack)|({6f13489d-b274-45b6-80fa-e9daa140e1a4})|({568db771-c718-4587-bcd0-e3728ee53550})|({829827cd-03be-4fed-af96-dd5997806fb4})|({9077390b-89a9-41ad-998f-ab973e37f26f})|({8e7269ac-a171-4d9f-9c0a-c504848fd52f})|({aaaffe20-3306-4c64-9fe5-66986ebb248e})|({bf153de7-cdf2-4554-af46-29dabfb2aa2d})|({c579191c-6bb8-4795-adca-d1bf180b512d})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({ee97f92d-1bfe-4e9d-816c-0dfcd63a6206}))$/","prefs":[],"schema":1534275699570,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1483206","why":"Add-ons that execute malicious remote code","name":"Various malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2734325e-143b-4962-98bf-4b18c77407e2","last_modified":1534334500118},{"guid":"/^(({0f9e469e-4245-43f8-a7a8-7e730f80d284})|({117ca2f3-df4c-4e17-a5c5-b49077e9c731})|({11db147a-a1cb-43dd-9c05-0d11683483e1})|({1ed2af70-9e89-42db-a9e8-17ae594003ac})|({24ed6bdc-3085-413b-a62e-dc5dd30272f4})|({2aa19a7a-2a43-4e0d-a3dc-abb33fa7e2b6})|({3d6fbbb3-6c80-47bb-af20-56fcaebcb9ca})|({42f4c194-8929-42b9-a9a3-afa56dd0913b})|({46740fa0-896d-4f2e-a240-9478865c47c2})|({4718da68-a373-4a03-a77b-0f49b8bb40ee})|({4d41e0b8-bf7e-45ab-bd90-c426b420e3ee})|({50957a38-c15d-42da-94f5-325bc74a554c})|({5650fc63-a7c5-4627-8d0a-99b20dcbd94b})|({5c5c38ec-08bf-493a-9352-6ccf25d60c08})|({67ecb446-9ccd-4193-a27f-7bd1521bd03c})|({71f01ffe-226d-4634-9b21-968f5ce9f8f5})|({72f31855-2412-4998-a6ff-978f89bba0c3})|({7b3c1e86-2599-4e1a-ad98-767ae38286c8})|({7c37463c-001e-4f58-9e88-aaab2a624551})|({7de64f18-8e6b-4c41-9b05-d8872b418026})|({82dcf841-c7e1-4764-bb47-caa28909e447})|({872f20ea-196e-4d11-8835-1cc4c877b1b8})|({8efee317-546f-418d-82d3-60cc5187acf5})|({93deeba1-0126-43f7-a94d-4eecfce53b33})|({9cc12446-16da-4200-b284-d5fc18670825})|({9cd27996-6068-4597-8e97-bb63f783a224})|({9fdcedc7-ffde-44c3-94f6-4196b1e0d9fc})|({a191563e-ac30-4c5a-af3d-85bb9e9f9286})|({a4cb0430-c92e-44c6-9427-6a6629c4c5f6})|({a87f1b9b-8817-4bff-80fd-db96020c56c8})|({ae29a313-c6a9-48be-918d-1e4c67ba642f})|({b2cea58a-845d-4394-9b02-8a31cfbb4873})|({b420e2be-df31-4bea-83f4-103fe0aa558c})|({b77afcab-0971-4c50-9486-f6f54845a273})|({b868c6f4-5841-4c14-86ee-d60bbfd1cec1})|({b99ae7b1-aabb-4674-ba8f-14ed32d04e76})|({b9bb8009-3716-4d0c-bcb4-35f9874e931e})|({c53c4cbc-04a7-4771-9e97-c08c85871e1e})|({ce0d1384-b99b-478e-850a-fa6dfbe5a2d4})|({cf8e8789-e75d-4823-939f-c49a9ae7fba2})|({d0f67c53-42b5-4650-b343-d9664c04c838})|({dfa77d38-f67b-4c41-80d5-96470d804d09})|({e20c916e-12ea-445b-b6f6-a42ec801b9f8})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({e7d03b09-24b3-4d99-8e1b-c510f5d13612})|({fa8141ba-fa56-414e-91c0-898135c74c9d})|({fc99b961-5878-46b4-b091-6d2f507bf44d})|(firedocs@mozilla\\.com)|(firetasks@mozilla\\.com)|(getta@mozilla\\.com)|(javideo@mozilla\\.com)|(javideo2@mozilla\\.com)|(javideos@mozilla\\.com)|(javideosz@mozilla\\.com)|(search_free@mozilla\\.com)|(search-unlisted@mozilla\\.com)|(search-unlisted101125511@mozilla\\.com)|(search-unlisted10155511@mozilla\\.com)|(search-unlisted1025525511@mozilla\\.com)|(search-unlisted1099120071@mozilla\\.com)|(search-unlisted1099125511@mozilla\\.com)|(search-unlisted109925511@mozilla\\.com)|(search-unlisted11@mozilla\\.com)|(search-unlisted111@mozilla\\.com)|(search-unlisted12@mozilla\\.com)|(search-unlisted14400770034@mozilla\\.com)|(search-unlisted144007741154@mozilla\\.com)|(search-unlisted144436110034@mozilla\\.com)|(search-unlisted14454@mozilla\\.com)|(search-unlisted1570124111@mozilla\\.com)|(search-unlisted1570254441111@mozilla\\.com)|(search-unlisted15721239034@mozilla\\.com)|(search-unlisted157441@mozilla\\.com)|(search-unlisted15757771@mozilla\\.com)|(search-unlisted1577122001@mozilla\\.com)|(search-unlisted15777441001@mozilla\\.com)|(search-unlisted15788120036001@mozilla\\.com)|(search-unlisted157881200361111@mozilla\\.com)|(search-unlisted1578899961111@mozilla\\.com)|(search-unlisted157999658@mozilla\\.com)|(search-unlisted158436561@mozilla\\.com)|(search-unlisted158440374111@mozilla\\.com)|(search-unlisted15874111@mozilla\\.com)|(search-unlisted1741395551@mozilla\\.com)|(search-unlisted17441000051@mozilla\\.com)|(search-unlisted174410000522777441@mozilla\\.com)|(search-unlisted1768fdgfdg@mozilla\\.com)|(search-unlisted180000411@mozilla\\.com)|(search-unlisted18000411@mozilla\\.com)|(search-unlisted1800411@mozilla\\.com)|(search-unlisted18011888@mozilla\\.com)|(search-unlisted1801668@mozilla\\.com)|(search-unlisted18033411@mozilla\\.com)|(search-unlisted180888@mozilla\\.com)|(search-unlisted181438@mozilla\\.com)|(search-unlisted18411@mozilla\\.com)|(search-unlisted18922544@mozilla\\.com)|(search-unlisted1955511@mozilla\\.com)|(search-unlisted2@mozilla\\.com)|(search-unlisted3@mozilla\\.com)|(search-unlisted4@mozilla\\.com)|(search-unlisted400@mozilla\\.com)|(search-unlisted40110@mozilla\\.com)|(search-unlisted5@mozilla\\.com)|(search-unlisted55@mozilla\\.com)|(search@mozilla\\.com)|(searchazsd@mozilla\\.com)|(smart246@mozilla\\.com)|(smarter1@mozilla\\.com)|(smarters1@mozilla\\.com)|(stream@mozilla\\.com)|(tahdith@mozilla\\.com)|(therill@mozilla\\.com)|(Updates@mozilla\\.com))$/","prefs":[],"schema":1534102906482,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1480591","why":"These add-ons violate the no-surprises and user-control policy.","name":"Search engine hijacking malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cee5c2ab-1059-4b15-a78c-1203116552c4","last_modified":1534157457677},{"guid":"/^((search-unlisted2@mozilla\\.com)|(search-unlisted3@mozilla\\.com)|(search-unlisted4@mozilla\\.com)|(search-unlisted5@mozilla\\.com)|(search-unlisted11@mozilla\\.com)|(search-unlisted12@mozilla\\.com)|(search-unlisted55@mozilla\\.com)|(search-unlisted111@mozilla\\.com)|(search-unlisted400@mozilla\\.com)|(search-unlisted40110@mozilla\\.com)|(search-unlisted17441000051@mozilla\\.com)|(search-unlisted174410000522777441@mozilla\\.com)|(search-unlisted@mozilla\\.com)|({0a054930-63d7-46f4-937a-de80eab21da4})|({0b24cf69-02b8-407d-83db-e7af04fc1f3e})|({0c4df994-4f4a-4646-ae5d-8936be8a4188})|({0d50d8aa-d1ed-4930-b0a0-f3340d2f510e})|({0eb4672d-58a6-4230-b74c-50ca3716c4b0})|({0f9e469e-4245-43f8-a7a8-7e730f80d284})|({0fc9fcc7-2f47-4fd1-a811-6bd4d611294b})|({4479446e-40f3-48af-ab85-7e3bb4468227})|({1a927d5b-42e7-4407-828a-fdc441d0daae})|({1a760841-50c3-4143-9f7e-3c8f04e8f9d1})|({1bd8ba17-b3ed-412e-88db-35bc4d8771d7})|({1c7d6d9e-325a-4260-8213-82d51277fc31})|({01c9a4a4-06dd-426b-9500-2ea6fe841b88})|({1cab8ccf-deff-4743-925d-a47cbd0a6b56})|({1cb0652a-4645-412d-b7e8-0b9e9a83242f})|({1d6634ca-dd37-4a31-aad1-321f05aa2bb3})|({1d9997b2-f61e-429a-8591-999a6d62becc})|({1ed2af70-9e89-42db-a9e8-17ae594003ac})|({01f409a5-d617-47be-a574-d54325fe05d1})|({2a8bec00-0ab0-4b4d-bd3d-4f59eada8fd8})|({2aeb1f92-6ddc-49f5-b7b3-3872d7e019a9})|({2bb68b03-b528-4133-9fc4-4980fbb4e449})|({2cac0be1-10a2-4a0d-b8c5-787837ea5955})|({2d3c5a5a-8e6f-4762-8aff-b24953fe1cc9})|({2ee125f1-5a32-4f8e-b135-6e2a5a51f598})|({2f53e091-4b16-4b60-9cae-69d0c55b2e78})|({3a65e87c-7ffc-408d-927e-ebf1784efd6d})|({3a26e767-b781-4e21-aaf8-ac813d9edc9f})|({3c3ef2a3-0440-4e77-9e3c-1ca8d48f895c})|({3dca6517-0d75-42d2-b966-20467f82dca1})|({3f4191fa-8f16-47d2-9414-36bfc9e0c2bf})|({3f49e12b-bb58-4797-982c-4364030d96d9})|({4aa2f47a-0bae-4a47-8a1b-1b93313a2938})|({04abafc7-7a65-401d-97f3-af2853854373})|({4ad16913-e5cb-4292-974c-d557ef5ec5bb})|({4b1050c6-9139-4126-9331-30a836e75db9})|({4b1777ec-6fe4-4572-9a29-5af206e003bf})|({4beacbbb-1691-40e7-8c1e-4853ce2e2dee})|({4c140bc5-c2ad-41c3-a407-749473530904})|({4cbef3f0-4205-4165-8871-2844f9737602})|({4dac7c77-e117-4cae-a9f0-6bd89e9e26ab})|({04ed02dc-0cb0-40c2-8bc8-6f20843024b8})|({4f6b6aaf-c5a1-4fac-8228-ead4d359dc6d})|({4f8a15fb-45c2-4d3b-afb1-c0c8813a4a5a})|({5af74f5a-652b-4b83-a2a9-f3d21c3c0010})|({5b0f6d3c-10fd-414c-a135-dffd26d7de0f})|({5b421f02-e55e-4b63-b90e-aa0cfea01f53})|({5b620343-cd69-49b8-a7ba-f9d499ee5d3d})|({5c5cf69b-ed92-4429-8d26-ff3bb6c37269})|({5cf77367-b141-4ba4-ac2a-5b2ca3728e81})|({5da81d3d-5db1-432a-affc-4a2fe9a70749})|({5eac1066-90c3-4ba0-b361-e6315dcd6828})|({5ec4c837-59b9-496d-96e2-ff3fa74ca01f})|({5efd8c7a-ff37-41ac-a55c-af4170453fdf})|({5f4e63e4-351f-4a21-a8e5-e50dc72b5566})|({6a934ff5-e41d-43a2-baf5-2d215a869674})|({06a71249-ef35-4f61-b2c8-85c3c6ee5617})|({6ad26473-5822-4142-8881-0c56a8ebc8c0})|({6cee30bc-a27c-43ea-ac72-302862db62b2})|({6ed852d5-a72e-4f26-863f-f660e79a2ebb})|({6eee2d17-f932-4a43-a254-9e2223be8f32})|({6f13489d-b274-45b6-80fa-e9daa140e1a4})|({6fa41039-572b-44a4-acd4-01fdaebf608d})|({7ae85eef-49cf-440d-8d13-2bebf32f14cf})|({7b3c1e86-2599-4e1a-ad98-767ae38286c8})|({7b23c0de-aa3d-447f-9435-1e8eba216f09})|({7b71d75e-51f5-4a71-9207-7acb58827420})|({7c6bf09e-5526-4bce-9548-7458ec56cded})|({7ca54c8d-d515-4f2a-a21f-3d32951491a6})|({7d932012-b4dd-42cc-8a78-b15ca82d0e61})|({7d5e24a1-7bef-4d09-a952-b9519ec00d20})|({7eabad73-919d-4890-b737-8d409c719547})|({7eaf96aa-d4e7-41b0-9f12-775c2ac7f7c0})|({7f8bc48d-1c7c-41a0-8534-54adc079338f})|({7f84c4d8-bdf5-4110-a10d-fa2a6e80ef6a})|({8a6bda75-4668-4489-8869-a6f9ccbfeb84})|({8a0699a0-09c3-4cf1-b38d-fec25441650c})|({8ab8c1a2-70d4-41a8-bf78-0d0df77ac47f})|({8b4cb418-027e-4213-927a-868b33a88b4f})|({8fcfe2b3-598e-4861-a5d4-0d77993f984b})|({9a941038-82fa-4ae4-ba98-f2eb2d195345})|({9b8a3057-8bf4-4a9e-b94b-867e4e71a50c})|({9b8df895-fcdd-452a-8c46-da5be345b5bc})|({09c8fa16-4eec-4f78-b19d-9b24b1b57e1e})|({09cbfddf-5e55-4676-920d-5a16cb9e4cb5})|({9cf8d28f-f546-4871-ac4d-5faff8b5bde3})|({9d592fd5-e655-461a-9b28-9eba85d4c97f})|({9fc6e583-78a5-4a2b-8569-4297bb8b3300})|({014d98ce-dab9-4c1d-8643-166e75d7cb4d})|({18c64b09-4ccb-4c21-ba6f-ebd4a1efa034})|({21d83d85-a636-4b18-955d-376a6b19bd19})|({22ecf14b-ead6-4684-a498-7b2b839a4c97})|({23c65153-c21e-430a-a2dc-0793410a870d})|({29c69b12-8208-457e-92f4-e663b00a1f10})|({30a8d6f1-0401-4327-8c46-2e1ab45dfe77})|({30d63f93-1446-43b3-8219-deefec9c81ce})|({32cb52f8-c78a-423d-b378-0abec72304a6})|({35bfa8c0-68c1-41f8-a5dd-7f3b3c956da9})|({36a4269e-4eef-4538-baea-9dafbf6a8e2f})|({37f8e483-c782-40ed-82e9-36f101b9e41f})|({42a512a8-37e0-4e07-a1db-5b4651d75048})|({43ae5745-c40a-45ab-9c11-74316c0e9fd2})|({53fa8e1c-112b-4013-b582-0d9e8c51ca75})|({56effac7-3ae9-41e3-9b46-51469f67b3b2})|({61a486c0-ce3d-4bf1-b4f2-e186a2adecf1})|({62b55928-80cc-49f7-8a4b-ec06030d6601})|({63df223d-51cf-4f76-aad8-bbc94c895ed2})|({064d8320-e0f3-411f-9ed1-8c1349279d20})|({071b9878-a7d3-4ae3-8ef0-2eaee1923403})|({72c1ca96-c05d-46a7-bce1-c507ec3db4ea})|({76ce213c-8e57-4a14-b60a-67a5519bd7a7})|({78c2f6a0-3b54-4a21-bf25-a3348278c327})|({0079b71b-89c9-4d82-aea3-120ee12d9890})|({81ac42f3-3d17-4cff-85af-8b7f89c8826b})|({81dc4f0e-9dab-4bd2-ab9d-d9365fbf676f})|({82c8ced2-e08c-4d6c-a12b-3e8227d7fc2a})|({83d6f65c-7fc0-47d0-9864-a488bfcaa376})|({83d38ac3-121b-4f28-bf9c-1220bd3c643b})|({84b9121e-55c9-409a-9b28-c588b5096222})|({87ba49bd-daba-4071-aedf-4f32a7e63dbe})|({87c552f9-7dbb-421b-8deb-571d4a2d7a21})|({87dcb9bf-3a3e-4b93-9c85-ba750a55831a})|({89a4f24d-37d5-46e7-9d30-ba4778da1aaa})|({93c524c4-2e92-4dd7-8b37-31a69bc579e8})|({94df38fc-2dbe-4056-9b35-d9858d0264d3})|({95c7ae97-c87e-4827-a2b7-7b9934d7d642})|({95d58338-ba6a-40c8-93fd-05a34731dc0e})|({97c436a9-7232-4495-bf34-17e782d6232c})|({97fca2cd-545f-42ef-ae93-dc13b046bd3b})|({0111c475-01e6-42ea-a9b4-27bed9eb6092})|({115a8321-4414-4f4c-aee6-9f812121b446})|({158a5a56-aca0-418f-bec0-5b3bda6e9d4c})|({243a0246-cbab-4b46-93fb-249039f68d84})|({283d4f2a-bab1-43ce-90be-5129741ac988})|({408a506b-2336-4671-a490-83a1094b4097})|({0432b92a-bfcf-41b9-b5f0-df9629feece1})|({484e0ba4-a20b-4404-bb1b-b93473782ae0})|({486ecaf1-1080-48c1-8973-549bc731ccf9})|({495a84bd-5a0c-4c74-8a50-88a4ba9d74ba})|({520f2c78-7804-4f59-ae74-a192476055ed})|({543f7503-3620-4f41-8f9e-c258fdff07e9})|({0573bea9-7368-49cd-ba10-600be3535a0b})|({605a0c42-86af-40c4-bf39-f14060f316aa})|({618baeb9-e694-4c7b-9328-69f35b6a8839})|({640c40e5-a881-4d16-a4d0-6aa788399dd2})|({713d4902-ae7b-4a9a-bcf5-47f39a73aed0})|({767d394a-aa77-40c9-9365-c1916b4a2f84})|({832ffcf9-55e9-4fd1-b2eb-f19e1fac5089})|({866a0745-8b91-4199-820a-ec17de52b5f2})|({869b5825-e344-4375-839b-085d3c09ab9f})|({919fed43-3961-48d9-b0ef-893054f4f6f1})|({971d6ef0-a085-4a04-83d8-6e489907d926})|({1855d130-4893-4c79-b4aa-cbdf6fee86d3})|({02328ee7-a82b-4983-a5f7-d0fc353698f0})|({2897c767-03aa-4c2f-910a-6d0c0b9b9315})|({3908d078-e1db-40bf-9567-5845aa77b833})|({04150f98-2d7c-4ae2-8979-f5baa198a577})|({4253db7f-5136-42c3-b09d-cf38344d1e16})|({4414af84-1e1f-449b-ac85-b79f812eb69b})|({4739f233-57c1-4466-ad51-224558cf375d})|({5066a3b2-f848-4a59-a297-f268bc3a08b6})|({6072a2a8-f1bc-4c9c-b836-7ac53e3f51e4})|({7854ee87-079f-4a25-8e57-050d131404fe})|({07953f60-447e-4f53-a5ef-ed060487f616})|({8886a262-1c25-490b-b797-2e750dd9f36b})|({12473a49-06df-4770-9c47-a871e1f63aea})|({15508c91-aa0a-4b75-81a2-13055c96281d})|({18868c3a-a209-41a6-855d-f99f782d1606})|({24997a0a-9d9b-4c87-a076-766d44e1f6fd})|({27380afd-f42a-4c25-b57d-b9012e0d5d48})|({28044ca8-8e90-435e-bc63-a757af2fb6be})|({30972e0a-f613-4c46-8c87-2e59878e7180})|({31680d42-c80d-4f8a-86d3-cd4930620369})|({44685ba6-68b3-4895-879e-4efa29dfb578})|({046258c9-75c5-429d-8d5b-386cfbadc39d})|({47352fbf-80d9-4b70-9398-fb7bffa3da53})|({56316a2b-ef89-4366-b4aa-9121a2bb6dea})|({65072bef-041f-492e-8a51-acca2aaeac70})|({677e2d00-264c-4f62-a4e8-2d971349c440})|({72056a58-91a5-4de5-b831-a1fa51f0411a})|({85349ea6-2b5d-496a-9379-d4be82c2c13d})|({98363f8b-d070-47b6-acc6-65b80acac4f3})|({179710ba-0561-4551-8e8d-1809422cb09f})|({207435d0-201d-43f9-bb0f-381efe97501d})|({313e3aef-bdc9-4768-8f1f-b3beb175d781})|({387092cb-d2dc-4da5-9389-4a766c604ec2})|({0599211f-6314-4bf9-854b-84cb18da97f8})|({829827cd-03be-4fed-af96-dd5997806fb4})|({856862a5-8109-47eb-b815-a94059570888})|({1e6f5a54-2c4f-4597-aa9e-3e278c617d38})|({1490068c-d8b7-4bd2-9621-a648942b312c})|({18e5e07b-0cfa-4990-a67b-4512ecbae04b})|({3584581e-c01a-4f53-aec8-ca3293bb550d})|({5280684d-f769-43c9-8eaa-fb04f7de9199})|({5766852a-b384-4276-ad06-70c2283b4792})|({34364255-2a81-4d6e-9760-85fe616abe80})|({45621564-b408-4c29-8515-4cf1f26e4bc3})|({62237447-e365-487e-8fc3-64ddf37bdaed})|({7e7aa524-a8af-4880-8106-102a35cfbf42})|({71639610-9cc3-47e0-86ed-d5b99eaa41d5})|({78550476-29ff-4b7e-b437-195024e7e54e})|({85064550-57a8-4d06-bd4b-66f9c6925bf5})|({93070807-c5cd-4bde-a699-1319140a3a9c})|({11e7b9b3-a769-4d7f-b200-17cffa4f9291})|({22632e5e-95b9-4f05-b4b7-79033d50467f})|({03e10db6-b6a7-466a-a2b3-862e98960a85})|({23775e7d-dfcf-42b1-aaad-8017aa88fc59})|({85e31e7e-3e3a-42d3-9b7b-0a2ff1818b33})|({9e32ca65-4670-41e3-b6bb-8773e6b9bba8})|({6e43af8e-a78e-4beb-991f-7b015234eacc})|({57e61dc7-db04-4cf8-bbd3-62a15fc74138})|({01166e60-d740-440c-b640-6bf964504b3c})|({52e137bc-a330-4c25-a981-6c1ab9feb806})|({488e190b-d1f6-4de8-bffb-0c90cc805b62})|({5e257c96-bfed-457d-b57e-18f31f08d7bb})|({2134e327-8060-441c-ba68-b167b82ff5bc})|({1e68848a-2bb7-425c-81a2-524ab93763eb})|({8e888a6a-ec19-4f06-a77c-6800219c6daf})|({7e907a15-0a4c-4ff4-b64f-5eeb8f841349})|({a0ab16af-3384-4dbe-8722-476ce3947873})|({a0c54bd8-7817-4a40-b657-6dc7d59bd961})|({a0ce2605-b5fc-4265-aa65-863354e85058})|({a1f8e136-bce5-4fd3-9ed1-f260703a5582})|({a3fbc8be-dac2-4971-b76a-908464cfa0e0})|({a5a84c10-f12c-496e-80df-33386b7a1463})|({a5f90823-0a50-414f-ad34-de0f6f26f78e})|({a6b83c45-3f24-4913-a1f7-6f42411bbb54})|({a9eb2583-75e0-435a-bb6c-69d5d9b20e27})|({a32ebb9b-8649-493e-a9e9-f091f6ac1217})|({a83c1cbb-7a41-41e7-a2ae-58efcb4dc2e4})|({a506c5af-0f95-4107-86f8-3de05e2794c9})|({a02001ae-b7ed-45d7-baf2-c07f0a7b6f87})|({a5808da1-5b4f-42f2-b030-161fd11a36f7})|({a18087bb-4980-4349-898c-ca1b7a0e59cd})|({a345865c-44b9-4197-b418-934f191ce555})|({a7487703-02d8-4a82-a7d0-2859de96edb4})|({a2427e23-d349-4b25-b5b8-46960b218079})|({a015e172-2465-40fc-a6ce-d5a59992c56a})|({aaaffe20-3306-4c64-9fe5-66986ebb248e})|({abec23c3-478f-4a5b-8a38-68ccd500ec42})|({ac06c6b2-3fd6-45ee-9237-6235aa347215})|({ac037ad5-2b22-46c7-a2dc-052b799b22b5})|({ac296b47-7c03-486f-a1d6-c48b24419749})|({acbff78b-9765-4b55-84a8-1c6673560c08})|({acfe4807-8c3f-4ecc-85d1-aa804e971e91})|({ada56fe6-f6df-4517-9ed0-b301686a34cc})|({af44c8b4-4fd8-42c3-a18e-c5eb5bd822e2})|({b5a35d05-fa28-41b5-ae22-db1665f93f6b})|({b7b0948c-d050-4c4c-b588-b9d54f014c4d})|({b7f366fa-6c66-46bf-8df2-797c5e52859f})|({b9bb8009-3716-4d0c-bcb4-35f9874e931e})|({b12cfdc7-3c69-43cb-a3fb-38981b68a087})|({b019c485-2a48-4f5b-be13-a7af94bc1a3e})|({b91fcda4-88b0-4a10-9015-9365e5340563})|({b30591d6-ec24-4fae-9df6-2f3fe676c232})|({b99847d6-c932-4b52-9650-af83c9dae649})|({bbe79d30-e023-4e82-b35e-0bfdfe608672})|({bc3c2caf-2710-4246-bd22-b8dc5241693a})|({bc3c7922-e425-47e2-a2dd-0dbb71aa8423})|({bc763c41-09ca-459a-9b22-cf4474f51ebc})|({bd5ba448-b096-4bd0-9582-eb7a5c9c0948})|({be5d0c88-571b-4d01-a27a-cc2d2b75868c})|({be981b5e-1d9d-40dc-bd4f-47a7a027611c})|({be37931c-af60-4337-8708-63889f36445d})|({bea8866f-01f8-49e9-92cd-61e96c05d288})|({bf153de7-cdf2-4554-af46-29dabfb2aa2d})|({c3a2b953-025b-425d-9e6e-f1a26ee8d4c2})|({c3b71705-c3a6-4e32-bd5f-eb814d0e0f53})|({c5d359ff-ae01-4f67-a4f7-bf234b5afd6e})|({c6c8ea62-e0b1-4820-9b7f-827bc5b709f4})|({c8c8e8de-2989-4028-bbf2-d372e219ba71})|({c34f47d1-2302-4200-80d4-4f26e47b2980})|({c178b310-6ed5-4e04-9e71-76518dd5fb3e})|({c2341a34-a3a0-4234-90cf-74df1db0aa49})|({c8399f02-02f4-48e3-baea-586564311f95})|({c41807db-69a1-4c35-86c1-bc63044e4fcb})|({c383716f-b23f-47b2-b6bb-d7c1a7c218af})|({c3447081-f790-45cb-ae03-0d7f1764c88c})|({c445e470-9e5a-4521-8649-93c8848df377})|({c8e14311-4b2d-4eb0-9a6b-062c6912f50e})|({ca4fdfdb-e831-4e6e-aa8b-0f2e84f4ed07})|({ca6cb8b2-a223-496d-b0f6-35c31bc7ca2b})|({cba7ce11-952b-4dcb-ba85-a5b618c92420})|({cc6b2dc7-7d6f-470f-bccc-6a42907162d1})|({cc689da4-203f-4a0c-a7a6-a00a5abe74c5})|({ccb7b5d6-a567-40a2-9686-a097a8b583dd})|({cd28aa38-d2f1-45a3-96c3-6cfd4702ef51})|({cd89045b-2e06-46bb-9e34-48e8799e5ef2})|({cdda1813-51d6-4b1f-8a2f-8f9a74a28e14})|({ce0d1384-b99b-478e-850a-fa6dfbe5a2d4})|({ce93dcc7-f911-4098-8238-7f023dcdfd0d})|({cf9d96ff-5997-439a-b32b-98214c621eee})|({cfa458f9-b49b-4e09-8cb2-5e50bd8937cc})|({cfb50cdf-e371-4d6b-9ef2-fcfe6726db02})|({d1ab5ebd-9505-481d-a6cd-6b9db8d65977})|({d03b6b0f-4d44-4666-a6d6-f16ad9483593})|({d9d8cfc1-7112-40cc-a1e9-0c7b899aae98})|({d47ebc8a-c1ea-4a42-9ca3-f723fff034bd})|({d72d260f-c965-4641-bf49-af4135fc46cb})|({d78d27f4-9716-4f13-a8b6-842c455d6a46})|({d355bee9-07f0-47d3-8de6-59b8eecba57b})|({d461cc1b-8a36-4ff0-b330-1824c148f326})|({d97223b8-44e5-46c7-8ab5-e1d8986daf44})|({d42328e1-9749-46ba-b35c-cce85ddd4ace})|({da7d00bf-f3c8-4c66-8b54-351947c1ef68})|({db84feec-2e1f-48f0-9511-645fe4784feb})|({dc6256cc-b6d0-44ca-b42f-4091f11a9d29})|({dd1cb0ec-be2a-432b-9c90-d64c824ac371})|({dd95dd08-75d1-4f06-a75b-51979cbab247})|({ddae89bd-6793-45d8-8ec9-7f4fb7212378})|({de3b1909-d4da-45e9-8da5-7d36a30e2fc6})|({df09f268-3c92-49db-8c31-6a25a6643896})|({e2a4966f-919d-4afc-a94f-5bd6e0606711})|({e05ba06a-6d6a-4c51-b8fc-60b461ffecaf})|({e7b978ae-ffc2-4998-a99d-0f4e2f24da82})|({e7fb6f2f-52b6-4b02-b410-2937940f5049})|({e08d85c5-4c0f-4ce3-9194-760187ce93ba})|({e08ebf0b-431d-4ed1-88bb-02e5db8b9443})|({e9c47315-2a2b-4583-88f3-43d196fa11af})|({e341ed12-a703-47fe-b8dd-5948c38070e4})|({e804fa4c-08e0-4dae-a237-8680074eba07})|({e8982fbd-1bc2-4726-ad8d-10be90f660bd})|({e40673cd-9027-4f61-956c-2097c03ae2be})|({e72172d1-39c9-4f41-829d-a1b8d845d1ca})|({e73854da-9503-423b-ab27-fafea2fbf443})|({e81e7246-e697-4811-b336-72298d930857})|({ea618d26-780e-4f0f-91fd-2a6911064204})|({ea523075-66cd-4c03-ab04-5219b8dda753})|({eb3ebb14-6ced-4f60-9800-85c3de3680a4})|({ec8c5fee-0a49-44f5-bf55-f763c52889a6})|({eccd286a-5b1d-494d-82b0-92a12213d95a})|({ed352072-ddf0-4cb4-9cb6-d8aa3741c2de})|({edb476af-0505-42af-a7fd-ec9f454804c0})|({ee97f92d-1bfe-4e9d-816c-0dfcd63a6206})|({f0b809eb-be22-432f-b26f-b1cadd1755b9})|({f5ffa269-fbca-4598-bbd8-a8aa9479e0b3})|({f6c543bf-2222-4230-8ecb-f5446095b63d})|({f6df4ef7-14bd-43b5-90c9-7bd02943789c})|({f6f98e6b-f67d-4c53-8b76-0b5b6df79218})|({f38b61f3-3fed-4249-bb3d-e6c8625c7afb})|({f50e0a8f-8c32-4880-bcef-ca978ccd1d83})|({f59c2d3d-58da-4f74-b8c9-faf829f60180})|({f82b3ad5-e590-4286-891f-05adf5028d2f})|({f92c1155-97b3-40f4-9d5b-7efa897524bb})|({f95a3826-5c8e-4f82-b353-21b6c0ca3c58})|({f5758afc-9faf-42bb-9543-a4cfb0bfce9d})|({f447670d-64f5-418f-9b4a-5352d6c8e127})|({f4262989-6de0-4604-918f-663b85fad605})|({fa8bd609-0e06-4ba9-8e2e-5989f0b2e197})|({fa0808f6-25ab-4a8b-bd17-3b275c55ff09})|({fac5816b-fd0f-4db2-a16e-52394b6db41d})|({fc99b961-5878-46b4-b091-6d2f507bf44d})|({fce89242-66d3-4946-9ed0-e66078f172fc})|({fcf72e24-5831-439e-bb07-fd53a9e87a30})|({fdc0601f-1fbb-40a5-84e1-8bbe96b22502})|({feb3c734-4529-4d69-9f3a-2dae18f1d896}))$/","prefs":[],"schema":1533411700296,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1479009","why":"Malicious add-ons disguising as updates or useful add-ons, but violating data collection policies, user-control, no surprises and security.","name":"Firefox Update (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cae5d906-0b1d-4d1c-b83f-f9727b8c4a29","last_modified":1533550294490},{"guid":"{5834f62d-6164-4cdd-a0a3-c00c66ec9d13}","prefs":[],"schema":1532704368947,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1479002","why":"This add-on violates our security and user-choice/no surprises policies.","name":"Youtube Dark Mode (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d0a401cb-0c70-4784-8288-b06a88b2ae8a","last_modified":1532705151926},{"guid":"/^((@asdfjhsdfuhw)|(@asdfsdfwe)|(@asdieieuss)|(@dghfghfgh)|(@difherk)|(@dsfgtftgjhrdf4)|(@fidfueir)|(@fsgergsdqtyy)|(@hjconsnfes)|(@isdifvdkf)|(@iweruewir)|(@oiboijdjfj)|(@safesearchavs)|(@safesearchavsext)|(@safesearchincognito)|(@safesearchscoutee)|(@sdfykhhhfg)|(@sdiosuff)|(@sdklsajd)|(@sduixcjksd)|(@sicognitores)|(@simtabtest)|(@sodiasudi)|(@test13)|(@test131)|(@test131ver)|(@test132)|(@test13s)|(@testmptys)|(\\{ac4e5b0c-13c4-4bfd-a0c3-1e73c81e8bac\\})|(\\{e78785c3-ec49-44d2-8aac-9ec7293f4a8f\\})|(general@filecheckerapp\\.com)|(general@safesearch\\.net))$/","prefs":[],"schema":1532703832328,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1475330","why":"These Add-ons violate our data collection, no surprises and user-choice policies.","name":"Safesearch (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"d664412d-ed08-4892-b247-b007a70856ff","last_modified":1532704364007},{"guid":"{dd3d7613-0246-469d-bc65-2a3cc1668adc}","prefs":[],"schema":1532684052432,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1478731","why":"This add-on violates data practices outlined in the review policy.","name":"BlockSite"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.0.3","minVersion":"0"}],"id":"e04f98b5-4480-43a3-881d-e509e4e28cdc","last_modified":1532684085999},{"guid":"{bee8b1f2-823a-424c-959c-f8f76c8b2306}","prefs":[],"schema":1532547689407,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1478731","why":"This add-on violates data practices outlined in the review policy.","name":"Popup blocker for FireFox"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.0.7.3","minVersion":"0"}],"id":"f0713a5e-7208-484e-b3a0-4e6dc6a195be","last_modified":1532684052426},{"guid":"/^((\\{39bd8607-0af4-4d6b-bd69-9a63c1825d3c\\})|(\\{273f0bce-33f4-45f6-ae03-df67df3864c2\\})|(\\{a77fc9b9-6ebb-418d-b0b6-86311c191158\\})|(\\{c6c4a718-cf91-4648-aa9b-170d66163cf2\\})|(\\{d371abec-84bb-481b-acbf-235639451127\\})|(\\{e63b262a-f9b8-4496-9c4b-9d3cbd6aea90\\}))$/","prefs":[],"schema":1532386339902,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1477950","why":"Add-ons that contain malicious functionality like search engine redirect.","name":"Smash (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c37c7c24-e738-4d06-888c-108b4d63b428","last_modified":1532424286908},{"guid":"/^((\\{ac296b47-7c03-486f-a1d6-c48b24419749\\})|(\\{1cab8ccf-deff-4743-925d-a47cbd0a6b56\\})|(\\{5da81d3d-5db1-432a-affc-4a2fe9a70749\\})|(\\{071b9878-a7d3-4ae3-8ef0-2eaee1923403\\})|(\\{261476ea-bd0e-477c-abd7-33cdf626f81f\\})|(\\{224e66d0-6b11-4c4b-9bcf-41180889898a\\})|(\\{1e90cf52-c67c-4bd9-80c3-a2bf521fc981\\})|(\\{09c4799c-00f1-439e-9e60-3827c589b372\\})|(\\{d3d2095a-9faa-466f-82ae-3114179b34d6\\})|(\\{70389ea5-7e4d-4515-835c-fbd047f229dd\\})|(\\{2e8083a5-cd88-4aaa-bb8b-e54e9753f280\\})|(\\{fbf2480b-5c19-478e-bfd0-192ad9f84dc9\\})|(\\{6c7dc694-89f8-477e-88d5-c55af4d6a846\\})|(\\{915c12c6-901a-490d-9bfc-20f00d1ad31d\\})|(\\{d3a4aa3e-f74c-4382-876d-825f592f2976\\})|(\\{0ad91ec1-f7c4-4a39-9244-3310e9fdd169\\})|(\\{9c17aa27-63c5-470a-a678-dc899ab67ed3\\})|(\\{c65efef2-9988-48db-9e0a-9ff8164182b6\\})|(\\{d54c5d25-2d51-446d-8d14-18d859e3e89a\\})|(\\{e458f1f1-a331-4486-b157-81cba19f0993\\})|(\\{d2de7e1f-6e51-41d6-ba8a-937f8a5c92ff\\})|(\\{2b08a649-9bea-4dd4-91c8-f53a84d38e19\\})|(\\{312dd57e-a590-4e19-9b26-90e308cfb103\\})|(\\{82ce595a-f9b6-4db8-9c97-b1f1c933418b\\})|(\\{0a2e64f0-ea5a-4fff-902d-530732308d8e\\})|(\\{5fbdc975-17ab-4b4e-90d7-9a64fd832a08\\})|(\\{28820707-54d8-41f0-93e9-a36ffb2a1da6\\})|(\\{64a2aed1-5dcf-4f2b-aad6-9717d23779ec\\})|(\\{ee54794f-cd16-4f7d-a7dd-515a36086f60\\})|(\\{4d381160-b2d5-4718-9a05-fc54d4b307e7\\})|(\\{60393e0e-f039-4b80-bad4-10189053c2ab\\})|(\\{0997b7b2-52d7-4d14-9aa6-d820b2e26310\\})|(\\{8214cbd6-d008-4d16-9381-3ef1e1415665\\})|(\\{6dec3d8d-0527-49a3-8f12-b05f2a8b95b2\\})|(\\{0c0d8d8f-3ae0-4c98-81ac-06453a316d16\\})|(\\{84d5ef02-a283-484a-80da-7087836c74aa\\})|(\\{24413756-2c44-47c5-8bbf-160cb37776d8\\})|(\\{cf6ac458-06e8-45d0-9cbf-ec7fc0eb1710\\})|(\\{263a5792-933a-4de1-820a-d04198e17120\\})|(\\{b5fd7f37-190d-4c0a-b8dd-8b4850c986ac\\})|(\\{cb5ef07b-c2e7-47a6-be81-2ceff8df4dd5\\})|(\\{311b20bc-b498-493c-a5e1-22ec32b0e83c\\})|(\\{b308aead-8bc1-4f37-9324-834b49903df7\\})|(\\{3a26e767-b781-4e21-aaf8-ac813d9edc9f\\}))$/","prefs":[],"schema":1532361925873,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1476553","why":"Third-party websites try to trick users into installing add-ons that inject remote scripts.","name":"Various malicious add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"52842139-3d11-41ac-9d7f-8e51122a3141","last_modified":1532372344457},{"guid":"/^((@FirefoxUpdate)|(@googledashboard)|(@smash_mov)|(@smash_tv)|(@smashdashboard)|(@smashmovs)|(@smashtvs)|(\\{0be01832-7cce-4457-b8ad-73b743914085\\})|(\\{0e1c683e-9f34-45f1-b365-a283befb471a\\})|(\\{0c72a72d-6b2e-4a0e-8a31-16581176052d\\})|(\\{0ccfc208-8441-4c27-b1cb-799accb04908\\})|(\\{0ede8d39-26f2-49c4-8014-dfc484f54a65\\})|(\\{1fc1f8e6-3575-4a6f-a4d1-c4ca1c36bd2a\\})|(\\{3a1d6607-e6a8-4012-9506-f14cd157c171\\})|(\\{03b3ac4d-59a3-4cc6-aa4d-9b39dd8b3196\\})|(\\{3bb6e889-ac7a-46ca-8eed-45ba4fbe75b5\\})|(\\{3c841114-da8c-44ea-8303-78264edfe60b\\})|(\\{3f3bcb3e-dd73-4410-b102-60a87fcb8323\\})|(\\{3f951165-fd85-42ae-96ef-6ff589a1fe72\\})|(\\{04c86cb3-5f52-4083-9e9a-e322dd02181a\\})|(\\{4d8b44ef-9b8b-4d82-b668-a49648d2749d\\})|(\\{4d25d2b4-6ae7-4a66-abc0-c3fca4cdddf6\\})|(\\{5c9a2eca-2126-4a84-82c0-efbf3d989371\\})|(\\{6ecb9f49-90f0-43a1-8f8a-e809ea4f732b\\})|(\\{6fb8289d-c6c8-4fe5-9a92-7dc6cbf35349\\})|(\\{7fea697d-327c-4d20-80d5-813a6fb26d86\\})|(\\{08a3e913-0bbc-42ba-96d7-3fa16aceccbf\\})|(\\{8b04086b-94a5-4161-910b-59e3e31e4364\\})|(\\{08c28c16-9fb6-4b32-9868-db37c1668f94\\})|(\\{8cd69708-2f5e-4282-a94f-3feebc4bce35\\})|(\\{8dc21e24-3883-4d01-b486-ef1d1106fa3d\\})|(\\{8f8cc21a-2097-488f-a213-f5786a2ccbbf\\})|(\\{9c8b93f7-3bf8-4762-b221-40c912268f96\\})|(\\{9ce66491-ef06-4da6-b602-98c2451f6395\\})|(\\{1e1acc1c-8daa-4c2e-ad05-5ef01ae65f1e\\})|(\\{10b0f607-1efa-4762-82a0-e0d9bbae4e48\\})|(\\{24f338d7-b539-49f1-b276-c9edc367a32d\\})|(\\{40c9030f-7a2f-4a58-9d0a-edccd8063218\\})|(\\{41f97b71-c7c6-40b8-83b1-a4dbff76f73d\\})|(\\{42f3034a-0c4a-4f68-a8fd-8a2440e3f011\\})|(\\{52d456e5-245a-4319-b8d2-c14fbc9755f0\\})|(\\{57ea692b-f9fe-42df-bf5e-af6953fba05a\\})|(\\{060c61d8-b48f-465d-aa4b-23325ea757c3\\})|(\\{65c1967c-6a5c-44dd-9637-0d4d8b4c339b\\})|(\\{65d40b64-b52a-46d8-b146-580ff91889cb\\})|(\\{75b7af0d-b4ed-4320-95c8-7ffd8dd2cb7c\\})|(\\{77fe9731-b683-4599-9b06-a5dcea63d432\\})|(\\{84b20d0c-9c87-4340-b4f8-1912df2ae70d\\})|(\\{92b9e511-ac81-4d47-9b8f-f92dc872447e\\})|(\\{95afafef-b580-4f66-a0fe-7f3e74be7507\\})|(\\{116a0754-20eb-4fe5-bd35-575867a0b89e\\})|(\\{118bf5f6-98b1-4543-b133-42fdaf3cbade\\})|(\\{248eacc4-195f-43b2-956c-b9ad1ae67529\\})|(\\{328f931d-83c1-4876-953c-ddc9f63fe3b4\\})|(\\{447fa5d3-1c27-4502-9e13-84452d833b89\\})|(\\{476a1fa9-bce8-4cb4-beff-cb31980cc521\\})|(\\{507a5b13-a8a3-4653-a4a7-9a03099acf48\\})|(\\{531bf931-a8c6-407b-a48f-8a53f43cd461\\})|(\\{544c7f83-ef54-4d17-aa91-274fa27514ef\\})|(\\{546ea388-2839-4215-af49-d7289514a7b1\\})|(\\{635cb424-0cd5-4446-afaf-6265c4b711b5\\})|(\\{654b21c7-6a70-446c-b9ac-8cac9592f4a9\\})|(\\{0668b0a7-7578-4fb3-a4bd-39344222daa3\\})|(\\{944ed336-d750-48f1-b0b5-3c516bfb551c\\})|(\\{1882a9ce-c0e3-4476-8185-f387fe269852\\})|(\\{5571a054-225d-4b65-97f7-3511936b3429\\})|(\\{5921be85-cddd-4aff-9b83-0b317db03fa3\\})|(\\{7082ba5c-f55e-4cd8-88d6-8bc479d3749e\\})|(\\{7322a4cb-641c-4ca2-9d83-8701a639e17a\\})|(\\{90741f13-ab72-443f-a558-167721f64883\\})|(\\{198627a5-4a7b-4857-b074-3040bc8effb8\\})|(\\{5e5b9f44-2416-4669-8362-42a0b3f97868\\})|(\\{824985b9-df2a-401c-9168-749960596007\\})|(\\{4853541f-c9d7-42c5-880f-fd460dbb5d5f\\})|(\\{6e6ff0fd-4ae4-49ae-ac0c-e2527e12359b\\})|(\\{90e8aa72-a7eb-4337-81d4-538b0b09c653\\})|(\\{02e3137a-96a4-433d-bfb2-0aa1cd4aed08\\})|(\\{9e734c09-fcb1-4e3f-acab-04d03625301c\\})|(\\{a6ad792c-69a8-4608-90f0-ff7c958ce508\\})|(\\{a512297e-4d3a-468c-bd1a-f77bd093f925\\})|(\\{a71b10ae-b044-4bf0-877e-c8aa9ad47b42\\})|(\\{a33358ad-a3fa-4ca1-9a49-612d99539263\\})|(\\{a7775382-4399-49bf-9287-11dbdff8f85f\\})|(\\{afa64d19-ddba-4bd5-9d2a-c0ba4b912173\\})|(\\{b4ab1a1d-e137-4c59-94d5-4f509358a81d\\})|(\\{b4ec2f8e-57fd-4607-bf4f-bc159ca87b26\\})|(\\{b06bfc96-c042-4b34-944c-8eb67f35630a\\})|(\\{b9dcdfb0-3420-4616-a4cb-d41b5192ba0c\\})|(\\{b8467ec4-ff65-45f4-b7c5-f58763bf9c94\\})|(\\{b48e4a17-0655-4e8e-a5e2-3040a3d87e55\\})|(\\{b6166509-5fe0-4efd-906e-1e412ff07a04\\})|(\\{bd1f666e-d473-4d13-bc4d-10dde895717e\\})|(\\{be572ad4-5dd7-4b6b-8204-5d655efaf3b3\\})|(\\{bf2a3e58-2536-44d4-b87f-62633256cf65\\})|(\\{bfc5ac5f-80bd-43e5-9acb-f6d447e0d2ce\\})|(\\{bfe3f6c1-c5fe-44af-93b3-576812cb6f1b\\})|(\\{c0b8009b-57dc-45bc-9239-74721640881d\\})|(\\{c1cf1f13-b257-4271-b922-4c57c6b6e047\\})|(\\{c3d61029-c52f-45df-8ec5-a654b228cd48\\})|(\\{c39e7c0b-79d5-4137-bef0-57cdf85c920f\\})|(\\{ce043eac-df8a-48d0-a739-ef7ed9bdf2b5\\})|(\\{cf62e95a-8ded-4c74-b3ac-f5c037880027\\})|(\\{cff02c70-7f07-4592-986f-7748a2abd9e1\\})|(\\{d1b87087-09c5-4e58-b01d-a49d714da2a2\\})|(\\{d14adc78-36bf-4cf0-9679-439e8371d090\\})|(\\{d64c923e-8819-488c-947f-716473d381b2\\})|(\\{d734e7e3-1b8e-42a7-a9b3-11b16c362790\\})|(\\{d147e8c6-c36e-46b1-b567-63a492390f07\\})|(\\{db1a103d-d1bb-4224-a5e1-8d0ec37cff70\\})|(\\{dec15b3e-1d12-4442-930e-3364e206c3c2\\})|(\\{dfa4b2e3-9e07-45a4-a152-cde1e790511d\\})|(\\{dfcda377-b965-4622-a89b-1a243c1cbcaf\\})|(\\{e4c5d262-8ee4-47d3-b096-42b8b04f590d\\})|(\\{e82c0f73-e42c-41dd-a686-0eb4b65b411c\\})|(\\{e60616a9-9b50-49d8-b1e9-cecc10a8f927\\})|(\\{e517649a-ffd7-4b49-81e0-872431898712\\})|(\\{e771e094-3b67-4c33-8647-7b20c87c2183\\})|(\\{eff5951b-b6d4-48f5-94c3-1b0e178dcca5\\})|(\\{f26a8da3-8634-4086-872e-e589cbf03375\\})|(\\{f992ac88-79d3-4960-870e-92c342ed3491\\})|(\\{f4e4fc03-be50-4257-ae99-5cd0bd4ce6d5\\})|(\\{f73636fb-c322-40e1-82fb-e3d7d06d9606\\})|(\\{f5128739-78d5-4ad7-bac7-bd1af1cfb6d1\\})|(\\{fc11e7f0-1c31-4214-a88f-6497c27b6be9\\})|(\\{feedf4f8-08c1-451f-a717-f08233a64ec9\\}))$/","prefs":[],"schema":1532097654002,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1476369","why":"These add-ons contain unwanted features and try to prevent the user from uninstalling themselves.","name":"Smash/Upater (malware) and similar"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c7d7515d-563f-459f-821c-27d4cf825dbf","last_modified":1532101113096},{"guid":"^((@mixclouddownloader)|(all-down@james\\.burrow)|(d\\.lehr@chello\\.at)|(easy-video-downloader@addonsmash)|(easy-youtube-mp3@james\\.burrow)|(gid@addonsmash)|(gmail_panel@addon_clone)|(guid-reused-by-pk-907175)|(idm@addonsmash)|(image-picka@addonsmash)|(instant-idm@addon\\.host)|(jdm@awesome\\.addons)|(open-in-idm@addonsmash)|(open-in-idm@james\\.burrow)|(open-in-vlc@awesome\\.addons)|(saveimage@addonsmash)|(thundercross@addonsmash)|(vk-download@addon\\.host)|(vk-music-downloader@addonsmash)|(whatsapp_popup@addons\\.clone)|(ytb-down@james\\.burrow)|(ytb-mp3-downloader@james\\.burrow)|(\\{0df8d631-7d88-401e-ba7e-af1425dded8a\\})|(\\{3c74e141-1993-4c04-b755-a66dd491bb47\\})|(\\{5cdd95c7-5d92-40c5-8e2a-8c52c90191d9\\})|(\\{40efedc0-8e48-404a-a779-f4016b25c0e6\\})|(\\{53d605ce-599b-4352-8a06-5e594b3d1822\\})|(\\{3697c1e8-27d7-4c63-a27e-ac16191a1545\\})|(\\{170503FA-3349-4F17-BC86-001888A5C8E2\\})|(\\{649558df-9461-4824-ad18-f2d4d4845ac8\\})|(\\{27875553-afd5-4365-86dc-019bcd60594c\\})|(\\{27875553-afd5-4365-86dc-019bcd60594c\\})|(\\{6e7624fa-7f70-4417-93db-1ec29c023275\\})|(\\{b1aea1f1-6bed-41ef-9679-1dfbd7b2554f\\})|(\\{b9acc029-d62b-4d23-b921-8e7aea34266a\\})|(\\{b9b59e13-4ac5-4eff-8dbe-c345b7619b3c\\})|(\\{b0186d2d-3126-4537-9186-a6f198547901\\})|(\\{b3e8fde8-6d97-4ac3-95e0-57b797f4c56b\\})|(\\{e6a9a96e-4a08-4719-b9bd-0e91c35aaabc\\})|(\\{e69a36e6-ee12-4fe6-87ca-66b77fc0ffbf\\})|(\\{ee3601f1-78ab-48bf-89ae-0cfe4aed1f2e\\})|(\\{f4ce48b3-ad14-4900-86cb-4604474c5b08\\})|(\\{f5c1262d-b1e8-44a4-b820-a834f0f6d605\\}))$","prefs":[],"schema":1531762485603,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1476020","why":"Add-ons repeatedly violated several of review policies.","name":"Several youtube downloading add-ons and others"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0"}],"id":"ae8ae617-590d-430b-86d4-16364372b67f","last_modified":1531762863373},{"guid":"{46551EC9-40F0-4e47-8E18-8E5CF550CFB8}","prefs":[],"schema":1530711142817,"blockID":"i1900","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1472948","why":"This add-on violates data practices outlined in the review policy.","name":"Stylish"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.1.1","minVersion":"3.0.0"}],"id":"c635229f-7aa0-44c5-914f-80c590949071","last_modified":1530716488758},{"guid":"/^(contactus@unzipper.com|{72dcff4e-48ce-41d8-a807-823adadbe0c9}|{dc7d2ecc-9cc3-40d7-93ed-ef6f3219bd6f}|{994db3d3-ccfe-449a-81e4-f95e2da76843}|{25aef460-43d5-4bd0-aa3d-0a46a41400e6}|{178e750c-ae27-4868-a229-04951dac57f7})$/","prefs":[],"schema":1528400492025,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1460331","why":"Add-ons change search settings against our policies, affecting core Firefox features. Add-on is also reportedly installed without user consent.","name":"SearchWeb"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5afea853-d029-43f3-a387-64ce9980742a","last_modified":1528408770328},{"guid":"{38363d75-6591-4e8b-bf01-0270623d1b6c}","prefs":[],"schema":1526326889114,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1461625","why":"This add-on contains abusive functionality.","name":"Photobucket Hotlink Fix"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0f0764d5-a290-428b-a5b2-3767e1d72c71","last_modified":1526381862851},{"guid":"@vkmad","prefs":[],"schema":1526154098016,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1461410","why":"This add-on includes malicious functionality.","name":"VK Universal Downloader (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cbfa5303-c1bf-49c8-87d8-259738a20064","last_modified":1526322954850},{"guid":"/^(({41c14ab8-9958-44bf-b74e-af54c1f169a6})|({78054cb2-e3e8-4070-a8ad-3fd69c8e4707})|({0089b179-8f3d-44d9-bb18-582843b0757a})|({f44ddcb4-4cc0-4866-92fa-eefda60c6720})|({1893d673-7953-4870-8069-baac49ce3335})|({fb28cac0-c2aa-4e0c-a614-cf3641196237})|({d7dee150-da14-45ba-afca-02c7a79ad805})|(RandomNameTest@RandomNameTest\\.com )|(corpsearchengine@mail\\.ru)|(support@work\\.org))$/","prefs":[],"schema":1525377099963,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458330","why":"These are malicious add-ons that inject remote scripts and use deceptive names.","name":"\"Table\" add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3a123214-b4b6-410c-a061-bbaf0d168d31","last_modified":1525377135149},{"guid":"/((@extcorp\\.[a-z]+)|(@brcorporation\\.com)|(@brmodcorp\\.com)|(@teset\\.com)|(@modext\\.tech)|(@ext?mod\\.net)|(@browcorporation\\.org)|(@omegacorporation\\.org)|(@browmodule\\.com)|(@corpext\\.net)|({6b50ddac-f5e0-4d9e-945b-e4165bfea5d6})|({fab6484f-b8a7-4ba9-a041-0f948518b80c})|({b797035a-7f29-4ff5-bd19-77f1b5e464b1})|({0f612416-5c5a-4ec8-b482-eb546af9cac4}))$/","prefs":[],"schema":1525290095999,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458330","why":"These are malicious add-ons that inject remote scripts and use deceptive names.","name":"\"Table\" add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3ab9f100-e253-4080-b3e5-652f842ddb7a","last_modified":1525377099954},{"guid":"/^({b99ae7b1-aabb-4674-ba8f-14ed32d04e76})|({dfa77d38-f67b-4c41-80d5-96470d804d09})$/","prefs":[],"schema":1524146566650,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1455291","why":"These add-ons claim to be the flash plugin.","name":"Flash Plugin (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"96b137e6-8cb5-44d6-9a34-4a4a76fb5e38","last_modified":1524147337556},{"guid":"/^({6ecb9f49-90f0-43a1-8f8a-e809ea4f732b})|(@googledashboard)|(@smashdashboard)|(@smash_tv)|(@smash_mov)|(@smashmovs)|(@smashtvs)|(@FirefoxUpdate)|({92b9e511-ac81-4d47-9b8f-f92dc872447e})|({3c841114-da8c-44ea-8303-78264edfe60b})|({116a0754-20eb-4fe5-bd35-575867a0b89e})|({6e6ff0fd-4ae4-49ae-ac0c-e2527e12359b})|({f992ac88-79d3-4960-870e-92c342ed3491})|({6ecb9f49-90f0-43a1-8f8a-e809ea4f732b})|({a512297e-4d3a-468c-bd1a-f77bd093f925})|({08c28c16-9fb6-4b32-9868-db37c1668f94})|({b4ab1a1d-e137-4c59-94d5-4f509358a81d})|({feedf4f8-08c1-451f-a717-f08233a64ec9})$/","prefs":[],"schema":1524139371832,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1454691","why":"This malware prevents itself from getting uninstalled ","name":"Malware"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"feb2d0d7-1b76-4dba-bf84-42873a92af5f","last_modified":1524141477640},{"guid":"{872f20ea-196e-4d11-8835-1cc4c877b1b8}","prefs":[],"schema":1523734896380,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1454413","why":"Extension claims to be Flash Player","name":"Flash Player (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"1e5f5cb2-346c-422a-9aaa-29d8760949d2","last_modified":1523897202689},{"guid":"/(__TEMPLATE__APPLICATION__@ruta-mapa\\.com)|(application-3@findizer\\.fr)|(application2@allo-pages\\.fr)|(application2@bilan-imc\\.fr)|(application2@lettres\\.net)|(application2@search-maps-finder\\.com)|(application-imcpeso@imc-peso\\.com)|(application-meuimc@meu-imc\\.com)|(application-us2@factorlove)|(application-us@misterdirections)|(application-us@yummmi\\.es)|(application@amiouze\\.fr)|(application@astrolignes\\.com)|(application@blotyn\\.com)|(application@bmi-result\\.com)|(application@bmi-tw\\.com)|(application@calcolo-bmi\\.com)|(application@cartes-itineraires\\.com)|(application@convertisseur\\.pro)|(application@de-findizer\\.fr)|(application@de-super-rezepte\\.com)|(application@dermabeauty\\.fr)|(application@dev\\.squel\\.v2)|(application@eu-my-drivingdirections\\.com)|(application@fr-allo-pages\\.fr)|(application@fr-catizz\\.com)|(application@fr-mr-traduction\\.com)|(application@good-recettes\\.com)|(application@horaires\\.voyage)|(application@imc-calcular\\.com)|(application@imc-peso\\.com)|(application@it-mio-percorso\\.com)|(application@iti-maps\\.fr)|(application@itineraire\\.info)|(application@lbc-search\\.com)|(application@les-pages\\.com)|(application@lovincalculator\\.com)|(application@lovintest\\.com)|(application@masowe\\.com)|(application@matchs\\.direct)|(application@mein-bmi\\.com)|(application@mes-resultats\\.com)|(application@mestaf\\.com)|(application@meu-imc\\.com)|(application@mon-calcul-imc\\.fr)|(application@mon-juste-poids\\.com)|(application@mon-trajet\\.com)|(application@my-drivingdirections\\.com)|(application@people-show\\.com)|(application@plans-reduc\\.fr)|(application@point-meteo\\.fr)|(application@poulixo\\.com)|(application@quipage\\.fr)|(application@quizdeamor\\.com)|(application@quizdoamor\\.com)|(application@quotient-retraite\\.fr)|(application@recettes\\.net)|(application@routenplaner-karten\\.com)|(application@ruta-mapa\\.com)|(application@satellite\\.dev\\.squel\\.v2)|(application@search-bilan-imc\\.fr)|(application@search-maps-finder\\.com)|(application@slimness\\.fr)|(application@start-bmi\\.com)|(application@tests-moi\\.com)|(application@tousmesjeux\\.fr)|(application@toutlannuaire\\.fr)|(application@tuto-diy\\.com)|(application@ubersetzung-app\\.com)|(application@uk-cookyummy\\.com)|(application@uk-howlogin\\.me)|(application@uk-myloap\\.com)|(application@voyagevoyage\\.co)|(application@wikimot\\.fr)|(application@www\\.plans-reduc\\.fr)|(application@yummmi\\.es)|(application@yummmies\\.be)|(application@yummmies\\.ch)|(application@yummmies\\.fr)|(application@yummmies\\.lu)|(application@zikplay\\.fr)|(applicationY@search-maps-finder\\.com)|(cmesapps@findizer\\.fr)|(findizer-shopping@jetpack)|(\\{8aaebb36-1488-4022-b7ec-29b790d12c17\\})/","prefs":[],"schema":1523216496621,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1452648","why":"Those add-ons do not provide a real functionality for users, other than silently tracking browsing behavior.","name":"Tracking Add-ons (harmful)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"36f97298-8bef-4372-a548-eb829413bee9","last_modified":1523286321447},{"guid":"adbeaver@adbeaver.org","prefs":[],"schema":1521630548030,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1445031","why":"This add-on generates numerous errors when loading Facebook, caused by ad injection included in it. Users who want to continue using this add-on can enable it in the Add-ons Manager.","name":"AdBeaver"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0"}],"id":"baf7f735-d6b6-410a-8cc8-25c60f7c57e2","last_modified":1522103097333},{"guid":"{44685ba6-68b3-4895-879e-4efa29dfb578}","prefs":[],"schema":1521565140013,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447042","why":"This add-on impersonates a Flash tool and runs remote code on users' systems.","name":"FF Flash Manager"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"547037f2-97ae-435a-863c-efd7532668cd","last_modified":1521630548023},{"guid":"/^.*extension.*@asdf\\.pl$/","prefs":[],"schema":1520451695869,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1444037","why":"These add-ons are using deceptive names and taking over Facebook accounts to post spam content.","name":"Facebook spammers"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3d55fab0-ec1a-4bca-84c9-3b74f5d01509","last_modified":1520527480321},{"guid":"/^(addon@fasterweb\\.com|\\{5f398d3f-25db-47f5-b422-aa2364ff6c0b\\}|addon@fasterp\\.com|addon@calculator)$/","prefs":[],"schema":1520338910918,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1443478","why":"These are malicious add-ons that use deceptive names and run remote scripts.","name":"FasterWeb add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f58729ec-f93c-41d9-870d-dd9c9fd811b6","last_modified":1520358450708},{"guid":"{42baa93e-0cff-4289-b79e-6ae88df668c4}","prefs":[],"schema":1520336325565,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1443196","why":"The add-on claims to be \"Adobe Shockwave Flash Player\"","name":"Adobe Shockwave Flash Player (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0cd723fe-d33d-43a0-b84f-7a3cad253212","last_modified":1520338780397},{"guid":"/{0c9970a2-6874-483b-a486-2296cfe251c2}|{01c9a4a4-06dd-426b-9500-2ea6fe841b88}|{1c981c7c-30e0-4ed2-955d-6b370e0a9d19}|{2aa275f8-fabc-4766-95b2-ecfc73db310b}|{2cac0be1-10a2-4a0d-b8c5-787837ea5955}|{2eb66f6c-94b3-44f5-9de2-22371236ec99}|{2f8aade6-8717-4277-b8b1-55172d364903}|{3c27c34f-8775-491a-a1c9-fcb15beb26d3}|{3f4dea3e-dbfc-428f-a88b-36908c459e20}|{3f4191fa-8f16-47d2-9414-36bfc9e0c2bf}|{4c140bc5-c2ad-41c3-a407-749473530904}|{05a21129-af2a-464c-809f-f2df4addf209}|{5da81d3d-5db1-432a-affc-4a2fe9a70749}|{5f4e63e4-351f-4a21-a8e5-e50dc72b5566}|{7c1df23b-1fd8-42b9-8752-71fff2b979de}|{7d5e24a1-7bef-4d09-a952-b9519ec00d20}|{7d932012-b4dd-42cc-8a78-b15ca82d0e61}|{7f8bc48d-1c7c-41a0-8534-54adc079338f}|{8a61507d-dc2f-4507-a9b7-7e33b8cbc31b}|{09c8fa16-4eec-4f78-b19d-9b24b1b57e1e}|{9ce2a636-0e49-4b8e-ad17-d0c156c963b0}|{11df9391-dba5-4fe2-bd48-37a9182b796d}|{23c65153-c21e-430a-a2dc-0793410a870d}|{36a4269e-4eef-4538-baea-9dafbf6a8e2f}|{37f8e483-c782-40ed-82e9-36f101b9e41f}|{63df223d-51cf-4f76-aad8-bbc94c895ed2}|{72c1ca96-c05d-46a7-bce1-c507ec3db4ea}|{76ce213c-8e57-4a14-b60a-67a5519bd7a7}|{79db6c96-d65a-4a64-a892-3d26bd02d2d9}|{81ac42f3-3d17-4cff-85af-8b7f89c8826b}|{83d38ac3-121b-4f28-bf9c-1220bd3c643b}|{86d98522-5d42-41d5-83c2-fc57f260a3d9}|{0111c475-01e6-42ea-a9b4-27bed9eb6092}|{214cb48a-ce31-4e48-82cf-a55061f1b766}|{216e0bcc-8a23-4069-8b63-d9528b437258}|{226b0fe6-f80f-48f1-9d8d-0b7a1a04e537}|{302ef84b-2feb-460e-85ca-f5397a77aa6a}|{408a506b-2336-4671-a490-83a1094b4097}|{419be4e9-c981-478e-baa0-937cf1eea1e8}|{0432b92a-bfcf-41b9-b5f0-df9629feece1}|{449e185a-dd91-4f7b-a23a-bbf6c1ca9435}|{591d1b73-5eae-47f4-a41f-8081d58d49bf}|{869b5825-e344-4375-839b-085d3c09ab9f}|{919fed43-3961-48d9-b0ef-893054f4f6f1}|{01166e60-d740-440c-b640-6bf964504b3c}|{2134e327-8060-441c-ba68-b167b82ff5bc}|{02328ee7-a82b-4983-a5f7-d0fc353698f0}|{6072a2a8-f1bc-4c9c-b836-7ac53e3f51e4}|{28044ca8-8e90-435e-bc63-a757af2fb6be}|{28092fa3-9c52-4a41-996d-c43e249c5f08}|{31680d42-c80d-4f8a-86d3-cd4930620369}|{92111c8d-0850-4606-904a-783d273a2059}|{446122cd-cd92-4d0c-9426-4ee0d28f6dca}|{829827cd-03be-4fed-af96-dd5997806fb4}|{4479446e-40f3-48af-ab85-7e3bb4468227}|{9263519f-ca57-4178-b743-2553a40a4bf1}|{71639610-9cc3-47e0-86ed-d5b99eaa41d5}|{84406197-6d37-437c-8d82-ae624b857355}|{93017064-dfd4-425e-a700-353f332ede37}|{a0ab16af-3384-4dbe-8722-476ce3947873}|{a0c54bd8-7817-4a40-b657-6dc7d59bd961}|{a2de96bc-e77f-4805-92c0-95c9a2023c6a}|{a3fbc8be-dac2-4971-b76a-908464cfa0e0}|{a42e5d48-6175-49e3-9e40-0188cde9c5c6}|{a893296e-5f54-43f9-a849-f12dcdee2c98}|{ac296b47-7c03-486f-a1d6-c48b24419749}|{b26bf964-7aa6-44f4-a2a9-d55af4b4eec0}|{be981b5e-1d9d-40dc-bd4f-47a7a027611c}|{be37931c-af60-4337-8708-63889f36445d}|{bfd92dfd-b293-4828-90c1-66af2ac688e6}|{c5cf4d08-0a33-4aa3-a40d-d4911bcc1da7}|{c488a8f5-ea3d-408d-809e-44e82c06ad9d}|{c661c2dc-00f9-4dc1-a9f6-bb2b7e1a4f8d}|{cd28aa38-d2f1-45a3-96c3-6cfd4702ef51}|{cd89045b-2e06-46bb-9e34-48e8799e5ef2}|{cf9d96ff-5997-439a-b32b-98214c621eee}|{d14acee6-f32b-4aa3-a802-6616003fc6a8}|{d97223b8-44e5-46c7-8ab5-e1d8986daf44}|{ddae89bd-6793-45d8-8ec9-7f4fb7212378}|{de3b1909-d4da-45e9-8da5-7d36a30e2fc6}|{df09f268-3c92-49db-8c31-6a25a6643896}|{e5bc3951-c837-4c98-9643-3c113fc8cf5e}|{e9ccb1f2-a8ba-4346-b43b-0d5582bce414}|{e341ed12-a703-47fe-b8dd-5948c38070e4}|{e2139287-2b0d-4f54-b3b1-c9a06c597223}|{ed352072-ddf0-4cb4-9cb6-d8aa3741c2de}|{f0b809eb-be22-432f-b26f-b1cadd1755b9}|{f1bce8e4-9936-495b-bf48-52850c7250ab}|{f01c3add-dc6d-4f35-a498-6b4279aa2ffa}|{f9e1ad25-5961-4cc5-8d66-5496c438a125}|{f4262989-6de0-4604-918f-663b85fad605}|{fc0d55bd-3c50-4139-9409-7df7c1114a9d}/","prefs":[],"schema":1519766961483,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1439702","why":"This malicious add-on claims to be a Firefox \"helper\" or \"updater\" or similar.","name":"FF updater (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"48b14881-5f6b-4e48-afc5-3d9a7fae26a3","last_modified":1519826648080},{"guid":"{44e4b2cf-77ba-4f76-aca7-f3fcbc2dda2f} ","prefs":[],"schema":1519414957616,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1440821","why":"This is a malicious add-on that uses a deceptive name and runs remote code.","name":"AntiVirus for Firefox"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2447476f-043b-4d0b-9d3c-8e859c97d950","last_modified":1519429178266},{"guid":"{f3c31b34-862c-4bc8-a98f-910cc6314a86}","prefs":[],"schema":1519242096699,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1440736","why":"This is a malicious add-on that is masked as an official Adobe Updater and runs malicious code.","name":"Adobe Updater (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"adfd98ef-cebc-406b-b1e0-61bd4c71e4b1","last_modified":1519409417397},{"guid":"/^(\\{fd0c36fa-6a29-4246-810b-0bb4800019cb\\}|\\{b9c1e5bf-6585-4766-93fc-26313ac59999\\}|\\{3de25fff-25e8-40e9-9ad9-fdb3b38bb2f4\\})$/","prefs":[],"schema":1519069296530,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1439432","why":"These are malicious add-ons that are masked as an official Adobe Updater and run malicious code.","name":"Adobe Updater"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"4e28ba5c-af62-4e53-a7a1-d33334571cf8","last_modified":1519078890592},{"guid":"/^(\\{01c9a4a4-06dd-426b-9500-2ea6fe841b88\\}|{5e024309-042c-4b9d-a634-5d92cf9c7514\\}|{f4262989-6de0-4604-918f-663b85fad605\\}|{e341ed12-a703-47fe-b8dd-5948c38070e4\\}|{cd89045b-2e06-46bb-9e34-48e8799e5ef2\\}|{ac296b47-7c03-486f-a1d6-c48b24419749\\}|{5da81d3d-5db1-432a-affc-4a2fe9a70749\\}|{df09f268-3c92-49db-8c31-6a25a6643896\\}|{81ac42f3-3d17-4cff-85af-8b7f89c8826b\\}|{09c8fa16-4eec-4f78-b19d-9b24b1b57e1e\\}|{71639610-9cc3-47e0-86ed-d5b99eaa41d5\\}|{83d38ac3-121b-4f28-bf9c-1220bd3c643b\\}|{7f8bc48d-1c7c-41a0-8534-54adc079338f\\})$/","prefs":[],"schema":1518550894975,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1438028","why":"These are malicious add-ons that inject remote scripts into popular websites.","name":"Page Marker add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"cc5848e8-23d5-4655-b45c-dc239839b74e","last_modified":1518640450735},{"guid":"/^(https|youtube)@vietbacsecurity\\.com$/","prefs":[],"schema":1517909997354,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1435974","why":"These add-ons contain malicious functionality, violating the users privacy and security.","name":"HTTPS and Youtube downloader (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"646e2384-f894-41bf-b7fc-8879e0095109","last_modified":1517910100624},{"guid":"{ed352072-ddf0-4cb4-9cb6-d8aa3741c2de}","prefs":[],"schema":1517514097126,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1434893","why":"This is a malicious add-on that injects remote scripts into popular pages while pretending to do something else.","name":"Image previewer"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2104a522-bb2f-4b04-ad0d-b0c571644552","last_modified":1517577111194},{"guid":"/^(\\{0b24cf69-02b8-407d-83db-e7af04fc1f3e\\})|(\\{6feed48d-41d4-49b8-b7d6-ef78cc7a7cd7\\})| (\\{8a0699a0-09c3-4cf1-b38d-fec25441650c\\})$/","prefs":[],"schema":1517341295286,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1434759","why":"These add-ons use remote scripts to alter popular sites like Google or Amazon.","name":"Malicious remote script add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"32ffc62d-40c4-43ac-aa3f-7240978d0ad0","last_modified":1517439279474},{"guid":"/^({be5d0c88-571b-4d01-a27a-cc2d2b75868c})|({3908d078-e1db-40bf-9567-5845aa77b833})|({5b620343-cd69-49b8-a7ba-f9d499ee5d3d})|({6eee2d17-f932-4a43-a254-9e2223be8f32})|({e05ba06a-6d6a-4c51-b8fc-60b461ffecaf})|({a5808da1-5b4f-42f2-b030-161fd11a36f7})|({d355bee9-07f0-47d3-8de6-59b8eecba57b})|({a1f8e136-bce5-4fd3-9ed1-f260703a5582})$/","prefs":[],"schema":1517260691761,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.\n","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"70f37cc7-9f8a-4d0f-a881-f0c56934fa75","last_modified":1517260722621},{"guid":"/^({d78d27f4-9716-4f13-a8b6-842c455d6a46})|({bd5ba448-b096-4bd0-9582-eb7a5c9c0948})|({0b24cf69-02b8-407d-83db-e7af04fc1f3e})|({e08d85c5-4c0f-4ce3-9194-760187ce93ba})|({1c7d6d9e-325a-4260-8213-82d51277fc31})|({8a0699a0-09c3-4cf1-b38d-fec25441650c})|({1e68848a-2bb7-425c-81a2-524ab93763eb})$/","prefs":[],"schema":1517168490224,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"805ee80e-0929-4c92-93ed-062b98053f28","last_modified":1517260691755},{"guid":"/^({abec23c3-478f-4a5b-8a38-68ccd500ec42}|{a83c1cbb-7a41-41e7-a2ae-58efcb4dc2e4}|{62237447-e365-487e-8fc3-64ddf37bdaed}|{b12cfdc7-3c69-43cb-a3fb-38981b68a087}|{1a927d5b-42e7-4407-828a-fdc441d0daae}|{dd1cb0ec-be2a-432b-9c90-d64c824ac371}|{82c8ced2-e08c-4d6c-a12b-3e8227d7fc2a}|{87c552f9-7dbb-421b-8deb-571d4a2d7a21})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c92f2a05-73eb-454e-9583-f6d2382d8bca","last_modified":1516829074251},{"guid":"/^({618baeb9-e694-4c7b-9328-69f35b6a8839}|{b91fcda4-88b0-4a10-9015-9365e5340563}|{04150f98-2d7c-4ae2-8979-f5baa198a577}|{4b1050c6-9139-4126-9331-30a836e75db9}|{1e6f5a54-2c4f-4597-aa9e-3e278c617d38}|{e73854da-9503-423b-ab27-fafea2fbf443}|{a2427e23-d349-4b25-b5b8-46960b218079}|{f92c1155-97b3-40f4-9d5b-7efa897524bb}|{c8e14311-4b2d-4eb0-9a6b-062c6912f50e}|{45621564-b408-4c29-8515-4cf1f26e4bc3}|{27380afd-f42a-4c25-b57d-b9012e0d5d48})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"2d4fe65b-6c02-4461-baa8-dda52e688cf6","last_modified":1516829040469},{"guid":"/^({4dac7c77-e117-4cae-a9f0-6bd89e9e26ab}|{cc689da4-203f-4a0c-a7a6-a00a5abe74c5}|{0eb4672d-58a6-4230-b74c-50ca3716c4b0}|{06a71249-ef35-4f61-b2c8-85c3c6ee5617}|{5280684d-f769-43c9-8eaa-fb04f7de9199}|{c2341a34-a3a0-4234-90cf-74df1db0aa49}|{85e31e7e-3e3a-42d3-9b7b-0a2ff1818b33}|{b5a35d05-fa28-41b5-ae22-db1665f93f6b}|{1bd8ba17-b3ed-412e-88db-35bc4d8771d7}|{a18087bb-4980-4349-898c-ca1b7a0e59cd}|{488e190b-d1f6-4de8-bffb-0c90cc805b62})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9a3fd797-0ab8-4286-9a1b-2b6c97f9075b","last_modified":1516829006347},{"guid":"/^({f6df4ef7-14bd-43b5-90c9-7bd02943789c}|{ccb7b5d6-a567-40a2-9686-a097a8b583dd}|{9b8df895-fcdd-452a-8c46-da5be345b5bc}|{5cf77367-b141-4ba4-ac2a-5b2ca3728e81}|{ada56fe6-f6df-4517-9ed0-b301686a34cc}|{95c7ae97-c87e-4827-a2b7-7b9934d7d642}|{e7b978ae-ffc2-4998-a99d-0f4e2f24da82}|{115a8321-4414-4f4c-aee6-9f812121b446}|{bf153de7-cdf2-4554-af46-29dabfb2aa2d}|{179710ba-0561-4551-8e8d-1809422cb09f}|{9d592fd5-e655-461a-9b28-9eba85d4c97f})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"aae78cd5-6b26-472e-ab2d-db4105911250","last_modified":1516828973824},{"guid":"/^({30972e0a-f613-4c46-8c87-2e59878e7180}|{0599211f-6314-4bf9-854b-84cb18da97f8}|{4414af84-1e1f-449b-ac85-b79f812eb69b}|{2a8bec00-0ab0-4b4d-bd3d-4f59eada8fd8}|{bea8866f-01f8-49e9-92cd-61e96c05d288}|{046258c9-75c5-429d-8d5b-386cfbadc39d}|{c5d359ff-ae01-4f67-a4f7-bf234b5afd6e}|{fdc0601f-1fbb-40a5-84e1-8bbe96b22502}|{85349ea6-2b5d-496a-9379-d4be82c2c13d}|{640c40e5-a881-4d16-a4d0-6aa788399dd2}|{d42328e1-9749-46ba-b35c-cce85ddd4ace})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"750aa293-3742-46b5-8761-51536afecaef","last_modified":1516828938683},{"guid":"/^({d03b6b0f-4d44-4666-a6d6-f16ad9483593}|{767d394a-aa77-40c9-9365-c1916b4a2f84}|{a0ce2605-b5fc-4265-aa65-863354e85058}|{b7f366fa-6c66-46bf-8df2-797c5e52859f}|{4ad16913-e5cb-4292-974c-d557ef5ec5bb}|{3c3ef2a3-0440-4e77-9e3c-1ca8d48f895c}|{543f7503-3620-4f41-8f9e-c258fdff07e9}|{98363f8b-d070-47b6-acc6-65b80acac4f3}|{5af74f5a-652b-4b83-a2a9-f3d21c3c0010}|{484e0ba4-a20b-4404-bb1b-b93473782ae0}|{b99847d6-c932-4b52-9650-af83c9dae649})$/","prefs":[],"schema":1516828883529,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"a29aed6f-6546-4fa2-8131-df5c9a5427af","last_modified":1516828911059},{"guid":"/^({2bb68b03-b528-4133-9fc4-4980fbb4e449}|{231e58ac-0f3c-460b-bb08-0e589360bec7}|{a506c5af-0f95-4107-86f8-3de05e2794c9}|{8886a262-1c25-490b-b797-2e750dd9f36b}|{65072bef-041f-492e-8a51-acca2aaeac70}|{6fa41039-572b-44a4-acd4-01fdaebf608d}|{87ba49bd-daba-4071-aedf-4f32a7e63dbe}|{95d58338-ba6a-40c8-93fd-05a34731dc0e}|{4cbef3f0-4205-4165-8871-2844f9737602}|{1855d130-4893-4c79-b4aa-cbdf6fee86d3}|{87dcb9bf-3a3e-4b93-9c85-ba750a55831a})$/","prefs":[],"schema":1516822896448,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are malicious add-ons that automatically close the Add-ons Manager.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5c092b0d-7205-43a1-aa75-b7a42372fb52","last_modified":1516828883523},{"guid":"/^({fce89242-66d3-4946-9ed0-e66078f172fc})|({0c4df994-4f4a-4646-ae5d-8936be8a4188})|({6cee30bc-a27c-43ea-ac72-302862db62b2})|({e08ebf0b-431d-4ed1-88bb-02e5db8b9443})$/","prefs":[],"schema":1516650096284,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432560","why":"These are malicious add-ons that make it hard for the user to be removed.","name":"FF AntiVir Monitoring"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9dfeee42-e6a8-49e0-8979-0648f7368239","last_modified":1516744119329},{"guid":"/^(\\{1490068c-d8b7-4bd2-9621-a648942b312c\\})|(\\{d47ebc8a-c1ea-4a42-9ca3-f723fff034bd\\})|(\\{83d6f65c-7fc0-47d0-9864-a488bfcaa376\\})|(\\{e804fa4c-08e0-4dae-a237-8680074eba07\\})|(\\{ea618d26-780e-4f0f-91fd-2a6911064204\\})|(\\{ce93dcc7-f911-4098-8238-7f023dcdfd0d\\})|(\\{7eaf96aa-d4e7-41b0-9f12-775c2ac7f7c0\\})|(\\{b019c485-2a48-4f5b-be13-a7af94bc1a3e\\})|(\\{9b8a3057-8bf4-4a9e-b94b-867e4e71a50c\\})|(\\{eb3ebb14-6ced-4f60-9800-85c3de3680a4\\})|(\\{01f409a5-d617-47be-a574-d54325fe05d1\\})$/","prefs":[],"schema":1516394914836,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are a set of malicious add-ons that block the add-ons manager tab from opening so they can't be uninstalled.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5bf72f70-a611-4845-af3f-d4dabe8862b6","last_modified":1516394982586},{"guid":"/^(\\{ac06c6b2-3fd6-45ee-9237-6235aa347215\\})|(\\{d461cc1b-8a36-4ff0-b330-1824c148f326\\})|(\\{d1ab5ebd-9505-481d-a6cd-6b9db8d65977\\})|(\\{07953f60-447e-4f53-a5ef-ed060487f616\\})|(\\{2d3c5a5a-8e6f-4762-8aff-b24953fe1cc9\\})|(\\{f82b3ad5-e590-4286-891f-05adf5028d2f\\})|(\\{f96245ad-3bb0-46c5-8ca9-2917d69aa6ca\\})|(\\{2f53e091-4b16-4b60-9cae-69d0c55b2e78\\})|(\\{18868c3a-a209-41a6-855d-f99f782d1606\\})|(\\{47352fbf-80d9-4b70-9398-fb7bffa3da53\\})$/","prefs":[],"schema":1516311993443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1431748","why":"These are a set of malicious add-ons that block the add-ons manager tab from opening so they can't be uninstalled.","name":"FF Tool"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"4ca8206f-bc2a-4428-9439-7f3142dc08db","last_modified":1516394914828},{"guid":"{5b0f6d3c-10fd-414c-a135-dffd26d7de0f}","prefs":[],"schema":1516131689499,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430577","why":"This is a malicious add-on that executes remote scripts, redirects popular search URLs and tracks users.","name":"P Birthday"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"8088b39a-3e6d-4a17-a22f-3f95c0464bd6","last_modified":1516303320468},{"guid":"{1490068c-d8b7-4bd2-9621-a648942b312c}","prefs":[],"schema":1515267698296,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1428754","why":"This add-on is using a deceptive name and performing unwanted actions on users' systems.","name":"FF Safe Helper"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"674b6e19-f087-4706-a91d-1e723ed6f79e","last_modified":1515433728497},{"guid":"{dfa727cb-0246-4c5a-843a-e4a8592cc7b9}","prefs":[],"schema":1514922095288,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1426582","why":"Version 2.0.0 shipped with a hidden coin miner, which degrades performance in users who have it enabled. Version 1.2.3 currently available on AMO is not affected.","name":"Open With Adobe PDF Reader 2.0.0"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.0","minVersion":"2.0.0"}],"id":"455772a3-8360-4f5a-9a5f-a45b904d0b51","last_modified":1515007270887},{"guid":"{d03b6b0f-4d44-4666-a6d6-f16ad9483593}","prefs":[],"schema":1513366896461,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1425581","why":"This is a malicious add-on posing as a legitimate update.","name":"FF Guard Tool (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"10d9ce89-b8d4-4b53-b3d7-ecd192681f4e","last_modified":1513376470395},{"guid":"{7e907a15-0a4c-4ff4-b64f-5eeb8f841349}","prefs":[],"schema":1510083698490,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate update.","name":"Manual Update"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"f7569261-f575-4719-8202-552b20d013b0","last_modified":1510168860382},{"guid":"{3602008d-8195-4860-965a-d01ac4f9ca96}","prefs":[],"schema":1509120801051,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.\n","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"28c805a9-e692-4ef8-b3ae-14e085c19ecd","last_modified":1509120934909},{"guid":"{87010166-e3d0-4db5-a394-0517917201df}","prefs":[],"schema":1509120801051,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.\n","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"84dd8a02-c879-4477-8ea7-bf2f225b0940","last_modified":1509120881470},{"guid":"{8ab60777-e899-475d-9a4f-5f2ee02c7ea4}","prefs":[],"schema":1509120801051,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.\n","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"ccebab59-7190-4258-8faa-a0b752dd5301","last_modified":1509120831329},{"guid":"{368eb817-31b4-4be9-a761-b67598faf9fa}","prefs":[],"schema":1509046897080,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411885","why":"This is a malicious add-on posing as a legitimate antivirus.","name":"Manual Antivirus"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"9abc7502-bd6f-40d7-b035-abe721345360","last_modified":1509120801043},{"guid":"fi@dictionaries.addons.mozilla.org","prefs":[],"schema":1508701297180,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407147","why":"This add-on is causing frequent crashes in Firefox 56.","name":"Finnish spellchecker"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.1.0","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"56.0a1"}]}],"id":"22431713-a93b-40f4-8264-0b341b5f6454","last_modified":1508856488536},{"guid":"firefox@mega.co.nz","prefs":[],"schema":1506800496781,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1404290","why":"Add-on is causing tabs to load blank.","name":"Mega.nz"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.16.1","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"56.0a1"}]}],"id":"a84e6eba-4bc1-4416-b481-9b837d39f9f0","last_modified":1506963401477},{"guid":"@68eba425-7a05-4d62-82b1-1d6d5a51716b","prefs":[],"schema":1505072496256,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1398905","why":"Misleads users into thinking this is a security and privacy tool (also distributed on a site that makes it look like an official Mozilla product).","name":"SearchAssist Incognito"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0"}],"id":"595e0e53-b76b-4188-a160-66f29c636094","last_modified":1505211411253},{"guid":"{efda3854-2bd9-45a1-9766-49d7ff18931d}","prefs":[],"schema":1503344500341,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1392625","why":"Add-on injects remote code into privileged scope.","name":"Smart Referer"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.8.17.2","minVersion":"0"}],"id":"d83011de-67a4-479b-a778-916a7232095b","last_modified":1503411102265},{"guid":"@H99KV4DO-UCCF-9PFO-9ZLK-8RRP4FVOKD9O","prefs":[],"schema":1502483549048,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1340877","why":"This is a malicious add-on that is being installed silently.","name":"FF Adr (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"5df16afc-c804-43c9-9de5-f1835403e5fb","last_modified":1502483601731},{"guid":"@DA3566E2-F709-11E5-8E87-A604BC8E7F8B","prefs":[],"schema":1502480491460,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1340877","why":"This is a malicious add-on that is being installed silently into users' systems.","name":"SimilarWeb (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"0a47a2f7-f07c-489b-bd39-88122a2dfe6a","last_modified":1502483549043},{"guid":"xdict@www.iciba.com","prefs":[],"schema":1501098091500,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1384497","why":"This add-on has been discontinued and is creating a prompt loop that blocks users from using Firefox.","name":"PowerWord Grab Word Extension"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.3.1","minVersion":"0"}],"id":"28736359-700e-4b61-9c50-0b533a6bac55","last_modified":1501187580933},{"guid":"{3B4DE07A-DE43-4DBC-873F-05835FF67DCE}","prefs":[],"schema":1496950889322,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1371392","why":"This add-on performs hidden actions that cause the users' systems to act as a botnet.","name":"The Safe Surfing (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"510bbd9b-b883-4837-90ab-8e353e27e1be","last_modified":1496951442076},{"guid":"WebProtection@360safe.com","prefs":[],"schema":1496846005095,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1336635","who":"All users of Firefox 52 and above who have this add-on installed.","why":"This add-on breaks the Firefox user interface starting with version 52.","name":"360 Internet Protection versions 5.0.0.1009 and lower"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"5.0.0.1009","minVersion":"0"}],"id":"e16408c3-4e08-47fd-85a9-3cbbce534e95","last_modified":1496849965060},{"guid":"html5@encoding","prefs":[],"schema":1496788543767,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1370847","who":"All users.","why":"This malicious add-on targets a certain user group and spies on them.","name":"HTML5 Encoding (Malicious), all versions"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"c806b01c-3352-4083-afd9-9a8ab6e00b19","last_modified":1496833261424},{"guid":"/^({95E84BD3-3604-4AAC-B2CA-D9AC3E55B64B}|{E3605470-291B-44EB-8648-745EE356599A}|{95E5E0AD-65F9-4FFC-A2A2-0008DCF6ED25}|{FF20459C-DA6E-41A7-80BC-8F4FEFD9C575}|{6E727987-C8EA-44DA-8749-310C0FBE3C3E}|{12E8A6C2-B125-479F-AB3C-13B8757C7F04}|{EB6628CF-0675-4DAE-95CE-EFFA23169743})$/","prefs":[],"schema":1494022576295,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1362585","why":"All of these add-ons have been identified as malware, and are being installed in Firefox globally, most likely via a malicious application installer.","name":"Malicious globally-installed add-ons"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"3fd71895-7fc6-4f3f-aa22-1cbb0c5fd922","last_modified":1494024191520},{"guid":"@safesearchscoutee","prefs":[],"schema":1494013289942,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1362553","why":"This add-on intercepts queries sent to search engines and replaces them with its own, without user consent.","name":"SafeSearch Incognito (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0"}],"id":"edad04eb-ea16-42f3-a4a7-20dded33cc37","last_modified":1494022568654},{"guid":"{0D2172E4-C5AE-465A-B80D-53A840275B5E}","prefs":[],"schema":1493332768943,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1359473","who":"All users of Thunderbird 52 and above, using a version of the Priority Switcher add-on before version 0.7","why":"This add-on is causing recurring startup crashes in Thunderbird.","name":"Priority Switcher for Thunderbird before version 0.7"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.6.999","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"52.0a1"}]}],"id":"8c8af415-46db-40be-a66e-38e3762493bd","last_modified":1493332986987},{"guid":"msktbird@mcafee.com","prefs":[],"schema":1493150718059,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1354912","why":"These versions of this add-on are known to cause frequent crashes in Thunderbird.","name":"McAfee Anti-Spam Thunderbird Extension 2.0 and lower"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.0","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"0"}]}],"id":"9e86d1ff-727a-45e3-9fb6-17f32666daf2","last_modified":1493332747360},{"guid":"/^(\\{11112503-5e91-4299-bf4b-f8c07811aa50\\})|(\\{501815af-725e-45be-b0f2-8f36f5617afc\\})$/","prefs":[],"schema":1491421290217,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1354045","why":"This add-on steals user credentials for popular websites from Facebook.","name":"Flash Player Updater (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c142360c-4f93-467e-9717-b638aa085d95","last_modified":1491472107658},{"guid":"fr@fbt.ovh","prefs":[],"schema":1490898754477,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1351689","why":"Scam add-on that silently steals user credentials of popular websites","name":"Adobe Flash Player (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0f8344d0-8211-49a1-81be-c0084b3da9b1","last_modified":1490898787752},{"guid":"/^\\{(9321F452-96D5-11E6-BC3E-3769C7AD2208)|({18ED1ECA-96D3-11E6-A373-BD66C7AD2208})\\}$/","prefs":[],"schema":1490872899765,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1351710","why":"These add-ons modify websites and add deceptive or abusive content","name":"Scamming add-ons (Malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d6425f24-8c9e-4c0a-89b4-6890fc68d5c9","last_modified":1490898748265},{"guid":"/^(test2@test\\.com)|(test3@test\\.com)|(mozilla_cc2\\.2@internetdownloadmanager\\.com)$/","prefs":[],"schema":1490557289817,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1351095","who":"All users who have any of these add-ons installed.","why":"Old versions of the Internet Download Manager Integration add-on cause performance and stability problems in Firefox 53 and above.","name":"IDM Integration forks"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"53.0a1"}]}],"id":"9085fdba-8498-46a9-b9fd-4c7343a15c62","last_modified":1490653926191},{"guid":"mozilla_cc2@internetdownloadmanager.com","prefs":[],"schema":1489007018796,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1338832","who":"All users who have these versions of the add-on installed.","why":"Old versions of the Internet Download Manager Integration add-on cause performance and stability problems in Firefox 53 and above.","name":"IDM Integration"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"6.26.11","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"53.0a1"}]}],"id":"d33f6d48-a555-49dd-96ff-8d75473403a8","last_modified":1489514734167},{"guid":"InternetProtection@360safe.com","prefs":[],"schema":1489006712382,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1336635","who":"All Firefox users who have this add-on installed.","why":"This add-on breaks the Firefox user interface starting with version 52.","name":"360 Internet Protection"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"5.0.0.1002","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"52.0a1"}]}],"id":"89a61123-79a2-45d1-aec2-97afca0863eb","last_modified":1489006816246},{"guid":"{95E84BD3-3604-4AAC-B2CA-D9AC3E55B64B}","prefs":[],"schema":1487179851382,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1338690","who":"All users who have this add-on installed.","why":"This is a malicious add-on that is silently installed in users' systems.","name":"youtube adblock (malware)"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"04b25e3d-a725-493e-be07-cbd74fb37ea7","last_modified":1487288975999},{"guid":"ext@alibonus.com","prefs":[],"schema":1485297431051,"blockID":"i1524","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333471","who":"All Firefox users who have these versions installed.","why":"Versions 1.20.9 and lower of this add-on contain critical security issues.","name":"Alibonus 1.20.9 and lower","created":"2017-01-24T22:45:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.20.9","minVersion":"0","targetApplication":[]}],"id":"a015d5a4-9184-95db-0c74-9262af2332fa","last_modified":1485301116629},{"guid":"{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}","prefs":[],"schema":1485295513652,"blockID":"i1523","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314332","who":"All Firefox users who have these versions of the Web of Trust add-on installed.","why":"Versions 20170120 and lower of the Web of Trust add-on send excessive user data to its service, which has been reportedly shared with third parties without sufficient sanitization. These versions are also affected by a vulnerability that could lead to unwanted remote code execution.","name":"Web of Trust 20170120 and lower","created":"2017-01-24T22:01:08Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"20170120","minVersion":"0","targetApplication":[]}],"id":"2224c139-9b98-0900-61c1-04031de11ad3","last_modified":1485297214072},{"guid":"/^(ciscowebexstart1@cisco\\.com|ciscowebexstart_test@cisco\\.com|ciscowebexstart@cisco\\.com|ciscowebexgpc@cisco\\.com)$/","prefs":[],"schema":1485212610474,"blockID":"i1522","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333225","who":"All Firefox users who have any Cisco WebEx add-ons installed.","why":"A critical security vulnerability has been discovered in Cisco WebEx add-ons that enable malicious websites to execute code on the user's system.","name":"Cisco WebEx add-ons","created":"2017-01-23T22:55:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.1","minVersion":"1.0.0","targetApplication":[]}],"id":"30368779-1d3b-490a-0a34-253085af7754","last_modified":1485215014902},{"guid":"{de71f09a-3342-48c5-95c1-4b0f17567554}","prefs":[],"schema":1484335370642,"blockID":"i1493","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329654","who":"All users who have this add-on installed.","why":"This is a malicious add-on that is installed using a fake name. It changes search and homepage settings.","name":"Search for Firefox Convertor (malware)","created":"2017-01-12T22:17:59Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.3.9","minVersion":"0","targetApplication":[]}],"id":"d6ec9f54-9945-088e-ba68-40117eaba24e","last_modified":1484867614757},{"guid":"googlotim@gmail.com","prefs":[],"schema":1483389810787,"blockID":"i1492","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1328594","who":"All users who have Savogram version 1.3.2 installed. Version 1.3.1 doesn't have this problem and can be installed from the add-on page. Note that this is an older version, so affected users won't be automatically updated to it. New versions should correct this problem if they become available.","why":"Version 1.3.2 of this add-on loads remote code and performs DOM injection in an unsafe manner.","name":"Savogram 1.3.2","created":"2017-01-05T19:58:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.3.2","minVersion":"1.3.2","targetApplication":[]}],"id":"0756ed76-7bc7-ec1e-aba5-3a9fac2107ba","last_modified":1483646608603},{"guid":"support@update-firefox.com","prefs":[],"schema":1483387107003,"blockID":"i21","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629717","who":"All users of the add-on in all Mozilla applications.","why":"This add-on is adware/spyware masquerading as a Firefox update mechanism.","name":"Browser Update (spyware)","created":"2011-01-31T16:23:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dfb06be8-3594-28e4-d163-17e27119f15d","last_modified":1483389809169},{"guid":"{2224e955-00e9-4613-a844-ce69fccaae91}","prefs":[],"schema":1483387107003,"blockID":"i7","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=512406","who":"All users of Internet Saving Optimizer for all Mozilla applications.","why":"This add-on causes a high volume of Firefox crashes and is considered malware.","name":"Internet Saving Optimizer (extension)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b9efb796-97c2-6434-d28f-acc83436f8e5","last_modified":1483389809147},{"guid":"supportaccessplugin@gmail.com","prefs":[],"schema":1483387107003,"blockID":"i43","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=693673","who":"All users with Firefox Access Plugin installed","why":"This add-on is spyware that reports all visited websites to a third party with no user value.","name":"Firefox Access Plugin (spyware)","created":"2011-10-11T11:24:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ed230a4-e174-262a-55ab-0c33f93a2529","last_modified":1483389809124},{"guid":"{8CE11043-9A15-4207-A565-0C94C42D590D}","prefs":[],"schema":1483387107003,"blockID":"i10","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=541302","who":"All users of this add-on in all Mozilla applications.","why":"This add-on secretly hijacks all search results in most major search engines and masks as a security add-on.","name":"Internal security options editor (malware)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e2e0ac09-6d68-75f5-2424-140f51904876","last_modified":1483389809102},{"guid":"youtube@youtube2.com","prefs":[],"schema":1483387107003,"blockID":"i47","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=713050","who":"All users with any version of Free Cheesecake Factory installed on any Mozilla product.","why":"This add-on hijacks your Facebook account.","name":"Free Cheesecake Factory (malware)","created":"2011-12-22T13:11:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"85f5c1db-433b-bee3-2a3b-325165cacc6e","last_modified":1483389809079},{"guid":"admin@youtubespeedup.com","prefs":[],"schema":1483387107003,"blockID":"i48","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=714221","who":"All users with any version of Youtube Speed UP! installed on any Mozilla product.","why":"This add-on hijacks your Facebook account.","name":"Youtube Speed UP! (malware)","created":"2011-12-29T19:48:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a93922c4-8a8a-5230-8f76-76fecb0653b6","last_modified":1483389809057},{"guid":"{E8E88AB0-7182-11DF-904E-6045E0D72085}","prefs":[],"schema":1483387107003,"blockID":"i13","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578085","who":"All users of this add-on for all Mozilla applications.","why":"This add-on intercepts website login credentials and is malware. For more information, please read our security announcement.","name":"Mozilla Sniffer (malware)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ebbd6de9-fc8a-3e5b-2a07-232bee589c7c","last_modified":1483389809035},{"guid":"sigma@labs.mozilla","prefs":[],"schema":1483387107003,"blockID":"i44","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690819","who":"All users of Lab Kit in all versions of Firefox.","why":"The Lab Kit add-on has been retired due to compatibility issues with Firefox 7 and future Firefox browser releases. You can still install Mozilla Labs add-ons individually.\r\n\r\nFor more information, please read this announcement.","name":"Mozilla Labs: Lab Kit","created":"2011-10-11T11:51:34Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d614e9cd-220f-3a19-287b-57e122f8c4b5","last_modified":1483389809012},{"guid":"/^(jid0-S9kkzfTvEmC985BVmf8ZOzA5nLM@jetpack|jid1-qps14pkDB6UDvA@jetpack|jid1-Tsr09YnAqIWL0Q@jetpack|shole@ats.ext|{38a64ef0-7181-11e3-981f-0800200c9a66}|eochoa@ualberta.ca)$/","prefs":[],"schema":1483376308298,"blockID":"i1424","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","who":"All users who have any of the affected versions installed.","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked.","name":"Various vulnerable add-on versions","created":"2016-12-21T17:22:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0699488d-2a19-6735-809e-f229849fe00b","last_modified":1483378113482},{"guid":"pink@rosaplugin.info","prefs":[],"schema":1482945809444,"blockID":"i84","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743484","who":"All Firefox users who have this add-on installed","why":"Add-on acts like malware and performs user actions on Facebook without their consent.","name":"Facebook Rosa (malware)","created":"2012-04-09T10:13:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"66ad8de9-311d-076c-7356-87fde6d30d8f","last_modified":1482945810971},{"guid":"videoplugin@player.com","prefs":[],"schema":1482945809444,"blockID":"i90","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=752483","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as a Flash Player update. It can hijack Google searches and Facebook accounts.","name":"FlashPlayer 11 (malware)","created":"2012-05-07T08:58:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d25943f1-39ef-b9ec-ab77-baeef3498365","last_modified":1482945810949},{"guid":"youtb3@youtb3.com","prefs":[],"schema":1482945809444,"blockID":"i60","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723753","who":"All Firefox users who have this extension installed.","why":"Malicious extension installed under false pretenses.","name":"Video extension (malware)","created":"2012-02-02T16:38:41Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cae3093f-a7b3-5352-a264-01dbfbf347ce","last_modified":1482945810927},{"guid":"{8f42fb8b-b6f6-45de-81c0-d6d39f54f971}","prefs":[],"schema":1482945809444,"blockID":"i82","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743012","who":"All Firefox users who have installed this add-on.","why":"This add-on maliciously manipulates Facebook and is installed under false pretenses.","name":"Face Plus (malware)","created":"2012-04-09T10:04:28Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"09319ab3-55e7-fec1-44e0-84067d014b9b","last_modified":1482945810904},{"guid":"cloudmask@cloudmask.com","prefs":[],"schema":1482945809444,"blockID":"i1233","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280431","who":"Any user who has version 2.0.788, or earlier, installed.","why":"These versions of the add-on (before 2.0.788) execute code from a website in a privileged local browser context, potentially allowing dangerous, unreviewed, actions to affect the user's computer. This is fixed in later versions.","name":"CloudMask","created":"2016-06-17T14:31:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.788","minVersion":"0","targetApplication":[]}],"id":"2a8b40c7-a1d2-29f4-b7d7-ccfc5066bae1","last_modified":1482945810881},{"guid":"{95ff02bc-ffc6-45f0-a5c8-619b8226a9de}","prefs":[],"schema":1482945809444,"blockID":"i105","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n","name":"Eklenti D\u00fcnyas\u0131 (malware)","created":"2012-06-08T14:34:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"afbbc08d-2414-f51e-fdb8-74c0a2d90323","last_modified":1482945810858},{"guid":"{fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}","prefs":[],"schema":1482945809444,"blockID":"i77","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738419","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware that is installed under false pretenses as an Adobe plugin.","name":"Adobe Flash (malware)","created":"2012-03-22T14:39:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81753a93-382d-5f9d-a4ca-8a21b679ebb1","last_modified":1482945810835},{"guid":"youtube@youtube3.com","prefs":[],"schema":1482945809444,"blockID":"i57","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722823","who":"All Firefox users that have installed this add-on.","why":"Malware installed on false pretenses.","name":"Divx 2012 Plugin (malware)","created":"2012-01-31T13:54:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4a93a0eb-a513-7272-6199-bc4d6228ff50","last_modified":1482945810811},{"guid":"{392e123b-b691-4a5e-b52f-c4c1027e749c}","prefs":[],"schema":1482945809444,"blockID":"i109","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=769781","who":"All Firefox users who have this add-on installed.","why":"This add-on pretends to be developed by Facebook and injects scripts that manipulate users' Facebook accounts.","name":"Zaman Tuneline Hay\u0131r! (malware)","created":"2012-06-29T13:20:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b9a805aa-cae7-58d6-5a53-2af4442e4cf6","last_modified":1482945810788},{"guid":"msntoolbar@msn.com","prefs":[],"schema":1482945809444,"blockID":"i18","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","who":"Users of Bing Bar 6.0 and older for all versions of Firefox.","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see this article.","name":"Bing Bar","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"6.*","minVersion":" 0","targetApplication":[]}],"id":"9b2f2039-b997-8993-d6dc-d881bc1ca7a1","last_modified":1482945810764},{"guid":"yasd@youasdr3.com","prefs":[],"schema":1482945809444,"blockID":"i104","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n","name":"Play Now (malware)","created":"2012-06-08T14:33:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8a352dff-d09d-1e78-7feb-45dec7ace5a5","last_modified":1482945810740},{"guid":"fdm_ffext@freedownloadmanager.org","prefs":[],"schema":1482945809444,"blockID":"i2","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=408445","who":"Users of Firefox 3 and later with versions 1.0 through 1.3.1 of Free Download Manager","why":"This add-on causes a high volume of crashes.","name":"Free Download Manager","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.3.1","minVersion":"1.0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.0a1"}]}],"id":"fc46f8e7-0489-b90f-a373-d93109479ca5","last_modified":1482945810393},{"guid":"flash@adobe.com","prefs":[],"schema":1482945809444,"blockID":"i56","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","who":"All Firefox users who have this add-on installed.","why":"This add-on poses as an Adobe Flash update and injects malicious scripts into web pages. It hides itself in the Add-ons Manager.","name":"Adobe Flash Update (malware)","created":"2012-01-30T15:41:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"696db959-fb0b-8aa4-928e-65f157cdd77a","last_modified":1482945810371},{"guid":"youtubeer@youtuber.com","prefs":[],"schema":1482945809444,"blockID":"i66","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726787","who":"All Firefox users who have installed this add-on.","why":"Add-on behaves maliciously, and is installed under false pretenses.","name":"Plug VDS (malware)","created":"2012-02-13T15:44:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0878ce4e-b476-ffa3-0e06-21a65b7917a1","last_modified":1482945810348},{"guid":"{B13721C7-F507-4982-B2E5-502A71474FED}","prefs":[],"schema":1482945809444,"blockID":"i8","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","who":"Users of all versions of the original Skype Toolbar in all versions of Firefox.","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please update to the latest version. For more information, please read our announcement.","name":"Original Skype Toolbar","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5a320611-59a3-0eee-bb30-9052be870e00","last_modified":1482945810326},{"guid":"yslow@yahoo-inc.com","prefs":[],"schema":1482945809444,"blockID":"i11","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542686","who":"Users of YSlow version 2.0.5 for Firefox 3.5.7 and later.","why":"This add-on causes a high volume of Firefox crashes and other stability issues. Users should update to the latest version.","name":"YSlow","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.5","minVersion":"2.0.5","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.5.7"}]}],"id":"a9b34e8f-45ce-9217-b791-98e094c26352","last_modified":1482945810303},{"guid":"youtube@youtuber.com","prefs":[],"schema":1482945809444,"blockID":"i63","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724691","who":"All Firefox users who have installed this add-on.","why":"Installs under false pretenses and delivers malware.","name":"Mozilla Essentials (malware)","created":"2012-02-06T15:39:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"18216e6f-9d70-816f-4d4c-63861f43ff3c","last_modified":1482945810281},{"guid":"flash@adobee.com","prefs":[],"schema":1482945809444,"blockID":"i83","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743497","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware installed under false pretenses.","name":"FlashPlayer 11 (malware)","created":"2012-04-09T10:08:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"09bb4661-331c-f7ba-865b-9e085dc437af","last_modified":1482945810259},{"guid":"youtube@2youtube.com","prefs":[],"schema":1482945809444,"blockID":"i71","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730399","who":"All Firefox users who have installed this add-on.","why":"Extension is malware, installed under false pretenses.","name":"YouTube extension (malware)","created":"2012-02-27T10:23:23Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5d389c1f-b3a0-b06f-6ffb-d1e8aa055e3c","last_modified":1482945810236},{"guid":"webmaster@buzzzzvideos.info","prefs":[],"schema":1482945809444,"blockID":"i58","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722844","who":"All Firefox users who have installed this add-on.","why":"Malware add-on that is installed under false pretenses.","name":"Buzz Video (malware)","created":"2012-01-31T14:51:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f7aab105-e2c2-42f5-d9be-280eb9c0c8f7","last_modified":1482945810213},{"guid":"play5@vide04flash.com","prefs":[],"schema":1482945809444,"blockID":"i92","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755443","who":"All Firefox users who have this add-on installed.","why":"This add-on impersonates a Flash Player update (poorly), and inserts malicious scripts into Facebook.","name":"Lastest Flash PLayer (malware)","created":"2012-05-15T13:27:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7190860e-fc1f-cd9f-5d25-778e1e9043b2","last_modified":1482945810191},{"guid":"support3_en@adobe122.com","prefs":[],"schema":1482945809444,"blockID":"i97","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759164","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as the Flash Player plugin.","name":"FlashPlayer 11 (malware)","created":"2012-05-28T13:42:54Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"decf93a1-2bb0-148c-a1a6-10b3757b554b","last_modified":1482945810168},{"guid":"a1g0a9g219d@a1.com","prefs":[],"schema":1482945809444,"blockID":"i73","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=736275","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as Flash Player. It steals user cookies and sends them to a remote location.","name":"Flash Player (malware)","created":"2012-03-15T15:03:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6dd66b43-897d-874a-2227-54e240b8520f","last_modified":1482945810146},{"guid":"ghostviewer@youtube2.com","prefs":[],"schema":1482945809444,"blockID":"i59","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723683","who":"All Firefox users who have installed this add-on.","why":"Malicious add-on that automatically posts to Facebook.","name":"Ghost Viewer (malware)","created":"2012-02-02T16:32:15Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"06dfe833-8c3d-90ee-3aa8-37c3c28f7c56","last_modified":1482945810123},{"guid":"{46551EC9-40F0-4e47-8E18-8E5CF550CFB8}","prefs":[],"schema":1482945809444,"blockID":"i19","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=621660","who":"Users of Stylish version 1.1b1 for Firefox.","why":"Version 1.1b1 of this add-on causes compatibility issues with Firefox. Users should update to the latest version.","name":"Stylish","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.1b1","minVersion":"1.1b1","targetApplication":[]}],"id":"aaea37e1-ff86-4565-8bd5-55a6bf942791","last_modified":1482945810101},{"guid":"kdrgun@gmail.com","prefs":[],"schema":1482945809444,"blockID":"i103","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.","name":"Timeline Kapat (malware)","created":"2012-06-08T14:32:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a9a46ab2-2f56-1046-201c-5faa3435e248","last_modified":1482945810078},{"guid":"youtube2@youtube2.com","prefs":[],"schema":1482945809444,"blockID":"i67","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=728476","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware, installed under false pretenses.","name":"Youtube Online (malware)","created":"2012-02-18T09:10:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"14650ece-295b-a667-f9bc-a3d973e2228c","last_modified":1482945810055},{"guid":"masterfiler@gmail.com","prefs":[],"schema":1482945809444,"blockID":"i12","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542081","who":"All users of this add-on for all Mozilla applications.","why":"This add-on is malware and attempts to install a Trojan on the user's computer.","name":"Master File (malware)","created":"2010-02-05T15:01:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a256d79d-5af8-92e9-a29d-350adf822efe","last_modified":1482945810032},{"guid":"{847b3a00-7ab1-11d4-8f02-006008948af5}","prefs":[],"schema":1482945809444,"blockID":"i9","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=531047","who":"Users of Enigmail versions older than 0.97a for Thunderbird 3 and later.","why":"This add-on causes a high volume of crashes and other stability issues. Users should update Enigmail.","name":"Enigmail","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.97a","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"3.0pre"}]}],"id":"115f46b6-059d-202a-4373-2ca79b096347","last_modified":1482945810003},{"guid":"mozilla_cc@internetdownloadmanager.com","prefs":[],"schema":1482945809444,"blockID":"i14","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578443","who":"Users of Firefox 4 and later with Internet Download Manager version 6.9.8 and older.","why":"This add-on causes a high volume of crashes and has other stability issues.","name":"Internet Download Manager","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"6.9.8","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1pre"}]}],"id":"773ffcfb-75d1-081d-7431-ebe3fa5dbb44","last_modified":1482945809979},{"guid":"admin@youtubeplayer.com","prefs":[],"schema":1482945809444,"blockID":"i51","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=717165","who":"All Firefox users with this extension installed.","why":"This add-on is malware, doing nothing more than inserting advertisements into websites through iframes.","name":"Youtube player (malware)","created":"2012-01-18T14:34:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"16b2ce94-88db-0d79-33fc-a93070ceb509","last_modified":1482945809957},{"guid":"personas@christopher.beard","prefs":[],"schema":1482945809444,"blockID":"i15","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=590978","who":"All users of Personas Plus 1.6 in all versions of Firefox.","why":"This version of Personas Plus is incompatible with certain Firefox functionality and other add-ons. Users should upgrade to the latest version.","name":"Personas Plus","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.6","minVersion":"1.6","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"3.6.*","minVersion":"3.6"}]}],"id":"e36479c6-ca00-48d4-4fd9-ec677fd032da","last_modified":1482945809934},{"guid":"youtubeee@youtuber3.com","prefs":[],"schema":1482945809444,"blockID":"i96","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=758503","who":"All Firefox users who have installed this add-on.","why":"This is a malicious add-on that is disguised as a DivX plugin.","name":"Divx 2012 Plugins (malware)","created":"2012-05-25T09:26:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f01be9cb-5cf2-774a-a4d7-e210a24db5b9","last_modified":1482945809912},{"guid":"{3252b9ae-c69a-4eaf-9502-dc9c1f6c009e}","prefs":[],"schema":1482945809444,"blockID":"i17","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","who":"Users of version 2.2 of this add-on in all versions of Firefox.","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see this article.","name":"Default Manager (Microsoft)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.2","minVersion":"2.2","targetApplication":[]}],"id":"38be28ac-2e30-37fa-4332-852a55fafb43","last_modified":1482945809886},{"guid":"{68b8676b-99a5-46d1-b390-22411d8bcd61}","prefs":[],"schema":1482945809444,"blockID":"i93","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755635","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that post content on Facebook accounts and steals user data.","name":"Zaman T\u00fcnelini Kald\u0131r! (malware)","created":"2012-05-16T10:44:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"733aff15-9b1f-ec04-288f-b78a55165a1c","last_modified":1482945809863},{"guid":"applebeegifts@mozilla.doslash.org","prefs":[],"schema":1482945809444,"blockID":"i54","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721562","who":"All Firefox users that install this add-on.","why":"Add-on is malware installed under false pretenses.","name":"Applebees Gift Card (malware)","created":"2012-01-26T16:17:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1372c8ab-5452-745a-461a-aa78e3e12c4b","last_modified":1482945809840},{"guid":"activity@facebook.com","prefs":[],"schema":1482945112982,"blockID":"i65","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726803","who":"All Firefox users who have installed this add-on.","why":"Add-on behaves maliciously and poses as an official Facebook add-on.","name":"Facebook extension (malware)","created":"2012-02-13T15:41:02Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"79ad1c9b-0828-7823-4574-dd1cdd46c3d6","last_modified":1482945809437},{"guid":"jid0-EcdqvFOgWLKHNJPuqAnawlykCGZ@jetpack","prefs":[],"schema":1482945112982,"blockID":"i62","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724650","who":"All Firefox users who have installed this add-on.","why":"Add-on is installed under false pretenses and delivers malware.","name":"YouTube extension (malware)","created":"2012-02-06T14:46:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5ae1e642-b53c-54c0-19e7-5562cfdac3a3","last_modified":1482945809415},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","prefs":[],"schema":1482945112982,"blockID":"i25","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=637542","who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"McAfee SiteAdvisor","created":"2011-03-14T15:53:07Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.3.0.*","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1"}]}],"id":"c950501b-1f08-2ab2-d817-7c664c0d16fe","last_modified":1482945809393},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","prefs":[],"schema":1482945112982,"blockID":"i38","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=660111","who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"McAfee SiteAdvisor","created":"2011-05-27T13:55:02Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"3.3.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"5.0a1"}]}],"id":"f11de388-4511-8d06-1414-95d3b2b122c5","last_modified":1482945809371},{"guid":"{3f963a5b-e555-4543-90e2-c3908898db71}","prefs":[],"schema":1482945112982,"blockID":"i6","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=527135","who":"Users of AVG SafeSearch version 8.5 and older for all Mozilla applications.","why":"This add-on causes a high volume of crashes and causes other stability issues.","name":"AVG SafeSearch","created":"2009-06-17T13:12:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"8.5","minVersion":"0","targetApplication":[]}],"id":"0d6f7d4c-bf5d-538f-1ded-ea4c6b775617","last_modified":1482945809348},{"guid":"langpack-vi-VN@firefox.mozilla.org","prefs":[],"schema":1482945112982,"blockID":"i3","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=432406","who":"Users of Vietnamese Language Pack version 2.0 for all Mozilla applications.","why":"Corrupted files. For more information, please see this blog post.","name":"Vietnamese Language Pack","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0","minVersion":"2.0","targetApplication":[]}],"id":"51d4b581-d21c-20a1-6147-b17c3adc7867","last_modified":1482945809326},{"guid":"youtube@youtube7.com","prefs":[],"schema":1482945112982,"blockID":"i55","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721646","who":"All Firefox users with this add-on installed.","why":"This is malware posing as video software.","name":"Plugin Video (malware)","created":"2012-01-27T09:39:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"08ceedf5-c7c1-f54f-db0c-02f01f0e319a","last_modified":1482945809304},{"guid":"crossriderapp3924@crossrider.com","prefs":[],"schema":1482945112982,"blockID":"i76","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738282","who":"All Firefox users who have installed this add-on.","why":"This add-on compromises Facebook privacy and security and spams friends lists without user intervention.","name":"Fblixx (malware)","created":"2012-03-22T10:38:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39d0a019-62fb-837b-1f1f-6831e56442b5","last_modified":1482945809279},{"guid":"{45147e67-4020-47e2-8f7a-55464fb535aa}","prefs":[],"schema":1482945112982,"blockID":"i86","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748993","who":"All Firefox users who have this add-on installed.","why":"This add-on injects scripts into Facebook and performs malicious activity.","name":"Mukemmel Face+","created":"2012-04-25T16:33:21Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"960443f9-cf48-0b71-1ff2-b8c34a3411ea","last_modified":1482945809255},{"guid":"{4B3803EA-5230-4DC3-A7FC-33638F3D3542}","prefs":[],"schema":1482945112982,"blockID":"i4","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=441649","who":"Users of Firefox 3 and later with version 1.2 of Crawler Toolbar","why":"This add-on causes a high volume of crashes.","name":"Crawler Toolbar","created":"2008-07-08T10:23:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2","minVersion":"1.2","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.0a1"}]}],"id":"a9818d53-3a6a-8673-04dd-2a16f5644215","last_modified":1482945809232},{"guid":"flashupdate@adobe.com","prefs":[],"schema":1482945112982,"blockID":"i68","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","who":"All Firefox users who have this add-on installed.","why":"Add-on is malware, installed under false pretenses.","name":"Flash Update (malware)","created":"2012-02-21T13:55:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ba5b46e-790d-5af2-9580-a5f1e6e65522","last_modified":1482945809208},{"guid":"plugin@youtubeplayer.com","prefs":[],"schema":1482945112982,"blockID":"i127","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=783356","who":"All users who have this add-on installed.","why":"This add-on tries to pass as a YouTube player and runs malicious scripts on webpages.","name":"Youtube Facebook Player (malware)","created":"2012-08-16T13:03:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"17a8bece-e2df-a55d-8a72-95faff028b83","last_modified":1482945809185},{"guid":"GifBlock@facebook.com","prefs":[],"schema":1482945112982,"blockID":"i79","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739482","who":"All Firefox users who have installed this extension.","why":"This extension is malicious and is installed under false pretenses.","name":"Facebook Essentials (malware)","created":"2012-03-27T10:53:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"728451e8-1273-d887-37e9-5712b1cc3bff","last_modified":1482945809162},{"guid":"ff-ext@youtube","prefs":[],"schema":1482945112982,"blockID":"i52","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719296","who":"All Firefox users that have this add-on installed.","why":"This add-on poses as a YouTube player while posting spam into Facebook account.","name":"Youtube player (malware)","created":"2012-01-19T08:26:35Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cd2dd72a-dd52-6752-a0cd-a4b312fd0b65","last_modified":1482945809138},{"guid":"ShopperReports@ShopperReports.com","prefs":[],"schema":1482945112982,"blockID":"i22","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=630191","who":"Users of Shopper Reports version 3.1.22.0 in Firefox 4 and later.","why":"This add-on causes a high volume of Firefox crashes.","name":"Shopper Reports","created":"2011-02-09T17:03:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.1.22.0","minVersion":"3.1.22.0","targetApplication":[]}],"id":"f26b049c-d856-750f-f050-996e6bec7cbb","last_modified":1482945809115},{"guid":"{27182e60-b5f3-411c-b545-b44205977502}","prefs":[],"schema":1482945112982,"blockID":"i16","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","who":"Users of version 1.0 of this add-on in all versions of Firefox.","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see this article.","name":"Search Helper Extension (Microsoft)","created":"2011-03-31T16:28:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0","minVersion":"1.0","targetApplication":[]}],"id":"2655f230-11f3-fe4c-7c3d-757d37d5f9a5","last_modified":1482945809092},{"guid":"{841468a1-d7f4-4bd3-84e6-bb0f13a06c64}","prefs":[],"schema":1482945112982,"blockID":"i46","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=712369","who":"Users of all versions of Nectar Search Toolbar in Firefox 9.","why":"This add-on causes crashes and other stability issues in Firefox.","name":"Nectar Search Toolbar","created":"2011-12-20T11:38:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.0","minVersion":"9.0a1"}]}],"id":"b660dabd-0dc0-a55c-4b86-416080b345d9","last_modified":1482945809069},{"guid":"support@daemon-tools.cc","prefs":[],"schema":1482945112982,"blockID":"i5","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=459850","who":"Users of Daemon Tools Toolbar version 1.0.0.5 and older for all Mozilla applications.","why":"This add-on causes a high volume of crashes.","name":"Daemon Tools Toolbar","created":"2009-02-13T18:39:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.0.5","minVersion":"0","targetApplication":[]}],"id":"8cabafd3-576a-b487-31c8-ab59e0349a0e","last_modified":1482945809045},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","prefs":[],"schema":1482945112982,"blockID":"i53","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719605","who":"All users of Firefox with this add-on installed.","why":"This add-on is being offered as an online movie viewer, when it reality it only inserts scripts and ads into known sites.","name":"Peliculas-FLV (malware)","created":"2012-01-19T15:58:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.0.3","minVersion":"2.0.3","targetApplication":[]}],"id":"07bc0962-60da-087b-c3ab-f2a6ab84d81c","last_modified":1482945809021},{"guid":"royal@facebook.com","prefs":[],"schema":1482945112982,"blockID":"i64","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=725777","who":"All Firefox users who have installed this add-on.","why":"Malicious add-on posing as a Facebook tool.","name":"Facebook ! (malware)","created":"2012-02-09T13:24:23Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dd1d2623-0d15-c93e-8fbd-ba07b0299a44","last_modified":1482945808997},{"guid":"{28bfb930-7620-11e1-b0c4-0800200c9a66}","prefs":[],"schema":1482945112982,"blockID":"i108","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=766852","who":"All Firefox user who have this add-on installed.","why":"This is malware disguised as an Adobe product. It spams Facebook pages.","name":"Aplicativo (malware)","created":"2012-06-21T09:24:11Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"908dc4fb-ebc9-cea1-438f-55e4507ba834","last_modified":1482945808973},{"guid":"socialnetworktools@mozilla.doslash.org","prefs":[],"schema":1482945112982,"blockID":"i78","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739441","who":"All Firefox users who have installed this add-on.","why":"This add-on hijacks the Facebook UI and adds scripts to track users.","name":"Social Network Tools (malware)","created":"2012-03-26T16:46:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1064cd25-3b87-64bb-b0a6-2518ad281574","last_modified":1482945808950},{"guid":"youtubeeing@youtuberie.com","prefs":[],"schema":1482945112982,"blockID":"i98","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759663","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as a Youtube add-on.","name":"Youtube Video Player (malware)","created":"2012-05-30T09:30:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3484f860-56e1-28e8-5a70-cdcd5ab9d6ee","last_modified":1482945808927},{"guid":"{3a12052a-66ef-49db-8c39-e5b0bd5c83fa}","prefs":[],"schema":1482945112982,"blockID":"i101","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761874","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware disguised as a Facebook timeline remover.","name":"Timeline Remove (malware)","created":"2012-06-05T18:37:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b01b321b-6628-7166-bd15-52f21a04d8bd","last_modified":1482945808904},{"guid":"pfzPXmnzQRXX6@2iABkVe.com","prefs":[],"schema":1482945112982,"blockID":"i99","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759950","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware disguised as a Flash Player update.","name":"Flash Player (malware)","created":"2012-05-30T17:10:18Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"29cc4abc-4f52-01f1-eb0b-cad84ba4db13","last_modified":1482945808881},{"guid":"/^(@pluginscribens_firefox|extension@vidscrab.com|firefox@jjj.ee|firefox@shop-reward.de|FxExtPasteNGoHtk@github.lostdj|himanshudotrai@gmail.com|jid0-bigoD0uivzAMmt07zrf3OHqa418@jetpack|jid0-iXbAR01tjT2BsbApyS6XWnjDhy8@jetpack)$/","prefs":[],"schema":1482341309012,"blockID":"i1423","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","who":"All users who have any of the affected versions installed.","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked.","name":"Various vulnerable add-on versions","created":"2016-12-21T17:21:10Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a58a2836-e4e7-74b5-c109-fa3d41e9ed56","last_modified":1482343886390},{"guid":"/^(pdftoword@addingapps.com|jid0-EYTXLS0GyfQME5irGbnD4HksnbQ@jetpack|jid1-ZjJ7t75BAcbGCX@jetpack)$/","prefs":[],"schema":1482341309012,"blockID":"i1425","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","who":"All users who have any of the affected versions installed.","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked.","name":"Various vulnerable add-on versions","created":"2016-12-21T17:23:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"150e639f-c832-63d0-a775-59313b2e1bf9","last_modified":1482343886365},{"guid":"{cc8f597b-0765-404e-a575-82aefbd81daf}","prefs":[],"schema":1480349193877,"blockID":"i380","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866332","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts and performs unwanted actions on behalf of the user.","name":"Update My Browser (malware)","created":"2013-06-19T13:03:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4950d7aa-c602-15f5-a7a2-d844182d5cbd","last_modified":1480349217152},{"guid":"extension@FastFreeConverter.com","prefs":[],"schema":1480349193877,"blockID":"i470","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"649dd933-debf-69b7-020f-496c2c9f99c8","last_modified":1480349217071},{"guid":"59D317DB041748fdB89B47E6F96058F3@jetpack","prefs":[],"schema":1480349193877,"blockID":"i694","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053540","who":"All Firefox users who have this add-ons installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This is a suspicious add-on that appears to be installed without user consent, in violation of the Add-on Guidelines.","name":"JsInjectExtension","created":"2014-08-21T13:46:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"75692bd4-18e5-a9be-7ec3-9327e159ef68","last_modified":1480349217005},{"guid":"/^({bfec236d-e122-4102-864f-f5f19d897f5e}|{3f842035-47f4-4f10-846b-6199b07f09b8}|{92ed4bbd-83f2-4c70-bb4e-f8d3716143fe})$/","prefs":[],"schema":1480349193877,"blockID":"i527","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and uses multiple IDs.","name":"KeyBar add-on","created":"2013-12-20T14:13:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6d68dd97-7965-0a84-8ca7-435aac3c8040","last_modified":1480349216927},{"guid":"support@vide1flash2.com","prefs":[],"schema":1480349193877,"blockID":"i246","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=830159","who":"All Firefox users who have this add-on installed.","why":"This is an add-on that poses as the Adobe Flash Player and runs malicious code in the user's system.","name":"Lastest Adobe Flash Player (malware)","created":"2013-01-14T09:17:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2004fba1-74bf-a072-2a59-6e0ba827b541","last_modified":1480349216871},{"guid":"extension21804@extension21804.com","prefs":[],"schema":1480349193877,"blockID":"i312","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"Coupon Companion","created":"2013-03-06T14:14:05Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b2cf1256-dadd-6501-1f4e-25902d408692","last_modified":1480349216827},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i602","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:18:05Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.8.*","minVersion":"3.15.8","targetApplication":[]}],"id":"b2b4236d-5d4d-82b2-99cd-00ff688badf1","last_modified":1480349216765},{"guid":"nosquint@urandom.ca","prefs":[],"schema":1480349193877,"blockID":"i1232","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279561","who":"Users on Firefox 47, and higher, using version 2.1.9.1, and earlier, of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"The add-on is breaking the in-built zoom functionality on Firefox 47.","name":"NoSquint","created":"2016-06-10T17:12:55Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.1.9.1-signed.1-signed","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"47"}]}],"id":"30e0a35c-056a-054b-04f3-ade68b83985a","last_modified":1480349216711},{"guid":"{FE1DEEEA-DB6D-44b8-83F0-34FC0F9D1052}","prefs":[],"schema":1480349193877,"blockID":"i364","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867670","who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager.","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons.","name":"IB Updater","created":"2013-06-10T16:14:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a59b967c-66ca-7ad9-2dc6-d0ad37ded5fd","last_modified":1480349216652},{"guid":"vpyekkifgv@vpyekkifgv.org","prefs":[],"schema":1480349193877,"blockID":"i352","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=872211","who":"All Firefox users who have this add-on installed.","why":"Uses a deceptive name and injects ads into pages without user consent.","name":"SQLlite Addon (malware)","created":"2013-05-14T13:42:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8fd981ab-7ee0-e367-d804-0efe29d63178","last_modified":1480349216614},{"guid":"/^firefox@(albrechto|swiftbrowse|springsmart|storimbo|squirrelweb|betterbrowse|lizardlink|rolimno|browsebeyond|clingclang|weblayers|kasimos|higher-aurum|xaven|bomlabio)\\.(com?|net|org|info|biz)$/","prefs":[],"schema":1480349193877,"blockID":"i549","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the Add-on Guidelines.","name":"Yontoo add-ons","created":"2014-01-30T15:08:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3a124164-b177-805b-06f7-70a358b37e08","last_modified":1480349216570},{"guid":"thefoxonlybetter@quicksaver","prefs":[],"schema":1480349193877,"blockID":"i702","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","who":"All Firefox users who have any of these versions of the add-on installed.","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"The Fox, Only Better (malicious versions)","created":"2014-08-27T10:05:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"1.10","targetApplication":[]}],"id":"60e54f6a-1b10-f889-837f-60a76a98fccc","last_modified":1480349216512},{"guid":"/@(ft|putlocker|clickmovie|m2k|sharerepo|smarter-?)downloader\\.com$/","prefs":[],"schema":1480349193877,"blockID":"i396","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881454","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"PutLockerDownloader and related","created":"2013-06-25T12:48:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e98ba6e3-f2dd-fdee-b106-3e0d2a03cda4","last_modified":1480349216487},{"guid":"my7thfakeid@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i1262","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1295616","who":"Anyone who has this add-on installed.","why":"This add-on is a keylogger that sends the data to a remote server, and goes under the name Real_player.addon.","name":"Remote Keylogger test 0 addon","created":"2016-08-17T10:54:59Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81b380c0-8092-ea5e-11cd-54c7f563ff5a","last_modified":1480349216460},{"guid":"{f0e59437-6148-4a98-b0a6-60d557ef57f4}","prefs":[],"schema":1480349193877,"blockID":"i304","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845975","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our installation guidelines and is dropped silently into user's profiles.","name":"WhiteSmoke B","created":"2013-02-27T13:10:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0469e643-1a90-f9be-4aad-b347469adcbe","last_modified":1480349216402},{"os":"Darwin,Linux","guid":"firebug@software.joehewitt.com","prefs":[],"schema":1480349193877,"blockID":"i75","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=718831","who":"All Firefox 9 users on Mac OS X or Linux who have Firebug 1.9.0 installed.","why":"Firebug 1.9.0 creates stability problems on Firefox 9, on Mac OS X and Linux. Upgrading to Firefox 10 or later, or upgrading to Firebug 1.9.1 or later fixes this problem.","name":"Firebug","created":"2012-03-21T16:00:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.9.0","minVersion":"1.9.0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.*","minVersion":"9.0a1"}]}],"id":"a1f9f055-ef34-1412-c39f-35605a70d031","last_modified":1480349216375},{"guid":"xz123@ya456.com","prefs":[],"schema":1480349193877,"blockID":"i486","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware and is installed silently in violation of the Add-on Guidelines.","name":"BetterSurf (malware)","created":"2013-11-15T13:34:53Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b9825a25-a96c-407e-e656-46a7948e5745","last_modified":1480349215808},{"guid":"{C7AE725D-FA5C-4027-BB4C-787EF9F8248A}","prefs":[],"schema":1480349193877,"blockID":"i424","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=860641","who":"Users of Firefox 23 or later who have RelevantKnowledge 1.0.0.2 or lower.","why":"Old versions of this add-on are causing startup crashes in Firefox 23, currently on the Beta channel. RelevantKnowledge users on Firefox 23 and above should update to version 1.0.0.3 of the add-on.","name":"RelevantKnowledge 1.0.0.2 and lower","created":"2013-07-01T10:45:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.0.2","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"23.0a1"}]}],"id":"c888d167-7970-4b3f-240f-2d8e6f14ded4","last_modified":1480349215779},{"guid":"{5C655500-E712-41e7-9349-CE462F844B19}","prefs":[],"schema":1480349193877,"blockID":"i966","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1175425","who":"All users who have this add-on installed.","why":"This add-on is vulnerable to a cross-site scripting attack, putting users at risk when using it in arbitrary websites.","name":"Quick Translator","created":"2015-07-17T13:42:28Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.1-signed","minVersion":"0","targetApplication":[]}],"id":"f34b00a6-c783-7851-a441-0d80fb1d1031","last_modified":1480349215743},{"guid":"superlrcs@svenyor.net","prefs":[],"schema":1480349193877,"blockID":"i545","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is in violation of the Add-on Guidelines, using multiple add-on IDs and potentially doing other unwanted activities.","name":"SuperLyrics","created":"2014-01-30T11:52:42Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"002cd4fa-4c2b-e28b-9220-4a520f4d9ec6","last_modified":1480349215672},{"guid":"mbrsepone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i479","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937331","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Mozilla Lightweight Pack (malware)","created":"2013-11-11T15:42:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0549645e-5f50-5089-1f24-6e7d3bfab8e0","last_modified":1480349215645},{"guid":"/^brasilescape.*\\@facebook\\.com$/","prefs":[],"schema":1480349193877,"blockID":"i453","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=918566","who":"All Firefox users who have these add-ons installed.","why":"This is a group of malicious add-ons that use deceitful names like \"Facebook Video Pack\" or \"Mozilla Service Pack\" and hijack Facebook accounts.","name":"Brasil Escape (malware)","created":"2013-09-20T09:54:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8e6b1176-1794-2117-414e-f0821443f27b","last_modified":1480349215591},{"guid":"foxyproxy-basic@eric.h.jung","prefs":[],"schema":1480349193877,"blockID":"i952","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","who":"All users who have this add-on installed on Thunderbird 38 and above.","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above.","name":"FoxyProxy Basic for Thunderbird","created":"2015-07-15T09:35:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.5.5","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"38.0a2"},{"guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*","minVersion":"2.35"}]}],"id":"81658491-feda-2ed3-3c6c-8e60c2b73aee","last_modified":1480349215536},{"guid":"mbroctone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i476","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936590","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks the users' Facebook account.","name":"Mozilla Storage Service (malware)","created":"2013-11-08T15:32:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"92198396-8756-8d09-7f18-a68d29894f71","last_modified":1480349215504},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i616","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:24:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.28.*","minVersion":"3.15.28","targetApplication":[]}],"id":"f11b485f-320e-233c-958b-a63377024fad","last_modified":1480349215479},{"guid":"/^({e9df9360-97f8-4690-afe6-996c80790da4}|{687578b9-7132-4a7a-80e4-30ee31099e03}|{46a3135d-3683-48cf-b94c-82655cbc0e8a}|{49c795c2-604a-4d18-aeb1-b3eba27e5ea2}|{7473b6bd-4691-4744-a82b-7854eb3d70b6}|{96f454ea-9d38-474f-b504-56193e00c1a5})$/","prefs":[],"schema":1480349193877,"blockID":"i494","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. It also uses multiple add-on IDs for no apparent reason. This violates our Add-on Guidelines.","name":"uTorrent and related","created":"2013-12-02T14:52:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"485210d0-8e69-3436-536f-5d1deeea4167","last_modified":1480349215454},{"guid":"{EB7508CA-C7B2-46E0-8C04-3E94A035BD49}","prefs":[],"schema":1480349193877,"blockID":"i162","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=799266","who":"All Firefox users who have installed any of these add-ons.","why":"This block covers a number of malicious add-ons that deceive users, using names like \"Mozilla Safe Browsing\" and \"Translate This!\", and claiming they are developed by \"Mozilla Corp.\". They hijack searches and redirects users to pages they didn't intend to go to.\r\n\r\nNote: this block won't be active until bug 799266 is fixed.","name":"Mozilla Safe Browsing and others (Medfos malware)","created":"2012-10-11T12:25:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"07566aa3-4ff9-ac4f-9de9-71c77454b4da","last_modified":1480349215428},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i614","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:23:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.26.*","minVersion":"3.15.26","targetApplication":[]}],"id":"ede541f3-1748-7b33-9bd6-80e2f948e14f","last_modified":1480349215399},{"guid":"/^({976cd962-e0ca-4337-aea7-d93fae63a79c}|{525ba996-1ce4-4677-91c5-9fc4ead2d245}|{91659dab-9117-42d1-a09f-13ec28037717}|{c1211069-1163-4ba8-b8b3-32fc724766be})$/","prefs":[],"schema":1480349193877,"blockID":"i522","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed and using multiple add-on IDs.","name":"appbario7","created":"2013-12-20T13:15:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"580aed26-dc3b-eef8-fa66-a0a402447b7b","last_modified":1480349215360},{"guid":"jid0-O6MIff3eO5dIGf5Tcv8RsJDKxrs@jetpack","prefs":[],"schema":1480349193877,"blockID":"i552","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","who":"All Firefox users who have this extension installed.","why":"This extension is malware that attempts to make it impossible for a second extension and itself to be disabled, and also forces the new tab page to have a specific URL.","name":"Extension_Protected (malware)","created":"2014-02-19T15:26:37Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e53063b4-5702-5b66-c860-d368cba4ccb6","last_modified":1480349215327},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i604","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:18:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.11.*","minVersion":"3.15.10","targetApplication":[]}],"id":"b910f779-f36e-70e1-b17a-8afb75988c03","last_modified":1480349215302},{"guid":"brasilescapefive@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i483","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938473","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Facebook Video Pack (malware)","created":"2013-11-14T09:37:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"85ee7840-f262-ad30-eb91-74b3248fd13d","last_modified":1480349215276},{"guid":"brasilescapeeight@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i482","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938476","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Mozilla Security Pack (malware)","created":"2013-11-14T09:36:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"457a5722-be90-5a9f-5fa0-4c753e9f324c","last_modified":1480349215249},{"guid":"happylyrics@hpyproductions.net","prefs":[],"schema":1480349193877,"blockID":"i370","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881815","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into Firefox without the users' consent, violating our Add-on Guidelines.","name":"Happy Lyrics","created":"2013-06-11T15:42:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"730e616d-94a7-df0c-d31a-98b7875d60c2","last_modified":1480349215225},{"guid":"search-snacks@search-snacks.com","prefs":[],"schema":1480349193877,"blockID":"i872","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082733","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Search Snacks","created":"2015-03-04T14:37:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7567b06f-98fb-9400-8007-5d0357c345d9","last_modified":1480349215198},{"os":"WINNT","guid":"{ABDE892B-13A8-4d1b-88E6-365A6E755758}","prefs":[],"schema":1480349193877,"blockID":"i107","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=764210","who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our support site for help.","name":"RealPlayer Browser Record Plugin","created":"2012-06-14T13:54:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"15.0.5","minVersion":"0","targetApplication":[]}],"id":"e3b89e55-b35f-8694-6f0e-f856e57a191d","last_modified":1480349215173},{"guid":"/(\\{7aeae561-714b-45f6-ace3-4a8aed6e227b\\})|(\\{01e86e69-a2f8-48a0-b068-83869bdba3d0\\})|(\\{77f5fe49-12e3-4cf5-abb4-d993a0164d9e\\})/","prefs":[],"schema":1480349193877,"blockID":"i436","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891606","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow the Add-on Guidelines, changing Firefox default settings and not reverting them on uninstall. If you want to continue using this add-on, it can be enabled in the Add-ons Manager.","name":"Visual Bee","created":"2013-08-09T15:04:44Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ad6dc811-ab95-46fa-4bff-42186c149980","last_modified":1480349215147},{"guid":"amo-validator-bypass@example.com","prefs":[],"schema":1480349193877,"blockID":"i1058","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1227605","who":"All users who install this add-on.","why":"This add-on is a proof of concept of a malicious add-on that bypasses the code validator.","name":" AMO Validator Bypass","created":"2015-11-24T09:03:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"86e38e3e-a729-b5a2-20a8-4738b376eea6","last_modified":1480349214743},{"guid":"6lIy@T.edu","prefs":[],"schema":1480349193877,"blockID":"i852","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"unIsaless","created":"2015-02-09T15:30:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39798bc2-9c75-f172-148b-13f3ca1dde9b","last_modified":1480349214613},{"guid":"{394DCBA4-1F92-4f8e-8EC9-8D2CB90CB69B}","prefs":[],"schema":1480349193877,"blockID":"i100","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761339","who":"All Firefox users who have Lightshot 2.5.0 installed.","why":"The Lightshot add-on, version 2.5.0, is causing widespread and frequent crashes in Firefox. Lightshot users are strongly recommended to update to version 2.6.0 as soon as possible.","name":"Lightshot","created":"2012-06-05T09:24:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.5.0","minVersion":"2.5.0","targetApplication":[]}],"id":"57829ea2-5a95-1b6e-953c-7c4a7b3b21ac","last_modified":1480349214568},{"guid":"{a7f2cb14-0472-42a1-915a-8adca2280a2c}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i686","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033809","who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"HomeTab","created":"2014-08-06T16:35:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"33a8f403-b2c8-cadf-e1ba-40b39edeaf18","last_modified":1480349214537},{"guid":"{CA8C84C6-3918-41b1-BE77-049B2BDD887C}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i862","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131230","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Ebay Shopping Assistant by Spigot","created":"2015-02-26T12:51:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9a9d6da2-90a1-5b71-8b24-96492d57dfd1","last_modified":1480349214479},{"guid":"update@firefox.com","prefs":[],"schema":1480349193877,"blockID":"i374","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781088","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks Facebook accounts.","name":"Premium Update (malware)","created":"2013-06-18T13:58:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bb388413-60ea-c9d6-9a3b-c90df950c319","last_modified":1480349214427},{"guid":"sqlmoz@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i350","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=871610","who":"All Firefox users who have this extension installed.","why":"This extension is malware posing as Mozilla software. It hijacks Facebook accounts and spams other Facebook users.","name":"Mozilla Service Pack (malware)","created":"2013-05-13T09:43:07Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"715082e8-7a30-b27b-51aa-186c38e078f6","last_modified":1480349214360},{"guid":"iobitapps@mybrowserbar.com","prefs":[],"schema":1480349193877,"blockID":"i562","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=948695","who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is installed silently and changes users settings without reverting them, in violation of the Add-on Guidelines.","name":"IObit Apps Toolbar","created":"2014-02-27T10:00:54Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"be9a54f6-20c1-7dee-3aea-300b336b2ae5","last_modified":1480349214299},{"guid":"{9e09ac65-43c0-4b9d-970f-11e2e9616c55}","prefs":[],"schema":1480349193877,"blockID":"i376","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=857847","who":"All Firefox users who have installed this add-on.","why":"This add-on is malware that hijacks Facebook accounts and posts content on it.","name":"The Social Networks (malware)","created":"2013-06-18T14:16:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"753638b4-65ca-6d71-f1f5-ce32ba2edf3b","last_modified":1480349214246},{"guid":"mozillahmpg@mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i140","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=791867","who":"All Firefox users who have installed this add-on.","why":"This is a malicious add-on that tries to monetize on its users by embedding unauthorized affiliate codes on shopping websites, and sometimes redirecting users to alternate sites that could be malicious in nature.","name":"Google YouTube HD Player (malware)","created":"2012-09-17T16:04:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"98150e2e-cb45-1fee-8458-28d3602ec2ec","last_modified":1480349214216},{"guid":"astrovia@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i489","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942699","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Facebook Security Service (malware)","created":"2013-11-25T12:40:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6f365ff4-e48f-8a06-d19d-55e19fba81f4","last_modified":1480349214157},{"guid":"{bbea93c6-64a3-4a5a-854a-9cc61c8d309e}","prefs":[],"schema":1480349193877,"blockID":"i1126","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","who":"All users who have this add-on installed.","why":"This is a malicious add-on that disables various security checks in Firefox.","name":"Tab Extension (malware)","created":"2016-02-29T21:58:10Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5acb9dcc-59d4-46d1-2a11-1194c4948239","last_modified":1480349214066},{"guid":"ffxtlbr@iminent.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i628","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the Add-on Guidelines.","name":"Iminent Minibar","created":"2014-06-26T15:47:15Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4387ad94-8500-d74d-68e3-20564a9aac9e","last_modified":1480349214036},{"guid":"{28387537-e3f9-4ed7-860c-11e69af4a8a0}","prefs":[],"schema":1480349193877,"blockID":"i40","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"MediaBar (2)","created":"2011-07-19T10:19:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.3.1.00","minVersion":"0.1","targetApplication":[]}],"id":"ff95664b-93e4-aa73-ac20-5ffb7c87d8b7","last_modified":1480349214002},{"guid":"{41e5ef7a-171d-4ab5-8351-951c65a29908}","prefs":[],"schema":1480349193877,"blockID":"i784","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"HelpSiteExpert","created":"2014-11-14T14:37:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0c05a0bb-30b4-979e-33a7-9f3955eba17d","last_modified":1480349213962},{"guid":"/^({2d7886a0-85bb-4bf2-b684-ba92b4b21d23}|{2fab2e94-d6f9-42de-8839-3510cef6424b}|{c02397f7-75b0-446e-a8fa-6ef70cfbf12b}|{8b337819-d1e8-48d3-8178-168ae8c99c36}|firefox@neurowise.info|firefox@allgenius.info)$/","prefs":[],"schema":1480349193877,"blockID":"i762","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082599","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"These add-ons are silently installed into users' systems, in violation of the Add-on Guidelines.","name":"SaveSense, neurowise, allgenius","created":"2014-10-17T16:58:10Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c5439f55-ace5-ad73-1270-017c0ba7b2ce","last_modified":1480349213913},{"guid":"{462be121-2b54-4218-bf00-b9bf8135b23f}","prefs":[],"schema":1480349193877,"blockID":"i226","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal.","name":"WhiteSmoke","created":"2012-11-29T16:27:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"994c6084-e864-0e4e-ac91-455083ee46c7","last_modified":1480349213879},{"guid":"firefox@browsefox.com","prefs":[],"schema":1480349193877,"blockID":"i546","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936244","who":"All Firefox users who have this add-on installed. If you want to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed, in violation of the Add-on Guidelines.","name":"BrowseFox","created":"2014-01-30T12:26:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"407d8c84-8939-cd28-b284-9b680e529bf6","last_modified":1480349213853},{"guid":"{6926c7f7-6006-42d1-b046-eba1b3010315}","prefs":[],"schema":1480349193877,"blockID":"i382","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844956","who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it again in the Add-ons Manager.","why":"This add-on is silently installed, bypassing the Firefox opt-in screen and violating our Add-on Guidelines.","name":"appbario7","created":"2013-06-25T12:05:34Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2367bd94-2bdd-c615-de89-023ba071a443","last_modified":1480349213825},{"guid":"faststartff@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i866","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131217","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Fast Start","created":"2015-02-26T13:12:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9e730bca-c7d1-da82-64f6-c74de216cb7d","last_modified":1480349213799},{"guid":"05dd836e-2cbd-4204-9ff3-2f8a8665967d@a8876730-fb0c-4057-a2fc-f9c09d438e81.com","prefs":[],"schema":1480349193877,"blockID":"i468","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935135","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be part of a Trojan software package.","name":"Trojan.DownLoader9.50268 (malware)","created":"2013-11-07T14:43:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2fd53d9b-7096-f1fb-fbcb-2b40a6193894","last_modified":1480349213774},{"guid":"jid1-0xtMKhXFEs4jIg@jetpack","prefs":[],"schema":1480349193877,"blockID":"i586","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011286","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware installed without user consent.","name":"ep (malware)","created":"2014-06-03T15:50:19Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"50ca2179-83ab-1817-163d-39ed2a9fbd28","last_modified":1480349213717},{"guid":"/^({16e193c8-1706-40bf-b6f3-91403a9a22be}|{284fed43-2e13-4afe-8aeb-50827d510e20}|{5e3cc5d8-ed11-4bed-bc47-35b4c4bc1033}|{7429e64a-1fd4-4112-a186-2b5630816b91}|{8c9980d7-0f09-4459-9197-99b3e559660c}|{8f1d9545-0bb9-4583-bb3c-5e1ac1e2920c})$/","prefs":[],"schema":1480349193877,"blockID":"i517","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing the add-on, and using multiple add-on IDs.","name":"Re-markit","created":"2013-12-20T12:54:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e88a28ab-5569-f06d-b0e2-15c51bb2a4b7","last_modified":1480349213344},{"guid":"safebrowse@safebrowse.co","prefs":[],"schema":1480349193877,"blockID":"i782","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1097696","who":"All Firefox users who have this add-on installed.","why":"This add-on loads scripts with malicious code that appears intended to steal usernames, passwords, and other private information.","name":"SafeBrowse","created":"2014-11-12T14:20:44Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"edd81c91-383b-f041-d8f6-d0b9a90230bd","last_modified":1480349213319},{"guid":"{af95cc15-3b9b-45ae-8d9b-98d08eda3111}","prefs":[],"schema":1480349193877,"blockID":"i492","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945126","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Facebook (malware)","created":"2013-12-02T12:45:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7064e9e2-fba4-7b57-86d7-6f4afbf6f560","last_modified":1480349213294},{"guid":"{84a93d51-b7a9-431e-8ff8-d60e5d7f5df1}","prefs":[],"schema":1480349193877,"blockID":"i744","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the Add-on Guidelines.","name":"Spigot Shopping Assistant","created":"2014-10-17T15:47:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dbc7ef8b-2c48-5dae-73a0-f87288c669f0","last_modified":1480349213264},{"guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","prefs":[],"schema":1480349193877,"blockID":"i918","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-02T09:58:16Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"7f2a68f3-aa8a-ae41-1e48-d1f8f63d53c7","last_modified":1480349213231},{"guid":"831778-poidjao88DASfsAnindsd@jetpack","prefs":[],"schema":1480349193877,"blockID":"i972","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190962","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video patch (malware)","created":"2015-08-04T15:18:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39471221-6926-e11b-175a-b28424d49bf6","last_modified":1480349213194},{"guid":"lbmsrvfvxcblvpane@lpaezhjez.org","prefs":[],"schema":1480349193877,"blockID":"i342","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863385","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. It also appears to install itself both locally and globally, producing a confusing uninstall experience.","name":"RapidFinda","created":"2013-05-06T16:18:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"98fb4536-07a4-d03a-f7c5-945acecc8203","last_modified":1480349213128},{"guid":"{babb9931-ad56-444c-b935-38bffe18ad26}","prefs":[],"schema":1480349193877,"blockID":"i499","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946086","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Facebook Credits (malware)","created":"2013-12-04T15:22:02Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"be1d19fa-1662-322a-13e6-5fa5474f33a7","last_modified":1480349213100},{"guid":"{18d5a8fe-5428-485b-968f-b97b05a92b54}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i802","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astromenda Search Addon","created":"2014-12-15T10:52:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bc846147-cdc1-141f-5846-b705c48bd6ed","last_modified":1480349213074},{"guid":"{b6ef1336-69bb-45b6-8cba-e578fc0e4433}","prefs":[],"schema":1480349193877,"blockID":"i780","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Power-SW","created":"2014-11-12T14:00:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3b080157-2900-d071-60fe-52b0aa376cf0","last_modified":1480349213024},{"guid":"info@wxdownloadmanager.com","prefs":[],"schema":1480349193877,"blockID":"i196","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Codec (malware)","created":"2012-11-05T09:24:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b62597d0-d2cb-d597-7358-5143a1d13658","last_modified":1480349212999},{"os":"WINNT","guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","prefs":[],"schema":1480349193877,"blockID":"i111","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=771802","who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our support site for help.","name":"RealPlayer Browser Record Plugin","created":"2012-07-10T15:28:16Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"15.0.5","minVersion":"0","targetApplication":[]}],"id":"d3f96257-7635-555f-ef48-34d426322992","last_modified":1480349212971},{"guid":"l@AdLJ7uz.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i728","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines","name":"GGoSavee","created":"2014-10-16T16:34:54Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e6bfa340-7d8a-1627-5cdf-40c0c4982e9d","last_modified":1480349212911},{"guid":"{6b2a75c8-6e2e-4267-b955-43e25b54e575}","prefs":[],"schema":1480349193877,"blockID":"i698","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052611","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"BrowserShield","created":"2014-08-21T15:46:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"492e4e43-f89f-da58-9c09-d99528ee9ca9","last_modified":1480349212871},{"guid":"/^({65f9f6b7-2dae-46fc-bfaf-f88e4af1beca}|{9ed31f84-c8b3-4926-b950-dff74047ff79}|{0134af61-7a0c-4649-aeca-90d776060cb3}|{02edb56b-9b33-435b-b7df-b2843273a694}|{da51d4f6-3e7e-4ef8-b400-9198e0874606}|{b24577db-155e-4077-bb37-3fdd3c302bb5})$/","prefs":[],"schema":1480349193877,"blockID":"i525","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and using multiple IDs.","name":"KeyBar add-on","created":"2013-12-20T14:11:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"78562d79-9a64-c259-fb63-ce24e29bb141","last_modified":1480349212839},{"guid":"adsremoval@adsremoval.net","prefs":[],"schema":1480349193877,"blockID":"i560","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=962793","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes various user settings, in violation of the Add-on Guidelines.","name":"Ad Removal","created":"2014-02-27T09:57:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4d150ad4-dc22-9790-07a9-36e0a23f857f","last_modified":1480349212798},{"guid":"firefoxaddon@youtubeenhancer.com","prefs":[],"schema":1480349193877,"blockID":"i445","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=911966","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that imitates a popular video downloader extension, and attempts to hijack Facebook accounts. The add-on available in the add-ons site is safe to use.","name":"YouTube Enhancer Plus (malware)","created":"2013-09-04T16:53:37Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"208.7.0","minVersion":"208.7.0","targetApplication":[]}],"id":"41d75d3f-a57e-d5ad-b95b-22f5fa010b4e","last_modified":1480349212747},{"guid":"suchpony@suchpony.de","prefs":[],"schema":1480349193877,"blockID":"i1264","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have version 1.6.7 or less of this add-on installed.","why":"Old versions of this add-on contained code from YouTube Unblocker, which was originally blocked due to malicious activity. Version 1.6.8 is now okay.","name":"Suchpony (pre 1.6.8)","created":"2016-08-24T10:48:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.6.7","minVersion":"0","targetApplication":[]}],"id":"1bbf00f3-53b5-3777-43c7-0a0b11f9c433","last_modified":1480349212719},{"guid":"{336D0C35-8A85-403a-B9D2-65C292C39087}","prefs":[],"schema":1480349193877,"blockID":"i224","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812292","who":"All Firefox users who have this add-on installed.","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons.","name":"IB Updater","created":"2012-11-29T16:22:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c87666e6-ec9a-2f1e-ad03-a722d2fa2a25","last_modified":1480349212655},{"guid":"G4Ce4@w.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i718","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the Add-on Guidelines.","name":"YoutUbeAdBlaocke","created":"2014-10-02T12:21:22Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3e1e9322-93e9-4ce1-41f5-46ad4ef1471b","last_modified":1480349212277},{"guid":"extension@Fast_Free_Converter.com","prefs":[],"schema":1480349193877,"blockID":"i533","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949597","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing it.","name":"FastFreeConverter","created":"2013-12-20T15:04:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"726f5645-c0bf-66dc-a97a-d072b46e63e7","last_modified":1480349212247},{"guid":"@stopad","prefs":[],"schema":1480349193877,"blockID":"i1266","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298780","who":"Users who have version 0.0.4 and earlier of the add-on installed.","why":"Stop Ads sends each visited url to a third party server which is not necessary for the add-on to work or disclosed in a privacy policy or user opt-in. Versions 0.0.4 and earlier are affected.","name":"Stop Ads Addon","created":"2016-08-30T12:24:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.0.4","minVersion":"0","targetApplication":[]}],"id":"3d1893dd-2092-d1f7-03f3-9629b7d7139e","last_modified":1480349212214},{"guid":"703db0db-5fe9-44b6-9f53-c6a91a0ad5bd@7314bc82-969e-4d2a-921b-e5edd0b02cf1.com","prefs":[],"schema":1480349193877,"blockID":"i519","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing the add-on, and using multiple add-on IDs.","name":"Re-markit","created":"2013-12-20T12:57:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a27d0f9f-7708-3d5f-82e1-e3f29e6098a0","last_modified":1480349212183},{"guid":"imbaty@taringamp3.com","prefs":[],"schema":1480349193877,"blockID":"i662","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin.","name":"Taringa MP3 / Adobe Flash","created":"2014-07-10T15:39:44Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f43859d4-46b7-c028-4738-d40a73ddad7b","last_modified":1480349212157},{"guid":"{13c9f1f9-2322-4d5c-81df-6d4bf8476ba4}","prefs":[],"schema":1480349193877,"blockID":"i348","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867359","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. It also fails to revert settings changes on removal.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"mywebsearch","created":"2013-05-08T15:55:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"372cf3df-0810-85d8-b5d7-faffff309a11","last_modified":1480349212102},{"guid":"{a6e67e6f-8615-4fe0-a599-34a73fc3fba5}","prefs":[],"schema":1480349193877,"blockID":"i346","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867333","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. Also, it doesn't reset its settings changes on uninstall.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Startnow","created":"2013-05-06T17:06:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1caf911c-ff2f-b0f6-0d32-29ef74be81bb","last_modified":1480349212077},{"guid":"garg_sms@yahoo.in","prefs":[],"schema":1480349193877,"blockID":"i652","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Save My YouTube Day! extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Save My YouTube Day!, version 67.9","created":"2014-07-10T15:17:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"67.9","minVersion":"67.9","targetApplication":[]}],"id":"e50c0189-a7cd-774d-702b-62eade1bf18e","last_modified":1480349212044},{"guid":"9518042e-7ad6-4dac-b377-056e28d00c8f@f1cc0a13-4df1-4d66-938f-088db8838882.com","prefs":[],"schema":1480349193877,"blockID":"i308","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=846455","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our Add-on Guidelines.","name":"Solid Savings","created":"2013-02-28T13:48:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"df25ee07-74d4-ccd9-dbbe-7eb053015144","last_modified":1480349212020},{"guid":"jufa098j-LKooapd9jasJ9jliJsd@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1000","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201163","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Secure Video (malware)","created":"2015-09-07T14:00:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c3a98025-0f4e-3bb4-b475-97329e7b1426","last_modified":1480349211979},{"guid":"{46eddf51-a4f6-4476-8d6c-31c5187b2a2f}","prefs":[],"schema":1480349193877,"blockID":"i750","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Slick Savings","created":"2014-10-17T16:17:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b4ef650-e1ad-d55f-c420-4f26dbb4139c","last_modified":1480349211953},{"guid":"{DAC3F861-B30D-40dd-9166-F4E75327FAC7}","prefs":[],"schema":1480349193877,"blockID":"i924","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:28:17Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"be57998b-9e4d-1040-e6bb-ed9de056338d","last_modified":1480349211896},{"guid":"JMLv@njMaHh.org","prefs":[],"schema":1480349193877,"blockID":"i790","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1103516","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"YouttubeAdBlocke","created":"2014-11-24T14:14:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"070d5747-137d-8500-8713-cfc6437558a3","last_modified":1480349211841},{"guid":"istart_ffnt@gmail.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i888","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152553","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the Add-on Guidelines.","name":"Istart","created":"2015-04-10T16:27:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"32fad759-38d9-dad9-2295-e44cc6887040","last_modified":1480349211785},{"guid":"gystqfr@ylgga.com","prefs":[],"schema":1480349193877,"blockID":"i449","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912742","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Define Ext","created":"2013-09-13T16:19:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8fe8f509-c530-777b-dccf-d10d58ae78cf","last_modified":1480349211748},{"guid":"e9d197d59f2f45f382b1aa5c14d82@8706aaed9b904554b5cb7984e9.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i844","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128324","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the Add-on Guidelines.","name":"Sense","created":"2015-02-06T15:01:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f8f8695c-a356-a1d6-9291-502b377c63c2","last_modified":1480349211713},{"guid":"{184AA5E6-741D-464a-820E-94B3ABC2F3B4}","prefs":[],"schema":1480349193877,"blockID":"i968","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1164243","who":"All users who have this add-on installed.","why":"This is a malicious add-on that poses as a Java extension.","name":"Java String Helper (malware)","created":"2015-08-04T09:41:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fac1d2cb-eed7-fcef-5d5a-43c556371bd7","last_modified":1480349211687},{"guid":"7d51fb17-b199-4d8f-894e-decaff4fc36a@a298838b-7f50-4c7c-9277-df6abbd42a0c.com","prefs":[],"schema":1480349193877,"blockID":"i455","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=919792","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks Facebook accounts and posts spam to the users' friends.","name":"Video Console (malware)","created":"2013-09-25T10:28:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dd4d2e17-4ce6-36b0-3035-93e9cc5846d4","last_modified":1480349211660},{"guid":"prositez@prz.com","prefs":[],"schema":1480349193877,"blockID":"i764","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"ProfSitez","created":"2014-10-29T16:43:15Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"684ad4fd-2cbd-ce2a-34cd-bc66b20ac8af","last_modified":1480349211628},{"guid":"/^toolbar[0-9]*@findwide\\.com$/","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i874","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082758","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.\r\n","name":"FindWide Toolbars","created":"2015-03-04T14:54:10Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a317ad9f-af4d-e086-4afd-cd5eead1ed62","last_modified":1480349211601},{"guid":"{25D77636-38B1-1260-887C-2D4AFA92D6A4}","prefs":[],"schema":1480349193877,"blockID":"i536","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=959279","who":"All Firefox users who have this extension installed.","why":"This is a malicious extension that is installed alongside a trojan. It hijacks searches on selected sites.","name":"Microsoft DirectInput Object (malware)","created":"2014-01-13T10:36:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cd174588-940e-f5b3-12ea-896c957bd4b3","last_modified":1480349211555},{"guid":"fdm_ffext@freedownloadmanager.org","prefs":[],"schema":1480349193877,"blockID":"i216","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=789700","who":"All Firefox users who have installed version 1.5.7.5 of the Free Download Manager extension.","why":"Version 1.5.7.5 of the Free Download Manager extension is causing frequent crashes in recent versions of Firefox. Version 1.5.7.6 corrects this problem, but it is currently not available on addons.mozilla.org. We recommend all users to update to the new version once it becomes available.","name":"Free Download Manager","created":"2012-11-27T12:47:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.5.7.5","minVersion":"1.5.7.5","targetApplication":[]}],"id":"736417a2-6161-9973-991a-aff566314733","last_modified":1480349211163},{"guid":"{badea1ae-72ed-4f6a-8c37-4db9a4ac7bc9}","prefs":[],"schema":1480349193877,"blockID":"i543","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963809","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is apparently malware that is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Address Bar Search","created":"2014-01-28T14:28:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8c1dd68e-7df6-0c37-2f41-107745a7be54","last_modified":1480349211119},{"guid":"addon@gemaoff","prefs":[],"schema":1480349193877,"blockID":"i1230","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"These add-ons are copies of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker (addon@gemaoff)","created":"2016-06-08T16:15:11Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6bc49e9f-322f-9952-15a6-0a723a61c2d9","last_modified":1480349211044},{"guid":"{d87d56b2-1379-49f4-b081-af2850c79d8e}","prefs":[],"schema":1480349193877,"blockID":"i726","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Xplorer Lite","created":"2014-10-13T16:01:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7b0895b4-dd4f-1c91-f4e3-31afdbdf3178","last_modified":1480349211007},{"guid":"OKitSpace@OKitSpace.es","prefs":[],"schema":1480349193877,"blockID":"i469","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:35:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6a11aa68-0dae-5524-cc96-a5053a31c466","last_modified":1480349210982},{"guid":"{c96d1ae6-c4cf-4984-b110-f5f561b33b5a}","prefs":[],"schema":1480349193877,"blockID":"i808","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Better Web","created":"2014-12-19T09:36:52Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0413d46b-8205-d9e0-65df-4caa3e6355c4","last_modified":1480349210956},{"guid":"lightningnewtab@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i554","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed in Firefox and includes a companion extension that also performs malicious actions.","name":"Lightning SpeedDial","created":"2014-02-19T15:28:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"875513e1-e6b1-a383-2ec5-eb4deb87eafc","last_modified":1480349210931},{"guid":"/^ext@bettersurfplus/","prefs":[],"schema":1480349193877,"blockID":"i506","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware and is installed silently in violation of the Add-on Guidelines.","name":"BetterSurf (malware)","created":"2013-12-10T15:10:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b4da06d2-a0fd-09b6-aadb-7e3b29c3be3a","last_modified":1480349210905},{"guid":"thefoxonlybetter@quicksaver","prefs":[],"schema":1480349193877,"blockID":"i706","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","who":"All Firefox users who have any of these versions of the add-on installed.","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"The Fox, Only Better (malicious versions)","created":"2014-08-27T14:50:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.6.160","minVersion":"1.6.160","targetApplication":[]}],"id":"bb2b2114-f8e7-511d-04dc-abc8366712cc","last_modified":1480349210859},{"guid":"CortonExt@ext.com","prefs":[],"schema":1480349193877,"blockID":"i336","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=864551","who":"All Firefox users who have this add-on installed.","why":"This add-on is reported to be installed without user consent, with a non-descriptive name, and ties a number of browser features to Amazon URLs, probably monetizing on affiliate codes.","name":"CortonExt","created":"2013-04-22T16:10:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a5bdd05d-eb4c-ce34-9909-a677b4322384","last_modified":1480349210805},{"guid":"1chtw@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i430","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks.","name":" Mozilla Service Pack (malware)","created":"2013-08-05T16:42:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bf1e31c7-ba50-1075-29ae-47368ac1d6de","last_modified":1480349210773},{"guid":"lrcsTube@hansanddeta.com","prefs":[],"schema":1480349193877,"blockID":"i344","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866944","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"LyricsTube","created":"2013-05-06T16:44:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"424b9f39-d028-b1fb-d011-d8ffbbd20fe9","last_modified":1480349210718},{"guid":"{341f4dac-1966-47ff-aacf-0ce175f1498a}","prefs":[],"schema":1480349193877,"blockID":"i356","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=868129","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"MyFreeGames","created":"2013-05-23T14:45:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"560e08b1-3471-ad34-8ca9-463f5ca5328c","last_modified":1480349210665},{"guid":"/^({d6e79525-4524-4707-9b97-1d70df8e7e59}|{ddb4644d-1a37-4e6d-8b6e-8e35e2a8ea6c}|{e55007f4-80c5-418e-ac33-10c4d60db01e}|{e77d8ca6-3a60-4ae9-8461-53b22fa3125b}|{e89a62b7-248e-492f-9715-43bf8c507a2f}|{5ce3e0cb-aa83-45cb-a7da-a2684f05b8f3})$/","prefs":[],"schema":1480349193877,"blockID":"i518","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing the add-on, and using multiple add-on IDs.","name":"Re-markit","created":"2013-12-20T12:56:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"145b0f22-501e-39eb-371e-ec8342a5add9","last_modified":1480349210606},{"guid":"{72b98dbc-939a-4e0e-b5a9-9fdbf75963ef}","prefs":[],"schema":1480349193877,"blockID":"i772","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"SitezExpert","created":"2014-10-31T16:15:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"386cb2c9-e674-ce2e-345f-d30a785f90c5","last_modified":1480349210536},{"guid":"hha8771ui3-Fo9j9h7aH98jsdfa8sda@jetpack","prefs":[],"schema":1480349193877,"blockID":"i970","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190963","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video fix (malware)","created":"2015-08-04T15:15:07Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3ca577d8-3685-4ba9-363b-5b2d8d8dd608","last_modified":1480349210477},{"guid":"{7e8a1050-cf67-4575-92df-dcc60e7d952d}","prefs":[],"schema":1480349193877,"blockID":"i478","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935796","who":"All Firefox users who have this add-on installed.","why":"This add-on violates the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"SweetPacks","created":"2013-11-08T15:42:28Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1519eb45-fcaa-b531-490d-fe366490ed45","last_modified":1480349210416},{"guid":"/^({66b103a7-d772-4fcd-ace4-16f79a9056e0}|{6926c7f7-6006-42d1-b046-eba1b3010315}|{72cabc40-64b2-46ed-8648-26d831761150}|{73ee2cf2-7b76-4c49-b659-c3d8cf30825d}|{ca6446a5-73d5-4c35-8aa1-c71dc1024a18}|{5373a31d-9410-45e2-b299-4f61428f0be4})$/","prefs":[],"schema":1480349193877,"blockID":"i521","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed and using multiple add-on IDs.","name":"appbario7","created":"2013-12-20T13:14:29Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"983cb7fe-e0b4-6a2e-f174-d2670876b2cd","last_modified":1480349210351},{"guid":"{dd6b651f-dfb9-4142-b0bd-09912ad22674}","prefs":[],"schema":1480349193877,"blockID":"i400","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:16:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"975d2126-f727-f5b9-ca01-b83345b80c56","last_modified":1480349210301},{"guid":"25p@9eAkaLq.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i730","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines\r\n","name":"YYOutoubeAdBlocke","created":"2014-10-16T16:35:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5a0c5818-693f-43ae-f85a-c6928d9c2cc4","last_modified":1480349210275},{"os":"Darwin","guid":"thunder@xunlei.com","prefs":[],"schema":1480349193877,"blockID":"i568","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=988490","who":"All Firefox users who have versions 2.0.6 or lower of the Thunder add-on installed on Mac OS.","why":"Versions 2.0.6 and lower of the Thunder add-on are causing startup crashes on Mac OS.","name":"Thunder, 2.0.6 and lower","created":"2014-03-28T15:48:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.0.6","minVersion":"0","targetApplication":[]}],"id":"cee484f6-2d5d-f708-88be-cd12d825a79a","last_modified":1480349210242},{"guid":"tmbepff@trendmicro.com","prefs":[],"schema":1480349193877,"blockID":"i1222","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"Add-on is causing a high-frequency crash in Firefox","name":"Trend Micro BEP 9.1.0.1035 and lower","created":"2016-05-24T12:10:34Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"9.1.0.1035","minVersion":"0","targetApplication":[]}],"id":"8045c799-486a-927c-b972-b9da1c2dab2f","last_modified":1480349209818},{"guid":"pricepeep@getpricepeep.com","prefs":[],"schema":1480349193877,"blockID":"i220","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811433","who":"All Firefox users who have Pricepeed below 2.1.0.20 installed.","why":"Versions older than 2.1.0.20 of the PricePeep add-on were silently side-installed with other software, injecting advertisements in Firefox. Versions 2.1.0.20 and above don't have the install problems are not blocked.","name":"PricePeep","created":"2012-11-29T16:18:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.1.0.19.99","minVersion":"0","targetApplication":[]}],"id":"227b9a8d-c18d-239c-135e-d79e614fe392","last_modified":1480349209794},{"guid":"ytd@mybrowserbar.com","prefs":[],"schema":1480349193877,"blockID":"i360","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845969","who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager tab.","why":"The installer that includes this add-on performs Firefox settings changes separately from the add-on install, making it very difficult to opt-out to these changes.","name":"YouTube Downloader","created":"2013-06-06T12:29:13Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"63669524-93fe-4823-95ba-37cf6cbd4914","last_modified":1480349209770},{"guid":"hoverst@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i498","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946029","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Adobe Flash Player (malware)","created":"2013-12-04T15:17:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2b25ba3e-45db-0e6c-965a-3acda1a44117","last_modified":1480349209745},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i606","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:20:07Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.13.*","minVersion":"3.15.13","targetApplication":[]}],"id":"c3d88e22-386a-da3b-8aba-3cb526e08053","last_modified":1480349209713},{"guid":"advance@windowsclient.com","prefs":[],"schema":1480349193877,"blockID":"i508","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950773","who":"All Firefox users who have this add-on installed.","why":"This is not the Microsoft .NET Framework Assistant created and distributed by Microsoft. It is a malicious extension that is distributed under the same name to trick users into installing it, and turns users into a botnet that conducts SQL injection attacks on visited websites.","name":"Microsoft .NET Framework Assistant (malware)","created":"2013-12-16T10:15:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e5d30a74-732e-c3fa-f13b-097ee28d4b27","last_modified":1480349209674},{"guid":"{5eeb83d0-96ea-4249-942c-beead6847053}","prefs":[],"schema":1480349193877,"blockID":"i756","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080846","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"SmarterPower","created":"2014-10-17T16:30:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e101dbc0-190c-f6d8-e168-0c1380581cc9","last_modified":1480349209625},{"guid":"/^({7e8a1050-cf67-4575-92df-dcc60e7d952d}|{b3420a9c-a397-4409-b90d-bcf22da1a08a}|{eca6641f-2176-42ba-bdbe-f3e327f8e0af}|{707dca12-3f99-4d94-afea-06dcc0ae0108}|{aea20431-87fc-40be-bc5b-18066fe2819c}|{30ee6676-1ba6-455a-a7e8-298fa863a546})$/","prefs":[],"schema":1480349193877,"blockID":"i523","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"SweetPacks","created":"2013-12-20T13:42:15Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a3a6bc8e-46a1-b3d5-1b20-58b90ba099c3","last_modified":1480349209559},{"guid":"{e0352044-1439-48ba-99b6-b05ed1a4d2de}","prefs":[],"schema":1480349193877,"blockID":"i710","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Site Counselor","created":"2014-09-30T15:28:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b8fedf07-dcaf-f0e3-b42b-32db75c4c304","last_modified":1480349209491},{"guid":"{bee6eb20-01e0-ebd1-da83-080329fb9a3a}","prefs":[],"schema":1480349193877,"blockID":"i642","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Flash and Video Download extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Flash and Video Download, between 40.10.1 and 44.10.1","created":"2014-07-10T15:02:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"44.10.1","minVersion":"40.10.1","targetApplication":[]}],"id":"16db0c85-02ec-4f7c-24a3-a504fbce902d","last_modified":1480349209443},{"guid":"addlyrics@addlyrics.net","prefs":[],"schema":1480349193877,"blockID":"i426","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891605","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Add Lyrics","created":"2013-07-09T15:25:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81678e9e-ebf0-47d6-e409-085c25e67c7e","last_modified":1480349209383},{"guid":"{7b1bf0b6-a1b9-42b0-b75d-252036438bdc}","prefs":[],"schema":1480349193877,"blockID":"i638","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036137","who":"All Firefox users who have this version of the add-on installed.","why":"Versions 27.8 and 27.9 of the YouTube High Definition extension weren't developed by the original developer, and are likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube High Definition 27.8 and 27.9","created":"2014-07-08T16:07:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"27.9","minVersion":"27.8","targetApplication":[]}],"id":"ffdc8ba0-d548-dc5b-d2fd-79a20837124b","last_modified":1480349209260},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i610","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:21:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.22.*","minVersion":"3.15.22","targetApplication":[]}],"id":"935dfec3-d017-5660-db5b-94ae7cea6e5f","last_modified":1480349209128},{"guid":"info@allpremiumplay.info","prefs":[],"schema":1480349193877,"blockID":"i163","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Codec-C (malware)","created":"2012-10-29T16:40:07Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6afbf9b8-ae3a-6a48-0f6c-7a3e065ec043","last_modified":1480349209076},{"guid":"now.msn.com@services.mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i490","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=926378","who":"All Firefox users who have this add-on installed.","why":"As part of their ongoing work to fine-tune their editorial mix, msnNOW has decided that msnNOW will stop publishing on Dec. 3, 2013. Rather than having a single home for trending content, they will continue integrating that material throughout all MSN channels. A big thank you to everyone who followed msnNOW stories using the Firefox sidebar","name":"MSNNow (discontinued social provider)","created":"2013-11-27T08:06:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"de7d699d-016d-d973-5e39-52568de6ffde","last_modified":1480349209021},{"guid":"fftoolbar2014@etech.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i858","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131078","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and changes users' settings, in violation of the Add-on Guidelines.","name":"FF Toolbar","created":"2015-02-11T15:32:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6877bf40-9e45-7017-4dac-14d09e7f0ef6","last_modified":1480349208988},{"guid":"mbrnovone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i477","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936249","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Mozilla Security Service (malware)","created":"2013-11-08T15:35:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"758c2503-766d-a2f5-4c58-7cea93acfe05","last_modified":1480349208962},{"guid":"{739df940-c5ee-4bab-9d7e-270894ae687a}","prefs":[],"schema":1480349193877,"blockID":"i530","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949558","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"WhiteSmoke New","created":"2013-12-20T14:49:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f8097aa6-3009-6dfc-59df-353ba6b1142b","last_modified":1480349208933},{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","prefs":[],"schema":1480349193877,"blockID":"i115","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=779014","who":"All Firefox users who have this add-on installed.","why":"This extension is malware that is installed under false pretenses, and it conducts attacks against certain video websites.","name":"Adobe Flash Player (malware)","created":"2012-08-01T13:53:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aef9312d-5f2e-a44d-464d-6113394148e3","last_modified":1480349208904},{"guid":"g99hiaoekjoasiijdkoleabsy278djasi@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1022","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208708","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"WatchIt (malware)","created":"2015-09-28T15:23:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"25e057ea-f500-67df-d078-ec3f37f99036","last_modified":1480349208877},{"guid":"firefoxaddon@youtubeenhancer.com","prefs":[],"schema":1480349193877,"blockID":"i636","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033120","who":"All Firefox users who have this version of the add-on installed.","why":"Version 199.7.0 of the YoutubeEnhancer extension isn't developed by the original developer, and is likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YoutubeEnhancer - Firefox","created":"2014-07-08T15:58:12Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"199.7.0","minVersion":"199.7.0","targetApplication":[]}],"id":"204a074b-da87-2784-f15b-43a9ea9a6b36","last_modified":1480349208851},{"guid":"extacylife@a.com","prefs":[],"schema":1480349193877,"blockID":"i505","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947741","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks users' Facebook accounts.","name":"Facebook Haber (malware)","created":"2013-12-09T15:08:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5acadb8d-d3be-e0e0-4656-9107f9de0ea9","last_modified":1480349208823},{"guid":"{746505DC-0E21-4667-97F8-72EA6BCF5EEF}","prefs":[],"schema":1480349193877,"blockID":"i842","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128325","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Shopper-Pro","created":"2015-02-06T14:45:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5f19c5fb-1c78-cbd6-8a03-1678efb54cbc","last_modified":1480349208766},{"guid":"{51c77233-c0ad-4220-8388-47c11c18b355}","prefs":[],"schema":1480349193877,"blockID":"i580","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004132","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed into Firefox, in violation of the Add-on Guidelines.","name":"Browser Utility","created":"2014-04-30T13:55:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.1.9999999","minVersion":"0","targetApplication":[]}],"id":"daa2c60a-5009-2c65-a432-161d50bef481","last_modified":1480349208691},{"guid":"{a2bfe612-4cf5-48ea-907c-f3fb25bc9d6b}","prefs":[],"schema":1480349193877,"blockID":"i712","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Xplorer","created":"2014-09-30T15:28:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"13450534-93d7-f2a2-7f0a-e4e3948c4dc1","last_modified":1480349208027},{"guid":"ScorpionSaver@jetpack","prefs":[],"schema":1480349193877,"blockID":"i539","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963826","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","why":"This add-on is being silently installed, in violation of the Add-on Guidelines","name":"ScorpionSaver","created":"2014-01-28T14:00:30Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3499c968-6e8b-37f1-5f6e-2384807c2a6d","last_modified":1480349207972},{"guid":"unblocker20@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1212","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"This add-on is a copy of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker 2.0","created":"2016-05-05T18:13:29Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"2.0.0","minVersion":"0","targetApplication":[]}],"id":"57785030-909f-e985-2a82-8bd057781227","last_modified":1480349207912},{"guid":"{D19CA586-DD6C-4a0a-96F8-14644F340D60}","prefs":[],"schema":1480349193877,"blockID":"i42","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690184","who":"Users of McAfee ScriptScan versions 14.4.0 and below for all versions of Firefox and SeaMonkey.","why":"This add-on causes a high volume of crashes.","name":"McAfee ScriptScan","created":"2011-10-03T09:38:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"14.4.0","minVersion":"0.1","targetApplication":[]}],"id":"1d35ac9d-49df-23cf-51f5-f3c228ad0dc9","last_modified":1480349207877},{"guid":"gjhrjenrengoe@jfdnkwelfwkm.com","prefs":[],"schema":1480349193877,"blockID":"i1042","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212174","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Avant Player (malware)","created":"2015-10-07T13:12:54Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d6453893-becc-7617-2050-0db284e0e0db","last_modified":1480349207840},{"guid":"/^(@9338379C-DD5C-4A45-9A36-9733DC806FAE|9338379C-DD5C-4A45-9A36-9733DC806FAE|@EBC7B466-8A28-4061-81B5-10ACC05FFE53|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4222|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4|@b2d6a97c0-4b18-40ed-bce7-3b7d3309e3c4222)$/","prefs":[],"schema":1480349193877,"blockID":"i1079","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240597","who":"All Firefox users who have these add-ons installed.","why":"These add-ons are malicious, manipulating registry and search settings for users.","name":"Default SearchProtected (malware)","created":"2016-01-18T12:32:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ddc5237e-42e4-1bf1-54d3-a5e5799dd828","last_modified":1480349207815},{"guid":"{33e0daa6-3af3-d8b5-6752-10e949c61516}","prefs":[],"schema":1480349193877,"blockID":"i282","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835683","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on violates our add-on guidelines, bypassing the third party opt-in screen.","name":"Complitly","created":"2013-02-15T12:19:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.1.999","minVersion":"0","targetApplication":[]}],"id":"1f94bc8d-9d5f-c8f5-45c0-ad1f6e147c71","last_modified":1480349207789},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i608","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:20:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.20.*","minVersion":"3.15.18","targetApplication":[]}],"id":"e7d50ff2-5948-d571-6711-37908ccb863f","last_modified":1480349207761},{"guid":"chiang@programmer.net","prefs":[],"schema":1480349193877,"blockID":"i340","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867156","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that logs keyboard input and sends it to a remote server.","name":"Cache Manager (malware)","created":"2013-04-30T07:44:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d50d0434-78e4-faa7-ce2a-9b0a8bb5120e","last_modified":1480349207736},{"guid":"{63eb5ed4-e1b3-47ec-a253-f8462f205350}","prefs":[],"schema":1480349193877,"blockID":"i786","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"FF-Plugin","created":"2014-11-18T12:33:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ca4558a2-8ce4-3ca0-3d29-63019f680c8c","last_modified":1480349207705},{"guid":"jid1-4vUehhSALFNqCw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i634","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","who":"All Firefox users who have this version of the add-on installed.","why":"Version 99.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube Plus Plus 99.7","created":"2014-07-04T14:13:57Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"99.7","minVersion":"99.7","targetApplication":[]}],"id":"a6d017cb-e33f-2239-4e42-ab4e7cfb19fe","last_modified":1480349207680},{"guid":"{aab02ab1-33cf-4dfa-8a9f-f4e60e976d27}","prefs":[],"schema":1480349193877,"blockID":"i820","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems without their consent, in violation of the Add-on Guidelines.","name":"Incredible Web","created":"2015-01-13T09:27:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"847ecc6e-1bc1-f7ff-e1d5-a76e6b8447d2","last_modified":1480349207654},{"guid":"torntv@torntv.com","prefs":[],"schema":1480349193877,"blockID":"i320","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"TornTV","created":"2013-03-20T16:35:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cdd492b8-8101-74a9-5760-52ff709fd445","last_modified":1480349207608},{"guid":"crossriderapp12555@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i674","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=877836","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"The add-on is silently installed, in violation of our Add-on Guidelines.","name":"JollyWallet","created":"2014-07-22T16:26:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d4467e20-0f71-f0e0-8cd6-40c82b6c7379","last_modified":1480349207561},{"guid":"pluggets@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i435","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903544","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks users' Facebook accounts and posts spam on their behalf. ","name":"Facebook Pluggets Plugin (malware)","created":"2013-08-09T13:12:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3a63fd92-9290-02fb-a2e8-bc1b4424201a","last_modified":1480349207535},{"guid":"344141-fasf9jas08hasoiesj9ia8ws@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1038","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211169","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video Plugin (malware)","created":"2015-10-05T16:42:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f7986b7b-9b5a-d372-8147-8b4bd6f5a29b","last_modified":1480349207485},{"guid":"meOYKQEbBBjH5Ml91z0p9Aosgus8P55bjTa4KPfl@jetpack","prefs":[],"schema":1480349193877,"blockID":"i998","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201164","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Smooth Player (malware)","created":"2015-09-07T13:54:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"30c3e511-9e8d-15ee-0867-d61047e56515","last_modified":1480349207370},{"guid":"{8dc5c42e-9204-2a64-8b97-fa94ff8a241f}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i770","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astrmenda Search","created":"2014-10-30T14:52:52Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8a9c7702-0349-70d6-e64e-3a666ab084c6","last_modified":1480349207320},{"guid":"savingsslider@mybrowserbar.com","prefs":[],"schema":1480349193877,"blockID":"i752","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Slick Savings","created":"2014-10-17T16:18:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b1faf30-5725-7847-d993-b5cdaabc9829","last_modified":1480349207290},{"guid":"youtubeunblocker__web@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1129","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons.","name":"YouTube Unblocker","created":"2016-03-01T21:20:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aa246b36-0a80-81e3-2129-4847e872d5fe","last_modified":1480349207262},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i612","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:23:00Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.24.*","minVersion":"3.15.24","targetApplication":[]}],"id":"e0ff9df4-60e4-dbd0-8018-57f395e6610a","last_modified":1480349206818},{"guid":"{1e4ea5fc-09e5-4f45-a43b-c048304899fc}","prefs":[],"schema":1480349193877,"blockID":"i812","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Great Finder","created":"2015-01-06T13:22:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ea40b9f-2423-a2fd-a5e9-4ec1df2715f4","last_modified":1480349206784},{"guid":"psid-vhvxQHMZBOzUZA@jetpack","prefs":[],"schema":1480349193877,"blockID":"i70","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730059","who":"All Firefox users who have installed this add-on.","why":"Add-on spams Facebook accounts and blocks Facebook warnings.","name":"PublishSync (malware)","created":"2012-02-23T13:44:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f1528b02-7cef-0e80-f747-8bbf1f0f2f06","last_modified":1480349206758},{"guid":"{B18B1E5C-4D81-11E1-9C00-AFEB4824019B}","prefs":[],"schema":1480349193877,"blockID":"i447","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","why":"This add-on is installed silently, in violation of our Add-on Guidelines.","name":"My Smart Tabs","created":"2013-09-06T16:00:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"40332fae-0444-a141-ade9-8d9e50370f56","last_modified":1480349206733},{"guid":"crossriderapp8812@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i314","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"Coupon Companion","created":"2013-03-06T14:14:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"06c07e28-0a34-e5ee-e724-491a2f6ce586","last_modified":1480349206708},{"guid":"/^(ffxtlbr@mixidj\\.com|{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}|{67097627-fd8e-4f6b-af4b-ecb65e50112e}|{f6f0f973-a4a3-48cf-9a7a-b7a69c30d71a}|{a3d0e35f-f1da-4ccb-ae77-e9d27777e68d}|{1122b43d-30ee-403f-9bfa-3cc99b0caddd})$/","prefs":[],"schema":1480349193877,"blockID":"i540","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","who":"All Firefox users who have this add-on installed.","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the Add-on Guidelines.","name":"MixiDJ (malware)","created":"2014-01-28T14:07:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4c03ddda-bb3f-f097-0a7b-b7b77b050584","last_modified":1480349206678},{"guid":"hansin@topvest.id","prefs":[],"schema":1480349193877,"blockID":"i836","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130406","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Inside News (malware)","created":"2015-02-06T14:17:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0945a657-f28d-a02c-01b2-5115b3f90d7a","last_modified":1480349206628},{"guid":"lfind@nijadsoft.net","prefs":[],"schema":1480349193877,"blockID":"i358","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=874131","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Lyrics Finder","created":"2013-05-24T14:09:47Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2307f11c-6216-0dbf-a464-b2921055ce2b","last_modified":1480349206603},{"guid":"plugin@getwebcake.com","prefs":[],"schema":1480349193877,"blockID":"i484","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938264","who":"All Firefox users who have this add-on installed.","why":"This add-on violates the Add-on Guidelines and is broadly considered to be malware. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"WebCake","created":"2013-11-14T09:55:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2865addd-da1c-20c4-742f-6a2270da2e78","last_modified":1480349206578},{"guid":"{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}","prefs":[],"schema":1480349193877,"blockID":"i354","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=837838","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Mixi DJ","created":"2013-05-23T14:31:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"03a745c3-0ee7-e262-ba31-62d4f78ddb62","last_modified":1480349206525},{"guid":"/^({7316e43a-3ebd-4bb4-95c1-9caf6756c97f}|{0cc09160-108c-4759-bab1-5c12c216e005}|{ef03e721-f564-4333-a331-d4062cee6f2b}|{465fcfbb-47a4-4866-a5d5-d12f9a77da00}|{7557724b-30a9-42a4-98eb-77fcb0fd1be3}|{b7c7d4b0-7a84-4b73-a7ef-48ef59a52c3b})$/","prefs":[],"schema":1480349193877,"blockID":"i520","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed and using multiple add-on IDs.","name":"appbario7","created":"2013-12-20T13:11:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e3901c48-9c06-fecb-87d3-efffd9940c22","last_modified":1480349206491},{"guid":"{354dbb0a-71d5-4e9f-9c02-6c88b9d387ba}","prefs":[],"schema":1480349193877,"blockID":"i538","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964081","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Show Mask ON (malware)","created":"2014-01-27T10:13:17Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aad90253-8921-b5df-3658-45a70d75f3d7","last_modified":1480349206465},{"guid":"{8E9E3331-D360-4f87-8803-52DE43566502}","prefs":[],"schema":1480349193877,"blockID":"i461","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=906071","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This is a companion add-on for the SweetPacks Toolbar which is blocked due to guideline violations.","name":"Updater By SweetPacks","created":"2013-10-17T16:10:51Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ae8cca6e-4258-545f-9a69-3d908264a701","last_modified":1480349206437},{"guid":"info@bflix.info","prefs":[],"schema":1480349193877,"blockID":"i172","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","who":"All Firefox users who have this add-on installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Bflix (malware)","created":"2012-10-30T13:39:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7a9062f4-218d-51d2-9b8c-b282e6eada4f","last_modified":1480349206384},{"guid":"{dff137ae-1ffd-11e3-8277-b8ac6f996f26}","prefs":[],"schema":1480349193877,"blockID":"i450","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=917861","who":"All Firefox users who have this add-on installed.","why":"This is add-on is malware that silently redirects popular search queries to a third party.","name":"Addons Engine (malware)","created":"2013-09-18T16:19:34Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8e583fe4-1c09-9bea-2473-faecf3260685","last_modified":1480349206312},{"guid":"12x3q@3244516.com","prefs":[],"schema":1480349193877,"blockID":"i493","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware and is installed silently in violation of the Add-on Guidelines.","name":"BetterSurf (malware)","created":"2013-12-02T12:49:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"af2a9e74-3753-9ff1-d899-5d1e79ed3dce","last_modified":1480349206286},{"guid":"{20AD702C-661E-4534-8CE9-BA4EC9AD6ECC}","prefs":[],"schema":1480349193877,"blockID":"i626","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1027886","who":"All Firefox users who have this add-on installed.","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the Add-on Guidelines.","name":"V-Bates","created":"2014-06-19T15:16:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b9ccabe-8f9a-e3d1-a689-1aefba1f33b6","last_modified":1480349206261},{"guid":"{c5e48979-bd7f-4cf7-9b73-2482a67a4f37}","prefs":[],"schema":1480349193877,"blockID":"i736","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080842","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"ClearThink","created":"2014-10-17T15:22:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6e8b3e4f-2f59-cde3-e6d2-5bc6e216c506","last_modified":1480349206231},{"guid":"{41339ee8-61ed-489d-b049-01e41fd5d7e0}","prefs":[],"schema":1480349193877,"blockID":"i810","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"FireWeb","created":"2014-12-23T10:32:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a35f2ca6-aec4-c01d-170e-650258ebcd2c","last_modified":1480349206165},{"guid":"jid0-l9BxpNUhx1UUgRfKigWzSfrZqAc@jetpack","prefs":[],"schema":1480349193877,"blockID":"i640","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036640","who":"All Firefox users who have this add-on installed.","why":"This add-on attempts to gather private user data and send it to a remote location. It doesn't appear to be very effective at it, but its malicious nature is undeniable.","name":"Bitcoin Mining Software","created":"2014-07-09T14:35:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8fe3c35e-1a6f-a89a-fa96-81bda3b71db1","last_modified":1480349206133},{"guid":"{845cab51-d8d2-472f-8bd9-2b44642d97c2}","prefs":[],"schema":1480349193877,"blockID":"i460","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=927456","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and handles users' settings, violating some of the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Vafmusic9","created":"2013-10-17T15:50:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8538ccb4-3b71-9858-3f6d-c0fff7af58b0","last_modified":1480349205746},{"guid":"SpecialSavings@SpecialSavings.com","prefs":[],"schema":1480349193877,"blockID":"i676","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881511","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This is add-on is generally considered to be unwanted and is probably silently installed, in violation of the Add-on Guidelines.","name":"SpecialSavings","created":"2014-07-22T16:31:56Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5e921810-fc3a-0729-6749-47e38ad10a22","last_modified":1480349205688},{"guid":"afurladvisor@anchorfree.com","prefs":[],"schema":1480349193877,"blockID":"i434","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","who":"All Firefox users who have this add-on installed.","why":"This add-on bypasses the external install opt in screen in Firefox, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Hotspot Shield Helper","created":"2013-08-09T11:26:11Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"083585eb-d7e7-e228-5fbf-bf35c52044e4","last_modified":1480349205645},{"guid":"addonhack@mozilla.kewis.ch","prefs":[],"schema":1480349193877,"blockID":"i994","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1200848","who":"All users who have this add-on installed.","why":"This add-on is a proof of concept of malicious behavior in an add-on. In itself it doesn't cause any harm, but it still needs to be blocked for security reasons.","name":"Addon Hack","created":"2015-09-01T15:32:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"81f75571-ca2a-0e50-a925-daf2037ce63c","last_modified":1480349205584},{"guid":"info@thebflix.com","prefs":[],"schema":1480349193877,"blockID":"i174","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Bflix (malware)","created":"2012-10-30T13:40:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"811a61d4-9435-133e-6262-fb72486c36b0","last_modified":1480349205526},{"guid":"{EEE6C361-6118-11DC-9C72-001320C79847}","prefs":[],"schema":1480349193877,"blockID":"i392","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our Add-on Guidelines.","name":"SweetPacks Toolbar","created":"2013-06-25T12:38:45Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c1dc6607-4c0a-4031-9f14-70ef1ae1edcb","last_modified":1480349205455},{"guid":"/^(4cb61367-efbf-4aa1-8e3a-7f776c9d5763@cdece6e9-b2ef-40a9-b178-291da9870c59\\.com|0efc9c38-1ec7-49ed-8915-53a48b6b7600@e7f17679-2a42-4659-83c5-7ba961fdf75a\\.com|6be3335b-ef79-4b0b-a0ba-b87afbc6f4ad@6bbb4d2e-e33e-4fa5-9b37-934f4fb50182\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i531","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and using multiple IDs.","name":"Feven","created":"2013-12-20T15:01:22Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"46aa79a9-d329-f713-d4f2-07d31fe7071e","last_modified":1480349205287},{"guid":"afext@anchorfree.com","prefs":[],"schema":1480349193877,"blockID":"i466","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=933988","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't respect user choice, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Hotspot Shield Extension","created":"2013-11-07T13:32:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8176f879-bd73-5468-e908-2d7cfc115ac2","last_modified":1480349205108},{"guid":"{FCE04E1F-9378-4f39-96F6-5689A9159E45}","prefs":[],"schema":1480349193877,"blockID":"i920","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:26:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"eb191ff0-20f4-6e04-4344-d880af4faf51","last_modified":1480349204978},{"guid":"{9CE11043-9A15-4207-A565-0C94C42D590D}","prefs":[],"schema":1480349193877,"blockID":"i503","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947384","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that uses a deceptive name to stay in users' systems.","name":"XUL Cache (malware)","created":"2013-12-06T11:58:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dcdae267-8d3a-5671-dff2-f960febbbb20","last_modified":1480349204951},{"guid":"/^[a-z0-9]+@foxysecure[a-z0-9]*\\.com$/","prefs":[],"schema":1480349193877,"blockID":"i766","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088615","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Fox Sec 7","created":"2014-10-30T14:22:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"503fbd7c-04cd-65f3-9d0e-3ecf427b4a8f","last_modified":1480349204925},{"guid":"/^(jid1-W4CLFIRExukJIFW@jetpack|jid1-W4CLFIRExukJIFW@jetpack_1|jid1-W3CLwrP[a-z]+@jetpack)$/","prefs":[],"schema":1480349193877,"blockID":"i1078","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240561","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that tries to pass itself for the Adobe Flash Player and hides itself in the Add-ons Manager.","name":"Adobe Flash Player (malware)","created":"2016-01-18T10:31:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b026fe67-ec77-a240-2fa1-e78f581a6fe4","last_modified":1480349204899},{"guid":"{0153E448-190B-4987-BDE1-F256CADA672F}","prefs":[],"schema":1480349193877,"blockID":"i914","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","who":"All Firefox users who have this add-on installed in Firefox 39 and above.","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.","name":"RealPlayer Browser Record Plugin","created":"2015-06-02T09:56:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"2bfe0d89-e458-9d0e-f944-ddeaf8c4db6c","last_modified":1480349204871},{"guid":"{77beece6-3997-403a-92fa-0055bfcf88e5}","prefs":[],"schema":1480349193877,"blockID":"i452","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Entrusted11","created":"2013-09-18T16:34:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d348f91f-caeb-a803-dfd9-fd5d285aa0fa","last_modified":1480349204844},{"guid":"dealcabby@jetpack","prefs":[],"schema":1480349193877,"blockID":"i222","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811435","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed with other software, injecting advertisements in Firefox.","name":"DealCabby","created":"2012-11-29T16:20:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6585f0bd-4f66-71e8-c565-d9762c5c084a","last_modified":1480349204818},{"guid":"{3c9a72a0-b849-40f3-8c84-219109c27554}","prefs":[],"schema":1480349193877,"blockID":"i510","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=951301","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks users' Facebook accounts.","name":"Facebook Haber (malware)","created":"2013-12-17T14:27:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7cfa3d0b-0ab2-5e3a-8143-1031c180e32f","last_modified":1480349204778},{"guid":"{4ED1F68A-5463-4931-9384-8FFF5ED91D92}","prefs":[],"schema":1480349193877,"blockID":"i1245","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286368","who":"All users who have McAfee SiteAdvisor lower than 4.0. \r\n\r\nTo resolve this issue, users will need to uninstall McAfee SiteAdvisor/WebAdvisor, reboot the computer, and then reinstall McAfee SiteAdvisor/WebAdvisor. \r\n\r\nFor detailed instructions, please refer to the McAfee support knowledge base.","why":"Old versions of McAfee SiteAdvisor cause startup crashes starting with Firefox 48.0 beta.","name":"McAfee SiteAdvisor lower than 4.0","created":"2016-07-14T21:24:02Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.9.9","minVersion":"0","targetApplication":[]}],"id":"d727d8c5-3329-c98a-7c7e-38b0813ca516","last_modified":1480349204748},{"guid":"{2aab351c-ad56-444c-b935-38bffe18ad26}","prefs":[],"schema":1480349193877,"blockID":"i500","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946087","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Adobe Photo (malware)","created":"2013-12-04T15:29:44Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f7a76d34-ddcd-155e-9fae-5967bd796041","last_modified":1480349204716},{"guid":"jid1-4P0kohSJxU1qGg@jetpack","prefs":[],"schema":1480349193877,"blockID":"i488","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942935","who":"All Firefox users who have version 1.2.50 of the Hola extension. Updating to the latest version should remove the block.","why":"Version 1.2.50 of the Hola extension is causing frequent crashes in Firefox. All users are strongly recommended to update to the latest version, which shouldn't have this problem.","name":"Hola, version 1.2.50","created":"2013-11-25T12:14:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2.50","minVersion":"1.2.50","targetApplication":[]}],"id":"5c7f1635-b39d-4278-5f95-9042399c776e","last_modified":1480349204668},{"guid":"{0A92F062-6AC6-8180-5881-B6E0C0DC2CC5}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i864","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131220","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems and makes unwanted settings changes, in violation of our Add-on Guidelines.","name":"BlockAndSurf","created":"2015-02-26T12:56:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"acb16d1c-6274-93a3-7c1c-7ed36ede64a9","last_modified":1480349204612},{"guid":"jid0-Y6TVIzs0r7r4xkOogmJPNAGFGBw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i322","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=847018","who":"All users who have this add-on installed.","why":"This extension is malware, installed pretending to be the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-03-22T14:39:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"54df22cd-19ce-a7f0-63cc-ffe3113748b9","last_modified":1480349204532},{"guid":"trackerbird@bustany.org","prefs":[],"schema":1480349193877,"blockID":"i986","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1189264","who":"All Thunderbird users who have this version of the add-on installed on Thunderbird 38.0a2 and above.","why":"This add-on is causing consistent crashes on Thunderbird 38.0a2 and above.","name":"trackerbird 1.2.6","created":"2015-08-17T15:56:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2.6","minVersion":"1.2.6","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"38.0a2"}]}],"id":"bb1c699e-8790-4528-0b6d-4f83b7a3152d","last_modified":1480349204041},{"guid":"{0134af61-7a0c-4649-aeca-90d776060cb3}","prefs":[],"schema":1480349193877,"blockID":"i448","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912746","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines. It manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"KeyBar add-on","created":"2013-09-13T16:15:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cf428416-4974-8bb4-7928-c0cb2cfe7957","last_modified":1480349203968},{"guid":"/^(firefox@vebergreat\\.net|EFGLQA@78ETGYN-0W7FN789T87\\.COM)$/","prefs":[],"schema":1480349193877,"blockID":"i564","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","why":"These add-ons are silently installed by the Free Driver Scout installer, in violation of our Add-on Guidelines.","name":"veberGreat and vis (Free Driver Scout bundle)","created":"2014-03-05T13:02:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"487538f1-698e-147e-6395-986759ceed7e","last_modified":1480349203902},{"guid":"69ffxtbr@PackageTracer_69.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i882","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1153001","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on appears to be malware, hijacking user's settings, in violation of the Add-on Guidelines.","name":"PackageTracer","created":"2015-04-10T16:18:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0d37b4e0-3c60-fdad-dd8c-59baff6eae87","last_modified":1480349203836},{"guid":"{ACAA314B-EEBA-48e4-AD47-84E31C44796C}","prefs":[],"schema":1480349193877,"blockID":"i496","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making settings changes that can't be easily reverted.","name":"DVDVideoSoft Menu","created":"2013-12-03T16:07:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"70d2c912-8d04-8065-56d6-d793b13d5f67","last_modified":1480349203779},{"guid":"jid1-4vUehhSALFNqCw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i632","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","who":"All Firefox users who have this version of the add-on installed.","why":"Version 100.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube Plus Plus 100.7","created":"2014-07-01T13:16:55Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"100.7","minVersion":"100.7","targetApplication":[]}],"id":"8bef6026-6697-99cd-7c1f-812877c4211d","last_modified":1480349203658},{"guid":"{a9bb9fa0-4122-4c75-bd9a-bc27db3f9155}","prefs":[],"schema":1480349193877,"blockID":"i404","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:16:43Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fb7a1dc7-16a0-4f70-8289-4df494e0d0fa","last_modified":1480349203633},{"guid":"P2@D.edu","prefs":[],"schema":1480349193877,"blockID":"i850","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"unIsaless","created":"2015-02-09T15:29:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"49536a29-fc7e-9fd0-f415-e15ac090fa56","last_modified":1480349203605},{"guid":"linksicle@linksicle.com","prefs":[],"schema":1480349193877,"blockID":"i472","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9b5b15b3-6da7-cb7c-3c44-30b4fe079d52","last_modified":1480349203581},{"guid":"{377e5d4d-77e5-476a-8716-7e70a9272da0}","prefs":[],"schema":1480349193877,"blockID":"i398","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:15:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ea94df32-2a85-23da-43f7-3fc5714530ec","last_modified":1480349203519},{"guid":"{4933189D-C7F7-4C6E-834B-A29F087BFD23}","prefs":[],"schema":1480349193877,"blockID":"i437","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=900695","who":"All Firefox users.","why":"This add-on is widely reported to be malware.","name":"Win32.SMSWebalta (malware)","created":"2013-08-09T15:14:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cbef1357-d6bc-c8d3-7a82-44af6b1c390f","last_modified":1480349203486},{"guid":"{ADFA33FD-16F5-4355-8504-DF4D664CFE10}","prefs":[],"schema":1480349193877,"blockID":"i306","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844972","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our Add-on Guidelines. It's also possible that it changes user settings without their consent.","name":"Nation Toolbar","created":"2013-02-28T12:56:48Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"017fd151-37ca-4646-4763-1d303fb918fa","last_modified":1480349203460},{"guid":"detgdp@gmail.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i884","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152614","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware, hijacking user settings, in violation of the Add-on Guidelines.","name":"Security Protection (malware)","created":"2015-04-10T16:21:34Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1b5cc88e-499d-2a47-d793-982d4c05e6ee","last_modified":1480349203433},{"guid":"/^(67314b39-24e6-4f05-99f3-3f88c7cddd17@6c5fa560-13a3-4d42-8e90-53d9930111f9\\.com|ffxtlbr@visualbee\\.com|{7aeae561-714b-45f6-ace3-4a8aed6e227b}|{7093ee04-f2e4-4637-a667-0f730797b3a0}|{53c4024f-5a2e-4f2a-b33e-e8784d730938})$/","prefs":[],"schema":1480349193877,"blockID":"i514","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by using multiple add-on IDs and making unwanted settings changes.","name":"VisualBee Toolbar","created":"2013-12-20T12:25:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5f91eee1-7303-3f97-dfe6-1e897a156c7f","last_modified":1480349203408},{"guid":"FXqG@xeeR.net","prefs":["browser.startup.homepage"],"schema":1480349193877,"blockID":"i720","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the Add-on Guidelines.","name":"GoSSave","created":"2014-10-02T12:23:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8ebbc061-a4ff-b75b-ec42-eb17c42a2956","last_modified":1480349203341},{"guid":"{87934c42-161d-45bc-8cef-ef18abe2a30c}","prefs":[],"schema":1480349193877,"blockID":"i547","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=798621","who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is silently installed and makes various unwanted changes, in violation of the Add-on Guidelines.","name":"Ad-Aware Security Toolbar","created":"2014-01-30T12:42:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.7.9999999999","minVersion":"0","targetApplication":[]}],"id":"bcfbc502-24c2-4699-7435-e4837118f05a","last_modified":1480349203310},{"guid":"kallow@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i495","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945426","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Facebook Security Service (malware)","created":"2013-12-02T15:09:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1a2c37a9-e7cc-2d03-2043-098d36b8aca2","last_modified":1480349203247},{"guid":"support@lastpass.com","prefs":[],"schema":1480349193877,"blockID":"i1261","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289907","who":"All users who install affected versions of this add-on - beta versions 4.0 to 4.1.20a from addons.mozilla.org or lastpass.com.","why":"LastPass have announced there are security issues that would allow a malicious website to perform some actions (e.g. deleting passwords) without the user's knowledge. Beta versions 4.0 to 4.1.20a of their add-on that were available from addons.mozilla.org are affected and Lastpass also distributed these versions direct from their website.","name":"LastPass addon","created":"2016-07-29T14:17:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.1.20a","minVersion":"4.0.0a","targetApplication":[]}],"id":"ffe94023-b4aa-87ac-962c-5beabe34b1a0","last_modified":1480349203208},{"guid":"008abed2-b43a-46c9-9a5b-a771c87b82da@1ad61d53-2bdc-4484-a26b-b888ecae1906.com","prefs":[],"schema":1480349193877,"blockID":"i528","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949565","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed.","name":"weDownload Manager Pro","created":"2013-12-20T14:40:58Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"da46065f-1c68-78f7-80fc-8ae07b5df68d","last_modified":1480349203131},{"guid":"{25dd52dc-89a8-469d-9e8f-8d483095d1e8}","prefs":[],"schema":1480349193877,"blockID":"i714","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Web Counselor","created":"2014-10-01T15:36:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e46c31ad-0ab3-e48a-47aa-9fa91b675fda","last_modified":1480349203066},{"guid":"{B1FC07E1-E05B-4567-8891-E63FBE545BA8}","prefs":[],"schema":1480349193877,"blockID":"i926","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:28:46Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"09868783-261a-ac24-059d-fc772218c1ba","last_modified":1480349202708},{"guid":"/^(torntv@torntv\\.com|trtv3@trtv\\.com|torntv2@torntv\\.com|e2fd07a6-e282-4f2e-8965-85565fcb6384@b69158e6-3c3b-476c-9d98-ae5838c5b707\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i529","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949559","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by being silently installed.","name":"TornTV","created":"2013-12-20T14:46:03Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"040e5ec2-ea34-816a-f99f-93296ce845e8","last_modified":1480349202677},{"guid":"249911bc-d1bd-4d66-8c17-df533609e6d8@c76f3de9-939e-4922-b73c-5d7a3139375d.com","prefs":[],"schema":1480349193877,"blockID":"i532","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and using multiple IDs.","name":"Feven","created":"2013-12-20T15:02:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d32b850d-82d5-b63d-087c-fb2041b2c232","last_modified":1480349202631},{"guid":"thefoxonlybetter@quicksaver","prefs":[],"schema":1480349193877,"blockID":"i704","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","who":"All Firefox users who have any of these versions of the add-on installed.","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"The Fox, Only Better (malicious versions)","created":"2014-08-27T14:49:02Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"0.*","minVersion":"0","targetApplication":[]}],"id":"79ea6621-b414-17a4-4872-bfc4af7fd428","last_modified":1480349202588},{"guid":"{B40794A0-7477-4335-95C5-8CB9BBC5C4A5}","prefs":[],"schema":1480349193877,"blockID":"i429","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=899178","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that spreads spam through Facebook.","name":"Video Player 1.3 (malware)","created":"2013-07-30T14:31:17Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d98b2b76-4082-3387-ae33-971d973fa278","last_modified":1480349202541},{"guid":"firefoxaddon@youtubeenhancer.com","prefs":[],"schema":1480349193877,"blockID":"i648","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the YouTube Enhancer Plus extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube Enhancer Plus, versions between 199.7.0 and 208.7.0","created":"2014-07-10T15:12:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"208.7.0","minVersion":"199.7.0","targetApplication":[]}],"id":"7e64d7fc-ff16-8687-dbd1-bc4c7dfc5097","last_modified":1480349202462},{"guid":"addon@defaulttab.com","prefs":[],"schema":1480349193877,"blockID":"i362","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863387","who":"All users who have this add-on installed. Users who wish to enable it again can do so in the Add-ons Manager tab.","why":"Old versions of this add-on had been silently installed into users' systems, without showing the opt-in install page that is built into Firefox.","name":"Default Tab","created":"2013-06-06T12:57:29Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.4.4","minVersion":"0","targetApplication":[]}],"id":"df3fe753-5bae-bfb4-022b-6b6bfc534937","last_modified":1480349202429},{"guid":"{7D4F1959-3F72-49d5-8E59-F02F8AA6815D}","prefs":[],"schema":1480349193877,"blockID":"i394","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This is a companion add-on for the SweetPacks Toolbar which is blocked due to guideline violations.","name":"Updater By SweetPacks","created":"2013-06-25T12:40:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"851c2b8e-ea19-3a63-eac5-f931a8da5d6e","last_modified":1480349202341},{"guid":"g@uzcERQ6ko.net","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i776","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines","name":"GoSave","created":"2014-10-31T16:23:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ee1e1a44-b51b-9f12-819d-64c3e515a147","last_modified":1480349202307},{"guid":"ffxtlbr@incredibar.com","prefs":[],"schema":1480349193877,"blockID":"i318","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812264","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"IncrediBar","created":"2013-03-20T14:40:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9e84b07c-84d5-c932-85f2-589713d7e380","last_modified":1480349202280},{"guid":"M1uwW0@47z8gRpK8sULXXLivB.com","prefs":[],"schema":1480349193877,"blockID":"i870","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131159","who":"All users who have this add-on installed.","why":"This is a malicious add-on that goes by the the name \"Flash Player 11\".","name":"Flash Player 11 (malware)","created":"2015-03-04T14:34:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"71d961b2-37d1-d393-76f5-3afeef57e749","last_modified":1480349202252},{"guid":"jid1-qj0w91o64N7Eeg@jetpack","prefs":[],"schema":1480349193877,"blockID":"i650","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the YouTube ALL HTML5 extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"YouTube ALL HTML5, versions between 39.5.1 and 47.0.4","created":"2014-07-10T15:14:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"47.0.4","minVersion":"39.5.1","targetApplication":[]}],"id":"b30b1f7a-2a30-a6cd-fc20-6c9cb23c7198","last_modified":1480349202186},{"guid":"4zffxtbr-bs@VideoDownloadConverter_4z.com","prefs":[],"schema":1480349193877,"blockID":"i507","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949266","who":"All Firefox users who have this add-on installed.","why":"Certain versions of this add-on contains an executable that is flagged by multiple tools as malware. Newer versions no longer use it.","name":"VideoDownloadConverter","created":"2013-12-12T15:37:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"5.75.3.25126","minVersion":"0","targetApplication":[]}],"id":"0a0f106a-ecc6-c537-1818-b36934943e91","last_modified":1480349202156},{"guid":"hdv@vovcacik.addons.mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i656","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the High Definition Video extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"High Definition Video, version 102.0","created":"2014-07-10T15:22:59Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"102.0","minVersion":"102.0","targetApplication":[]}],"id":"972249b2-bba8-b508-2ead-c336631135ac","last_modified":1480349202125},{"guid":"@video_downloader_pro","prefs":[],"schema":1480349193877,"blockID":"i1265","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298335","who":"Users of versions of 1.2.1 to 1.2.5 inclusive.","why":"Versions 1.2.1 to 1.2.5 of Video Downloader Pro included code that violated our polices - affected versions send every visited url to a remote server without the user's consent. Versions older than 1.2.1 and more recent than 1.2.5 are okay.","name":"Video Downloader Pro","created":"2016-08-26T18:26:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.2.5","minVersion":"1.2.1","targetApplication":[]}],"id":"ff9c8def-7d50-66b4-d42a-f9a4b04bd224","last_modified":1480349202099},{"guid":"contato@facefollow.net","prefs":[],"schema":1480349193877,"blockID":"i509","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950846","who":"All Firefox users who have this add-on installed.","why":"This add-on spams users' Facebook accounts.","name":"Face follow","created":"2013-12-16T16:15:15Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"56f15747-af8c-342c-6877-a41eeacded84","last_modified":1480349202067},{"guid":"wecarereminder@bryan","prefs":[],"schema":1480349193877,"blockID":"i666","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=818614","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is being silently installed by various software packages, in violation of the Add-on Guidelines.","name":"We-Care Reminder","created":"2014-07-10T16:18:36Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"51e0ead7-144c-c1f4-32f2-25fc5fcde870","last_modified":1480349202039},{"guid":"/^({83a8ce1b-683c-4784-b86d-9eb601b59f38}|{ef1feedd-d8da-4930-96f1-0a1a598375c6}|{79ff1aae-701f-4ca5-aea3-74b3eac6f01b}|{8a184644-a171-4b05-bc9a-28d75ffc9505}|{bc09c55d-0375-4dcc-836e-0e3c8addfbda}|{cef81415-2059-4dd5-9829-1aef3cf27f4f})$/","prefs":[],"schema":1480349193877,"blockID":"i526","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and uses multiple IDs.","name":"KeyBar add-on","created":"2013-12-20T14:12:31Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9dfa4e92-bbf2-66d1-59a9-51402d1d226c","last_modified":1480349202010},{"guid":"{d9284e50-81fc-11da-a72b-0800200c9a66}","prefs":[],"schema":1480349193877,"blockID":"i806","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1106948","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable the add-on in the Add-on Manager.","why":"Starting with Firefox 34, current versions of the Yoono add-on cause all tabs to appear blank.","name":"Yoono","created":"2014-12-16T08:35:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"7.7.34","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"34.0a1"}]}],"id":"ccdceb04-3083-012f-9d9f-aac85f10b494","last_modified":1480349201976},{"guid":"{f2548724-373f-45fe-be6a-3a85e87b7711}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i768","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astro New Tab","created":"2014-10-30T14:52:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8510e9e2-c7d8-90d0-a2ff-eb09293acc6e","last_modified":1480349201854},{"guid":"KSqOiTeSJEDZtTGuvc18PdPmYodROmYzfpoyiCr2@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1032","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211172","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Video Player (malware)","created":"2015-10-05T16:22:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3d9188ac-235f-773a-52a2-261b3ea9c03c","last_modified":1480349201504},{"guid":"{849ded12-59e9-4dae-8f86-918b70d213dc}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i708","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047102","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes homepage and search settings without the user's consent, in violation of the Add-on Guidelines.","name":"Astromenda New Tab","created":"2014-09-02T16:29:08Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a319bfee-464f-1c33-61ad-738c52842fbd","last_modified":1480349201453},{"guid":"grjkntbhr@hgergerherg.com","prefs":[],"schema":1480349193877,"blockID":"i1018","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208196","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"GreenPlayer (malware)","created":"2015-09-24T16:04:53Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"9c47d940-bdd9-729f-e32e-1774d87f24b5","last_modified":1480349201425},{"guid":"quick_start@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i588","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011316","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware that is installed without user consent.","name":"Quick Start (malware)","created":"2014-06-03T15:53:15Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2affbebe-8776-3edb-28b9-237cb8b85f97","last_modified":1480349201398},{"guid":"/^(matchersite(pro(srcs?)?)?\\@matchersite(pro(srcs?)?)?\\.com)|((pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\@(pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i668","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1039892","who":"All Firefox users who have any of these add-ons installed. User who wish to continue using these add-ons can enable them in the Add-ons Manager.","why":"This is a group of add-ons that are being distributed under multiple different IDs and likely being silently installed, in violation of the Add-on Guidelines.","name":"Site Matcher","created":"2014-07-17T14:35:14Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"52e1a2de-ab35-be27-4810-334f681ccc4a","last_modified":1480349201372},{"guid":"{EEF73632-A085-4fd3-A778-ECD82C8CB297}","prefs":[],"schema":1480349193877,"blockID":"i165","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have these add-ons installed.","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing.","name":"Codec-M (malware)","created":"2012-10-29T16:41:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e5ecd02a-20ee-749b-d5cf-3d74d1173a1f","last_modified":1480349201262},{"guid":"firefox-extension@mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i688","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1049533","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hides itself under the name Java_plugin, among others.","name":"FinFisher (malware)","created":"2014-08-06T17:13:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"98aca74a-69c7-9960-cccc-096a4a4adc6c","last_modified":1480349201235},{"guid":"jid1-vW9nopuIAJiRHw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i570","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=990291","who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed, reverts settings changes to enforce its own, and is also causing stability problems in Firefox, all in violation of the Add-on Guidelines.","name":"SmileysWeLove","created":"2014-03-31T16:17:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bf2abd66-f910-650e-89aa-cd1d5c2f8a89","last_modified":1480349201204},{"guid":"87aukfkausiopoawjsuifhasefgased278djasi@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1050","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1220461","who":"All users who have this add-on installed.","why":"This is a malicious add-on that poses as a video update and hijacks Facebook accounts.","name":"Trace Video (malware)","created":"2015-11-02T14:53:21Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cb4cfac0-79c2-0fbf-206a-324aa3abbea5","last_modified":1480349201157},{"guid":"{e44a1809-4d10-4ab8-b343-3326b64c7cdd}","prefs":[],"schema":1480349193877,"blockID":"i451","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Entrusted","created":"2013-09-18T16:33:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ad5f53ed-7a43-cb1f-cbd7-41808fac1791","last_modified":1480349201128},{"guid":"{21EAF666-26B3-4A3C-ABD0-CA2F5A326744}","prefs":[],"schema":1480349193877,"blockID":"i620","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024752","who":"All Firefox users who have this add-on installed.","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the Add-on Guidelines.","name":"V-Bates","created":"2014-06-12T15:27:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2d8833db-01a7-a758-080f-19e47abc54cb","last_modified":1480349201096},{"guid":"{1FD91A9C-410C-4090-BBCC-55D3450EF433}","prefs":[],"schema":1480349193877,"blockID":"i338","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844979","who":"All Firefox users who have this add-on installed.","why":"This extension overrides search settings, and monitors any further changes done to them so that they can be reverted. This violates our add-on guidelines.","name":"DataMngr (malware)","created":"2013-04-24T11:30:28Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2e35995f-bec6-aa2b-3372-346d3325f72e","last_modified":1480349201059},{"guid":"9598582LLKmjasieijkaslesae@jetpack","prefs":[],"schema":1480349193877,"blockID":"i996","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201165","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Secure Player (malware)","created":"2015-09-07T13:50:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"52f9c6e7-f7d5-f52e-cc35-eb99ef8b4b6a","last_modified":1480349201029},{"guid":"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}","prefs":[],"schema":1480349193877,"blockID":"i406","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our Add-on Guidelines.","name":"uTorrentBar","created":"2013-06-27T10:46:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3bcefc4b-110c-f3b8-17ad-f9fc97c1120a","last_modified":1480349201000},{"guid":"{ce7e73df-6a44-4028-8079-5927a588c948}","prefs":[],"schema":1480349193877,"blockID":"i117","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781269","who":"All Firefox users who have this add-on installed.","why":"The Search By Image (by Google) extension causes very high CPU utilization during regular browsing, often damaging user experience significantly, in a way that is very difficult to associate with the extension.\r\n\r\nUsers who want to continue using the add-on regardless of its performance impact can enable it in the Add-ons Manager.","name":"Search By Image (by Google)","created":"2012-08-10T08:50:52Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0.8","minVersion":"0","targetApplication":[]}],"id":"fb1f9aed-2f1f-3e2c-705d-3b34ca9168b6","last_modified":1480349200972},{"guid":"{424b0d11-e7fe-4a04-b7df-8f2c77f58aaf}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i800","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astromenda NT","created":"2014-12-15T10:51:56Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"07bdf6aa-cfc8-ed21-6b36-6f90af02b169","last_modified":1480349200939},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i618","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:25:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.31.*","minVersion":"3.15.31","targetApplication":[]}],"id":"825feb43-d6c2-7911-4189-6f589f612c34","last_modified":1480349200911},{"guid":"{167d9323-f7cc-48f5-948a-6f012831a69f}","prefs":[],"schema":1480349193877,"blockID":"i262","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal.","name":"WhiteSmoke (malware)","created":"2013-01-29T13:33:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a8f249fe-3db8-64b8-da89-7b584337a7af","last_modified":1480349200885},{"guid":"/^({988919ff-0cd8-4d0c-bc7e-60d55a49eb64}|{494b9726-9084-415c-a499-68c07e187244}|{55b95864-3251-45e9-bb30-1a82589aaff1}|{eef3855c-fc2d-41e6-8d91-d368f51b3055}|{90a1b331-c2b4-4933-9f63-ba7b84d60d58}|{d2cf9842-af95-48cd-b873-bfbb48cd7f5e})$/","prefs":[],"schema":1480349193877,"blockID":"i541","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","who":"All Firefox users who have this add-on installed","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the Add-on Guidelines.","name":"MixiDJ (malware)","created":"2014-01-28T14:09:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"36196aed-9d0d-ebee-adf1-d1f7fadbc48f","last_modified":1480349200819},{"guid":"{29b136c9-938d-4d3d-8df8-d649d9b74d02}","prefs":[],"schema":1480349193877,"blockID":"i598","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011322","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed, in violation with our Add-on Guidelines.","name":"Mega Browse","created":"2014-06-12T13:21:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"63b1c965-27c3-cd06-1b76-8721add39edf","last_modified":1480349200775},{"guid":"{6e7f6f9f-8ce6-4611-add2-05f0f7049ee6}","prefs":[],"schema":1480349193877,"blockID":"i868","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1086574","who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of our Add-on Guidelines.","name":"Word Proser","created":"2015-02-26T14:58:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f54797da-cdcd-351a-c95e-874b64b0d226","last_modified":1480349200690},{"guid":"{02edb56b-9b33-435b-b7df-b2843273a694}","prefs":[],"schema":1480349193877,"blockID":"i438","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=896581","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"KeyBar Toolbar","created":"2013-08-09T15:27:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"896710d2-5a65-e9b0-845b-05aa72c2bd51","last_modified":1480349200338},{"guid":"{e1aaa9f8-4500-47f1-9a0a-b02bd60e4076}","prefs":[],"schema":1480349193877,"blockID":"i646","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Youtube Video Replay extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Youtube Video Replay, version 178.7.0","created":"2014-07-10T15:10:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"178.7.0","minVersion":"178.7.0","targetApplication":[]}],"id":"ac5d1083-6753-bbc1-a83d-c63c35371b22","last_modified":1480349200312},{"guid":"{1cdbda58-45f8-4d91-b566-8edce18f8d0a}","prefs":[],"schema":1480349193877,"blockID":"i724","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Counselor Pro","created":"2014-10-13T16:00:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"7b70bd36-d2f7-26fa-9038-8b8dd132cd81","last_modified":1480349200288},{"guid":"{b12785f5-d8d0-4530-a3ea-5c4263b85bef}","prefs":[],"schema":1480349193877,"blockID":"i988","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1161573","who":"All users who have this add-on installed. Those who wish continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on overrides user's preferences without consent, in violation of the Add-on Guidelines.","name":"Hero Fighter Community Toolbar","created":"2015-08-17T16:04:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3e6d73f2-e8e3-af69-866e-30d3977b09e4","last_modified":1480349200171},{"guid":"{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}","prefs":[],"schema":1480349193877,"blockID":"i39","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox.","name":"MediaBar","created":"2011-07-19T10:18:12Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.3.1.00","minVersion":"0.1","targetApplication":[]}],"id":"e928a115-9d8e-86a4-e2c7-de39627bd9bf","last_modified":1480349200047},{"guid":"{9edd0ea8-2819-47c2-8320-b007d5996f8a}","prefs":["browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i684","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033857","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is believed to be silently installed in Firefox, in violation of the Add-on Guidelines.","name":"webget","created":"2014-08-06T13:33:33Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d38561f5-370f-14be-1443-a74dad29b1f3","last_modified":1480349199962},{"guid":"/^({ad9a41d2-9a49-4fa6-a79e-71a0785364c8})|(ffxtlbr@mysearchdial\\.com)$/","prefs":["browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i670","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036740","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on has been repeatedly been silently installed into users' systems, and is known for changing the default search without user consent, in violation of the Add-on Guidelines.","name":"MySearchDial","created":"2014-07-18T15:47:35Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a04075e6-5df2-2e1f-85a6-3a0171247349","last_modified":1480349199927},{"guid":"odtffplugin@ibm.com","prefs":[],"schema":1480349193877,"blockID":"i982","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190630","who":"All users who have these versions installed. The latest versions of this add-on aren't blocked, so updating to them should be sufficient to fix this problem.","why":"Certain versions of the IBM Remote Control add-on could leave a machine vulnerable to run untrusted code.","name":"IBM Endpoint Manager for Remote Control 9.0.1.1 to 9.0.1.100","created":"2015-08-11T11:25:43Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"9.0.1.100","minVersion":"9.0.1.1","targetApplication":[]}],"id":"f6e3e5d2-9331-1097-ba4b-cf2e484b7187","last_modified":1480349199886},{"guid":"support@todoist.com","prefs":[],"schema":1480349193877,"blockID":"i1030","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205479","who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is sending all sites visited by the user to a remote server, additionally doing so in an unsafe way.","name":"Todoist","created":"2015-10-01T16:53:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.9","minVersion":"0","targetApplication":[]}],"id":"d0a84aab-0661-b3c5-c184-a2fd3f9dfb9c","last_modified":1480349199850},{"guid":"/^({1f43c8af-e9e4-4e5a-b77a-f51c7a916324}|{3a3bd700-322e-440a-8a6a-37243d5c7f92}|{6a5b9fc2-733a-4964-a96a-958dd3f3878e}|{7b5d6334-8bc7-4bca-a13e-ff218d5a3f17}|{b87bca5b-2b5d-4ae8-ad53-997aa2e238d4}|{bf8e032b-150f-4656-8f2d-6b5c4a646e0d})$/","prefs":[],"schema":1480349193877,"blockID":"i1136","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox.","name":"Watcher (malware)","created":"2016-03-04T17:56:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a2d0378f-ebe4-678c-62d8-2e4c6a613c17","last_modified":1480349199818},{"guid":"liiros@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i814","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119657","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations.","name":"One Tab (malware)","created":"2015-01-09T12:49:05Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"387c054d-cc9f-7ebd-c814-b4c1fbcb2880","last_modified":1480349199791},{"guid":"youtubeunblocker@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1128","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons.","name":"YouTube Unblocker","created":"2016-03-01T21:18:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3395fce1-42dd-e31a-1466-2da3f32456a0","last_modified":1480349199768},{"guid":"{97E22097-9A2F-45b1-8DAF-36AD648C7EF4}","prefs":[],"schema":1480349193877,"blockID":"i916","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-02T09:57:38Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"94fba774-c4e6-046a-bc7d-ede787a9d0fe","last_modified":1480349199738},{"guid":"{b64982b1-d112-42b5-b1e4-d3867c4533f8}","prefs":[],"schema":1480349193877,"blockID":"i167","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=805973","who":"All Firefox users who have this add-on installed.","why":"This add-on is a frequent cause for browser crashes and other problems.","name":"Browser Manager","created":"2012-10-29T17:17:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"00bbe501-2d27-7a1c-c344-6eea1c707473","last_modified":1480349199673},{"guid":"{58bd07eb-0ee0-4df0-8121-dc9b693373df}","prefs":[],"schema":1480349193877,"blockID":"i286","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=842206","who":"All Firefox users who have this extension installed.","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same BrowserProtect extension that is listed on our add-ons site. That one is safe to use.","name":"Browser Protect / bProtector (malware)","created":"2013-02-18T10:54:28Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b40a60d3-b9eb-09eb-bb02-d50b27aaac9f","last_modified":1480349199619},{"guid":"trtv3@trtv.com","prefs":[],"schema":1480349193877,"blockID":"i465","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","who":"All Firefox users who have this add-on installed.","why":"This add-on doesn't follow our Add-on Guidelines, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager.","name":"TornTV","created":"2013-11-01T15:21:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3d4d8a33-2eff-2556-c699-9be0841a8cd4","last_modified":1480349199560},{"guid":"youtube@downloader.yt","prefs":[],"schema":1480349193877,"blockID":"i1231","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1278932","who":"All users who have this add-on installed.","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that can being exploited through this website (downloader.yt) to change security settings in Firefox and/or install malicious add-ons. \r\n","name":"YouTube downloader","created":"2016-06-09T14:50:27Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8514eaee-850c-e27a-a058-8badeeafc26e","last_modified":1480349199528},{"guid":"low_quality_flash@pie2k.com","prefs":[],"schema":1480349193877,"blockID":"i658","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the Low Quality Flash extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"Low Quality Flash, versions between 46.2 and 47.1","created":"2014-07-10T15:27:51Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"47.1","minVersion":"46.2","targetApplication":[]}],"id":"b869fae6-c18c-0d39-59a2-603814656404","last_modified":1480349199504},{"guid":"{d2cf9842-af95-48cd-b873-bfbb48cd7f5e}","prefs":[],"schema":1480349193877,"blockID":"i439","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902569","who":"All Firefox users who have this add-on installed.","why":"This is another instance of the previously blocked Mixi DJ add-on, which doesn't follow our Add-on Guidelines. If you wish to continue using it, it can be enabled in the Add-ons Manager.","name":"Mixi DJ V45","created":"2013-08-09T16:08:18Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e81c31fc-265e-61b9-d4c1-0e2f31f1652e","last_modified":1480349199478},{"guid":"/^({b95faac1-a3d7-4d69-8943-ddd5a487d966}|{ecce0073-a837-45a2-95b9-600420505f7e}|{2713b394-286f-4d7c-89ea-4174eeab9f5a}|{da7a20cf-bef4-4342-ad78-0240fdf87055})$/","prefs":[],"schema":1480349193877,"blockID":"i624","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the Add-on Guidelines.\r\n","name":"WiseConvert","created":"2014-06-18T13:50:38Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ed57d7a6-5996-c7da-8e07-1ad125183e84","last_modified":1480349199446},{"guid":"{f894a29a-f065-40c3-bb19-da6057778493}","prefs":[],"schema":1480349193877,"blockID":"i742","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the Add-on Guidelines.","name":"Spigot Shopping Assistant","created":"2014-10-17T15:46:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"39d8334e-4b7c-4336-2d90-e6aa2d783967","last_modified":1480349199083},{"guid":"plugin@analytic-s.com","prefs":[],"schema":1480349193877,"blockID":"i467","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935797","who":"All Firefox users who have this add-on installed.","why":"This add-on bypasses the external install opt in screen in Firefox, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Analytics","created":"2013-11-07T14:08:48Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ffbed3f3-e5c9-bc6c-7530-f68f47b7efd6","last_modified":1480349199026},{"guid":"{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}","prefs":[],"schema":1480349193877,"blockID":"i678","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=895668","who":"All Firefox users who have this add-on installed. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on is generally silently installed, in violation of the Add-on Guidelines.","name":"DataMngr","created":"2014-07-23T14:12:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"151021fc-ce4e-a734-e075-4ece19610f64","last_modified":1480349198947},{"guid":"HxLVJK1ioigz9WEWo8QgCs3evE7uW6LEExAniBGG@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1036","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211170","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Mega Player (malware)","created":"2015-10-05T16:37:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"32e34b41-a73c-72d4-c96c-136917ad1d4d","last_modified":1480349198894},{"guid":"{6af08a71-380e-42dd-9312-0111d2bc0630}","prefs":[],"schema":1480349193877,"blockID":"i822","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1126353","who":"All Firefox users who have this add-on installed.","why":"This add-on appears to be malware, hiding itself in the Add-ons Manager, and keeping track of certain user actions.","name":"{6af08a71-380e-42dd-9312-0111d2bc0630} (malware)","created":"2015-01-27T09:50:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"96d0c12b-a6cf-4539-c1cf-a1c75c14ff24","last_modified":1480349198826},{"guid":"colmer@yopmail.com","prefs":[],"schema":1480349193877,"blockID":"i550","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=968445","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook accounts.","name":"Video Plugin Facebook (malware)","created":"2014-02-06T15:49:25Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c394d10b-384e-cbd0-f357-9c521715c373","last_modified":1480349198744},{"guid":"fplayer@adobe.flash","prefs":[],"schema":1480349193877,"blockID":"i444","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=909433","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware disguised as the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-08-26T14:49:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c6557989-1b59-72a9-da25-b816c4a4c723","last_modified":1480349198667},{"guid":"ascsurfingprotection@iobit.com","prefs":[],"schema":1480349193877,"blockID":"i740","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963776","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Advanced SystemCare Surfing Protection","created":"2014-10-17T15:39:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4405f99d-c9b7-c496-1b45-268163ce29b7","last_modified":1480349198637},{"guid":"{6E19037A-12E3-4295-8915-ED48BC341614}","prefs":[],"schema":1480349193877,"blockID":"i24","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=615518","who":"Users of RelevantKnowledge version 1.3.328.4 and older in Firefox 4 and later.","why":"This add-on causes a high volume of Firefox crashes.","name":"comScore RelevantKnowledge","created":"2011-03-02T17:42:56Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.3.328.4","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1pre"}]}],"id":"7c189c5e-f95b-0aef-e9e3-8e879336503b","last_modified":1480349198606},{"guid":"crossriderapp4926@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i91","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=754648","who":"All Firefox users who have installed this add-on.","why":"Versions of this add-on prior to 0.81.44 automatically post message to users' walls and hide them from their view. Version 0.81.44 corrects this.","name":"Remove My Timeline (malware)","created":"2012-05-14T14:16:43Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.81.43","minVersion":"0","targetApplication":[]}],"id":"5ee3e72e-96fb-c150-fc50-dd581e960963","last_modified":1480349198547},{"guid":"/^(93abedcf-8e3a-4d02-b761-d1441e437c09@243f129d-aee2-42c2-bcd1-48858e1c22fd\\.com|9acfc440-ac2d-417a-a64c-f6f14653b712@09f9a966-9258-4b12-af32-da29bdcc28c5\\.com|58ad0086-1cfb-48bb-8ad2-33a8905572bc@5715d2be-69b9-4930-8f7e-64bdeb961cfd\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i544","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","why":"This add-on is in violation of the Add-on Guidelines, using multiple add-on IDs and potentially doing other unwanted activities.","name":"SuperLyrics","created":"2014-01-30T11:51:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d8d25967-9814-3b65-0787-a0525c16e11e","last_modified":1480349198510},{"guid":"wHO@W9.net","prefs":[],"schema":1480349193877,"blockID":"i980","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1192468","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"BestSavEFOrYoU (malware)","created":"2015-08-11T11:20:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4beb917f-68f2-1f91-beed-dff6d83006f8","last_modified":1480349198483},{"guid":"frhegnejkgner@grhjgewfewf.com","prefs":[],"schema":1480349193877,"blockID":"i1040","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212451","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Async Codec (malware)","created":"2015-10-07T13:03:37Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fb6ab4ce-5517-bd68-2cf7-a93a109a528a","last_modified":1480349198458},{"guid":"firefox@luckyleap.net","prefs":[],"schema":1480349193877,"blockID":"i471","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:33Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3a9e04c7-5e64-6297-8442-2816915aad77","last_modified":1480349198433},{"guid":"auto-plugin-checker@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1210","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on reports every visited URL to a third party without disclosing it to the user.","name":"auto-plugin-checker","created":"2016-05-04T16:25:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3e202419-5318-2025-b579-c828af24a06e","last_modified":1480349198401},{"guid":"lugcla21@gmail.com","prefs":[],"schema":1480349193877,"blockID":"i432","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902072","who":"All Firefox users who have this add-on installed.","why":"This add-on includes malicious code that spams users' Facebook accounts with unwanted messages.","name":"FB Color Changer (malware)","created":"2013-08-06T13:16:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b6943f35-9429-1f8e-bf8e-fe37979fe183","last_modified":1480349198372},{"guid":"{99079a25-328f-4bd4-be04-00955acaa0a7}","prefs":[],"schema":1480349193877,"blockID":"i402","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our Add-on Guidelines.","name":"Searchqu","created":"2013-06-25T15:16:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"16008331-8b47-57c8-a6f7-989914d1cb8a","last_modified":1480349198341},{"guid":"{81b13b5d-fba1-49fd-9a6b-189483ac548a}","prefs":[],"schema":1480349193877,"blockID":"i473","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:43Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"76debc7b-b875-6da4-4342-1243cbe437f6","last_modified":1480349198317},{"guid":"{e935dd68-f90d-46a6-b89e-c4657534b353}","prefs":[],"schema":1480349193877,"blockID":"i732","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Sites Pro","created":"2014-10-16T16:38:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"97fdc235-ac1a-9f20-1b4a-17c2f0d89ad1","last_modified":1480349198260},{"guid":"{32da2f20-827d-40aa-a3b4-2fc4a294352e}","prefs":[],"schema":1480349193877,"blockID":"i748","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Start Page","created":"2014-10-17T16:02:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6c980c8e-4a3c-7912-4a3a-80add457575a","last_modified":1480349198223},{"guid":"chinaescapeone@facebook.com","prefs":[],"schema":1480349193877,"blockID":"i431","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks.","name":"F-Secure Security Pack (malware)","created":"2013-08-05T16:43:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fbd89a9d-9c98-8481-e4cf-93e327ca8be1","last_modified":1480349198192},{"guid":"{cc6cc772-f121-49e0-b1f0-c26583cb0c5e}","prefs":[],"schema":1480349193877,"blockID":"i716","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Website Counselor","created":"2014-10-02T12:12:34Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"debcd28c-884b-ca42-d983-6fabf91034dd","last_modified":1480349198148},{"guid":"{906000a4-88d9-4d52-b209-7a772970d91f}","prefs":[],"schema":1480349193877,"blockID":"i474","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","who":"All Firefox users who have this add-on installed.","why":"This add-on is part of a malicious Firefox installer bundle.","name":"Installer bundle (malware)","created":"2013-11-07T15:38:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"326d05b9-ace7-67c6-b094-aad926c185a5","last_modified":1480349197744},{"guid":"{A34CAF42-A3E3-11E5-945F-18C31D5D46B0}","prefs":["security.csp.enable","security.fileuri.strict_origin_policy","security.mixed_content.block_active_content"],"schema":1480349193877,"blockID":"i1227","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1274995","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on downgrades the security of all iframes from https to http and changes important Firefox security preferences.","name":"Mococheck WAP browser","created":"2016-05-31T15:45:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2230a5ce-a8f8-a20a-7974-3b960a03aba9","last_modified":1480349197699},{"guid":"{AB2CE124-6272-4b12-94A9-7303C7397BD1}","prefs":[],"schema":1480349193877,"blockID":"i20","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","who":"Users of Skype extension versions below 5.2.0.7165 for all versions of Firefox.","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please update to the latest version. For more information, please read our announcement.","name":"Skype extension","created":"2011-01-20T18:39:25Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"5.2.0.7164","minVersion":"0.1","targetApplication":[]}],"id":"60e16015-1803-197a-3241-484aa961d18f","last_modified":1480349197667},{"guid":"f6682b47-e12f-400b-9bc0-43b3ccae69d1@39d6f481-b198-4349-9ebe-9a93a86f9267.com","prefs":[],"schema":1480349193877,"blockID":"i682","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1043017","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is being silently installed, in violation of the Add-on Guidelines.","name":"enformation","created":"2014-08-04T16:07:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a7ae65cd-0869-67e8-02f8-6d22c56a83d4","last_modified":1480349197636},{"guid":"rally_toolbar_ff@bulletmedia.com","prefs":[],"schema":1480349193877,"blockID":"i537","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950267","who":"All Firefox users who have this extension installed. If you want to continue using it, you can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by silently installing it.","name":"Rally Toolbar","created":"2014-01-23T15:51:48Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4ac6eb63-b51a-3296-5b02-bae77f424032","last_modified":1480349197604},{"guid":"x77IjS@xU.net","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i774","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed and changes user settings without consent, in violation of the Add-on Guidelines\r\n","name":"YoutubeAdBlocke","created":"2014-10-31T16:22:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"4771da14-bcf2-19b1-3d71-bc61a1c7d457","last_modified":1480349197578},{"guid":"{49c53dce-afa0-49a1-a08b-2eb8e8444128}","prefs":[],"schema":1480349193877,"blockID":"i441","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844985","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed, violating our Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"ytbyclick","created":"2013-08-09T16:58:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5f08d720-58c2-6acb-78ad-7af45c82c90b","last_modified":1480349197550},{"guid":"searchengine@gmail.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i886","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152555","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the Add-on Guidelines.","name":"Search Enginer","created":"2015-04-10T16:25:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"46de4f6e-2b29-7334-ebbb-e0048f114f7b","last_modified":1480349197525},{"guid":"{bb7b7a60-f574-47c2-8a0b-4c56f2da9802}","prefs":[],"schema":1480349193877,"blockID":"i754","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080850","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"AdvanceElite","created":"2014-10-17T16:27:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f222ceb2-9b69-89d1-8dce-042d8131a12e","last_modified":1480349197500},{"guid":"/^(test3@test.org|test2@test.org|test@test.org|support@mozilla.org)$/","prefs":[],"schema":1480349193877,"blockID":"i1119","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1242721","who":"All users who have these add-ons installed.","why":"These add-ons are malicious, or at least attempts at being malicious, using misleading names and including risky code.","name":"test.org add-ons (malware)","created":"2016-01-25T13:31:43Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"afd2a0d7-b050-44c9-4e45-b63696d9b22f","last_modified":1480349197468},{"guid":"/^((34qEOefiyYtRJT@IM5Munavn\\.com)|(Mro5Fm1Qgrmq7B@ByrE69VQfZvZdeg\\.com)|(KtoY3KGxrCe5ie@yITPUzbBtsHWeCdPmGe\\.com)|(9NgIdLK5Dq4ZMwmRo6zk@FNt2GCCLGyUuOD\\.com)|(NNux7bWWW@RBWyXdnl6VGls3WAwi\\.com)|(E3wI2n@PEHTuuNVu\\.com)|(2d3VuWrG6JHBXbQdbr@3BmSnQL\\.com))$/","prefs":[],"schema":1480349193877,"blockID":"i324","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","who":"All users who have this add-on installed.","why":"This extension is malware, installed pretending to be the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-03-22T14:48:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5be3a399-af3e-644e-369d-628273b3fdc2","last_modified":1480349197432},{"guid":"axtara__web@axtara.com","prefs":[],"schema":1480349193877,"blockID":"i1263","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have version 1.1.1 or less of this add-on installed.","why":"Old versions of this add-on contained code from YouTube Unblocker, which was originally blocked due to malicious activity. Version 1.1.2 is now okay.","name":"AXTARA Search (pre 1.1.2)","created":"2016-08-17T16:47:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"1.1.1","minVersion":"0","targetApplication":[]}],"id":"c58be1c9-3d63-a948-219f-e3225e1eec8e","last_modified":1480349197404},{"guid":"{8f894ed3-0bf2-498e-a103-27ef6e88899f}","prefs":[],"schema":1480349193877,"blockID":"i792","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"ExtraW","created":"2014-11-26T13:49:30Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bebc9e15-59a1-581d-0163-329d7414edff","last_modified":1480349197368},{"guid":"profsites@pr.com","prefs":[],"schema":1480349193877,"blockID":"i734","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.\r\n","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"ProfSites","created":"2014-10-16T16:39:26Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0d6d84d7-0b3f-c5ab-57cc-6b66b0775a23","last_modified":1480349197341},{"guid":"{872b5b88-9db5-4310-bdd0-ac189557e5f5}","prefs":[],"schema":1480349193877,"blockID":"i497","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making settings changes that can't be easily reverted.","name":"DVDVideoSoft Menu","created":"2013-12-03T16:08:09Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e8da89c4-c585-77e4-9872-591d20723a7e","last_modified":1480349197240},{"guid":"123456789@offeringmedia.com","prefs":[],"schema":1480349193877,"blockID":"i664","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin.","name":"Taringa MP3 / Adobe Flash","created":"2014-07-10T15:41:24Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6d0a7dda-d92a-c8e2-21be-c92b0a88ac8d","last_modified":1480349197208},{"guid":"firefoxdav@icloud.com","prefs":[],"schema":1480349193877,"blockID":"i1214","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1271358","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on is causing frequent and persistent crashing.","name":"iCloud Bookmarks","created":"2016-05-17T16:55:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.4.22","minVersion":"0","targetApplication":[]}],"id":"2dddd7a7-b081-45e2-3eeb-2a7f76a1465f","last_modified":1480349197172},{"guid":"youplayer@addons.mozilla.org","prefs":[],"schema":1480349193877,"blockID":"i660","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","who":"All Firefox users who have this version of the add-on installed.","why":"Certain versions of the YouPlayer extension weren't developed by the original developer, and are likely malicious in nature. This violates the Add-on Guidelines for reusing an already existent ID.","name":"YouPlayer, versions between 79.9.8 and 208.0.1","created":"2014-07-10T15:31:04Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"208.0.1","minVersion":"79.9.8","targetApplication":[]}],"id":"82dca22b-b889-5d9d-3fc9-b2184851f2d1","last_modified":1480349197136},{"guid":"{df6bb2ec-333b-4267-8c4f-3f27dc8c6e07}","prefs":[],"schema":1480349193877,"blockID":"i487","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940681","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Facebook 2013 (malware)","created":"2013-11-19T14:59:45Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5867c409-b342-121e-3c3b-426e2f0ba1d4","last_modified":1480349197109},{"guid":"/^({4e988b08-8c51-45c1-8d74-73e0c8724579}|{93ec97bf-fe43-4bca-a735-5c5d6a0a40c4}|{aed63b38-7428-4003-a052-ca6834d8bad3}|{0b5130a9-cc50-4ced-99d5-cda8cc12ae48}|{C4CFC0DE-134F-4466-B2A2-FF7C59A8BFAD})$/","prefs":[],"schema":1480349193877,"blockID":"i524","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"SweetPacks","created":"2013-12-20T13:43:21Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1a3a26a2-cdaa-e5ba-f6ac-47b98ae2cc26","last_modified":1480349197082},{"guid":"foxyproxy@eric.h.jung","prefs":[],"schema":1480349193877,"blockID":"i950","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","who":"All users who have this add-on installed on Thunderbird 38 and above.","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above.","name":"FoxyProxy Standard for Thunderbird","created":"2015-07-15T09:34:44Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"4.5.5","minVersion":"0","targetApplication":[{"guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*","minVersion":"38.0a2"},{"guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*","minVersion":"2.35"}]}],"id":"5ee8203d-bea2-6cd5-9ba0-d1922ffb3d21","last_modified":1480349197056},{"guid":"{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}","prefs":[],"schema":1480349193877,"blockID":"i1056","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1225639","who":"All users who have this add-on installed in Firefox 43 and above. User who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is associated with frequent shutdown crashes in Firefox.","name":"Skype Click to Call","created":"2015-11-17T14:03:05Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"7.5.0.9082","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"43.0a1"}]}],"id":"484f8386-c415-7499-a8a0-f4e16f5a142f","last_modified":1480349197027},{"guid":"{22119944-ED35-4ab1-910B-E619EA06A115}","prefs":[],"schema":1480349193877,"blockID":"i45","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=699134","who":"Users of version 7.9.20.6 of RoboForm Toolbar and earlier on Firefox 48 and above.","why":"Older versions of the RoboForm Toolbar add-on are causing crashes in Firefox 48 and above. The developer has released a fix, available in versions 7.9.21+.","name":"Roboform","created":"2011-11-19T06:14:56Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"7.9.20.6","minVersion":"0.1","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"8.0a1"}]}],"id":"5f7f9e13-d3e8-ea74-8341-b83e36d67d94","last_modified":1480349196995},{"guid":"{87b5a11e-3b54-42d2-9102-0a7cb1f79ebf}","prefs":[],"schema":1480349193877,"blockID":"i838","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"Cyti Web (malware)","created":"2015-02-06T14:29:12Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1ba0e57c-4c0c-4eb6-26e7-c2016769c343","last_modified":1480349196965},{"guid":"/^({bf67a47c-ea97-4caf-a5e3-feeba5331231}|{24a0cfe1-f479-4b19-b627-a96bf1ea3a56})$/","prefs":[],"schema":1480349193877,"blockID":"i542","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","who":"All Firefox users who have this add-on installed.","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the Add-on Guidelines.","name":"MixiDJ (malware)","created":"2014-01-28T14:10:49Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fc442b64-1b5d-bebb-c486-f431b154f3db","last_modified":1480349196622},{"guid":"/^({ebd898f8-fcf6-4694-bc3b-eabc7271eeb1}|{46008e0d-47ac-4daa-a02a-5eb69044431a}|{213c8ed6-1d78-4d8f-8729-25006aa86a76}|{fa23121f-ee7c-4bd8-8c06-123d087282c5}|{19803860-b306-423c-bbb5-f60a7d82cde5})$/","prefs":[],"schema":1480349193877,"blockID":"i622","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the Add-on Guidelines.","name":"WiseConvert","created":"2014-06-18T13:48:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"ffd184fa-aa8f-8a75-ff00-ce285dec5b22","last_modified":1480349196597},{"guid":"/^({fa95f577-07cb-4470-ac90-e843f5f83c52}|ffxtlbr@speedial\\.com)$/","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i696","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1031115","who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using these add-ons can enable them in the Add-ons Manager.","why":"These add-ons are silently installed and change homepage and search defaults without user consent, in violation of the Add-on Guidelines. They are also distributed under more than one add-on ID.","name":"Speedial","created":"2014-08-21T13:55:41Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"130c7419-f727-a2fb-3891-627bc69a43bb","last_modified":1480349196565},{"guid":"pennerdu@faceobooks.ws","prefs":[],"schema":1480349193877,"blockID":"i442","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=904050","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that hijacks Facebook accounts.","name":"Console Video (malware)","created":"2013-08-13T14:00:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"fb83e48e-a780-9d06-132c-9ecc65b43674","last_modified":1480349196541},{"guid":"anttoolbar@ant.com","prefs":[],"schema":1480349193877,"blockID":"i88","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748269","who":"All Firefox users who have installed version 2.4.6.4 of the Ant Video Downloader and Player add-on.","why":"Version 2.4.6.4 of the Ant Video Downloader and Player add-on is causing a very high number of crashes in Firefox. There's an updated version 2.4.6.5 that doesn't have this problem. All users are recommended to update as soon as possible.","name":"Ant Video Downloader and Player","created":"2012-05-01T10:32:11Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"2.4.6.4","minVersion":"2.4.6.4","targetApplication":[]}],"id":"9eef435b-39d4-2b73-0810-44b0d3ff52ad","last_modified":1480349196509},{"guid":"{E90FA778-C2B7-41D0-9FA9-3FEC1CA54D66}","prefs":[],"schema":1480349193877,"blockID":"i446","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","why":"This add-on is installed silently, in violation of our Add-on Guidelines.","name":"YouTube to MP3 Converter","created":"2013-09-06T15:59:29Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"83eb6337-a3b6-84e4-e76c-ee9200b80796","last_modified":1480349196471},{"guid":"{ad7ce998-a77b-4062-9ffb-1d0b7cb23183}","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i804","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and is considered malware, in violation of the Add-on Guidelines.","name":"Astromenda Search Addon","created":"2014-12-15T10:53:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"633f9999-c81e-bd7a-e756-de7d34feb39d","last_modified":1480349196438},{"guid":"{52b0f3db-f988-4788-b9dc-861d016f4487}","prefs":[],"schema":1480349193877,"blockID":"i584","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","why":"Versions of this add-on are silently installed by the Free Driver Scout installer, in violation of our Add-on Guidelines.","name":"Web Check (Free Driver Scout bundle)","created":"2014-05-22T11:07:00Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"0.1.9999999","minVersion":"0","targetApplication":[]}],"id":"cba0ac44-90f9-eabb-60b0-8da2b645e067","last_modified":1480349196363},{"guid":"dodatek@flash2.pl","prefs":[],"schema":1480349193877,"blockID":"i1279","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","who":"Any user with version 1.3 or newer of this add-on installed.","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server.","name":"Aktualizacja Flash WORK addon","created":"2016-10-27T15:52:00Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"1.3","targetApplication":[]}],"id":"2dab5211-f9ec-a1bf-c617-6f94f28b5ee1","last_modified":1480349196331},{"guid":"{2d069a16-fca1-4e81-81ea-5d5086dcbd0c}","prefs":[],"schema":1480349193877,"blockID":"i440","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903647","who":"All Firefox users who have this add-on installed.","why":"This add-on is installed silently and doesn't follow many other of the Add-on Guidelines. If you want to continue using this add-on, you can enable it in the Add-ons Manager.","name":"GlitterFun","created":"2013-08-09T16:26:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e3f77f3c-b1d6-3b29-730a-846007b9cb16","last_modified":1480349196294},{"guid":"xivars@aol.com","prefs":[],"schema":1480349193877,"blockID":"i501","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946420","who":"All Firefox users who have this add-on installed.","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts.","name":"Video Plugin Facebook (malware)","created":"2013-12-04T15:34:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3303d201-7006-3c0d-5fd5-45503e2e690c","last_modified":1480349196247},{"guid":"2bbadf1f-a5af-499f-9642-9942fcdb7c76@f05a14cc-8842-4eee-be17-744677a917ed.com","prefs":[],"schema":1480349193877,"blockID":"i700","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052599","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is widely considered malware and is apparently installed silently into users' systems, in violation of the Add-on Guidelines.","name":"PIX Image Viewer","created":"2014-08-21T16:15:16Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1b72889b-90e6-ea58-4fe8-d48257df7d8b","last_modified":1480349196212},{"guid":"/^[0-9a-f]+@[0-9a-f]+\\.info/","prefs":[],"schema":1480349193877,"blockID":"i256","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","who":"All Firefox users who have installed any of these add-ons.","why":"The set of extensions labeled as Codec, Codec-M, Codec-C and other names are malware being distributed as genuine add-ons.\r\n\r\nIf you think an add-on you installed was incorrectly blocked and the block dialog pointed you to this page, please comment on this blog post.","name":"Codec extensions (malware)","created":"2013-01-22T12:16:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"0c654540-00f2-0ad4-c9be-7ca2ace5341e","last_modified":1480349196184},{"guid":"toolbar@ask.com","prefs":[],"schema":1480349193877,"blockID":"i600","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.","name":"Ask Toolbar (old Avira Security Toolbar bundle)","created":"2014-06-12T14:16:08Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"3.15.5.*","minVersion":"3.15.5","targetApplication":[]}],"id":"51c4ab3b-9ad3-c5c3-98c8-a220025fc5a3","last_modified":1480349196158},{"guid":"{729c9605-0626-4792-9584-4cbe65b243e6}","prefs":[],"schema":1480349193877,"blockID":"i788","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Browser Ext Assistance","created":"2014-11-20T10:07:19Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3c588238-2501-6a53-65ea-5c8ff0f3e51d","last_modified":1480349196123},{"guid":"unblocker20__web@unblocker.yt","prefs":[],"schema":1480349193877,"blockID":"i1213","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"This add-on is a copy of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker 2.0","created":"2016-05-09T17:28:18Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"de305335-e9f3-f410-cf5c-f88b7ad4b088","last_modified":1480349196088},{"guid":"webbooster@iminent.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i630","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the Add-on Guidelines.","name":"Iminent Minibar","created":"2014-06-26T15:49:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d894ea79-8215-7a0c-b0e9-be328c3afceb","last_modified":1480349196032},{"guid":"jid1-uabu5A9hduqzCw@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1016","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208051","who":"All users who have this add-on installed.","why":"This add-on is injecting unwanted and unexpected advertisements into all web pages, and masking this behavior as ad-blocking in its code.","name":"SpeedFox (malware)","created":"2015-09-24T09:49:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"31397419-3dfa-9db3-f1aa-e812d4220669","last_modified":1480349196001},{"guid":"/^firefox@(jumpflip|webconnect|browsesmart|mybuzzsearch|outobox|greygray|lemurleap|divapton|secretsauce|batbrowse|whilokii|linkswift|qualitink|browsefox|kozaka|diamondata|glindorus|saltarsmart|bizzybolt|websparkle)\\.(com?|net|org|info|biz)$/","prefs":[],"schema":1480349193877,"blockID":"i548","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the Add-on Guidelines.","name":"Yontoo add-ons","created":"2014-01-30T15:06:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bfaf3510-397e-48e6-cc4f-74202aaaed54","last_modified":1480349195955},{"guid":"firefox@bandoo.com","prefs":[],"schema":1480349193877,"blockID":"i23","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629634","who":"Users of Bandoo version 5.0 for Firefox 3.6 and later.","why":"This add-on causes a high volume of Firefox crashes.","name":"Bandoo","created":"2011-03-01T23:30:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"5.0","minVersion":"5.0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"3.7a1pre"}]}],"id":"bd487cf4-3f6a-f956-a6e9-842ac8deeac5","last_modified":1480349195915},{"guid":"5nc3QHFgcb@r06Ws9gvNNVRfH.com","prefs":[],"schema":1480349193877,"blockID":"i372","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=875752","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware pretending to be the Flash Player plugin.","name":"Flash Player 11 (malware)","created":"2013-06-18T13:23:40Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"dc71fcf5-fae4-5a5f-6455-ca7bbe4202db","last_modified":1480349195887},{"guid":"/^(7tG@zEb\\.net|ru@gfK0J\\.edu)$/","prefs":[],"schema":1480349193877,"blockID":"i854","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952255","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"youtubeadblocker (malware)","created":"2015-02-09T15:41:36Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"cfe42207-67a9-9b88-f80c-994e6bdd0c55","last_modified":1480349195851},{"guid":"{a7aae4f0-bc2e-a0dd-fb8d-68ce32c9261f}","prefs":[],"schema":1480349193877,"blockID":"i378","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=865090","who":"All Firefox users who have installed this add-on.","why":"This extension is malware that hijacks Facebook accounts for malicious purposes.","name":"Myanmar Extension for Facebook (malware)","created":"2013-06-18T15:58:54Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"30ecd9b9-4023-d9ef-812d-f1a75bb189b0","last_modified":1480349195823},{"guid":"a88a77ahjjfjakckmmabsy278djasi@jetpack","prefs":[],"schema":1480349193877,"blockID":"i1034","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211171","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Fast Unlock (malware)","created":"2015-10-05T16:28:48Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f801f112-3e8f-770f-10db-384349a36026","last_modified":1480349195798},{"guid":"crossriderapp5060@crossrider.com","prefs":[],"schema":1480349193877,"blockID":"i228","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=810016","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently side-installed by other software, and it overrides user preferences and inserts advertisements in web content.","name":"Savings Sidekick","created":"2012-11-29T16:31:13Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a37f76ac-7b77-b5a3-bac8-addaacf34bae","last_modified":1480349195769},{"guid":"/^(saamazon@mybrowserbar\\.com)|(saebay@mybrowserbar\\.com)$/","prefs":[],"schema":1480349193877,"blockID":"i672","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011337","who":"All Firefox users who have these add-ons installed. Users wishing to continue using these add-ons can enable them in the Add-ons Manager.","why":"These add-ons are being silently installed, in violation of the Add-on Guidelines.","name":"Spigot Shopping Assistant","created":"2014-07-22T15:13:57Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e072a461-ee5a-c83d-8d4e-5686eb585a15","last_modified":1480349195347},{"guid":"{b99c8534-7800-48fa-bd71-519a46cdc7e1}","prefs":[],"schema":1480349193877,"blockID":"i596","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011325","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed, in violation with our Add-on Guidelines.","name":"BrowseMark","created":"2014-06-12T13:19:59Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f411bb0f-7c82-9061-4a80-cabc8ff45beb","last_modified":1480349195319},{"guid":"/^({94d62e35-4b43-494c-bf52-ba5935df36ef}|firefox@advanceelite\\.com|{bb7b7a60-f574-47c2-8a0b-4c56f2da9802})$/","prefs":[],"schema":1480349193877,"blockID":"i856","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130323","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"AdvanceElite (malware)","created":"2015-02-09T15:51:11Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e3d52650-d3e2-4cef-71f7-e6188f56fe4d","last_modified":1480349195286},{"guid":"{458fb825-2370-4973-bf66-9d7142141847}","prefs":["app.update.auto","app.update.enabled","app.update.interval","app.update.url"],"schema":1480349193877,"blockID":"i1024","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1209588","who":"All users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on hides itself in the Add-ons Manager, interrupts the Firefox update process, and reportedly causes other problems to users, in violation of the Add-on Guidelines.","name":"Web Shield","created":"2015-09-29T09:25:27Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"32c5baa7-d547-eaab-302d-b873c83bfe2d","last_modified":1480349195258},{"guid":"{f2456568-e603-43db-8838-ffa7c4a685c7}","prefs":[],"schema":1480349193877,"blockID":"i778","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Sup-SW","created":"2014-11-07T13:53:13Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"93568fa2-0cb7-4e1d-e893-d7261e81547c","last_modified":1480349195215},{"guid":"{77BEC163-D389-42c1-91A4-C758846296A5}","prefs":[],"schema":1480349193877,"blockID":"i566","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964594","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-on Manager.","why":"This add-on is silently installed into Firefox, in violation of the Add-on Guidelines.","name":"V-Bates","created":"2014-03-05T13:20:54Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"080edbac-25d6-e608-abdd-feb1ce7a9a77","last_modified":1480349195185},{"guid":"helper@vidscrab.com","prefs":[],"schema":1480349193877,"blockID":"i1077","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1231010","who":"All Firefox users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","why":"This add-on injects remote scripts and injects unwanted content into web pages.","name":"YouTube Video Downloader (from AddonCrop)","created":"2016-01-14T14:32:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"36b2e1e0-5fda-bde3-db55-dfcbe24dfd04","last_modified":1480349195157},{"guid":"/^ext@WebexpEnhancedV1alpha[0-9]+\\.net$/","prefs":[],"schema":1480349193877,"blockID":"i535","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952717","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","why":"This add-on is generally unwanted by users and uses multiple random IDs in violation of the Add-on Guidelines.","name":"Webexp Enhanced","created":"2014-01-09T11:22:19Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c7d6a30d-f3ee-40fb-5256-138dd4593a61","last_modified":1480349195123},{"guid":"jid1-XLjasWL55iEE1Q@jetpack","prefs":[],"schema":1480349193877,"blockID":"i578","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002037","who":"All Firefox users who have this add-on installed.","why":"This is a malicious add-on that presents itself as \"Flash Player\" but is really injecting unwanted content into Facebook pages.","name":"Flash Player (malware)","created":"2014-04-28T16:25:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"1e75b2f0-02fc-77a4-ad2f-52a4caff1a71","last_modified":1480349195058},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","prefs":[],"schema":1480349193877,"blockID":"i142","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=792132","who":"Todos los usuarios de Firefox que instalaron la versi\u00f3n 4.2 del complemento Cuevana Stream.\r\n\r\nAll Firefox users who have installed version 4.2 of the Cuevana Stream add-on.","why":"Espa\u00f1ol\r\nUna versi\u00f3n maliciosa del complemento Cuevana Stream (4.2) fue colocada en el sitio Cuevana y distribuida a muchos usuarios del sitio. Esta versi\u00f3n recopila informaci\u00f3n de formularios web y los env\u00eda a una direcci\u00f3n remota con fines maliciosos. Se le recomienda a todos los usuarios que instalaron esta versi\u00f3n que cambien sus contrase\u00f1as inmediatamente, y que se actualicen a la nueva versi\u00f3n segura, que es la 4.3.\r\n\r\nEnglish\r\nA malicious version of the Cuevana Stream add-on (4.2) was uploaded to the Cuevana website and distributed to many of its users. This version takes form data and sends it to a remote location with malicious intent. It is recommended that all users who installed this version to update their passwords immediately, and update to the new safe version, version 4.3.\r\n\r\n","name":"Cuevana Stream (malicious version)","created":"2012-09-18T13:37:47Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"4.2","minVersion":"4.2","targetApplication":[]}],"id":"91e551b9-7e94-60e2-f1bd-52f25844ab16","last_modified":1480349195007},{"guid":"{34712C68-7391-4c47-94F3-8F88D49AD632}","prefs":[],"schema":1480349193877,"blockID":"i922","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n","name":"RealPlayer Browser Record Plugin","created":"2015-06-09T15:27:31Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"39.0a1"}]}],"id":"dd350efb-34ac-2bb5-5afd-eed722dbb916","last_modified":1480349194976},{"guid":"PDVDZDW52397720@XDDWJXW57740856.com","prefs":["browser.startup.homepage","browser.search.defaultenginename"],"schema":1480349193877,"blockID":"i846","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128320","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the Add-on Guidelines.","name":"Ge-Force","created":"2015-02-06T15:03:39Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c33e950c-c977-ed89-c86a-3be8c4be1967","last_modified":1480349194949},{"guid":"{977f3b97-5461-4346-92c8-a14c749b77c9}","prefs":[],"schema":1480349193877,"blockID":"i69","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=729356","who":"All Firefox users who have this add-on installed.","why":"This add-on adds apps to users' accounts, with full access permissions, and sends spam posts using these apps, all without any consent from users.","name":"Zuperface+","created":"2012-02-22T16:41:23Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f105bdc7-7ebd-587c-6344-1533249f50b3","last_modified":1480349194919},{"guid":"discoverypro@discoverypro.com","prefs":[],"schema":1480349193877,"blockID":"i582","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004231","who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enabled it in the Add-ons Manager.","why":"This add-on is silently installed by the CNET installer for MP3 Rocket and probably other software packages. This is in violation of the Add-on Guidelines.","name":"Website Discovery Pro","created":"2014-04-30T16:10:03Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"34eab242-6fbc-a459-a89e-0dc1a0b8355d","last_modified":1480349194878},{"guid":"jid1-bKSXgRwy1UQeRA@jetpack","prefs":[],"schema":1480349193877,"blockID":"i680","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=979856","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into user's systems, in violation of the Add-on Guidelines.","name":"Trusted Shopper","created":"2014-08-01T16:34:01Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f701b790-b266-c69d-0fba-f2d189cb0f34","last_modified":1480349194851},{"guid":"bcVX5@nQm9l.org","prefs":[],"schema":1480349193877,"blockID":"i848","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128266","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"boomdeal","created":"2015-02-09T15:21:17Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"f8d6d4e1-b9e6-07f5-2b49-192106a45d82","last_modified":1480349194799},{"guid":"aytac@abc.com","prefs":[],"schema":1480349193877,"blockID":"i504","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947341","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks users' Facebook accounts.","name":"Facebook Haber (malware)","created":"2013-12-06T12:07:58Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"bfaf8298-dd69-165c-e1ed-ad55584abd18","last_modified":1480349194724},{"guid":"Adobe@flash.com","prefs":[],"schema":1480349193877,"blockID":"i136","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=790100","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware posing as a legitimate Adobe product.","name":"Adobe Flash (malware)","created":"2012-09-10T16:09:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"47ac744e-3176-5cb6-1d02-b460e0c7ada0","last_modified":1480349194647},{"guid":"{515b2424-5911-40bd-8a2c-bdb20286d8f5}","prefs":[],"schema":1480349193877,"blockID":"i491","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940753","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted.","name":"Connect DLC","created":"2013-11-29T14:52:24Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"6d658443-b34a-67ad-934e-cbf7cd407460","last_modified":1480349194580},{"guid":"/^({3f3cddf8-f74d-430c-bd19-d2c9147aed3d}|{515b2424-5911-40bd-8a2c-bdb20286d8f5}|{17464f93-137e-4646-a0c6-0dc13faf0113}|{d1b5aad5-d1ae-4b20-88b1-feeaeb4c1ebc}|{aad50c91-b136-49d9-8b30-0e8d3ead63d0})$/","prefs":[],"schema":1480349193877,"blockID":"i516","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947478","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by making changes that can't be easily reverted and being distributed under multiple add-on IDs.","name":"Connect DLC","created":"2013-12-20T12:38:20Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"96f8e157-8b8b-8e2e-76cd-6850599b4370","last_modified":1480349194521},{"guid":"wxtui502n2xce9j@no14","prefs":[],"schema":1480349193877,"blockID":"i1012","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206157","who":"All users who have this add-on installed.","why":"This is a malicious add-on that takes over Facebook accounts.","name":"Video fix (malware)","created":"2015-09-21T13:04:09Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"246798ac-25fa-f4a4-258c-a71f9f6ae091","last_modified":1480349194463},{"guid":"flashX@adobe.com","prefs":[],"schema":1480349193877,"blockID":"i168","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=807052","who":"All Firefox users who have this add-on installed.","why":"This is an exploit proof-of-concept created for a conference presentation, which will probably be copied and modified for malicious purposes. \r\n","name":"Zombie Browser Pack","created":"2012-10-30T12:07:41Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d7c69812-801c-8d8e-12cb-c5171bdc48a1","last_modified":1480349194428},{"guid":"/^(ff\\-)?dodate(kKKK|XkKKK|k|kk|kkx|kR)@(firefox|flash(1)?)\\.pl|dode(ee)?k@firefoxnet\\.pl|(addon|1)@upsolutions\\.pl$/","prefs":[],"schema":1480349193877,"blockID":"i1278","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","who":"Any user with a version of this add-on installed.","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server.","name":"Aktualizacja dodatku Flash Add-on","created":"2016-10-27T10:52:53Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"389aec65-a15d-8276-c7a8-691ac283c9f1","last_modified":1480349194386},{"guid":"tmbepff@trendmicro.com","prefs":[],"schema":1480349193877,"blockID":"i1223","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"Add-on is causing a high-frequency crash in Firefox.","name":"Trend Micro BEP 9.2 to 9.2.0.1023","created":"2016-05-30T17:07:04Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"9.2.0.1023","minVersion":"9.2","targetApplication":[]}],"id":"46f75b67-2675-bdde-be93-7ea03475d405","last_modified":1480349194331},{"guid":"{4889ddce-7a83-45e6-afc9-1e4f1149fff4}","prefs":[],"schema":1480343836083,"blockID":"i840","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed and performs unwanted actions, in violation of the Add-on Guidelines.","name":"Cyti Web (malware)","created":"2015-02-06T14:30:06Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"be600f35-0633-29f3-c571-819e19d85db9","last_modified":1480349193867},{"guid":"{55dce8ba-9dec-4013-937e-adbf9317d990","prefs":[],"schema":1480343836083,"blockID":"i690","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048647","who":"All Firefox users. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is being silently installed in users' systems, in violation of the Add-on Guidelines.","name":"Deal Keeper","created":"2014-08-12T16:23:46Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"512b0d40-a10a-5ddc-963b-b9c487eb1422","last_modified":1480349193833},{"guid":"/^new@kuot\\.pro|{13ec6687-0b15-4f01-a5a0-7a891c18e4ee}|rebeccahoppkins(ty(tr)?)?@gmail\\.com|{501815af-725e-45be-b0f2-8f36f5617afc}|{9bdb5f1f-b1e1-4a75-be31-bdcaace20a99}|{e9d93e1d-792f-4f95-b738-7adb0e853b7b}|dojadewaskurwa@gmail\\.com$/","prefs":[],"schema":1480343836083,"blockID":"i1414","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","who":"All users who have this add-on installed.","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server.","name":"Aktualizacja dodatku Flash (malware)","created":"2016-10-28T18:06:03Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"5cebc983-bc88-d5f8-6807-bd1cbfcd82fd","last_modified":1480349193798},{"guid":"/^pink@.*\\.info$/","prefs":[],"schema":1480343836083,"blockID":"i238","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806543","who":"All Firefox users (Firefox 19 and above) who have any of these add-ons installed.","why":"This is a set of malicious add-ons that affect many users and are installed without their consent.","name":"Pink add-ons (malware)","created":"2012-12-07T13:46:20Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*","minVersion":"18.0"}]}],"id":"0d964264-8bd6-b78d-3c6c-92046c7dc8d0","last_modified":1480349193764},{"guid":"{58d2a791-6199-482f-a9aa-9b725ec61362}","prefs":[],"schema":1480343836083,"blockID":"i746","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' systems, in violation of the Add-on Guidelines.","name":"Start Page","created":"2014-10-17T16:01:53Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"8ebbc7d0-635c-b74a-de9f-16eb5837b36a","last_modified":1480349193730},{"guid":"{94cd2cc3-083f-49ba-a218-4cda4b4829fd}","prefs":[],"schema":1480343836083,"blockID":"i590","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013678","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is silently installed into users' profiles, in violation of the Add-on Guidelines.","name":"Value Apps","created":"2014-06-03T16:12:50Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"556b8d4d-d6c2-199d-9f33-8eccca07e8e7","last_modified":1480349193649},{"guid":"contentarget@maildrop.cc","prefs":[],"schema":1480343836083,"blockID":"i818","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119971","who":"All Firefox users who have this add-on installed.","why":"This is a malicious extension that hijacks Facebook accounts.","name":"Astro Play (malware)","created":"2015-01-12T09:29:19Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"440e9923-027a-6089-e036-2f78937dc193","last_modified":1480349193622},{"guid":"unblocker30__web@unblocker.yt","prefs":[],"schema":1480343836083,"blockID":"i1228","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"This add-on is a copy of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker 3.0","created":"2016-06-01T15:17:22Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"2d83e640-ef9d-f260-f5a3-a1a5c8390bfc","last_modified":1480349193595},{"guid":"noOpus@outlook.com","prefs":[],"schema":1480343836083,"blockID":"i816","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119659","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations.","name":"Full Screen (malware)","created":"2015-01-09T12:52:32Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b64d7cef-8b6c-2575-16bc-732fca7db377","last_modified":1480349193537},{"guid":"{c95a4e8e-816d-4655-8c79-d736da1adb6d}","prefs":[],"schema":1480343836083,"blockID":"i433","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","who":"All Firefox users who have this add-on installed.","why":"This add-on bypasses the external install opt in screen in Firefox, violating the Add-on Guidelines. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","name":"Hotspot Shield","created":"2013-08-09T11:25:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b3168278-a8ae-4882-7f26-355bc362bed0","last_modified":1480349193510},{"guid":"{9802047e-5a84-4da3-b103-c55995d147d1}","prefs":[],"schema":1480343836083,"blockID":"i722","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","who":"All Firefox users who have this add-on installed.","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the Add-on Guidelines.","name":"Web Finder Pro","created":"2014-10-07T12:58:14Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"50097c29-26b1-bf45-ffe1-83da217eb127","last_modified":1480349193482},{"guid":"/^({bf9194c2-b86d-4ebc-9b53-1c08b6ff779e}|{61a83e16-7198-49c6-8874-3e4e8faeb4f3}|{f0af464e-5167-45cf-9cf0-66b396d1918c}|{5d9968c3-101c-4944-ba71-72d77393322d}|{01e86e69-a2f8-48a0-b068-83869bdba3d0})$/","prefs":[],"schema":1480343836083,"blockID":"i515","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","why":"The installer that includes this add-on violates the Add-on Guidelines by using multiple add-on IDs and making unwanted settings changes.","name":"VisualBee Toolbar","created":"2013-12-20T12:26:49Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"029fa6f9-2351-40b7-5443-9a66e057f199","last_modified":1480349193449},{"guid":"/^({d50bfa5f-291d-48a8-909c-5f1a77b31948}|{d54bc985-6e7b-46cd-ad72-a4a266ad879e}|{d89e5de3-5543-4363-b320-a98cf150f86a}|{f3465017-6f51-4980-84a5-7bee2f961eba}|{fae25f38-ff55-46ea-888f-03b49aaf8812})$/","prefs":[],"schema":1480343836083,"blockID":"i1137","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","who":"All users who have this add-on installed.","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox.","name":"Watcher (malware)","created":"2016-03-04T17:56:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"252e18d0-85bc-7bb3-6197-5f126424c9b3","last_modified":1480349193419},{"guid":"ffxtlbr@claro.com","prefs":[],"schema":1480343836083,"blockID":"i218","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=816762","who":"All Firefox users who have installed this add-on.","why":"The Claro Toolbar is side-installed with other software, unexpectedly changing users' settings and then making it impossible for these settings to be reverted by users.","name":"Claro Toolbar","created":"2012-11-29T16:07:00Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"e017a3b2-9b37-b8a0-21b0-bc412ae8a7f4","last_modified":1480349193385},{"guid":"/^(.*@(unblocker\\.yt|sparpilot\\.com))|(axtara@axtara\\.com)$/","prefs":[],"schema":1480343836083,"blockID":"i1229","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","who":"All users who have this add-on installed.","why":"These add-ons are copies of YouTube Unblocker, which was originally blocked due to malicious activity.","name":"YouTube Unblocker (various)","created":"2016-06-03T15:28:39Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"c677cc5d-5b1e-8aa2-5cea-5a8dddce2ecf","last_modified":1480349193344},{"guid":"/^(j003-lqgrmgpcekslhg|SupraSavings|j003-dkqonnnthqjnkq|j003-kaggrpmirxjpzh)@jetpack$/","prefs":[],"schema":1480343836083,"blockID":"i692","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048656","who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","why":"This add-on is being silently installed in users' systems, in violation of the Add-on Guidelines.","name":"SupraSavings","created":"2014-08-12T16:27:06Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"b0d30256-4581-1489-c241-d2e85b6c38f4","last_modified":1480349193295},{"guid":"helperbar@helperbar.com","prefs":[],"schema":1480343836083,"blockID":"i258","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=817786","who":"All Firefox users who have this add-on installed. This only applies to version 1.0 of Snap.do. Version 1.1 fixed all the issues for which this block was created.","why":"This extension violates a number of our Add-on Guidelines, particularly on installation and settings handling. It also causes some stability problems in Firefox due to the way the toolbar is handled.\r\n\r\nUsers who wish to keep the add-on enabled can enable it again in the Add-ons Manager.","name":"Snap.do","created":"2013-01-28T13:52:26Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"1.0","minVersion":"0","targetApplication":[]}],"id":"f1ede5b8-7757-5ec5-d8ed-1a01889154aa","last_modified":1480349193254},{"guid":"/^((support2_en@adobe14\\.com)|(XN4Xgjw7n4@yUWgc\\.com)|(C7yFVpIP@WeolS3acxgS\\.com)|(Kbeu4h0z@yNb7QAz7jrYKiiTQ3\\.com)|(aWQzX@a6z4gWdPu8FF\\.com)|(CBSoqAJLYpCbjTP90@JoV0VMywCjsm75Y0toAd\\.com)|(zZ2jWZ1H22Jb5NdELHS@o0jQVWZkY1gx1\\.com))$/","prefs":[],"schema":1480343836083,"blockID":"i326","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","who":"All users who have this add-on installed.","why":"This extension is malware, installed pretending to be the Flash Player plugin.","name":"Flash Player (malware)","created":"2013-03-22T14:49:08Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"3142020b-8af9-1bac-60c5-ce5ad0ff3d42","last_modified":1480349193166},{"guid":"newmoz@facebook.com","prefs":[],"schema":1480343836083,"blockID":"i576","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=997986","who":"All Firefox users who have this add-on installed.","why":"This add-on is malware that hijacks Facebook user accounts and sends spam on the user's behalf.","name":"Facebook Service Pack (malware)","created":"2014-04-22T14:34:42Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"d85798d3-9b87-5dd9-ace2-64914b93df77","last_modified":1480349193114},{"guid":"flvto@hotger.com","prefs":[],"schema":1480343836083,"blockID":"i1211","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","why":"This add-on reports every visited URL to a third party without disclosing it to the user.","name":"YouTube to MP3 Button","created":"2016-05-04T16:26:32Z"},"enabled":true,"versionRange":[{"severity":1,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"a14d355f-719f-3b97-506c-083cc97cebaa","last_modified":1480349193088},{"guid":"{0F827075-B026-42F3-885D-98981EE7B1AE}","prefs":[],"schema":1480343836083,"blockID":"i334","details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=862272","who":"All Firefox users who have this extension installed.","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same BrowserProtect extension that is listed on our add-ons site. That one is safe to use.","name":"Browser Protect / bProtector (malware)","created":"2013-04-16T13:25:01Z"},"enabled":true,"versionRange":[{"severity":3,"maxVersion":"*","minVersion":"0","targetApplication":[]}],"id":"aad4545f-8f9d-dd53-2aa8-e8945cad6185","last_modified":1480349192987}]} \ No newline at end of file diff --git a/services/settings/dumps/security-state/onecrl.json b/services/settings/dumps/security-state/onecrl.json index f25752eb167d..eff502bbc2b2 100644 --- a/services/settings/dumps/security-state/onecrl.json +++ b/services/settings/dumps/security-state/onecrl.json @@ -1 +1 @@ -{"data":[{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AK8tb0kLM7VzymmWJsfD3A==","id":"d3f0522b-2465-405f-9f7b-60b4855dcffb","last_modified":1552492951595},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AJDvcXc7qWv3KL5T8LZTzg==","id":"bf4d016f-5663-41ab-878f-3125a4ed37d3","last_modified":1547837142956},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"atcGz1KKGVTDnXW50L1A","id":"e247e73f-9f9d-4a95-be21-189451d6547d","last_modified":1547837142641},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"T8WaANEU0o+TGJUhLg2r","id":"59f41045-3213-41e4-a57f-b80f6e718319","last_modified":1547837142322},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AITPqUzKZv4eLCI4WjAAJw==","id":"b77e2e29-365d-47ee-ba09-7737a5c9ead3","last_modified":1547837141991},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDElMCMGA1UEAwwcVUNBIEV4dGVuZGVkIFZhbGlkYXRpb24gUm9vdA==","serialNumber":"WfGaLerthIxK19OQTLUGWg==","id":"40c1362f-3787-4984-a6a5-0990d7e49e37","last_modified":1547837141665},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEdsb2JhbCBHMiBSb290","serialNumber":"U3PRzjiR2zDYPa19QJGeCQ==","id":"b2eb4727-dee0-4f6d-a738-e7f7fac9e141","last_modified":1547837141343},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/VqQ==","id":"e38378f4-32d4-4c07-93a5-482380ef4765","last_modified":1547837141021},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzM=","serialNumber":"e41LsLkwucx+Zibwpajkmngu5js=","id":"847dbfce-baf3-4983-a1ee-d88788cbbf14","last_modified":1547837140703},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"T96lTZ6OiZgO5HXc2chfmg==","id":"a07d0ace-fd5c-4c75-a10b-f61f902ba77b","last_modified":1547837140382},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"XLd9GTWYtJqCVi/S1qbPCA==","id":"28365130-2f06-4e4d-8c88-bdb5b67dadb5","last_modified":1547837140050},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dmmZvl03B2fppSvWZ2AhmQ==","id":"70388522-f69e-46af-bad5-030de539f8b8","last_modified":1547837139726},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"T94ltso4x5zl5SmPzGxaRQ==","id":"ff260017-eece-4203-96f7-7fe544eef7ea","last_modified":1547837139403},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ANWeOrGre+B3kYmkmDsQFA==","id":"63ba2af1-3b95-4c2f-86de-8d260c0e7515","last_modified":1547837139075},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"NuO1LvUpC8SX29dTTMDyxg==","id":"4187cbc1-981b-45d8-aabc-55264528b6be","last_modified":1547837138743},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"PLutAhi0cRaKAH2YfGu0ww==","id":"33baf681-54e2-4e2c-a122-c4cd476df1ad","last_modified":1547837138417},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"Aw==","id":"1cefaa15-053b-4ab9-a393-ea6bfcbfd990","last_modified":1547837138096},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"CQ==","id":"04ace127-bc46-4db7-945c-4d0c65c0d526","last_modified":1547837137775},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIIBDDELMAkGA1UEBhMCRVMxDzANBgNVBAgMBk1BRFJJRDEPMA0GA1UEBwwGTUFEUklEMTowOAYDVQQLDDFzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzMSkwJwYDVQQLDCBDSEFNQkVSUyBPRiBDT01NRVJDRSBST09UIC0gMjAxNjESMBAGA1UEBRMJQTgyNzQzMjg3MRgwFgYDVQRhDA9WQVRFUy1BODI3NDMyODcxGzAZBgNVBAoMEkFDIENBTUVSRklSTUEgUy5BLjEpMCcGA1UEAwwgQ0hBTUJFUlMgT0YgQ09NTUVSQ0UgUk9PVCAtIDIwMTY=","serialNumber":"GfVBLKRI50c=","id":"6c625a74-448c-4ea8-8a4a-396ea0e9f212","last_modified":1547837137453},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"Cg==","id":"934dba88-38a3-491b-828b-eb3e3c2e793d","last_modified":1547837137131},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"CA==","id":"c2060e12-c016-498e-8f7a-63a84744145c","last_modified":1547837136780},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"BA==","id":"5d203d0c-a393-4007-bf81-e7468b44a3f9","last_modified":1547837136462},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1513609","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-12-14T18:02:57Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMTwwOgYDVQQDEzNHbG9iYWxTaWduIE9yZ2FuaXphdGlvbiBWYWxpZGF0aW9uIENBIC0gU0hBMjU2IC0gRzI=","serialNumber":"CpI/GtuuSFspBu4E","id":"3a6ab1f4-89cb-4987-b8b2-54797f88930b","last_modified":1544811398633},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"XtxscvsjagmsjDmthiFt","id":"b476fea3-2cdb-4481-89f0-913db8d7498a","last_modified":1544194317387},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AJWE4kFAkUQDWa/pTgHq2w==","id":"236e57d7-b146-4be8-b8d1-29e872612646","last_modified":1544194316803},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"C8qNtOLfRJf1IZuBa5YY","id":"c496b743-29d9-421d-be85-cc3f0fe2129c","last_modified":1544194316153},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"ME4xCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxKDAmBgNVBAMTH1N3aXNzU2lnbiBQbGF0aW51bSBSb290IENBIC0gRzM=","serialNumber":"AIDHko+nptD0l30tljroTA==","id":"c7938b05-7beb-446a-98ea-c288e33c6fbb","last_modified":1544194315552},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AKrsBzcrYHp2NTXnbO4+Qg==","id":"8f563a73-5cae-4aa8-b235-482618a31010","last_modified":1544194314942},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"ME4xCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxKDAmBgNVBAMTH1N3aXNzU2lnbiBQbGF0aW51bSBSb290IENBIC0gRzM=","serialNumber":"APbjF26Q/6hfA1ECXToQLg==","id":"589ef449-7393-4474-9c3a-643023fb517c","last_modified":1544194314328},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AJpv8fAILOsYJSFFQ2KtPg==","id":"47970400-9add-4b5f-9e45-411f928e4623","last_modified":1544194313711},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MIGnMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWRdGFuw7pzw610dsOhbnk=","serialNumber":"SUEs5AAf","id":"ab409612-f7ba-430b-bd06-59fdb9a9313b","last_modified":1544194313119},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MIGnMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWRdGFuw7pzw610dsOhbnk=","serialNumber":"SUEs5AAh","id":"14d8c40f-e1d6-43da-9e12-acbaf631466c","last_modified":1544194312511},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"GPo59VlzNyA=","id":"b0e872b6-06dc-4f2e-8944-ce63aa2eb698","last_modified":1544194311831},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESISaOB3ffRv2jD4gcSgycgm","id":"40de616f-9872-4e5b-9c79-772291fdddf8","last_modified":1544194311237},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESImf/mZpsO94hCWJFJDUDPZ","id":"132dad17-7ebb-482a-bc8a-8b1ab06b6132","last_modified":1544194310607},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAk1LMRcwFQYDVQQKEw5LSUJTIEFEIFNrb3BqZTEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEqMCgGA1UEAxMhS2lic1RydXN0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"CiM0WSw//67JHGWCrlZU4Q==","id":"93d297ac-6894-4a83-8406-0ae2585cf9ee","last_modified":1544194310003},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeHHg==","id":"e3f98761-7fae-4684-bc3b-8c8da50e5ba1","last_modified":1544194309375},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDqg==","id":"2b01f223-8b3a-4da7-8925-44af81bd1279","last_modified":1544194308748},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeuLg==","id":"a0a574cb-2efb-42a7-bc70-51ce91e560db","last_modified":1544194308135},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDtw==","id":"5050d06f-ae56-40f4-8131-5019beeeec79","last_modified":1544194307534},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bfb2Rs8N620oUcAWs41vjA==","id":"d53e3b7e-da21-4cdb-8e68-dacd97d1d079","last_modified":1544194306886},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByemYA==","id":"62d36dac-38c1-49d1-b96d-6e018d7a5ef5","last_modified":1544194306284},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAk1LMRcwFQYDVQQKEw5LSUJTIEFEIFNrb3BqZTEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEqMCgGA1UEAxMhS2lic1RydXN0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"UK9vtGRfZt5a3QiUAQUTaQ==","id":"783e58c7-e899-4297-af4e-95d3c6253ce7","last_modified":1544194305696},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkNOMTAwLgYDVQQKDCdDaGluYSBGaW5hbmNpYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFTATBgNVBAMMDENGQ0EgRVYgUk9PVA==","serialNumber":"ZHKPuIaZ7pI39g==","id":"8d006e7e-9f46-4413-909b-52795a0bfff4","last_modified":1544194305082},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkNOMTAwLgYDVQQKDCdDaGluYSBGaW5hbmNpYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFTATBgNVBAMMDENGQ0EgRVYgUk9PVA==","serialNumber":"fs7i7UJNxcrb9w==","id":"e67cb2f1-f829-4659-8823-831d8abb7a46","last_modified":1544194304064},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"KKdkWIX7TIM=","id":"abbc3079-34c6-4101-a577-2db27ca8cbd7","last_modified":1544194302086},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"dyRJDorYkgE=","id":"7e0b53c6-5915-4be1-847b-4c1785fb50e7","last_modified":1544194300987},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484798","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-12-07T14:23:59Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJESzEQMA4GA1UECAwHRGVubWFyazEpMCcGA1UEBwwgaW5kdXN0cmlwYXJrZW4gMjcsIDI3NTAgQmFsbGVydXAxJjAkBgNVBAoMHVNlbm5oZWlzZXIgQ29tbXVuaWNhdGlvbnMgQS9TMQwwCgYDVQQLDANSJkQxFjAUBgNVBAMMDVNlbm5jb21Sb290Q0ExIjAgBgkqhkiG9w0BCQEWE3N1cHBvcnRAc2VubmNvbS5jb20=","serialNumber":"APSjDtifEQeh","id":"188e1d62-6db0-42ec-b603-ff08649962e1","last_modified":1544194300329},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMTAvBgNVBAMMKFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBJbnRlcm1lZGlhaXIgQ0E=","serialNumber":"VAgHVTPgNwAuYo/y/jkd5A==","id":"9cb67873-dc81-4fb2-9e08-ff4aacaf9fb2","last_modified":1541184580803},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQQ==","serialNumber":"DDbXyG6tZ+P3+B11YPItUw==","id":"ba22132a-97ca-42f1-a521-87fed171e1b7","last_modified":1541184580485},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ArkguT7SeGHAA9ts1IOWWg==","id":"76e65b53-7470-4e1d-8b75-672633474bc2","last_modified":1541184580122},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfHkg==","id":"b323ad96-398b-4225-aa75-1745251dffcb","last_modified":1541184579802},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeoVA==","id":"ad2f2b7a-3f07-4945-8bf6-ec8606df1a00","last_modified":1541184579472},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQQ==","serialNumber":"CkE6FgBN+nIkANMmgOQkiQ==","id":"de69d003-2a1e-4b76-a367-a4cdc26b2a58","last_modified":1541184579160},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGwxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xKzApBgNVBAMTIkRpZ2lDZXJ0IEhpZ2ggQXNzdXJhbmNlIEVWIFJvb3QgQ0E=","serialNumber":"DPWCOBgZnlb4K9ZS7Sft6Q==","id":"6c73cf52-b339-421b-8c2d-cb5a6b9f459b","last_modified":1541184578848},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJhg==","id":"9d3e708c-2edc-4ffd-8414-cb9dc0edf46e","last_modified":1541184578526},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfNbg==","id":"583b6241-3ab7-4c50-90ea-112bff931a2b","last_modified":1541184578212},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQQ==","serialNumber":"Ajx7/tYZjpFt5dBByJo9JQ==","id":"78be56f6-6b69-42ea-abaa-356d066b3c38","last_modified":1541184577902},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDqw==","id":"6ca65a6d-8aeb-47ae-b6b5-6c24509a73b1","last_modified":1541184577589},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeekQ==","id":"1ea21ad4-2362-45ba-a738-de15afc58297","last_modified":1541184577274},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDtg==","id":"846ddb44-f14a-4712-a1fb-6780e38300b5","last_modified":1541184576961},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"AXscEecDK83Ks/XoEFX8RQ==","id":"33b2de43-06a8-4984-85b5-5808c0baa6fd","last_modified":1541184576649},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd7Zg==","id":"c164ebb8-e020-45c4-ac6b-9bd57b761aa0","last_modified":1541184576330},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RDQTEx","serialNumber":"HQ4ijQIlTBpJKXTUo0geJ5AI4VI=","id":"b7bff651-6a6c-45d9-8bb3-d795ed07bdac","last_modified":1541184576013},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"dMGHU/futOojjYQWtax2Rg==","id":"a9080b65-0185-4097-ab66-3c059b2a04ad","last_modified":1541184575682},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxSDcTuZO2","id":"db09a4fa-41d9-4e6c-b80f-a9be26cc70b2","last_modified":1535652552759},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxSjphH9DY","id":"1179bdb8-27ac-4bba-8e7e-f9c065b0dad4","last_modified":1535652552456},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxTNGDGgYt","id":"5f5530aa-7a1c-4b8f-bc35-1d123477d217","last_modified":1535652552111},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxSxsaAPaT","id":"ac2d20b0-5c89-4575-831a-51ef341f0ebc","last_modified":1535652551805},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxST2Fhyj5","id":"225ca652-d633-46e6-aef2-d97708ea696f","last_modified":1535652551494},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxST2Fhyj5","id":"752a5350-9895-434e-abe7-04b85863341e","last_modified":1535652551184},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"Qks10R3Zqs4AAAAAUdNX8Q==","id":"bc1bcbe5-4db7-4a41-8f10-e900f4eee969","last_modified":1535652550869},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfTSg==","id":"06039f5d-19e5-4760-9a27-656f4c949f71","last_modified":1535652550558},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfTSw==","id":"5cddfcfb-2136-4b37-8208-1b0d8dce98c4","last_modified":1535652550249},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkg==","id":"1d0f7585-ddb3-44f2-86b5-afacda2fdfdb","last_modified":1535652549936},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeO7w==","id":"6183f199-c1c5-4705-a178-911f35de4916","last_modified":1535652549620},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkA==","id":"424db874-09b3-4a92-8fe6-61c6e10a0c69","last_modified":1535652549313},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeO7g==","id":"e0cb6242-a46f-4c43-a435-0f8550dd1e6a","last_modified":1535652549004},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"W2qOjVqGcY8=","id":"0093c3c1-1c5c-4524-a29b-9d6a857af2d7","last_modified":1535652548629},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"W2qOjVqGcY8=","id":"724dc57b-1305-4bc3-82af-90d7457e08b7","last_modified":1535652548311},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"W2qOjVqGcY8=","id":"aa81cbe1-031c-4e40-b2d1-e6b9ec6abd7e","last_modified":1535652547990},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484798","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-08-29T17:35:07Z"},"enabled":true,"issuerName":"ME0xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxJzAlBgNVBAMTHkRpZ2lDZXJ0IFNIQTIgU2VjdXJlIFNlcnZlciBDQQ==","serialNumber":"CR8HWlsGr6Sdlw/mzOv8gA==","id":"cdd584ce-f3a2-4b7a-927e-1d479586f224","last_modified":1535564772911},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1480853","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-08-29T17:33:12Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJSYXBpZFNTTCBTSEEyNTYgQ0E=","serialNumber":"L41amoCH4B2agSUpD8Wd2A==","id":"8a401bee-cee4-40d8-a61e-903ca0cda17f","last_modified":1535564772595},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1480853","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-08-29T17:32:10Z"},"enabled":true,"issuerName":"MIGWMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE8MDoGA1UEAxMzQ09NT0RPIFJTQSBPcmdhbml6YXRpb24gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","serialNumber":"AMN6iHtOgy68QBu3kXiaFc8=","id":"514b3b98-0554-4aff-b117-faeafe5f4897","last_modified":1535564772273},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MDcxFDASBgNVBAoMC1RlbGlhU29uZXJhMR8wHQYDVQQDDBZUZWxpYVNvbmVyYSBSb290IENBIHYx","serialNumber":"ANdqi8UFCQChm0RchyjMpjY=","id":"4307675d-416f-4104-b7ca-6d728920cb91","last_modified":1534541096333},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MDcxFDASBgNVBAoMC1RlbGlhU29uZXJhMR8wHQYDVQQDDBZUZWxpYVNvbmVyYSBSb290IENBIHYx","serialNumber":"A3XEm35jzkM3B/8ZhDel7w==","id":"68edcd97-5fc4-40ea-b459-306f4339e987","last_modified":1534541095459},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AISaJcSkfQq9","id":"7c47f219-cff9-4fef-a855-007eb636ecb4","last_modified":1534541094267},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"SUUmDL8PIBZ0EkIfCV6N","id":"7cc984ca-7513-4e31-bf91-f32799747ef9","last_modified":1534541093107},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"TA7JMQ==","id":"b4858c0b-2060-4327-9a27-0f3ab43765d6","last_modified":1534541092217},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"RWua3A==","id":"fc4c7ef0-5d5e-4a2c-86dc-99f2586d9774","last_modified":1534541091322},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"TA7JGA==","id":"2558efc4-46b1-4769-a57e-f8ac3971ed01","last_modified":1534541090496},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"Beo=","id":"9ff5d4c3-8d66-48ff-9add-343a90b031a6","last_modified":1534541089654},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"U4S9ZGx1FCY3wppgMwTn0Q==","id":"bd9d1022-f109-47a4-84be-ebf91cc901cb","last_modified":1534541088707},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"JMRsU4iZEfeLdmXeFIjy4w==","id":"85acb0b3-8291-4ee5-8137-3147412a22af","last_modified":1534541087581},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"BnG7G8DueagyBXomN87dYA==","id":"cde8301e-94ce-4808-935a-8dc1dc550d1f","last_modified":1534541086654},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"PtgfuDU/40rxF87UP4HpIw==","id":"c2c44bd7-a0d9-48ac-95b7-9b42250f09bb","last_modified":1534541085650},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGBMQswCQYDVQQGEwJCUjEtMCsGA1UEChMkQ2VydGlzaWduIENlcnRpZmljYWRvcmEgRGlnaXRhbCBTLkEuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSIwIAYDVQQDExlDZXJ0aXNpZ24gQ2xhc3MgMiBDQSAtIEcz","serialNumber":"FdJweu3BTeU/YzTvayJksQ==","id":"961d1883-8b9a-4523-8ee5-43ed4ccfc347","last_modified":1534541084620},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"cDosFiyvqdvDoYinOV6PDg==","id":"1c8e5f98-3a13-4f90-9d16-d15580d1c3fe","last_modified":1534541083590},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"LiJxautXUrJeoN4q4RX/Rg==","id":"3cd4e097-6f1d-44e6-9e51-43ca50114727","last_modified":1534541082464},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpBTFBIQSBCQU5LMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMRswGQYDVQQDExJBTFBIQSBCQU5LIENBIC0gRzI=","serialNumber":"aqcSP+AsWAmN9xWwAseOqg==","id":"fe1c41a4-4a07-4bfa-b7dc-850433c2e433","last_modified":1534541081450},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByekbQ==","id":"0597bdd4-fb5d-4418-860e-f8e23349c9ff","last_modified":1534541080214},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByekbA==","id":"b797348e-1bfc-4996-be6e-a9f9cb9856cc","last_modified":1534541079187},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"BILpOL1LYav6JuQxlNetFA==","id":"fb097e62-de6b-4b55-afc9-b5102081e107","last_modified":1534541078056},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHNA==","serialNumber":"IW5rxECQ5LEyRGPeZE91ug==","id":"b83dfdc9-8db9-4668-858f-3fb24473e8e0","last_modified":1534541077133},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHNA==","serialNumber":"USISWFWRHGp530VQc2S1/Q==","id":"cb72eb7e-7a95-4a55-9e6f-a0b2286287e6","last_modified":1534541076012},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpBTFBIQSBCQU5LMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMRswGQYDVQQDExJBTFBIQSBCQU5LIENBIC0gRzI=","serialNumber":"I5cyb4y1eoVQS44pO3PAww==","id":"7e42ae24-9a36-4b9c-805e-786c45bd4b2b","last_modified":1534541074363},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpBTFBIQSBCQU5LMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMRswGQYDVQQDExJBTFBIQSBCQU5LIENBIC0gRzI=","serialNumber":"SoA0BJz+EzihvsNlkwlJTg==","id":"18832146-8b40-4eb2-992e-bf066afd87e0","last_modified":1534541073330},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Jje4sy72uF/upHdwh0gBGg==","id":"12d06d11-7118-4d7d-aad8-d6a3a5abf4dc","last_modified":1534541072103},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"e9fp8poJ4jDqpHxVc+7SoA==","id":"c318da0b-ae36-4297-9b3b-54b3704c415a","last_modified":1534541071195},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"H3xY9eXX+IpIl9ixQf3lzQ==","id":"a152bd2e-c4dc-4b8a-9367-68d233e3293d","last_modified":1534541070166},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHNA==","serialNumber":"YfdCZWyRV1sSx5XxyoXKSQ==","id":"5a6a2309-ef7f-4294-a5f5-35713e6b09ef","last_modified":1534541069146},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"SrterKaDHA8hZ+z9gwFXnw==","id":"9a9f2ce5-4adf-44ab-9419-46b2a9c23c0b","last_modified":1534541067931},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"HxapAqDOXuN5BHzREkFFtg==","id":"ccbb9f74-6a49-488f-9a63-d760e364a097","last_modified":1534541066804},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"MyEj11s2KJH0vdnfUfuNIw==","id":"aae675ae-903f-443f-aeb9-b9dbdad319a9","last_modified":1534541065882},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"C95Fob0ttu7S7dIXnjqiBA==","id":"d4aebc29-de67-49a0-ba42-255f38d35437","last_modified":1534541064843},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"A7XRsyidfS8L2dlFuTsfGA==","id":"f5c969f7-ddec-42f6-9ebf-595fbb7c6fca","last_modified":1534541063714},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc3DA==","id":"2bc17daa-0e8d-4d68-bfa4-ba4e68ab506c","last_modified":1534541062617},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByekcA==","id":"5bff7385-6327-424d-9190-6fc5e49e6204","last_modified":1534541061659},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"HvAB3BwhY8g=","id":"95957db4-01f6-458e-9702-b6bac846e794","last_modified":1534541060556},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"ThcGy6zgwpM=","id":"af35a216-5439-4e22-ac65-06b46b10f1e4","last_modified":1534541059412},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"YfJj9o3IPBI=","id":"f5764907-12d4-448f-a9ff-0c7bd49b6e2e","last_modified":1534541058504},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwOA==","serialNumber":"AahE5mpsDY4=","id":"10e71a2b-68ae-4c3e-aece-21b68e0c9c17","last_modified":1534541057381},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"AQ8=","id":"c056f51e-560e-4386-ab51-aa1447c3f778","last_modified":1527680138898},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARA=","id":"7e68e021-3514-4f54-bff4-16562a15fd8b","last_modified":1527680137878},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARE=","id":"680e1552-a9c7-465b-9230-796fbaae08af","last_modified":1527680136981},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ATEz9w==","id":"95d4aa6a-e99d-4706-b071-b6c9d18f38f4","last_modified":1527680136034},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"Q704nTrqxVY=","id":"1507de3d-b758-4803-8048-edaf5b747848","last_modified":1527680135116},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMw==","serialNumber":"SMwb3p7dSlA=","id":"57ec979f-fa95-401a-8791-8adf2edd0223","last_modified":1527680134190},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOjA4BgNVBAMMMVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBQZXJzb29uIENBIC0gRzM=","serialNumber":"XJI7ULS6xv8=","id":"56e35d02-2284-4f72-9dd2-8606c005b3e7","last_modified":1527680133272},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"eNYPiDzOMtQ=","id":"d47cb30c-c61b-4514-9435-14998929b8e1","last_modified":1527680132390},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIGRMQswCQYDVQQGEwJOTDEiMCAGA1UEChMZS1BOIENvcnBvcmF0ZSBNYXJrZXQgQi5WLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazE9MDsGA1UEAxM0S1BOIENvcnBvcmF0ZSBNYXJrZXQgQ2xhc3MgMiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"M9pDPXYgyiimYdML5Wg4zQ==","id":"ce3da6f2-bb52-4ea8-b2ca-334a49f34494","last_modified":1527680131497},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"X407nWyYC7u8lCrBrW2cRA==","id":"3c05d750-a448-4a72-8fe6-337efe7b68f0","last_modified":1527680130603},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"DmbpIZh1fhYcSThCcjaohA==","id":"e3c45873-f60c-4a04-be49-48e84b26c842","last_modified":1527680129682},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"TpTE/3d2UBJYfYHw2LSoww==","id":"4c6efcb4-ab11-4ebc-a527-bb9d4b5d54a9","last_modified":1527680128734},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"W9KDjZvaDeWwN4jQG9TO3w==","id":"4c841dba-55af-4fb2-ac56-9a4e9e090e9d","last_modified":1527680127636},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"RWHsRyzP3KFyjhTLPO4FPA==","id":"49638a65-fc28-4f9f-bac5-618e2c4df184","last_modified":1527680126713},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABECVWTJM=","id":"fafb930f-555d-4185-b11c-51542f67e9ed","last_modified":1527680125794},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABI75RcWk=","id":"cb02a3fb-31a6-4e59-9b7b-298a675dcfaf","last_modified":1527680124869},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABKkKSw14=","id":"ea62e720-34bf-43e3-863a-b920c4f9f3c0","last_modified":1527680123965},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc3Cg==","id":"291cf8ea-ad61-4a25-a829-8444ab7ff3e0","last_modified":1527680123024},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABSOXEgNk=","id":"a2b79aa8-7b05-43f2-8774-33be4e58e12a","last_modified":1527680122103},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkw==","id":"e6b1307d-9179-4d0c-baf0-486fc60f9e3d","last_modified":1527680121187},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"QHdGjRdEcAz+FjRyuIJmog==","id":"e7dd6129-27e9-43c3-832e-465f281653fd","last_modified":1527680120267},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"JekvfVn3h2+OX/V8Ef6vpg==","id":"69975669-0ed8-4c98-8bfe-0179eca26f16","last_modified":1527680119342},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"CHF76YGUdPMMCJ4njfsnwQ==","id":"f09d52b1-8a8b-4ca6-8d3e-aedcdfa2a2a2","last_modified":1527680118421},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"OBGSpfa3Oz6a7zeF/OywMg==","id":"e8d4263a-45aa-4965-b66b-fff4c766fd35","last_modified":1527680117502},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"deh5gFVej9+uQBqlb1fIig==","id":"496ee295-b927-4d33-9fd1-fc87b0327af5","last_modified":1527680116475},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"aKsZrWDpsFlVL0xkShb22A==","id":"79eccf3a-91ef-4238-b579-373bbfc64546","last_modified":1527680115348},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"SFuFrFB7MZnZ6tsqwS47tw==","id":"b52359b1-3f41-4c09-bbfa-8b9e507ec567","last_modified":1527680114428},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkQ==","id":"783843ba-bada-4793-af9d-ba731980deb8","last_modified":1527680113504},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byeekg==","id":"d8d6e770-d17f-4d6e-bbd9-e977a8b433d7","last_modified":1527680112688},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byekaw==","id":"7726f4b7-43ab-4446-82de-5b94436243ef","last_modified":1527680111761},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycpXg==","id":"fe0212f9-fd42-4659-8052-86a4c39e358c","last_modified":1527680110845},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byekag==","id":"b86acd44-3dc4-4652-b48d-b0903b1ca74a","last_modified":1527680109917},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycpXw==","id":"c8acece6-3bd4-433f-ad93-ac379de4e8d7","last_modified":1527680108997},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"Mi/Y+W40ChdUGpag8vaUjQ==","id":"9f89002a-a395-46a0-b050-e5f32733e807","last_modified":1527680108078},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"eRdKqRQXNv4Vp8qfLP9FiA==","id":"1ad54d87-3100-49f5-8fd1-a156f5a479fd","last_modified":1527680107215},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"EOqAPvgqxt8=","id":"5e5f0c19-5509-4c2d-96d4-7e89771a75ff","last_modified":1527680106336},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"amYSY2usyXU=","id":"0a3b7dd0-23ee-4ec6-8237-ceba9815e4ee","last_modified":1527680105419},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"KZlCQ0XnAo+GY3mKKJoNoNucjT0=","id":"b604fa72-f222-48f6-a8b7-8c7907a5b697","last_modified":1525201514127},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"JJfQeI7SQbQcPQ8Wc4+X2nlpWho=","id":"e5d6417c-1b43-45e0-a9d5-ccad984a9170","last_modified":1525201512695},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"bdheRp0SfvS84GGiPaBnyFhE8EY=","id":"8e9d1e04-962c-4495-89be-f25d3cd7d8d3","last_modified":1525201511157},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"Z6RtH7xmDM0r66IKSlpCZNrlRfY=","id":"cc7d8a02-77da-415a-842b-83d2f60e1bf3","last_modified":1525201509729},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"VOQX5SLKeMGyQdoF0X9h38gYrks=","id":"d34174b6-22f9-47b4-af3f-7d78b2ce313f","last_modified":1525201508294},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"ATE7Ow==","id":"6d27a296-13e2-4b53-880e-32f7030708a6","last_modified":1525201506960},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMTAvBgNVBAMMKFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBJbnRlcm1lZGlhaXIgQ0E=","serialNumber":"a5DOAqSUlLm2s6kL0x8gkQ==","id":"04216f09-9d99-4699-bf56-81cb74464d6e","last_modified":1525201505526},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"AeUotGv9K4mpvLzWxw==","id":"ac3d127c-2b79-4a52-94fa-b3ce9f420f2c","last_modified":1525201504399},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFI2MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"Ro51e1DpnjbH3LKdghY=","id":"e63eb91d-a23d-4f90-babb-9c4c2baf3da0","last_modified":1525201502761},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"R8MQVHZjYD/8LqGrob8=","id":"3264ae57-4d3d-482a-a169-f66652d93ff9","last_modified":1525201501429},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIx","serialNumber":"B6AKfwrKX6H1AAAAAAAAAAE=","id":"7647d289-2123-401d-b316-d84482d851a9","last_modified":1525201500273},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIy","serialNumber":"CMUHBBak0idMAAAAAAAAAAE=","id":"a792f002-d392-4bb5-ac92-94fe71853dbc","last_modified":1525201498941},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMSIwIAYDVQQKExlLUE4gQ29ycG9yYXRlIE1hcmtldCBCLlYuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSgwJgYDVQQDEx9LUE4gQ29ycG9yYXRlIE1hcmtldCBDbGFzcyAyIENB","serialNumber":"GARMIB0Iaz3xxucE70O9Qg==","id":"dd5c26f0-c931-4d95-ade1-f243ba56a7eb","last_modified":1525201497640},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAktSMRMwEQYDVQQKEwpLRUNBLCBJbmMuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSIwIAYDVQQDExlDcm9zc0NlcnQgQ2xhc3MgMiBDQSAtIEcz","serialNumber":"fLpClvRi4IMKsokzVKT9Yg==","id":"2e3b108e-3455-44e3-b519-262869934aea","last_modified":1525201496208},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"JFcRHv1L89Vu8gagzuR3Pg==","id":"7732cbbc-9821-492e-8f1e-7b8754a1dc12","last_modified":1525201494877},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"CAEyq5GePgxvZbmFx5WW6A==","id":"5f6842bc-4062-4445-a442-17ec20539f59","last_modified":1525201493653},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAk1ZMR8wHQYDVQQKExZNU0MgVHJ1c3RnYXRlLmNvbSBTZG4uMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSowKAYDVQQDEyFNU0MgVHJ1c3RnYXRlLmNvbSBDbGFzcyAyIENBIC0gRzI=","serialNumber":"L3UnLdK9iz8XVM1rbm3tTw==","id":"f2d9c522-665c-4d09-b6c2-e0653ca8dc8e","last_modified":1525201492418},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAk1ZMSQwIgYDVQQKExtNU0MgVHJ1c3RnYXRlLmNvbSBTZG4uIEJoZC4xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxKDAmBgNVBAMTH01TQyBUcnVzdGdhdGUuY29tIENsYXNzIDIgQ0EtRzM=","serialNumber":"Q0dKwXPiEec83XZPgsQh+g==","id":"119dc8cc-5dde-4e71-aa7a-dd2058aaaced","last_modified":1525201490985},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"PpIe9Q1JUVu5nN/+4HWAoA==","id":"b06fa973-e8ef-4deb-8dd6-af1f306563b6","last_modified":1525201489551},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Baw9WIPUcpFvYe8bilTVVQ==","id":"3105cae8-2380-44c9-943b-62bb59978626","last_modified":1525201488149},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"CpSHXk6RnrLSRVVJhVZEWA==","id":"a91e0705-eaae-417a-8cf5-f990c819c96f","last_modified":1525201486895},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"Bxt4PMyN1f5tIXW8W62DhA==","id":"ef5a0861-7a80-4bef-8189-6b190481cd0f","last_modified":1525201485456},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"bcIU/gztAKdw8elgpRh2vA==","id":"451f9b8a-ce9e-4393-866c-2a62440afa7a","last_modified":1525201484131},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"U51Qij2xILJB29u2m4ePyw==","id":"5ae5d4d8-47cd-4519-86f0-9e764f1fd1ec","last_modified":1525201482589},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"VedYmG4aoUcioKT467SDcg==","id":"5c06e662-9307-463e-bdb9-07abfd4f311d","last_modified":1525201481154},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"HkN+3VDzRBFAw/QQ6XZ2gA==","id":"d284e696-c47e-4f9f-97b0-610dc7313438","last_modified":1525201480132},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"XaqJA1pYkpSOSst7Hmcxew==","id":"78487925-3b88-480a-ba6b-1d5e139b1ec9","last_modified":1525201478595},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"cIHLIBl0M9N90NNjZwhwSA==","id":"289275cc-72e5-4d51-b4f1-07346c5e237e","last_modified":1525201477470},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMSIwIAYDVQQKExlLUE4gQ29ycG9yYXRlIE1hcmtldCBCLlYuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSgwJgYDVQQDEx9LUE4gQ29ycG9yYXRlIE1hcmtldCBDbGFzcyAyIENB","serialNumber":"I+zjm9Bi1ZVKLF0R96thFQ==","id":"efd22973-74ee-4157-8ddf-057a44f23c03","last_modified":1525201475931},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMS0wKwYDVQQKEyRHZXRyb25pY3MgUGlua1JvY2NhZGUgTmVkZXJsYW5kIEIuVi4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxHTAbBgNVBAMTFEdldHJvbmljcyBDbGFzcyAyIENB","serialNumber":"MfSUS8xHwG64IFRIU5IHpw==","id":"9e57aa7e-ff8e-468f-98ed-562dd56eee71","last_modified":1525201474704},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMS0wKwYDVQQKEyRHZXRyb25pY3MgUGlua1JvY2NhZGUgTmVkZXJsYW5kIEIuVi4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxHTAbBgNVBAMTFEdldHJvbmljcyBDbGFzcyAyIENB","serialNumber":"VhmAg9gQ0IaL5+lKzrKYPQ==","id":"a801439e-c1b1-414f-acbb-16b5fe362389","last_modified":1525201473562},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGwxCzAJBgNVBAYTAk5MMRkwFwYDVQQKExBLUE4gVGVsZWNvbSBCLlYuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMSEwHwYDVQQDExhLUE4gVGVsZWNvbSBCLlYuIENBIC0gRzI=","serialNumber":"I1kCCASG38Q8TKOJaqQtvQ==","id":"eca07c7f-1a9c-46f5-a61f-a9696f8bdd7a","last_modified":1525201472349},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGwxCzAJBgNVBAYTAk5MMRkwFwYDVQQKExBLUE4gVGVsZWNvbSBCLlYuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMSEwHwYDVQQDExhLUE4gVGVsZWNvbSBCLlYuIENBIC0gRzI=","serialNumber":"W4sqXNfJgPC3aLKkcOxq9Q==","id":"eac5a645-3936-457a-8d93-f2d8acb71e1f","last_modified":1525201471502},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMSIwIAYDVQQKExlLUE4gQ29ycG9yYXRlIE1hcmtldCBCLlYuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSgwJgYDVQQDEx9LUE4gQ29ycG9yYXRlIE1hcmtldCBDbGFzcyAyIENB","serialNumber":"F6sWArGVJv7AwBSxbnnqaw==","id":"4a21fbd9-4b39-4d8c-b2c9-82ace310f9c7","last_modified":1525201470403},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"JY5zdgD/mG9A4oB/uzdSwQ==","id":"859ec3d1-70bd-417d-a3a1-bedc847fb4f3","last_modified":1525201469016},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"VBy0L8eIKnVUGpY97OXrkw==","id":"e5ef5cbb-45ad-4ffd-a2db-beb350b195a3","last_modified":1525201468162},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"c+6uFePfrahUGpXs8lhiTw==","id":"b93e70b2-98aa-44d3-a62a-4f3bb49f9966","last_modified":1525201467126},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"PZfTkwQ5Yio+HE2mvtFzDg==","id":"4d559aad-94e9-4240-93d2-054943a9f31a","last_modified":1525201466102},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHpMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxLjAsBgNVBAsTJVNlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8gRUNWLTExNjA0BgNVBAsTLVZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlckNJQy0xICAoYykwMzEhMB8GA1UECxMYR2VuZXJhbGl0YXQgZGUgQ2F0YWx1bnlhMRIwEAYDVQQDEwlFQy1HRU5DQVQ=","serialNumber":"b+8vFPRPzN8+HCEWmIwVNg==","id":"047fdabb-c9a2-4eb1-aaa7-469511a8f1db","last_modified":1525201464668},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIIBGDELMAkGA1UEBhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2VydGlmaWNhY2lvIChOSUYgUS0wODAxMTc2LUkpMTQwMgYDVQQHEytQYXNzYXRnZSBkZSBsYSBDb25jZXBjaW8gMTEgMDgwMDggQmFyY2Vsb25hMS4wLAYDVQQLEyVTZXJ2ZWlzIFB1YmxpY3MgZGUgQ2VydGlmaWNhY2lvIEVDVi0yMTUwMwYDVQQLEyxWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJDSUMtMiAoYykwMzEfMB0GA1UECxMWVW5pdmVyc2l0YXRzIGkgUmVjZXJjYTEOMAwGA1UEAxMFRUMtVVI=","serialNumber":"Y3QACu2RGYVJ6FAnJWZpHA==","id":"703b71d5-0bf4-4af5-885b-d5c2165f4062","last_modified":1525201463440},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"BqVfPLKBlSg/4Enn+TGdbA==","id":"f4e4fccb-6400-4fca-8557-849ba24afac1","last_modified":1525201462192},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"cEBA0P3KPBk/ojwnYepwzg==","id":"4c13fe3b-275e-4459-bb38-dc54bf6ba01d","last_modified":1525201460880},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"P0qUU7RhznNP6V9iGYbSbA==","id":"4f6b910c-64a4-4919-8ff5-c9fdd1f7d740","last_modified":1525201459447},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"W99Z2UuV5pFP6V8AYIwcVQ==","id":"66226a62-8d11-4442-8cd4-65279cdc08fa","last_modified":1525201458032},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"dfE2CNAy9IxP6VwZ2IU2cA==","id":"e4012675-11d8-4514-ba99-7a519d9f64c8","last_modified":1525201456987},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"IqW4gO46S81PjTpHBA7mUQ==","id":"54088505-0388-44e8-89f3-54dbeee3d2f5","last_modified":1525201455452},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHpMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxLjAsBgNVBAsMJVNlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8gRUNWLTExNjA0BgNVBAsMLVZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlckNJQy0xICAoYykwMzEhMB8GA1UECwwYR2VuZXJhbGl0YXQgZGUgQ2F0YWx1bnlhMRIwEAYDVQQDDAlFQy1HRU5DQVQ=","serialNumber":"On0bAstcoxZP6WERe150Gw==","id":"d2241dbd-e9df-420f-ba92-0c9c9d8d89f6","last_modified":1525201454025},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIIBGDELMAkGA1UEBhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2VydGlmaWNhY2lvIChOSUYgUS0wODAxMTc2LUkpMTQwMgYDVQQHEytQYXNzYXRnZSBkZSBsYSBDb25jZXBjaW8gMTEgMDgwMDggQmFyY2Vsb25hMS4wLAYDVQQLEyVTZXJ2ZWlzIFB1YmxpY3MgZGUgQ2VydGlmaWNhY2lvIEVDVi0yMTUwMwYDVQQLEyxWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJDSUMtMiAoYykwMzEfMB0GA1UECxMWVW5pdmVyc2l0YXRzIGkgUmVjZXJjYTEOMAwGA1UEAxMFRUMtVVI=","serialNumber":"JSPC8hAKsUBP6Y3n9JMx8w==","id":"a6240c29-985b-41aa-bfef-a4b5b10c43c4","last_modified":1525201452790},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"L5tOVjVGKtFP6V84tGEFPg==","id":"7780f12e-5f2c-4382-aa26-25e0b06e2a23","last_modified":1525201451667},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"IL094GkEPSU+HAucglL0Ig==","id":"b9db725d-2c89-42ad-8b0b-807311d0a5cb","last_modified":1525201450130},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"ME4xCzAJBgNVBAYTAk5PMR0wGwYDVQQKDBRCdXlwYXNzIEFTLTk4MzE2MzMyNzEgMB4GA1UEAwwXQnV5cGFzcyBDbGFzcyAyIFJvb3QgQ0E=","serialNumber":"KA==","id":"3d04d4fa-8dea-49f3-a47c-71e1443a9136","last_modified":1525201448898},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"UzAV4JqeuGY=","id":"8e357bb0-7738-4fb6-be98-1c3b0f34b883","last_modified":1525201447362},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"bYuYcMtVvjo=","id":"3546a52d-6e2a-4f79-bfda-3c7514eaf39e","last_modified":1525201446066},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"WV2iHxGL6Vg=","id":"7aee1756-65b5-44d6-b368-bf7345dfb4d9","last_modified":1525201444699},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R4af5Q==","id":"6d5c851b-0161-406e-8d63-8d3db27ca4f8","last_modified":1521539068414},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R4b2Vg==","id":"bfd98186-8469-4f90-9caa-ef94ee7e5793","last_modified":1521539067480},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Hl7MT7aU4GbuanaMzc5eAg==","id":"b5d0f6f8-dc6c-42e6-86e3-db86c0f0ef3e","last_modified":1521539066546},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TrUuR7x7VeU7Qvlwt8Sumw==","id":"cd97a51f-ecd0-4cd0-afac-022a5deae387","last_modified":1521539065613},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ajUDfjuO76YmIt3+fyTLXg==","id":"6562ca7d-c4df-4c31-93b9-4a4ed561f830","last_modified":1521539064682},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"G0UY3ZCa+JfTgAVgvFA8qg==","id":"f31c2c71-e3dc-4f33-a12b-fad7aa9e1b66","last_modified":1521539063753},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dtULH8kD2mThpR/g1YJEtw==","id":"690c5b1d-ff08-4827-b7fe-0b43f8363202","last_modified":1521539062819},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"c5EZjjNc7LMOapbOzjEtJA==","id":"bcd2807e-15df-4eba-be88-2677fd17496e","last_modified":1521539061889},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dn2My7LvPi25AtUw3aPEmQ==","id":"1841b57b-5085-4ffd-9b5a-192ed098c6af","last_modified":1521539060941},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Qk03giZwJwxf5QpixTKflQ==","id":"01c7e0fd-4973-44d4-829a-896db0c7e1dd","last_modified":1521539060008},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"cepjeevcJiJnbGEvdJE1jg==","id":"e27659bd-3699-4eea-afb0-a435dfac9bd1","last_modified":1521539059082},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"BtDaTXIs6tBSClhSLPXdYg==","id":"33f91455-1f4c-4fd7-aeea-c7f1df9309fd","last_modified":1521539058135},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ej2u88yEVXEb8BP1K49U6Q==","id":"af65bc77-69b0-4afb-9451-b8ae0bcc7b62","last_modified":1521539057196},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"H/Vx9uatDIulnLLrZjXEKg==","id":"d1b51a6b-bcb0-44d0-830c-394a409c3fa0","last_modified":1521539056260},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"PxYWUib8jdriX5MSGW7Ozw==","id":"b8304b34-1fcb-46bd-ac88-796748e0278f","last_modified":1521539055332},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"T3UrJ2tKvT0lyumu37ic6g==","id":"629d62ec-34c0-466d-b9ec-4f1991f45ac4","last_modified":1521539054393},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"And3HzRA33dI3K772oqBCw==","id":"e7cea443-749b-48c0-90e4-72139c44b9a7","last_modified":1521539053460},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ZpLTr9toPH+XRF7OITitfw==","id":"8e977340-0255-432f-a74f-b45f1d892f59","last_modified":1521539052528},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TpyAwu1JmlIKD9gyf+0d4w==","id":"86c1352b-e5e8-4e7e-9a88-ea8916d08ded","last_modified":1521539051596},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"A09gcxt2IBLNzwqUBAhkDg==","id":"bd99f32d-02fb-4a46-9265-8bdcb343b8f8","last_modified":1521539047661},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dgkExobSurPQq8GYrxxluA==","id":"190e2d0d-35d1-47b4-8b07-73df5c649ba4","last_modified":1521539046709},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IEVDQyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"UJ3tpbZLsyrhh60M9CMQaQ==","id":"b4c69adc-2247-4aed-8cb9-e0fd1bd4e457","last_modified":1521539045779},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"MpG5djdbcIoI5TIkJ7vENA==","id":"c2b676e2-f636-4489-ad39-ceadad4d122c","last_modified":1521539044827},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IEVDQyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"BlOMLY2hk1OPGflbt/pPXQ==","id":"06096001-fd68-4d0e-be8d-832c24695c75","last_modified":1521539043891},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IEVDQyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"APy7Z8kyJRVBcM/oki5xZ2M=","id":"71a73415-ba8f-4281-86b4-76311c2f0410","last_modified":1521539042956},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"ANjIV8rkvmb5E3Wf3aPV2ys=","id":"ca2547dd-66ec-4991-ab40-362581ebdc69","last_modified":1521539042013},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"AKbcLtOIMMwDPSOrzrclZL8=","id":"f463f5b3-b729-4da8-afc0-c54e54d857bc","last_modified":1521539041071},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"BQ==","id":"821bc34c-45ce-444a-b7c0-0a581a788a52","last_modified":1521539040133},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"Ag==","id":"490cb9c4-e092-4200-9e4b-be790d4db9b6","last_modified":1521539039175},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1436524","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-02-13T20:30:40Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMSAwHgYDVQQDExd0aGF3dGUgRFYgU1NMIFNIQTI1NiBDQQ==","serialNumber":"dqN9ZZM/PfFCXStajJdbtQ==","id":"1dea3a27-cf12-440c-b77d-08608dcb4fae","last_modified":1518553957211},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"IsWDgJMv7uY=","id":"6252eb0e-d613-4290-a7ab-1b6698146077","last_modified":1518185155027},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","serialNumber":"WDFms0iypljMkohTzBvf4GmTOu0=","id":"938ea097-b56a-4286-9370-a1dabb46c908","last_modified":1518185154165},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzM=","serialNumber":"PybG62jqpxKYOV5MlXAGPJYDy9M=","id":"495b31a1-84f2-4a2e-b4b0-f24303c0b114","last_modified":1518185153363},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/SsQ==","id":"5373d63b-fdb3-4cf2-82c4-6d5dde47a536","last_modified":1518185152542},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ATEzEQ==","id":"e0589829-384d-4cd8-952f-3b4d5b3116f0","last_modified":1518185151698},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"ATE33w==","id":"b4208886-7ca1-4d3f-a6b7-271f93aaf6cd","last_modified":1518185150862},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byecpw==","id":"0a419007-294d-4c7e-8ae4-e26c83633f5a","last_modified":1518185150011},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MHoxCzAJBgNVBAYTAkFVMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazErMCkGA1UEAxMiU3ltYW50ZWMgQXVzdHJhbGlhIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"MZNwCx0BAjzTOgcvHsmdhQ==","id":"f7ee0207-7809-4310-a334-906a783c94f9","last_modified":1518185149162},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"PWwhjEHh0n5G6P8b+bAkcg==","id":"8ed4a6a5-4222-44bd-b52a-2fc5b2093fd4","last_modified":1518185148285},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye/xA==","id":"49f10bd9-4827-42f8-b6bb-1136cdb8b1f1","last_modified":1518185147458},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkFVMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEmMCQGA1UEAxMdU3ltYW50ZWMgQXVzdHJhbGlhIENsYXNzIDIgQ0E=","serialNumber":"Nn6RHaVImMEtHLbPqlyGEA==","id":"49216c75-cdfa-423a-84cb-a4285e9efc65","last_modified":1518185146632},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"X22XOlwfc1Taw/ORwGOIeg==","id":"21e8b448-bdc3-4549-8436-7b5218662f7b","last_modified":1518185145800},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"PgImeGqCkapG6P426Ne85w==","id":"9c7330f0-ac62-44f6-9ecc-1f6c8090e22c","last_modified":1518185144953},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1433118","who":"jc@mozilla.com","why":"key compromise","name":"","created":"2018-01-30T17:48:22Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSkwJwYDVQQDEyBDZXJ0dW0gRG9tYWluIFZhbGlkYXRpb24gQ0EgU0hBMg==","serialNumber":"VEav0UR+l38TpKTRi7sS1g==","id":"cb712a6d-3b3d-4642-b0f0-5f765f615559","last_modified":1517334651604},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432467","who":"","why":"","name":"","created":"2018-01-23T13:41:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye9zg==","id":"fead3048-84a5-4256-9850-cf412c8cce88","last_modified":1516714883099},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432467","who":"","why":"","name":"","created":"2018-01-23T13:41:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeWyA==","id":"5d178546-44d0-4756-8bc1-aa84c958ec6d","last_modified":1516714882194},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432467","who":"","why":"","name":"","created":"2018-01-23T13:41:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye9zw==","id":"ce6dc2f0-5709-49d6-a762-87e297e2c4f3","last_modified":1516714881354},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1427034","who":"mgoodwin@mozilla.com","why":"","name":"key compromise","created":"2018-01-17T13:03:45.551668672Z"},"enabled":true,"issuerName":"MHAxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xLzAtBgNVBAMTJkRpZ2lDZXJ0IFNIQTIgSGlnaCBBc3N1cmFuY2UgU2VydmVyIENB","serialNumber":"Cn+uUpLudsH09lYYIPTK5A==","id":"37450b9d-89e2-4144-af21-c01dfb50d5e8","last_modified":1516714880459},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430498","who":"jc@mozilla.com","why":"","name":"registry problem","created":"2018-01-17T00:30:37.551668672Z"},"enabled":true,"issuerName":"MHIxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJUWDEQMA4GA1UEBxMHSG91c3RvbjEVMBMGA1UEChMMY1BhbmVsLCBJbmMuMS0wKwYDVQQDEyRjUGFuZWwsIEluYy4gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"AJk3QFH13eHUHHVnsvwS0Vo=","id":"c3485d18-5309-46f4-a324-b72aae76d2fa","last_modified":1516150019120},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430498","who":"jc@mozilla.com","why":"","name":"registry problem - remove after Feb 2018","created":"2018-01-16T14:26:03.648712626Z"},"enabled":true,"issuerName":"MHIxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJUWDEQMA4GA1UEBxMHSG91c3RvbjEVMBMGA1UEChMMY1BhbmVsLCBJbmMuMS0wKwYDVQQDEyRjUGFuZWwsIEluYy4gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"NlLRZJFLco/An3cLAGjGgQ==","id":"ee550d4f-2e5e-4a92-84a0-97595775682d","last_modified":1516119227966},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430172","who":"jc@mozilla.com","why":"","name":"key compromise","created":"2018-01-12T16:24:38.732932137Z"},"enabled":true,"issuerName":"MIGSMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE4MDYGA1UEAxMvQ09NT0RPIFJTQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIgQ0E=","serialNumber":"TasC8Zd8BT8kXEE67cFQmA==","id":"fd5a2c90-20dc-49fa-8d98-4ce4f75a9e67","last_modified":1515779270416},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1425376","who":"jc@mozilla.com","why":"","name":"key compromise","created":"2018-01-12T16:10:12.532698105Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"UDE/uwr4z5V8eZI4+1gkAw==","id":"c848badb-926d-4a4b-84ca-776d8e83afbd","last_modified":1515773559723},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429636","who":"jc@mozilla.com","why":"","name":"key compromise","created":"2018-01-12T16:07:30.989396006Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEUMBIGA1UEBxMLU2FudGEgQ2xhcmExGjAYBgNVBAoTEUludGVsIENvcnBvcmF0aW9uMSUwIwYDVQQDExxJbnRlbCBFeHRlcm5hbCBJc3N1aW5nIENBIDZC","serialNumber":"HwAABsvzDP+DIzUG6QAAAAAGyw==","id":"754959ef-52da-40c2-9f01-6d58cee4bb6e","last_modified":1515773559394},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MFQxCzAJBgNVBAYTAkJNMRkwFwYDVQQKDBBRdW9WYWRpcyBMaW1pdGVkMSowKAYDVQQDDCFRdW9WYWRpcyBFbnRlcnByaXNlIFRydXN0IENBIDIgRzM=","serialNumber":"bqapwACCtKhVagTl7cEP7KFbM0E=","id":"557dce95-1f9d-4292-b0e3-1e6190ceb6b2","last_modified":1515506204155},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"BFA=","id":"8b5b2498-3bda-404a-b778-8231f31548ed","last_modified":1515506203323},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfNbw==","id":"54bc1bfd-3c57-4698-9702-bf18862330e5","last_modified":1515506202308},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"Eg==","id":"bc46d429-2528-4068-b205-b0f853e3865b","last_modified":1515506201306},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1425166","who":"jc@mozilla.com","why":".","name":"key compromise","created":"2017-12-14T17:17:08.723413Z"},"enabled":true,"issuerName":"MIG0MQswCQYDVQQGEwJVUzEQMA4GA1UECBMHQXJpem9uYTETMBEGA1UEBxMKU2NvdHRzZGFsZTEaMBgGA1UEChMRR29EYWRkeS5jb20sIEluYy4xLTArBgNVBAsTJGh0dHA6Ly9jZXJ0cy5nb2RhZGR5LmNvbS9yZXBvc2l0b3J5LzEzMDEGA1UEAxMqR28gRGFkZHkgU2VjdXJlIENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcy","serialNumber":"AOfHzdPzlvw5","id":"47a94296-eb80-4f80-a327-d6c0dcf96e83","last_modified":1513273512012},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423400","who":"mgoodwin","why":"Added per CA request","name":"Microsoft IT SSL SHA2 revocation 2","created":"2017-12-06T16:51:03Z"},"enabled":true,"issuerName":"MIGLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMRUwEwYDVQQLEwxNaWNyb3NvZnQgSVQxHjAcBgNVBAMTFU1pY3Jvc29mdCBJVCBTU0wgU0hBMg==","serialNumber":"WgAFElbyxxPA8BdM4gABAAUSVg==","id":"41d101d3-2258-4c62-94b4-288e140a4205","last_modified":1512596195433},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423400","who":"mgoodwin","why":"Added per CA request","name":"Microsoft IT SSL SHA2 revocation 1","created":"2017-12-06T16:51:03Z"},"enabled":true,"issuerName":"MIGLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMRUwEwYDVQQLEwxNaWNyb3NvZnQgSVQxHjAcBgNVBAMTFU1pY3Jvc29mdCBJVCBTU0wgU0hBMg==","serialNumber":"WgAFElcDxFjoswSzjAABAAUSVw==","id":"d6e37caf-2691-4a82-8682-72b454419d8c","last_modified":1512596194454},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"em/HTY01Cvv6ITgkH+ftlg==","id":"7b48e485-3f00-4838-98d7-78c731f014e7","last_modified":1512488574225},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"a2GKnRbYMZ0oZkRzJE8NIw==","id":"0efe9970-3656-4aa9-8fd2-cfe290ca2c7e","last_modified":1512488573423},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"QspbHxzWb41SX9TUhF1N1A==","id":"bb2d8dfc-6dd0-47c3-a46c-c0f8235418a4","last_modified":1512488572398},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"PbXdgANzAyCOCZ5qa/7E6A==","id":"f3f7d94c-c3d6-48f1-b807-43c97784dcdc","last_modified":1512488571476},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"EgtJ1f+/tZwlGfg0Uu7XCQ==","id":"331b24c7-b0dd-4289-9ef7-a4f92eb4f449","last_modified":1512488570451},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"TbPyD9NnsEcxyK6LIsr78g==","id":"eb7bda20-89d0-4ed5-a731-0896127de01e","last_modified":1512488569530},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"JjjcXrfGjTCi1ug/AEeYlg==","id":"0f7d3bf7-ddeb-4c1b-ba24-7ae9157bba15","last_modified":1512488568584},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"HGD2RtvXMaPDqHIPLdXocw==","id":"b26128cc-3096-438e-858f-7c2cbaf3c903","last_modified":1512488567585},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"fa9agGguMHfBorMTXXMd9g==","id":"2ace54b8-3856-4aa9-bd26-45f573e737ce","last_modified":1512488566638},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"WfPUsnnSF04ShWVYEa/KRA==","id":"5bc1d739-7788-4f13-b92c-5b6a8662319b","last_modified":1512488565741},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"LzVYePklc3vH3jkk0BZr9g==","id":"bc7eea97-3ee7-49a0-80a7-c0f1a346a1c4","last_modified":1512488564721},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"BWuckD4dPHZYW5ThBsl+aQ==","id":"2a474462-256d-4583-9103-297077b85bad","last_modified":1512488563751},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"LJ8wKbrQXgT8VExZ6vEfWA==","id":"4a1c1053-a8a9-42ff-bb3e-3ac5c536d5c3","last_modified":1512488562853},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"GskXrIFkzLS+4yohQM9EUA==","id":"a3b8a885-9d36-483c-8b4c-c80e8795bb92","last_modified":1512488561945},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"X3iUdzxCEtOAKpiTLsqjBA==","id":"7fc162c0-b668-4336-ad9a-cf6ac4bf7f88","last_modified":1512488560934},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"UKM/CNF2OvC4giYnAUG/Ag==","id":"7f8575f4-dcd7-4e51-9540-674ea52a0afc","last_modified":1512488559917},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"fZ10MyCe51jAjZCsDgqaxA==","id":"a943a2dc-e783-4560-90ec-5b2ce4936f60","last_modified":1512488558952},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"Gz4uHrL2usrTZrPCHeuF5g==","id":"cf84a41a-afeb-4727-b51e-f1489075f5a0","last_modified":1512488557959},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"bf8hEJywo1lAp4UNcLl5Ew==","id":"26c0ae81-c15c-4f37-930c-f3c39fca709a","last_modified":1512488557038},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"P4sUnc++hlU/bXj0zSTlcQ==","id":"1a68fa22-b801-4f56-81b2-a6575dd928ac","last_modified":1512488556115},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"KUZMXOUj2sdY2i2Rfgp/5Q==","id":"4c1f25cc-e17b-4ce4-a0c8-ab871a370238","last_modified":1512488555092},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"a9HDb1beqQYmkvFH0qExcg==","id":"b876cede-af38-44ff-952b-cf1652e0eff4","last_modified":1512488554136},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"C2tQZWb2eoQD2XC3F5JSzg==","id":"67c163b1-7be2-434d-9a17-24ab282e0906","last_modified":1512488553221},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"QjiuX0y1agXQQqmDB2yh3w==","id":"966bf4c9-229d-40ea-8783-cdd20a90e7d0","last_modified":1512488552326},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"YwslVqGwc9CHkaZkXNZ4xw==","id":"e35a9cd7-72a9-44b6-bb42-c43054e279d3","last_modified":1512488551279},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"KRfQOuBdOSpEmAxSpDZGZg==","id":"3901e046-eee7-462e-9207-62a2074d5555","last_modified":1512488550258},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"IARKrBjlKQLyVGA4X52L7w==","id":"59872bbc-66b1-4627-890b-b8e9aee46d08","last_modified":1512488549244},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"TsaDDThhoyhX10SURO3NMg==","id":"477a1238-b526-4dbf-9e7d-8807315f8e5a","last_modified":1512488548206},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"dSBsq/te0hzZauKHgJ3EWg==","id":"320c2435-4a3d-4a9c-898e-0be3e7314601","last_modified":1512488547208},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"JLLEdDl2iHqqyenVWwQ/XA==","id":"d1d33ccd-4ea7-4b1f-9969-b77036da72c0","last_modified":1512488546183},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"D4dSwi4udjGtMftKLTSFyg==","id":"36e0661b-bbce-412d-b181-f51599b5133f","last_modified":1512488545212},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltmw=","id":"7ab02aa8-9300-4e05-bd35-1a8a0dc66114","last_modified":1512488544217},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltm8=","id":"3128a9a7-5929-495d-b6e9-d1322d8969cc","last_modified":1512488543316},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"N4XreFRrqFQ=","id":"0cf09345-c803-4248-8e8f-4fd437efc225","last_modified":1512488542191},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwOA==","serialNumber":"Ah69dEvrzT4=","id":"eabda172-8673-4d9d-b955-ae33491273d0","last_modified":1512488541251},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"RXJFI0h6EJY=","id":"0ac03d6a-f013-45f1-a611-8d408d81cda2","last_modified":1512488540265},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"DA==","id":"8374c965-72aa-4411-96a9-d0ed94b6eff5","last_modified":1512488539210},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwOA==","serialNumber":"AklaZYwhC9k=","id":"0ef6e97e-f104-472f-a639-f5095bee2cec","last_modified":1512488538203},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGcMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxFzAVBgNVBAMMDlRydXN0Q29yIEVDQS0x","serialNumber":"APB/jQRgyP8Q","id":"89031d16-d554-432c-b874-29611e57ddc7","last_modified":1511530774264},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGkMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRydXN0Q29yIFJvb3RDZXJ0IENBLTE=","serialNumber":"AOVojQRgyPcY","id":"365afa37-c1b7-49a1-b426-3ad6f41062ce","last_modified":1511530773342},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGkMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRydXN0Q29yIFJvb3RDZXJ0IENBLTI=","serialNumber":"APB/jQRgyPca","id":"469dc3f7-856e-46e9-bcd4-4690669a1164","last_modified":1511530772420},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGkMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRydXN0Q29yIFJvb3RDZXJ0IENBLTE=","serialNumber":"AOVojQRgyPca","id":"350ab323-afb6-4b13-ad9d-4fd751b43b6d","last_modified":1511530771603},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"OeKv0wi+ATDxfQ6CWir1vA==","id":"f9cdfe8d-8646-4f51-a52e-2f8e207dd9af","last_modified":1511530770270},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"VNb2Hjai/t7dmCtOzRXXew==","id":"58ff4957-a4c8-490b-8ed2-28ec1730c0e5","last_modified":1511530769350},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"CuUEKEJM4xhxlFXraPcSpQ==","id":"7601c888-8cc4-4c4a-a1f8-c7035f722d59","last_modified":1511530768331},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"FK+rVRFA0o0PnW+X6V60gQ==","id":"94b0d239-ef85-46fd-8af6-4213e19bbe5a","last_modified":1511530767405},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"UT6GtTGbEC6SXJteWAKy2g==","id":"f232a4f0-ab91-4cde-acd6-28745c3c2bd0","last_modified":1511530766483},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"c0ENPRDbRozjU83garZrdA==","id":"5c07893e-ed64-43c5-aabb-fd7d059100f6","last_modified":1511530765531},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"ODTGURr0vY14WkIt15hHrg==","id":"26b8bba0-1be3-4f66-98d3-936a13c810b8","last_modified":1511530764744},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"RkNUwM80Jt7beb4ek+iI8w==","id":"e28af90b-6ca1-4335-876b-4afedaea6cf8","last_modified":1511530763884},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"dUIqmrcgq/261bRbo7fM1g==","id":"6d8170da-8177-4e04-988b-e24f36c39001","last_modified":1511530762701},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"XbPH0u4MjoIrWzN8QCilfg==","id":"a44b3f08-cbb8-4fbe-98c0-e7710dd3e81e","last_modified":1511530761466},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"KvQ5AzK6tQy8eBy7NAD/lQ==","id":"882fa317-43a7-4515-b79b-437119b72cf3","last_modified":1511530760452},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"UfM8pWkcmmLGRiGIVydmoA==","id":"069856d2-6bd0-4b39-a8f5-2debd4535542","last_modified":1511530759416},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"X4C5SJIG0BDeJvpQq4ngCw==","id":"9abf8a9e-66d2-4193-9dd8-3d86f482d44f","last_modified":1511530758551},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"CGo/+42e75JBJ2JcOEaMFw==","id":"879c2baf-c634-45eb-b80b-c1fb0ceb31d9","last_modified":1511530757370},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"Q1r0dRkkG9miuHj/Y52izw==","id":"9e9ecf02-4c1c-4c32-b10a-c7272c416b5f","last_modified":1511530756553},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"WU+jmMhGAumhewqVKrZBmg==","id":"27bf3c0e-8868-4274-b37c-b3a4bde99ba1","last_modified":1511530755428},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"d8ToN4Dfs5RqD2yfAp12yQ==","id":"972f597f-5333-4ec4-8801-751bb5546abe","last_modified":1511530754297},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"ElBUYv/f+6+gnbAJ23qnAA==","id":"6ad92631-7061-4717-93ed-b5f56d8452b1","last_modified":1511530753374},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"DoP7aSdEs/3y+o2Gj9zgWA==","id":"16737b7d-6e89-43d1-8a4a-0f1a931371f8","last_modified":1511530752482},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"XOZMbPKQuJEw8Ib5neDVpQ==","id":"6d117cdb-5081-48b0-8408-4ca74edb943e","last_modified":1511530751226},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"UN78HLEKf7W9vQYkzYpJnw==","id":"e52276ca-6055-4069-8277-e046a6c8dca1","last_modified":1511530750302},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"KNhgX8XuJduYciIyatpOQg==","id":"000e9e4e-75dd-46f1-8acc-acdb9844a1ba","last_modified":1511530749075},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"OIJdAvYxHmLb6YaaMmwmjg==","id":"b2085d97-60ab-449c-ad46-8ca2818da916","last_modified":1511530747846},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"SrQ125q7UcLfxVKepx+lRg==","id":"5b2d0011-e159-4fe2-8d40-72fd5c210474","last_modified":1511530746840},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"EYfoVrySx7V3OUqs4xKvgA==","id":"39bf9bb4-2301-4d71-8c46-7a88f5b0cbae","last_modified":1511530745816},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"EkoaKijVTGVYI5c604iweg==","id":"eb900242-3154-40c3-8f90-391c5c15a6d5","last_modified":1511530744778},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"VIFPnH3Io2OmF0J5KK8gzA==","id":"0aa3a176-7080-48d4-b8f2-8a3c60a6de88","last_modified":1511530743731},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"ANsAyDuSSs7Z83LfMZ+TDw==","id":"f20c25eb-a06f-43ac-a202-710565679819","last_modified":1511530742622},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AIQ8dLGqNIaxxMeg31W16Q==","id":"aec665a0-9d68-4342-9743-18efc713e0f8","last_modified":1511530741394},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AIQ8dLGqNIaxxMeg31W16Q==","id":"8a10108d-b91c-49da-9748-72421d965126","last_modified":1511530740428},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"cFbYT3bxd1sAAAAAUdNX8A==","id":"892f7600-cbf9-41d7-8854-91e39cca6d64","last_modified":1511530739059},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"DNHqTQd9QC+JnMy6AWyhkg==","id":"8f08f0c9-78a0-46cf-ac37-4d272b696046","last_modified":1511530738030},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-02T22:09:46Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AxPlMqxkByCn3XNuYMhYNMcp","id":"eab2fa01-c3d4-4fd1-b3b8-9d88ed9b6657","last_modified":1509980661621},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723413Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BPVqx4UbKVAbJSFTKwrcFryU","id":"f644b647-a845-40ef-9f6c-36744f304d08","last_modified":1509744817871},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723410Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOncXh7IZp1SNydhtUdyh2O2","id":"58e3d1dd-4602-4b04-9f99-3f6efe1b0653","last_modified":1509744808464},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723407Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOc11keA9WJ9R20XQY8hO7yi","id":"749a02fe-2f0d-4eeb-84ff-f2730ec10bdf","last_modified":1509744807487},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723405Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOPwjyn5eqfeoxs7Z0y3vqNN","id":"9bcd94b9-c798-43da-9520-f15ffd3418e8","last_modified":1509744806955},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723402Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BONHqLIx/ibQE08IQIyoGaXg","id":"1b719105-db02-4597-8d5e-4e60a72167dc","last_modified":1509744802604},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723398Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOIIipysxAz5xHIMmFRvYchY","id":"6f43ef92-37ea-407d-b113-0d1a2f30af6d","last_modified":1509744793918},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723395Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BLlQHJ611eOZuedFrFgVAfAs","id":"af6370dc-0ee2-4f46-864b-4aba6dad16aa","last_modified":1509744793363},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723392Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BKrxi2/1iFxHEFzyZvegxq5C","id":"8636eb93-74a1-4a6a-9fbe-c027fce6e1f3","last_modified":1509744792878},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723390Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BKobzjrOxa/6kCR0ImKoqaQW","id":"87cdeef4-a32f-4f89-90b2-d979766f66fd","last_modified":1509744792287},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723387Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BJDHnthjoDRutxFRJPFnixbU","id":"fd062b35-a923-4f40-adb6-b438b21dcebb","last_modified":1509744791739},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723385Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BHT6CK6B569m/dd5dEluBOEd","id":"dbd760d1-545a-4c22-9634-8266b173fea7","last_modified":1509744791182},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723382Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BDV89QWZE9MJYlCpFQUv5Y2W","id":"5933c583-8b53-41b9-a23d-3fa849a39f22","last_modified":1509744790658},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723376Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A/99bZCzSpexYL5y6dSryDn3","id":"62a22818-bb50-4f99-ae28-194943003e28","last_modified":1509744790097},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723373Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A/7DHCczBnP5qUVh0jF2pvwB","id":"930fdbad-652c-445a-be30-1721420d5308","last_modified":1509744789472},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723371Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A+ly3y1rVP59k/MKfcE3DoEq","id":"2be75058-2815-46b4-97de-5f800fac23fb","last_modified":1509744776797},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723368Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A+RCQYwhofmXM+/hxdyoUzkI","id":"ece94a68-9224-462d-aa7d-174e461c3eac","last_modified":1509744776283},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723366Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A9BRwOwbXRRhCe+kcmglgW3z","id":"b17c537a-31c2-4547-90a7-5588e967e0d2","last_modified":1509744775761},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723363Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A8wZnhfuY6VIV1SwGsTGNR7L","id":"06dd2b87-9f23-4ecf-a6d7-1c4e248c377d","last_modified":1509744775215},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723361Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A8aDg1/IA4O8gjMPZHVqPI+w","id":"e90d77e0-1e41-4a45-9c4b-a0b615b0091d","last_modified":1509744774659},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723358Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A8LV4zckxcwdttbQSk0EPnoA","id":"421f4d83-9377-403a-b28b-c7249634e7fc","last_modified":1509744774150},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723356Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7uy+rmTav6tDH4dRrsnvXGH","id":"188d1c6c-c94c-4a1a-8028-cbc7c29069d4","last_modified":1509744773593},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723353Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7T0V6o47rgCKl3oUb7jF2Ph","id":"fee8894c-8624-41fc-ae9a-7180f52714f1","last_modified":1509744773026},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723350Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7RCxMe1S9Hb7ENzRxl0mxGP","id":"fca062d6-5292-4ca1-87ce-a6aa34c6a1ae","last_modified":1509744772514},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723348Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7GX+szdK8/7Kf0xUuarfyIN","id":"fcaebe3c-564b-46c0-a852-a6e51d8a56cf","last_modified":1509744771973},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723345Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A5oET6WBWx72ColKf0txoWyR","id":"b6cd6dd6-4173-4584-ad06-d3a6400f4c4c","last_modified":1509744771414},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723342Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3ZQibPGSZ8nPVbuccaCvUfa","id":"c67ca525-ccdb-4ef9-8029-422656cbdbc8","last_modified":1509744766044},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723340Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3WVy2V+2VFkWtMvA6HFwnhq","id":"69b9dc1c-9178-4090-82d2-4ecb650bf8a6","last_modified":1509744762617},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723337Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3UNTBOHUkbq+k999nJeSJdF","id":"12f76ac6-cb54-42d2-90e2-a06fbf6cc681","last_modified":1509744758183},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723335Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3TWA5Aylxw0x8bVvrmUSNJd","id":"6765cc1a-15e0-46e8-b74a-30a03f538885","last_modified":1509744757639},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723332Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A1V4dX0tTb1rdTZxdWcuZ7YR","id":"fddf483c-b881-4a58-a24c-03b0f46ca701","last_modified":1509744754400},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723329Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A0BOaf9UbJxzqBudSyes/cEM","id":"21c2287c-c873-4a06-bd80-8c2498deee0c","last_modified":1509744746034},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723327Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AzL4tLuklekJ8lSh6VnRMSrk","id":"fe19f480-7306-4eb4-a434-bb21e983102e","last_modified":1509744744506},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723324Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AyjNQ4dnGD3FD6WL5gYrYru7","id":"22ef2da0-8e63-40fe-8644-667178538911","last_modified":1509744743907},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723321Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AyYMguSo1my449OZq51C3s3Z","id":"bbb3fb02-ff86-44d0-859b-9b827c4943ad","last_modified":1509744743316},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723318Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"Ax6Jm7ajV49tqHgf9nYnzRCI","id":"f2b5d0ef-312b-4de2-9cd6-e0fb9bf262df","last_modified":1509744742729},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723315Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AxW0+uDsfyCSfhECdsGGpVD8","id":"0266840c-ce0c-47c1-8816-2c4f4b29b3f4","last_modified":1509744742199},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723168Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AwBGo0Zmp6KRryAguuMvXATI","id":"d5c21685-054a-4233-a633-0af3d769b0e7","last_modified":1509744741583},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARU=","id":"b91f4d33-972a-42ab-859f-0d3c8b68efe4","last_modified":1507714028770},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"RqFXxGPuA18=","id":"c75a0024-f08d-49e1-b8fc-1ca9bbb47965","last_modified":1507714027119},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABQaHhPSY=","id":"ddb917af-e251-48bc-91eb-59076ddf8494","last_modified":1507714025550},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABQaHhNLo=","id":"e606e8ce-32ef-4ffe-b9fd-7eced767b9b2","last_modified":1507714024574},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABQaHhOT4=","id":"259ff0a7-151c-4b7e-b449-98922b6bbfe3","last_modified":1507714023126},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMTowOAYDVQQDEzFHbG9iYWxTaWduIFBlcnNvbmFsU2lnbiBQYXJ0bmVycyBDQSAtIFNIQTI1NiAtIEcy","serialNumber":"AeNmeF8oVpDp/4GPvA==","id":"82e8996b-8424-4e5d-849a-9cb6c134773b","last_modified":1507713902396},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MIGRMQswCQYDVQQGEwJERTEQMA4GA1UECgwHU2llbWVuczERMA8GA1UEBRMIWlpaWlpaVjAxOjA4BgNVBAsMMUNvcHlyaWdodCAoQykgU2llbWVucyBBRyAyMDExIEFsbCBSaWdodHMgUmVzZXJ2ZWQxITAfBgNVBAMMGFNpZW1lbnMgSW50ZXJuZXQgQ0EgVjEuMA==","serialNumber":"WW8OCQ==","id":"a8ba8579-79d8-494e-b5bc-f9b8a6efae71","last_modified":1507713900874},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MIGRMQswCQYDVQQGEwJERTEQMA4GA1UECgwHU2llbWVuczERMA8GA1UEBRMIWlpaWlpaVjAxOjA4BgNVBAsMMUNvcHlyaWdodCAoQykgU2llbWVucyBBRyAyMDExIEFsbCBSaWdodHMgUmVzZXJ2ZWQxITAfBgNVBAMMGFNpZW1lbnMgSW50ZXJuZXQgQ0EgVjEuMA==","serialNumber":"AaoZYg==","id":"316627fa-3b68-48e4-909f-9fc58fc69a62","last_modified":1507713899233},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydCwg==","id":"7696b73a-52f8-4902-b6b5-130d22222f15","last_modified":1507713897487},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BEeJFwO0nu759EPo9tKluw==","id":"113485f8-45db-488e-b45a-7917fcf4878c","last_modified":1507713895927},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402158","who":"mgoodwin@mozilla.com","why":".","name":"Certinomis Cross-Signed StartCom certs","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","serialNumber":"Wu0lOm5kylP5uOu6md4xmWC3AtQ=","id":"9945629e-f285-47fd-9241-05cb75c041e6","last_modified":1506372739199},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402158","who":"mgoodwin@mozilla.com","why":".","name":"Certinomis Cross-Signed StartCom certs","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","serialNumber":"Z7mwlz4NA2s+8dnwRzT/RvK9ZZQ=","id":"0f1e6e75-0f69-407f-bccd-5838401393eb","last_modified":1506372738063},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402128","who":"mgoodwin@mozilla.com","why":"These issue only client certificates and do not need to be trusted for SSL/TLS server authentication","name":"Add Cart\u00e3o de Cidad\u00e3o to OneCRL","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"a0zzyZD4OEdRpzTBCGWFnQ==","id":"b931ec9c-45a9-4719-b2fe-fd6c903b63f1","last_modified":1506372736800},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402128","who":"mgoodwin@mozilla.com","why":"These issue only client certificates and do not need to be trusted for SSL/TLS server authentication","name":"Add Cart\u00e3o de Cidad\u00e3o to OneCRL","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"ObszBuNYqt9If26rE5MLnA==","id":"1aadc1b7-2a94-4178-9ccb-64ba471135b7","last_modified":1506372735297},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1400600","who":"mgoodwin@mozilla.com","why":"Three cross certificates issued by the Baltimore Cybertrust Root to the Siemens Internet CA V1.0 have not yet been revoked but should be added to OneCRL.","name":"Baltimore Cybertrust Cross Certificates issued to Siemens Internet CA V1.0","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"CcaPWuZtcdneSnerYJH33A==","id":"2f081df6-2a06-4a11-ba8a-368275363e9c","last_modified":1506372734155},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1400600","who":"mgoodwin@mozilla.com","why":"Three cross certificates issued by the Baltimore Cybertrust Root to the Siemens Internet CA V1.0 have not yet been revoked but should be added to OneCRL.","name":"Baltimore Cybertrust Cross Certificates issued to Siemens Internet CA V1.0","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"DL0FAAzqeadFvWvsl9xaiA==","id":"07eff59c-72ff-4fa5-bdf6-756974fea58c","last_modified":1506372733055},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1400600","who":"mgoodwin@mozilla.com","why":"Three cross certificates issued by the Baltimore Cybertrust Root to the Siemens Internet CA V1.0 have not yet been revoked but should be added to OneCRL.","name":"Baltimore Cybertrust Cross Certificates issued to Siemens Internet CA V1.0","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydWSw==","id":"f5108d78-08e8-4a73-b7e6-5722bc181931","last_modified":1506372732025},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1394595","who":"mgoodwin@mozilla.com","why":"Unknown","name":"Add Firmaprofesional subCA Santander Digital Signature to OneCRL","created":"2017-09-07T11:55:05Z"},"enabled":false,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"QwCyx4wTlCQ=","id":"56e5b51e-6b90-4b87-8ca0-4f58d49e648d","last_modified":1504798798154},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1393281","who":"mgoodwin@mozilla.com","why":"Unknown","name":"Add FNMT's AC Representaci\u00f3n certificate to OneCRL","created":"2017-09-07T11:55:05Z"},"enabled":false,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"YcLU1PaprndVkma5ja/WIQ==","id":"756c3e21-c95d-4e5d-b5cb-00da9d658a78","last_modified":1504798796757},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1397312","who":"","why":"","name":"","created":"2017-09-06T16:07:44Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"UWMOvf4tj/x5cQN2PXVSww==","id":"0b0401dd-4f39-4740-b911-6ab11ab5edb3","last_modified":1504710470915},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1397312","who":"","why":"","name":"","created":"2017-09-06T16:07:44Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"AINVG9I4T2jgQgW4N9SNhw==","id":"a1d4104f-7bf3-4c00-9174-29b580030fee","last_modified":1504710469413},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1397312","who":"","why":"","name":"","created":"2017-09-06T16:07:44Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","serialNumber":"BUE=","id":"d081997f-6074-4f9e-b5b8-aa572a1d3177","last_modified":1504710467840},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1392378","who":"","why":"","name":"","created":"2017-08-21T20:42:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeLBg==","id":"e130c036-75e7-4e76-a93a-392fb9568b30","last_modified":1503344586238},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1381863","who":"mgoodwin@mozilla.com","why":"CA request","name":"T\u00dcRKTRUST EV SSL Sertifikas\u0131 Hizmetleri H5 - Add TurkTrust Intermediate Certs to OneCRL per CA's request","created":"2017-08-21T16:42:55Z"},"enabled":false,"issuerName":"MIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0wSwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1","serialNumber":"AUMyuCiycPJJ","id":"e8c04b9e-6bbd-4fbf-bcb0-a2177ac9c04a","last_modified":1503344585208},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1381863","who":"mgoodwin@mozilla.com","why":"CA request","name":"T\u00dcRKTRUST Nesne \u0130mzalama Sertifikas\u0131 Hizmetleri H5 - Add TurkTrust Intermediate Certs to OneCRL per CA's request","created":"2017-08-21T16:42:55Z"},"enabled":false,"issuerName":"MIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0wSwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1","serialNumber":"Aay2vr4aoUeZ","id":"af014072-16c1-4375-94ac-e8ee7611ccd3","last_modified":1503344584093},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1381863","who":"mgoodwin@mozilla.com","why":"CA request","name":"T\u00dcRKTRUST Basit Elektronik Sertifika Hizmetleri H5 - Add TurkTrust Intermediate Certs to OneCRL per CA's request","created":"2017-08-21T16:42:55Z"},"enabled":false,"issuerName":"MIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0wSwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1","serialNumber":"AZkNBFXrl1Zg","id":"5b62df54-5b45-424c-b126-a6442013861a","last_modified":1503344582959},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1391095","who":".","why":"https://groups.google.com/forum/#!msg/mozilla.dev.security.policy/Qo1ZNwlYKnY/UrAodnoQBwAJ","name":"Add AC FNMT Usuarios certificate to OneCRL","created":"2017-08-17T17:54:25Z"},"enabled":false,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"RV864VwhzbpUT4KqR1Hr2w==","id":"5e3a7625-ad9e-4713-89e7-3cddd3c0a781","last_modified":1503344581693},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"ATk=","id":"b2eaf8f3-f13b-4294-9a7c-5f70cda440b0","last_modified":1501513259932},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"ANU=","id":"d91f7502-e635-4fa6-b2da-9dcbac7a73b5","last_modified":1501513258828},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"QOu0a5Z9rCkw6Nk7Rg1/AQ==","id":"c302fc31-c64b-4105-bec4-2895e7201f97","last_modified":1501513257806},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"Xmo3AIW2VHeeJoR0o09RGQ==","id":"5be4587b-7e7d-4362-90ae-ec54e5c84a59","last_modified":1501513256610},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"SeEzbpTltqUtqW7UiuJ2","id":"8dd80d48-07b1-419d-9992-dac30fced89e","last_modified":1501513255352},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"RMgdRGEBv0KzFCjgGFp0Hg==","id":"5f913c3e-d525-4ecf-b374-45e1e40d75b1","last_modified":1499778717805},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"E/YGRk12iZqZuMfsIiVaeg==","id":"398c4ee1-de04-429c-8dbb-cdc0c232b145","last_modified":1499778716926},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"O2Qh+qhbBRuZA11yDhcLGQ==","id":"d87aa7c0-507c-4795-b4c5-812e387c3eab","last_modified":1499778716028},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"D/VlGqmz9Nai1ywCydT/RQ==","id":"6094fb26-7fbf-48b0-83b0-42750450cb4e","last_modified":1499778715137},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"B8f7CHJUqV3VareLPE+2kA==","id":"33c37dfe-6270-49e8-b437-e593e6905679","last_modified":1499778714260},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"HVRikKXRQ1ouhOpYcOna/A==","id":"18c1851b-db94-4913-8688-368d7ed7bc61","last_modified":1499778713388},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA3IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNA==","serialNumber":"RmI44ARDVCUOgXNK9ACAbg==","id":"f4213dc2-9eb3-44a8-8be4-accb6d408075","last_modified":1499778712492},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"Aj/CJN2QWZAF25GXPXADOA==","id":"03a9b3e7-7787-41db-98db-e2fbd024ef45","last_modified":1499778711624},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"CgFBQQAAATjkOB1sAAAAAg==","id":"1b74aa7b-2506-48bd-88bc-39af44ee70ce","last_modified":1499778710731},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"JGKKnm00uOQ=","id":"c6c10916-eb0c-4c4f-a812-4d6390e8a738","last_modified":1499778709784},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1375006","who":"","why":"","name":"","created":"2017-06-21T13:43:45Z"},"enabled":true,"issuerName":"MGsxCzAJBgNVBAYTAlVTMQ0wCwYDVQQKEwRWSVNBMS8wLQYDVQQLEyZWaXNhIEludGVybmF0aW9uYWwgU2VydmljZSBBc3NvY2lhdGlvbjEcMBoGA1UEAxMTVmlzYSBlQ29tbWVyY2UgUm9vdA==","serialNumber":"B2VhZAPxCDH3s9Mkbu3HfQ==","id":"4961246c-b140-4db0-87d7-d240f049b67e","last_modified":1498049030788},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1375006","who":"","why":"","name":"","created":"2017-06-21T13:43:45Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"ANUANvVYN7xqAISA9rvJPzQ=","id":"bdb19be5-1d67-49a9-bd7e-a7bbd8dcccad","last_modified":1498049029660},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1375006","who":"","why":"","name":"","created":"2017-06-21T13:43:45Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"CgFBQQAAATjtdPY5AAAAAg==","id":"fe6d33ba-fc97-485c-9b8a-639dd6d150d8","last_modified":1498049028433},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1374809","who":".","why":"Private key leaked","name":"Leaked private key for Cisco cert","created":"2017-06-21T12:45:09Z"},"enabled":false,"issuerName":"MF4xCzAJBgNVBAYTAlVTMTAwLgYDVQQKEydIeWRyYW50SUQgKEF2YWxhbmNoZSBDbG91ZCBDb3Jwb3JhdGlvbikxHTAbBgNVBAMTFEh5ZHJhbnRJRCBTU0wgSUNBIEcy","serialNumber":"ZhcM4uyLfYi04utzLnOP46Z89nI=","id":"bb8ba6ba-4e19-407d-ab9d-9f8aafd2c312","last_modified":1498049027284},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372336","who":".","why":"Banca d' Italia does not have a current audit for Baseline Requirements compliance","name":"Banca d'Italia Root's X-Certificate","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByemaA==","id":"7df83512-01f2-4d2c-af53-fcf4d87defd9","last_modified":1497542609610},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1373288","who":".","why":"","name":"Revoked intermediates","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"RsdOCxepZXHEs1ErwPc=","id":"b21c90ad-5618-40c1-ac75-eaf73b2c333b","last_modified":1497542608552},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1373288","who":".","why":"","name":"Revoked intermediates","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByembQ==","id":"e7397769-a603-486d-9696-84693b277203","last_modified":1497542607254},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1373288","who":".","why":"","name":"Revoked intermediates","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byemaw==","id":"148f7a38-535a-4097-a7a5-83abc4e35800","last_modified":1497542606104},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:06Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"MWzraR3LLhU9m/qKEhvVLQ==","id":"47786d55-ed71-461d-8ea0-3b074caac874","last_modified":1497362467654},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:05Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"eViJ2GX26lp5HbF+XNp1kQ==","id":"38355da2-f5ab-4882-a7e8-78ea5fc41e39","last_modified":1497362466761},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:04Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"U3KGm6UTqJ/nsMyteiUa2g==","id":"071f5229-616f-4ad1-a506-b48a9dbce21c","last_modified":1497362465694},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:03Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"OgxXyntHYBXnPAHDxY0OXg==","id":"95b7cd91-57b5-4e72-aa52-6a0546883af5","last_modified":1497362464680},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:02Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"GTPOETOFf5mIsbuzrojGfw==","id":"a7e4d7b5-50b7-412f-8592-ceb4f6db29a8","last_modified":1497362463643},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:01Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"NpsJHyt3o1U47AAgw3UNXA==","id":"f2e9d2ab-7220-460e-b4a4-02f3675e7a66","last_modified":1497362462415},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:00Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"RbG+tfPUe/vBRfTZF54i8g==","id":"9d320894-4ac4-49fb-bfcb-a71d97ebfe01","last_modified":1497362461438},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:59Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"dhjnNtYx6cojdAE55TgIBA==","id":"fd51db5c-9e30-4cdb-9736-1f10b80376a9","last_modified":1497362460372},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:58Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"Cf0103tCm9oulH1QK0weTA==","id":"a02fbc88-df3e-4d81-b9e3-7a7088e193b0","last_modified":1497362459446},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:57Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"GuJ0aGBYhChXAOljooJZ3A==","id":"375b3822-bf9f-4c3d-8633-02f7a03597ac","last_modified":1497362458420},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:56Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"OOkLFZaa4CXGyJlLTIEjUQ==","id":"815b19c3-6c68-49fd-b9c4-f488317c9e8e","last_modified":1497362457510},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"A/kVDQpE7c9h+WxlWQFzSQ==","id":"ae9bb73c-5360-4685-a5e9-8098b95617d5","last_modified":1497362456459},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:54Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"VP3bQF/UdNfxq/UOypU1zQ==","id":"9e057902-89e3-49eb-9e56-f878c1c05f4f","last_modified":1497362455630},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:53Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"G8sz+bm+vQjTpQNBh5CfMg==","id":"d7283b5c-18aa-4cda-9158-fae5ae41ad09","last_modified":1497362454734},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:52Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"PmDn14AwWY28IlJeBXkDvA==","id":"43838f76-1ecd-4a7e-9a81-f9f2449f31f1","last_modified":1497362453713},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:51Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"aBXsv0oU3xqh2xkUPOi8","id":"380057fa-8d61-4ee2-a6a1-f6bc5d210e40","last_modified":1497362452684},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:50Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AIZ6Wq/4deFQzwC6NnFpUA==","id":"15c3777b-b91b-461c-99c5-761d6185b109","last_modified":1497362451663},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:49Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"APiyCXmwAUq+95DYa3DmGw==","id":"583ee36f-2136-418c-bab7-2d5ed62aad0a","last_modified":1497362450536},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:48Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEeMBwGA1UEAxMVU3dpc3Njb20gUm9vdCBFViBDQSAy","serialNumber":"AL691kTvkemG9UQNa6McQg8=","id":"a2fad4bd-2ce5-4ecf-97e2-1612bde41ed2","last_modified":1497362449522},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:47Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"AI7cApIcPA3cfSpQMf40onQ=","id":"7b9f5e88-b3a1-4071-ad7f-fce8459aa3a5","last_modified":1497362448476},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:46Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"OUOBG6TE0Lr+uYYGxeVbHg==","id":"418575d9-15aa-4b24-9ba5-3764748e3245","last_modified":1497362447464},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:45Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEeMBwGA1UEAxMVU3dpc3Njb20gUm9vdCBFViBDQSAy","serialNumber":"QFLH3Zrq+I5WQ6TlWzfUxA==","id":"65123c45-adf1-40a7-9531-a66d818ae6ab","last_modified":1497362446438},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:44Z"},"enabled":true,"issuerName":"MH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYDVQQDEyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"fqRDfSf8haCEh2nWE6O+bA==","id":"07e6dcee-ed47-4aa9-bc69-cd8c50be9eaf","last_modified":1497362445416},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:43Z"},"enabled":true,"issuerName":"MH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYDVQQDEyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"eohOGeS5ZHJeptyBvCu/mQ==","id":"11009f24-3e40-4372-82cb-c640be931a51","last_modified":1497362444493},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:42Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnY=","id":"d4cc9f44-f6a3-416d-92f5-d9d1242eff77","last_modified":1497362443469},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:41Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltm0=","id":"d448448b-1f23-4815-a563-c4a7996615ce","last_modified":1497362442343},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:40Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnQ=","id":"04f35e34-8280-4b48-a5b3-bb61b27445be","last_modified":1497362441423},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:39Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnE=","id":"133ff174-70c2-4cdf-b8d4-4bcc3db4b004","last_modified":1497362440295},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:38Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"LYTXWk7gMu8=","id":"3b0df03c-394f-43bf-bafd-6da07eca3c10","last_modified":1497362439285},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:37Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"azAcTWL+ijs=","id":"0e15f9c5-75e7-4b8c-9f10-99f8998eda98","last_modified":1497362438146},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:36Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"ATE6YA==","id":"73604eec-92dd-48a5-a040-b5644c4c9799","last_modified":1497362437119},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:35Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"ATE6Xw==","id":"7e3d897e-9724-443f-842b-2124ee1cd062","last_modified":1497362436009},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:34Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"ATE5Ig==","id":"cfe99f95-d3d1-4d4e-b312-6a7a0efedf09","last_modified":1497362434869},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:32Z"},"enabled":true,"issuerName":"MGkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOjA4BgNVBAMMMVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBQZXJzb29uIENBIC0gRzM=","serialNumber":"f43O9TualR8=","id":"ab95e89b-21cc-49c0-b4ac-0d1a3773b334","last_modified":1497362433845},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:31Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABL07hW2M=","id":"a2b93b68-1670-4c9d-a94d-e792364d24d4","last_modified":1497362432728},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:30Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABL07hXdQ=","id":"9aba77c3-ae07-443c-a0ba-ca01aadcc3eb","last_modified":1497362431692},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:29Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABL07hRxA=","id":"9065a612-801b-4b7b-9e2b-b87d584332a0","last_modified":1497362430669},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:28Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABL07hSVI=","id":"b1bb540b-be1b-4011-81df-998edb912fe1","last_modified":1497362429542},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:27Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/UQ==","id":"891cdd11-90ff-435c-9688-1a9e7aeb3a70","last_modified":1497362428621},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:26Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/Tw==","id":"43770c43-8568-4d25-b5f2-52623d4fcf78","last_modified":1497362427700},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:25Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeBQg==","id":"9ea34ca2-9f9d-483e-8a49-c3a17d055d47","last_modified":1497362426780},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:25Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/Tg==","id":"3d2ac953-a4f2-4f59-a7a6-7c9a8fadf2ca","last_modified":1497362425753},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:23Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/UA==","id":"78529990-77c3-404e-93bf-308ebf7033e9","last_modified":1497362424834},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:22Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/Ug==","id":"91e8f996-738a-4ff5-bf6a-4823c963d8e5","last_modified":1497362423604},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:21Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJhw==","id":"7e2f71f1-6463-460c-b6ce-2a8b25624d3a","last_modified":1497362422585},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:20Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeekA==","id":"9a55265f-72e6-4e38-b23b-b3f097136daf","last_modified":1497362421456},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:19Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bycfmw==","id":"d29166c7-29e9-4b00-878f-99f6a415a4d2","last_modified":1497362420326},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycfpA==","id":"b02d1c65-499b-4cf9-a2e5-cd3d172c06f6","last_modified":1497362419199},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:17Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycpYA==","id":"b544067a-575f-417a-ab9f-a9ef880c262e","last_modified":1497362418087},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:16Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydIoA==","id":"f91cf838-8125-41b5-9f6f-46891375de0d","last_modified":1497362416981},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:15Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEmMCQGA1UEAwwdQ2VydGlub21pcyAtIEF1dG9yaXTDqSBSYWNpbmU=","serialNumber":"GA==","id":"a980e313-d1dc-41dd-9bb8-921862a834be","last_modified":1497362415923},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:14Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEmMCQGA1UEAwwdQ2VydGlub21pcyAtIEF1dG9yaXTDqSBSYWNpbmU=","serialNumber":"Eg==","id":"8e1465de-a917-4608-b44b-ef02800eeb0a","last_modified":1497362414917},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:00Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEmMCQGA1UEAwwdQ2VydGlub21pcyAtIEF1dG9yaXTDqSBSYWNpbmU=","serialNumber":"HQ==","id":"d61c0990-8c57-4141-9fe4-d5a0f46371ec","last_modified":1497362413918},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"Rea7UUYH3jl33BryPIo=","id":"3f5a142c-40a3-4c89-9df1-a056702b984e","last_modified":1494458678750},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"RvCM2iRdkCE82ZOO2dU=","id":"3e1798dd-0356-44c2-917f-76b2f32ee998","last_modified":1494458667510},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"RdHgEmEIjdyRFWDRRlk=","id":"f8ebfd47-13fb-46c7-9b4d-334526c6ded9","last_modified":1494458658573},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R/j2qA==","id":"2ba77577-428a-4f7d-9d54-b088ecb696b2","last_modified":1494458649435},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlRXMRIwEAYDVQQKDAlUQUlXQU4tQ0ExEDAOBgNVBAsMB1Jvb3QgQ0ExKjAoBgNVBAMMIVRXQ0EgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QAEy3RIAAAAAAAAMweH5dw==","id":"81126721-940c-454b-bd0e-f538cd5ab646","last_modified":1494458639464},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlRXMRIwEAYDVQQKDAlUQUlXQU4tQ0ExEDAOBgNVBAsMB1Jvb3QgQ0ExKjAoBgNVBAMMIVRXQ0EgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"DL8=","id":"ff5d47b7-cb50-46f9-9da8-e778892a2caf","last_modified":1494458631103},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"AMs=","id":"6ff3473b-bd64-4b79-98c4-4622661c8e80","last_modified":1494458620210},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"AZ0=","id":"6aa5cbdb-19fb-4f57-9a4e-ddfbf06f50ae","last_modified":1494458595987},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"cx0HrIEQg8JHWTP7DzOxSQ==","id":"bcd2cb94-3cd2-49df-a372-50a258804cc1","last_modified":1494458581014},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"A4g=","id":"124dd7d2-59e3-4eb1-b93a-5e9a33cd6e4f","last_modified":1494458571110},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"A4w=","id":"0b21265d-dcfb-49c0-b9e9-e900412c1fdf","last_modified":1494458562276},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"APt5i5rs4dIIQPwZdk9/ISc=","id":"058e5554-d206-4b11-9791-dff120803f83","last_modified":1494458553816},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"OGPFrg==","id":"f27c1519-908d-4dca-a797-024c43844b52","last_modified":1494458545573},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByemaQ==","id":"cbc37076-9136-40fa-a079-4d443b7071ca","last_modified":1494458533053},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byemag==","id":"b9762946-8b71-40cb-844b-cafa2c0aed12","last_modified":1494458523822},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDtA==","id":"4b8b97f0-8a72-4ff1-af47-2fcd773c900f","last_modified":1494458510233},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydvrw==","id":"c3724a4d-2ed5-46a0-87dd-d7d339549c8f","last_modified":1494458498850},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAlRXMQ4wDAYDVQQKEwVUYWlDQTESMBAGA1UECxMJUG9saWN5IENBMSQwIgYDVQQDExtUYWlDQSBJbmZvcm1hdGlvbiBQb2xpY3kgQ0E=","serialNumber":"UbQGvw==","id":"20dc1a34-8afa-4d47-856f-810cc0a6f229","last_modified":1494458484988},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"LAVIFm0MWZYH+Sv8Vf+IqkM=","id":"d8f28ce2-8ee3-41a1-9bc0-ddad36f7c72e","last_modified":1494458469413},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"QM1zZ4GZ4gfwpQtUYye3Ne0=","id":"e35ececb-f12b-4fe4-bef8-ff7c3099fbe8","last_modified":1494458454435},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"YUlF+VXF2FWFqCo472HfZlw=","id":"0e806ef9-c9d4-455a-a462-cbb897cd8e20","last_modified":1494458439140},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"IHj3eiEK3K1Xrpu1uvtBuvE=","id":"023bf60f-9ed8-41ef-8ccb-1bf993f3f973","last_modified":1494458422758},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"RVWTeb5EKqE7cy7MUD2oJ3M=","id":"e5723e05-8b15-4cdb-b996-4d36b419a431","last_modified":1494458398872},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMg==","serialNumber":"UdNjvA==","id":"917e8337-dd57-4b8a-8994-2921f2fb69ef","last_modified":1494458377056},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"TA5iEg==","id":"16319df7-453c-d980-4624-d73d9cf43143","last_modified":1485907697001},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:37Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydSYg==","id":"ec171905-2990-30e0-74bb-9fc327c1c4bd","last_modified":1485907696954},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"Iqpyf/YoGgvHc8HiDAxAI8o=","id":"6fa017d2-461c-8de0-f8a1-ab0531097d8e","last_modified":1485907696908},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","serialNumber":"Hwexgn/ZCJicZPcsIyI8zxQ=","id":"4df86909-6b1c-f7cd-c71b-bb4b895d441f","last_modified":1485907696863},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","serialNumber":"RnQ3dg5KdDZs0nyFZk4=","id":"0971a89d-b11f-97c9-2ac2-f706757b75fb","last_modified":1485907696819},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","serialNumber":"RnQ3dYovwvB0D5q2YGY=","id":"d739cdcd-0078-92a9-2c46-6a5231f3d888","last_modified":1485907696773},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","serialNumber":"ALxyZmb/WL/wAuUiPK5oK/g=","id":"d6bedca3-c2b7-0402-337e-7788b9c97b85","last_modified":1484704581273},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDErMCkGA1UEAxMiQ09NT0RPIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"AKrMYlJmUUin8FOM/0TJrmk=","id":"42e2ce60-f40f-97a6-dd47-3ea2e2dd72d8","last_modified":1484704580920},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","serialNumber":"e7wSpVxmgAS5/ioLi2iBIA==","id":"59b02ba9-97ec-924b-d797-2c61c2be0d87","last_modified":1484704580894},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydrxg==","id":"224d1360-5aed-b81f-f24c-3d34e2ca3ec4","last_modified":1484704580868},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc85g==","id":"25a0eefb-aa44-23df-4dda-bb166836d4c1","last_modified":1484704580840},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"CdYL9vSQCEKzBwjO10ud2w==","id":"479ac2a4-7b6a-8db3-c5a2-be10eb5dec57","last_modified":1484704580815},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"fbsHfUkagQtznc3rtY1uDg==","id":"b1b1a5db-3c68-21be-8264-7146b0ee9e6b","last_modified":1484704580787},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"AJiU+bpWh2Uc4xFRf8GM9yA=","id":"60daf8a1-a929-0177-e7ba-76fff95fd20b","last_modified":1484704580760},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"Hnms0W0OxHSYE2F0XE97sw==","id":"55b72394-f4c1-3001-cf84-10f2068f2768","last_modified":1484704580734},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye2Cg==","id":"e2277fc3-1aac-7c20-0cb7-f4fd6c79eedb","last_modified":1484704580708},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","serialNumber":"CMNfzETd7XxesS9FOUj9Mg==","id":"49251465-af0d-3e93-cb1a-9d0b2ac356b2","last_modified":1484704580680},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"XJ8pGvGNM9RIcLUG9YQjLQ==","id":"c83b4498-ea23-7723-1c2c-b673115792d8","last_modified":1484704580653},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"e9JTGBe45yw=","id":"20d69a85-62b2-72c7-1107-110b43d2aeb2","last_modified":1484704580623},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpGcmF1bmhvZmVyMSEwHwYDVQQLExhGcmF1bmhvZmVyIENvcnBvcmF0ZSBQS0kxIDAeBgNVBAMTF0ZyYXVuaG9mZXIgUm9vdCBDQSAyMDA3","serialNumber":"YR0zGQAAAAAAAw==","id":"4204c7d6-1838-5925-2461-1bc0e03515d4","last_modified":1484704580597},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"AQw=","id":"f8c41076-a3f0-439a-9d5e-41e27e019a77","last_modified":1484704580571},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","serialNumber":"ESDDtMgFFiaUfKo7HD9qImM7","id":"ec0960f7-7ae1-23e7-5006-6652da817daa","last_modified":1484704580544},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"RFlmmjulj6Ve7PfBi44nnw==","id":"0e7b9a2c-3604-5b89-4dff-796122174bdc","last_modified":1484704580517},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","serialNumber":"ESBrHE7sFC7CQ8EM681xA3CY","id":"0595dc75-9356-ba32-a15e-05e3072b7f54","last_modified":1484704580491},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"AjpW","id":"b7e26b4d-bbe1-1c4e-ef9b-12471bcb9bf8","last_modified":1484704580465},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","serialNumber":"a9rf7/BmG9JkKvRuy7J5QA==","id":"fcfc3b3c-0a59-d143-f5fd-7600dd8efa87","last_modified":1484704580438},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ZECgRdZEsns=","id":"4652f392-127d-a5bf-4ed6-b07b9fa72247","last_modified":1484704580412},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"AJBQSPqrEvDE2Hz8xH39Low=","id":"c279dd67-2ce1-e090-1e04-0c11fe3ddf8e","last_modified":1484704580385},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"frj5jTuqBnQ4fljPvVU3KA==","id":"85acb18c-16b6-12c7-83ae-1e0d94251362","last_modified":1484704580358},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfFnw==","id":"d0da2ea3-1cad-5c9e-4c75-c83acfeabc8d","last_modified":1484704580332},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByembA==","id":"fcd51190-7eaf-291e-b6e5-45e447de7291","last_modified":1484704580305},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"RH7WhshwXRK6f0VfOfjXgQ==","id":"003234b2-f425-eae6-9596-040747dab2b9","last_modified":1484704580277},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"SurdtfsuPcXXDpY2LkBpYO6BT7o=","id":"034627e4-44c6-fbf2-275a-4ed3431a4094","last_modified":1483471394790},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Er0moq4zwH8ke2pYafIKdg==","id":"85c81ed8-787f-ffcf-2a63-1be622db8d04","last_modified":1483471394768},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydiAg==","id":"9194c97e-3baa-0446-9642-0d6211c3f019","last_modified":1483471394746},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"eLumDUO40KwnecZLJxFM2A==","id":"c2cc63c7-5274-9901-5f67-0a13355a8aa8","last_modified":1483471394725},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Bw==","id":"92e2494f-f3cd-7638-7fe1-a3cb8d8939fa","last_modified":1483471394702},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","serialNumber":"GpO48aJ8GngtwECqZhm/xA==","id":"bdfdc34f-ba9a-7b25-6cb6-24c547eb8a10","last_modified":1483471394681},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"Cw==","id":"7574eb9e-6978-dcb7-5a6f-d4c3dd855254","last_modified":1483471394658},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"IA==","id":"d82f446f-181a-5ac3-0ced-854e3cde100c","last_modified":1483471394635},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","serialNumber":"OfJBIhFwAdQ=","id":"b8fdddf1-27c1-5f6e-58a1-295e2c8c0ea5","last_modified":1483471394613},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"MABJTA==","id":"71e08617-c00a-8b62-53c2-2a61e21e6155","last_modified":1483471394591},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"HA==","id":"6a6d36e6-8939-0a83-3fd5-c38652b165ed","last_modified":1483471394569},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:55Z"},"enabled":true,"issuerName":"ME0xCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSMwIQYDVQQDDBpEaWdpZGVudGl0eSBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"DA==","id":"460643a1-23f3-1beb-0f14-ecb4b6e26cc9","last_modified":1483471394547},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CLc=","id":"49eb43cf-91d4-66ce-1a86-b8674ff83d4d","last_modified":1483471394524},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEZMBcGA1UEAxMQU2VjdXJlIEdsb2JhbCBDQQ==","serialNumber":"QAAnEQ==","id":"bb5c827f-3458-93fe-f80f-2982f0d19d34","last_modified":1483471394501},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"AjqK","id":"d6f9a6d9-d936-dfaf-d396-8ae96769ef10","last_modified":1483471394478},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfNeA==","id":"02ec8a09-2ae4-cd2a-4fa1-5037fa945391","last_modified":1483471394453},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"JLiDzgpL7oFNgJN+jIjt7w==","id":"5631f49c-a1fb-803e-ecf2-3ba82ca79f2e","last_modified":1483471394090},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"BwImeaRkSZQLYwFREwKo3R1Jn+8=","id":"c2de8edd-fd89-36dd-63d0-d3a1df92274a","last_modified":1483471394067},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"HxT1XSjIpzjMprp9Qu1gYQ==","id":"46d4712b-6db2-ce7e-0efd-675f3be896cf","last_modified":1483471394046},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QDi5sA==","id":"8acc0cad-dee8-7e2e-1799-e1a7b8b989c3","last_modified":1483471394023},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"BA==","id":"b9ac21bb-8c1e-e562-5418-bbf6f6323c45","last_modified":1483471394000},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"KuzHPJLdK5hNgJRo3R47Ag==","id":"91b7f544-9de1-efea-08d4-4ebafc9a3608","last_modified":1483471393978},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"B+U=","id":"86fe91df-ebb8-f20d-2031-2bc815b14a25","last_modified":1483471393956},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byeaqw==","id":"b97a8dce-04d9-7dba-6463-ae95d61524f4","last_modified":1483471393933},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"LU4d0t7PAsZNgJGZcb+o/w==","id":"efdf0a12-4ba1-f84d-a88d-fc384251583c","last_modified":1483471393911},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABIg08FMU=","id":"6c0561bc-fea3-ba35-bbdb-2b2672b67d36","last_modified":1483471393889},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"AjqL","id":"4be7b89c-27a6-e95e-c6f9-bf652d4a0b97","last_modified":1483471393867},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"FQ==","id":"89946691-d008-fd14-bd7a-443206d647c6","last_modified":1483471393845},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydInw==","id":"e1a83fb0-93df-deb8-68cd-17f4997ea58b","last_modified":1483471393823},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"JD1wxDd8IgmiqX7MyPPg1g==","id":"f5ad7ea6-4ac9-b9cd-776f-d2afb53fb91b","last_modified":1483471393801},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/SqA==","id":"ad8a2f72-7124-3e33-3060-414ce2bd8be3","last_modified":1483471393779},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","serialNumber":"J8mznxvTvOR5p4Br3a3sm5j5iM0=","id":"d3f6b499-297d-e9c8-081c-44e2331bcf29","last_modified":1483471393750},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","serialNumber":"AIChpbGNqu4XKp9J70syKEs=","id":"f184ba74-06de-9247-104e-160b6d210962","last_modified":1483471393727},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"Cj0=","id":"c5fdcbc2-71d8-0a58-3375-0c7d92526cf1","last_modified":1483471393705},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Aw==","id":"0e8a05ee-feae-fc46-15b9-eaa2d11f4a60","last_modified":1483471393683},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABRE7wRk4=","id":"ac8d3825-3fef-6d3e-2690-7360d1ef57a4","last_modified":1483471393659},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QDi5sQ==","id":"4b03d4c1-705b-458e-5bdc-f729f67eeb91","last_modified":1483471393637},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","serialNumber":"WJ2qHzWUqTk=","id":"f93061a9-8afa-1d74-e063-4134d318f00b","last_modified":1483471393615},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"VUtahOwvvmJFwlvmGDZP5w==","id":"9c88bc12-466d-fcdd-cc53-349d4e041332","last_modified":1483471393592},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"L1fHogsVxmfMBka5q4uzaQ==","id":"d3c14505-c104-150c-0a2d-e5f9e92b6152","last_modified":1483471393569},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:55Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"cJ+vg4742XhNgJW2ot9eIg==","id":"58bf9d8a-9a68-b41f-453c-8af8844bc07c","last_modified":1483471393547},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"LizeWXFWP5pZPI/dLc+PVQ==","id":"cb1a1172-56d6-4150-1f50-eb2131f442f5","last_modified":1483471393221},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Ew==","id":"a0ff8e3f-e68d-5ee2-21e3-26cd0f46673b","last_modified":1483471393199},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABElatX7I=","id":"00ac492e-04f7-ee6d-5fd2-bb12b97a4b7f","last_modified":1483471393177},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","serialNumber":"ANX8SnNRxCmsE/GCl5hw+8A=","id":"a09db9b3-2faa-73ab-67ff-61dcbf700ec7","last_modified":1483471393155},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"VBSf+IncsTB3RZS4KFCJPQ==","id":"7e816865-7c1d-2519-f114-e69a280768f4","last_modified":1483471393133},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"DA==","id":"5b760d02-fdd7-d6be-cb6f-4d30bf97746e","last_modified":1483471393111},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QDi5rw==","id":"7de029af-ddf3-02be-ca26-5bb95b080d14","last_modified":1483471393088},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"MABJSw==","id":"411b4e82-2ddd-20c2-20b3-8d77145f6901","last_modified":1483471393066},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","serialNumber":"Ermwtg==","id":"9d8a83d8-d651-42a0-ac1c-0ee414f3e31a","last_modified":1483471393043},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"Nbc68Q8EHza72P/hSWcddw==","id":"d0513de2-6da9-d68d-78cc-a2292a9d18fb","last_modified":1483471393021},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Ig==","id":"872ba8c8-a236-9ac0-85ea-08630f5b17e2","last_modified":1483471392998},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"APdCebq8ZyZr/T0luxlicNw=","id":"7a24e461-9fd0-b17f-01e0-f44866b800f1","last_modified":1483471392976},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","serialNumber":"Ermw0Q==","id":"fff46511-7357-4559-3d36-75fc74034299","last_modified":1483471392954},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"Ajp/","id":"272f2a95-6aec-f333-22ad-709d6118a87b","last_modified":1483471392932},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Fw==","id":"4f0dfd30-9278-4f20-25c3-436798595b84","last_modified":1483471392911},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"K1ftto7Xcb0YKwQ6uMvOIA==","id":"29eab149-524e-b1da-e2b9-dc4a784ab64b","last_modified":1483471392889},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","serialNumber":"STMAFQ==","id":"91609507-ef23-7672-3a5d-06dfb9b0dac4","last_modified":1483471392867},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"U+1Y1QpJc0FOR5JdCJ01gQ==","id":"79f39790-1151-6bb2-0a50-fc596b82bedd","last_modified":1483471392845},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TAA2G+UIK6mqznQKBT77NA==","id":"d51879d6-0a85-8311-5b14-ad993cec17e6","last_modified":1483471392823},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Iw==","id":"532dd854-cdef-6452-2793-1e36d091d9ec","last_modified":1483471392801},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/O5w==","id":"756ab100-8a14-daf7-bf06-9fe423863208","last_modified":1483471392779},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"Ajp+","id":"41f2401b-5c31-724f-ad6c-28f3f6f47634","last_modified":1483471392757},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkpQMRMwEQYDVQQKEwpGdWppIFhlcm94MS0wKwYDVQQDEyRGdWppIFhlcm94IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDI=","serialNumber":"AUa47POQ1dN5","id":"0956d064-8750-eee2-b0c7-7e1c2d1d6f25","last_modified":1483471392735},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Pgyeh2mqlVzqI9hFntRbUQ==","id":"134969c5-0bf4-4054-eaa1-b24feaa76aef","last_modified":1483471392712},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Gg==","id":"141d8e99-193b-d108-382b-7d97e6912d8c","last_modified":1483471392689},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESDYXNBhF+dePFjojs7u2vj1","id":"f7f193ca-c34e-866a-8abf-d44188a78cb0","last_modified":1480349168043},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"TA6BjA==","id":"2a9d41c8-d3e7-a40a-a79a-899902aa73cb","last_modified":1480349168021},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","serialNumber":"XhcFm2g619rt8Sro+a4rHA==","id":"a01f2d94-e1ee-2139-5652-c216331e357a","last_modified":1480349167999},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F6QlB/yX+A==","id":"a7fa8b99-3e2a-2c03-dffd-ab341eae59af","last_modified":1480349167976},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydxog==","id":"35f6f9f8-eb17-39d2-50a7-2b40f01e2584","last_modified":1480349167954},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CqnbFQ==","id":"3b60bc42-674b-7822-113f-c8dc6d1b015e","last_modified":1480349167931},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGXMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEfMB0GA1UEAxMWVVROLVVTRVJGaXJzdC1IYXJkd2FyZQ==","serialNumber":"Xrr31RF0DoIzMKXS6XtD+g==","id":"c0d2651b-f567-0f6d-ce3c-16e7d19390d0","last_modified":1480349167904},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/SnQ==","id":"7326aa15-9b3e-44ca-c1c5-0ed1ff29521f","last_modified":1480349167882},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzQ=","serialNumber":"H08=","id":"2ac02b19-f616-0dc3-6d01-28e1bea3dd93","last_modified":1480349167861},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:22:27Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"NMpMcEnex3eXx4ohk9glcQ==","id":"8e453b5c-3f81-2694-2f10-73ec8c406c49","last_modified":1480349167827},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAA=","id":"a3b400ad-0b4d-aa11-e8b5-82019fbc84d5","last_modified":1480349167797},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MIGpMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhhd3RlLCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9uMTgwNgYDVQQLEy8oYykgMjAwNiB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UEAxMWdGhhd3RlIFByaW1hcnkgUm9vdCBDQQ==","serialNumber":"Ikdj3zYXXGsC/Afm9Tvx+g==","id":"e8b2d24e-5aaf-86dd-441e-b4781d5370db","last_modified":1480349167774},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMw==","serialNumber":"acI1CFIgmwSFBoU5+ahDgg==","id":"938358e4-4c70-beb4-0fbe-02009feee6b6","last_modified":1480349167744},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:37Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABA/A35EU=","id":"97fbf7c4-3ef2-f54f-0029-1ba6540c63ea","last_modified":1480349167722},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMg==","serialNumber":"UVKsEezpGWOVQ4W9esstng==","id":"c4c22010-0cb9-e9af-005d-2483612d864e","last_modified":1480349167701},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5Bg/C8eXg==","id":"4295bb93-6e34-a58a-4d1c-238615b57cb0","last_modified":1480349167343},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"AImQERVYPoeb","id":"4ca8f1a1-0dc0-881f-b497-cc5574f2494d","last_modified":1480349167322},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"J2La+q+JOURNWkX60OP2lQ==","id":"8662e9a7-fe16-d1fc-0993-d16dd2f01012","last_modified":1480349167291},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDEgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAxIENB","serialNumber":"BAAAAAABHkSl5ao=","id":"7cfc5a53-f950-c15b-4dbb-8124fadcf871","last_modified":1480349167269},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","serialNumber":"RUT1Gehd1KKYPfqOlgspoQ==","id":"8855fafd-e48b-680d-ff15-a022057d9b9e","last_modified":1480349167246},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:26Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABKUXDqxw=","id":"0a92faa8-b870-3a38-036e-9b95185fcb6a","last_modified":1480349167224},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"CqZgEvHAsnzkT//QV9KjXw==","id":"39008976-298e-f664-50c0-56f8ae6c4df5","last_modified":1480349167202},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR8wHQYDVQQDExZHZW9UcnVzdCBTSEEyNTYgU1NMIENB","serialNumber":"OUvvVscW0/NltofkmV9qmg==","id":"a5eb3877-5e7d-200a-cee3-f63b8004d58e","last_modified":1480349167179},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"ORFgmCj072NjcJnrxOMfQA==","id":"995df7f2-6bd4-12c6-b1aa-fcfe7618b193","last_modified":1480349167156},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltms=","id":"460ae779-c915-9daf-9a13-e0bf953322cb","last_modified":1480349167125},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155119","who":".","why":".","name":"T-Systems intermediate certificate","created":"2015-05-05T11:10:09Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARQ=","id":"2826cef9-e4b4-53f9-e3cf-c5870fc778dd","last_modified":1480349167102},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:49Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"DAk9hy8DhHSo+aQetvPB/fY=","id":"b42066e0-0c88-e02b-620f-c41c2118c4e7","last_modified":1480349167079},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","who":".","why":".","name":"Hongkong Post e-Cert CA 1-10 certificates","created":"2016-11-03T12:48:38Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","serialNumber":"BHk=","id":"5048a7c5-79c8-68d7-06a3-19e8ba32e5fc","last_modified":1480349167057},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"OnvXX72mvUI2Id/NMzegmg==","id":"92d843e8-4e72-2832-b56f-6e488e677d0f","last_modified":1480349167035},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEiMCAGA1UEAxMZR2VvVHJ1c3QgRFYgU1NMIFNIQTI1NiBDQQ==","serialNumber":"ZgwfEqZnBsUNvNuZ77FbQA==","id":"73ae5fed-730d-94db-04ef-2aafd5ff75b8","last_modified":1480349167012},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/QbQ==","id":"6e4739fe-1aed-2320-4dc3-832043a31fc8","last_modified":1480349166989},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"L79XLVO2ZmtAu7FAG8Wmzw==","id":"7d2a48b3-0b2e-59ae-2002-8edb4da20bd2","last_modified":1480349166968},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"BUrYjru5px1ym4QUN33TOQ==","id":"e95bb238-6d35-2cce-9744-d6a672b0a874","last_modified":1480349166946},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESByNJZ5TPjg9iZyL6a/h5Zx","id":"51935a37-2964-18cf-b34c-a20c2c2250ea","last_modified":1480349166921},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314673","who":".","why":".","name":"SecureSign Public CA11 intermediate CA cert","created":"2016-11-03T12:46:07Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RDQTEx","serialNumber":"Aw==","id":"ec4f91dd-7560-920a-f178-e8ae460dd595","last_modified":1480349166898},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABFUtaxac=","id":"8d87b3cd-b954-f4f1-bfb2-a0e60645301c","last_modified":1480349166876},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"ATE3ew==","id":"83ac91ce-0f5e-ae4e-2010-b0da5616cd59","last_modified":1480349166855},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"LnfcUaXG/pxV2CpXM5+YSg==","id":"4c743a6f-af95-49a6-bd4a-d1ee8160c537","last_modified":1480349166833},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","who":".","why":".","name":"Hongkong Post e-Cert CA 1-10 certificates","created":"2016-11-03T12:49:39Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","serialNumber":"BGU=","id":"4de7908c-45e7-3b7f-a91a-8cefb1ecf830","last_modified":1480349166811},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:42:46Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJZbEU4I=","id":"19c9a896-fbf0-8ad0-92cd-4aca2577c006","last_modified":1480349166787},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABIg08D3U=","id":"4aec7420-aa59-53b8-1373-d3c0a7ebc837","last_modified":1480349166478},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"CgFBQgAAAUFcf/EVAAAAAg==","id":"d60a94e9-3f7f-a20f-1dcc-c87ccc78fb99","last_modified":1480349166455},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"dItWlz2V62Philqj9m6Pbg==","id":"abb0df0d-6716-9a25-ae33-806e93276cd4","last_modified":1480349166433},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CcL+EA==","id":"3cef2b9e-ddcd-cc40-8d59-49408409a3bb","last_modified":1480349166405},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263733","who":".","why":".","name":"Disney CA intermediate CA certificate","created":"2016-04-12T12:50:50Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"TA6EVg==","id":"7b09e4fc-2261-e7c6-e926-5a7b5e74fc5e","last_modified":1480349166381},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"GdXz4L1b6FKNCMG9Jz2tjA==","id":"35f81fe8-9fa4-760b-9fd0-2de1b0191721","last_modified":1480349166358},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:23:14Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"COwoDFvz7GD8R2K7Lo0rYQ==","id":"cc56260c-5f3a-3f4b-c712-78a8e7facd27","last_modified":1480349166330},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIGKMQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEmMCQGA1UECxMdQ29weXJpZ2h0IChjKSAyMDA1IFdJU2VLZXkgU0ExFjAUBgNVBAsTDUludGVybmF0aW9uYWwxKTAnBgNVBAMTIFdJU2VLZXkgQ2VydGlmeUlEIEFkdmFuY2VkIEcxIENB","serialNumber":"WD1AyQAAAAAAJQ==","id":"8c984ecd-c61c-426a-97aa-3a808e4da482","last_modified":1480349166308},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnI=","id":"333f6eb2-cefe-1a3b-3726-a8320b047847","last_modified":1480349166286},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABJQcQRNU=","id":"2258e9bc-1c39-9db3-4fdb-c7eb12d0609c","last_modified":1480349166264},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:15:54Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"Bg==","id":"b7fb6842-6407-8ae4-5e0f-e6daf112ed4f","last_modified":1480349166240},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"IIxFSyNM6mWtCgTG0IL3Og==","id":"6457eeb8-d83a-3818-c416-0dce6d71d471","last_modified":1480349166215},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABHkSl5AQ=","id":"de8e6484-fc97-6889-a1f9-dafd45786606","last_modified":1480349166191},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeQ9g==","id":"bb5a82a6-8da0-5390-a7d6-843bdb0c02c2","last_modified":1480349166170},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:17:01Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"EQ==","id":"dcce309f-aa60-6484-eaed-aa8310440a5c","last_modified":1480349166148},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R4af5A==","id":"e60eeeb2-612e-ef08-d0b8-5e9f8e1a23a9","last_modified":1480349166126},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:40:51Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAAA+X/GIyk=","id":"528cd047-ef3b-fc23-e37f-5d67fd3117e4","last_modified":1480349166102},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"BYyEX2b5+K+myAIR7eXaRQ==","id":"9be08dd3-1922-fb30-77dc-5cfcf00164a0","last_modified":1480349166080},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"RurwlgVMxeP6Zepun0LGZA==","id":"22a74468-602c-f4ac-0003-be4ce0167258","last_modified":1480349166058},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKTAnBgNVBAMMIFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBSb290IENB","serialNumber":"AJiWmg==","id":"1525b265-22d6-3253-079c-c4ffca58458f","last_modified":1480349166036},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCLRVuhcUZaluIgIVlRJx+O","id":"a6299e39-84a4-2dce-ffbb-751107660f4f","last_modified":1480349166012},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:20Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABCUVQ9No=","id":"a1d34c2f-4a03-0e35-ba5f-bc14138bcff5","last_modified":1480349165990},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:38:26Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABF2Tb8Bc=","id":"7e19f742-420e-dbe9-f691-2d19430d75b2","last_modified":1480349165968},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltm4=","id":"20732fc6-dd20-fe76-b6b5-b78388b64bdd","last_modified":1480349165947},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"fMTRbGCp280pnyE/u53zbA==","id":"44aa21e7-a92c-a0cc-6f6c-85b7ee52a87d","last_modified":1480349165925},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"d8AtKymQwkOPDBj+hjPzFg==","id":"014a5b67-d566-0767-c9d7-48e54115a69a","last_modified":1480349165591},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"Os2rnHWYhryvdOXfgan06A==","id":"dc94f688-044b-f8a0-79f9-5dc2d42e3edb","last_modified":1480349165569},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:19Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"e/fIfg2Dj2tkYIWVu2r82Cc=","id":"9e8ec7bc-0f79-42c2-c9bc-32bfbbd3b591","last_modified":1480349165547},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:16:27Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"EA==","id":"362a0532-ea75-9bc6-2e50-35d9566a6ad2","last_modified":1480349165523},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:06Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"UU3AP1SMxmyhBFq7MRFZmf0=","id":"4f2e59ff-cdf1-48ee-1122-961833187e49","last_modified":1480349165501},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESBqoILo90ntDW7OTK43MS2F","id":"0702b706-86e5-6a48-49fa-6c53b99009f3","last_modified":1480349165479},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"GtXUVojhwOTkaQ4bTKblEQ==","id":"9475e2f6-7247-cbe1-5055-8af86f39a149","last_modified":1480349165453},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"KjoVfZ3by6+pL8fssyfM6A==","id":"f4c8162a-d49b-1cbd-adb9-5e6223793aa4","last_modified":1480349165429},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydr0Q==","id":"a85aef34-3bfe-2135-845d-466adadc414b","last_modified":1480349165407},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Xbevr3ut3Z9m1GuXC9SonA==","id":"549710cf-bcaa-843c-df9d-5962bad88a9a","last_modified":1480349165384},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CeagHQ==","id":"d69db231-b7b5-4d79-147b-49198f93fc10","last_modified":1480349165355},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"EAdmaA==","id":"618009ee-0ef1-af4b-8841-349e6f82eacc","last_modified":1480349165329},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:47:54Z"},"enabled":true,"issuerName":"MIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTElMCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMnR2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENB","serialNumber":"BAAAAAABHkSl7L4=","id":"636c65b9-2d52-8689-023f-7a23a0baec5b","last_modified":1480349165306},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABFqoAZoI=","id":"2b0d58aa-9c96-748f-4fc0-b1f413ca8e20","last_modified":1480349165285},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1250907","who":".","why":".","name":"IdenTrust cross certificate","created":"2016-02-24T20:04:54Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAlVTMRIwEAYDVQQKEwlJZGVuVHJ1c3QxIDAeBgNVBAsTF0lkZW5UcnVzdCBQdWJsaWMgU2VjdG9yMRwwGgYDVQQDExNJZGVuVHJ1c3QgQUNFUyBDQSAx","serialNumber":"fwAAAQAAAUrz/HmrAAAAAg==","id":"352c78aa-997c-bdbe-66ba-930d66fde011","last_modified":1480349165264},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CeFU2w==","id":"e8e298f0-efa2-0d08-458f-c085ee9df8f9","last_modified":1480349165242},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1149603","who":".","why":".","name":"MCSHOLDING intermediate certificate","created":"2015-03-31T14:53:16Z"},"enabled":true,"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","serialNumber":"STMAjg==","id":"c9897d2c-c68e-3c02-2f39-678954b0cf3e","last_modified":1480349165209},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:35Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"bAOrKSMsmA0MLJyAJ5BRsUM=","id":"7d44cb3e-28a5-16dd-024c-796312f780bc","last_modified":1480349165175},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5BhE0zbgQ==","id":"29925947-91ab-16a8-a5af-65558cdb27c2","last_modified":1480349165145},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABL07hUBg=","id":"1240480e-2ef8-8ac3-4314-4e8e494741b9","last_modified":1480349165119},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCyHU+xOECnh9Rf2IvgR8zS","id":"3980401b-c0e2-0533-f0fb-0cc04685d248","last_modified":1480349165097},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CdWFNw==","id":"f06ff510-954e-b917-fda1-2c3153788d7d","last_modified":1480349165075},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TrKEMhb2PKktH8lHg0AV5A==","id":"8b7985ab-ab8b-fcd2-cf88-cf8dad0f7a97","last_modified":1480349165048},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:56Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJQdAjik=","id":"a75f5980-9149-fff9-70d5-b24121c3eaff","last_modified":1480349165026},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cfk9lw==","id":"59b587cb-401b-a5d0-8128-86c3691c4be1","last_modified":1480349165002},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDMgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAzIENB","serialNumber":"BAAAAAABHkSl6mw=","id":"3cc60c06-a870-951e-1d12-4b29ee13989e","last_modified":1480349164725},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","serialNumber":"SdegFrLaFTCsoMAW5ED+zA==","id":"9fbfe267-c715-8f7b-d9ad-166aad9f91af","last_modified":1480349164704},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:42:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABMxvC9bk=","id":"923a5e98-11f7-cdae-b073-45b525fb2294","last_modified":1480349164681},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydp0g==","id":"10e51569-072a-611a-c397-3050fdf22649","last_modified":1480349164658},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QZCrvQ==","id":"6d791114-68b4-8c3c-ee3c-29ed83eced2e","last_modified":1480349164636},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAI=","id":"bff9c953-6690-f618-cfea-7b936f3691a6","last_modified":1480349164614},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Aw1SPC56593ZCZ9vCNHKwQ==","id":"c395381f-fe34-7b6c-f56a-f20b20bf0d0d","last_modified":1480349164590},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:44:22Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABAJmPjfQ=","id":"24b096b4-987f-a21a-04d3-aedc9eaafc1e","last_modified":1480349164559},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABK84yjs8=","id":"8078d5ff-c93b-15d1-ebcf-607bdbfc159f","last_modified":1480349164533},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"FJl6tXgNpSk=","id":"7ab0a200-7ecf-576f-bff9-652fb14c3af6","last_modified":1480349164510},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"M0VSOewW3WI=","id":"f3688c95-3934-e80a-e32f-0d5dcb2f0c4c","last_modified":1480349164486},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"VN2yeFexyXjPf34fHGmbhg==","id":"bbcfc451-2fcc-b380-e579-bb6d11fc7d34","last_modified":1480349164463},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","serialNumber":"STMAeg==","id":"a46be506-1dbc-41a9-2775-95d67708fb5f","last_modified":1480349164433},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1300977","who":".","why":".","name":"revoked.badssl.com certificate","created":"2016-09-09T16:26:08Z"},"enabled":true,"issuerName":"ME0xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxJzAlBgNVBAMTHkRpZ2lDZXJ0IFNIQTIgU2VjdXJlIFNlcnZlciBDQQ==","serialNumber":"Aa8e+91erglSMgsk/mtVaA==","id":"4b778ec2-ef45-c5b2-dc44-b00c87b11741","last_modified":1480349164410},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"TurPPI6eivtNeGYdM0ZWXQ==","id":"8192a2fa-165d-3759-fd20-4b7d8e2a0e84","last_modified":1480349164388},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAMTFHRoYXd0ZSBTSEEyNTYgU1NMIENB","serialNumber":"UKKK5ol/rKBZchAAOnZjaA==","id":"ca0c5f15-2808-8c94-3f77-6a277d6738b2","last_modified":1480349164365},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"UMUwXwT1Z4juyQ/CNTf4mw==","id":"c623e511-79c8-cbe6-6a6e-0d9896f07e71","last_modified":1480349164342},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIGTMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEbMBkGA1UEAxMSVVROIC0gREFUQUNvcnAgU0dD","serialNumber":"Ew1ee9Jq7Q/Dig3ACF4V6Q==","id":"c011d2b4-73bc-27e5-3d3a-ab00be2a4d05","last_modified":1480349164320},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"XLhHIg7vP+tWfRqvuKeAxw==","id":"520c26f8-9a60-5949-0372-c9d93f9e95dd","last_modified":1480349164297},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"E5I2y6sIonl4a+TmlXc7fw==","id":"ee842f50-9d56-8fdf-fa55-8b55b8519b81","last_modified":1480349164275},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","serialNumber":"Jq6jgeApiT9O4W2Tx/NTRQ==","id":"3b658f17-11f9-7550-d991-3e9a1397402d","last_modified":1480349164253},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDIgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAyIENB","serialNumber":"BAAAAAABHkSl6Co=","id":"6eb0fa3b-c226-f411-0fab-df88962a5769","last_modified":1480349164232},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESD9YhzIEOwiOT7Nwip+E1KI","id":"d6172148-c2ee-a904-db40-079b10436cca","last_modified":1480349164209},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:17:24Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"Eg==","id":"34561e12-916b-083e-6fa6-181b5b89ec80","last_modified":1480349164187},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","serialNumber":"NvEJoRYL2yvAZrAjbDIipQ==","id":"b1119d43-b3b8-1f41-6fbb-9cf2f67a521d","last_modified":1480349164164},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCC9oPNcRdPOox+SjWm9dTX","id":"8858e9fc-cc55-54ea-fe45-c4e533c2e410","last_modified":1480349163834},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1145157","who":".","why":".","name":"live.fi certificate","created":"2015-03-31T11:14:46Z"},"enabled":true,"issuerName":"MIGQMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UEAxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","serialNumber":"D9UltDPl4XVfSSqQOvdiwQ==","id":"0a9323dd-982f-c62d-a9b4-b9d04617fc62","last_modified":1480349163810},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:35Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"OYBKgxEHpW/8XGAGAlvJyMA=","id":"d6dfdc76-52ae-2843-3484-7fbff46f0100","last_modified":1480349163788},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","serialNumber":"EM8bDLBnnoYe4LnWpLIhS4esr3I=","id":"be09b295-68d1-9c01-97ee-10df36acd3ea","last_modified":1480349163764},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:41Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJ/ufRdg=","id":"5d64f82e-9ad8-fde1-a8c9-2d94552a8ad4","last_modified":1480349163739},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:51Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHJRKMpA=","id":"f5b2da3a-5176-b4e4-240a-181f39f6756b","last_modified":1480349163715},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:40:18Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABBHYoIFs=","id":"f59ed73e-f3c5-eef3-4481-3ca8af0b0688","last_modified":1480349163691},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:37:41Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABHhw1vwc=","id":"1b1856c1-f4f5-82ca-ba57-d94739e74576","last_modified":1480349163668},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"TqfXw+FkhxfVgE9GVMgjWQ==","id":"60f6a3be-ad83-a868-d645-7aad77914bc8","last_modified":1480349163645},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:21:56Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"LdbnCbsA9sOgI4mkUpWXPw==","id":"d839b1ed-7d39-5e57-687c-2f4d6f0514e5","last_modified":1480349163622},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"ANygrItIJ2rcKlyS3Lue07U=","id":"d55572d9-be60-5967-948a-7dae793ab30f","last_modified":1480349163595},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydeGg==","id":"b7d8b0e0-9747-6a09-ab6b-051c57579fe9","last_modified":1480349163572},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCVop+Q4/OBgtf4WJkr01Gh","id":"7602529c-c2ea-d18b-9b2a-fdb70ca936f9","last_modified":1480349163548},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:42:31Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABGMG0Gmw=","id":"317aeda4-6de7-7b11-76cb-3b0afa9aaf86","last_modified":1480349163514},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:47:04Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"O2S99lVUxErLSk56GvWRv+E=","id":"27847bcc-dbaf-196f-ed5e-c1c022798717","last_modified":1480349163492},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:16:35Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"By7fBTreouRwX/qrpgSUsg==","id":"322de470-76d3-a45d-740f-342a6a8eb863","last_modified":1480349163470},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"ezdAeCxKH7BFs7vn3byYaw==","id":"fc5bde6b-45b9-c141-7171-0a6f37e7938a","last_modified":1480349163448},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"VLm3Xe60+1YgPpXCGtXLng==","id":"055d66b6-8fbd-93df-f2c4-dcdb41943212","last_modified":1480349163426},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxUaGF3dGUsIEluYy4xGzAZBgNVBAMTElRoYXd0ZSBTR0MgQ0EgLSBHMg==","serialNumber":"cDggUYfwJ3A1YcdoeT6s4A==","id":"093f20b4-93b8-a171-cbe7-3e24a543c7e9","last_modified":1480349163403},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"a9/VeyVWrzFD7rM2PEHwQA==","id":"c02a9772-b351-59dc-8633-1293ac9addee","last_modified":1480349163377},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCis569omrbb20yySF39+aE","id":"aaa19866-32ce-e842-6431-6d357fafe8d8","last_modified":1480349163350},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5Bg6C237Q==","id":"57ddfa31-3f08-298a-d7bd-712e3aaea567","last_modified":1480349163327},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"HZyLf+K70FKc+jomm8DiDw==","id":"452f4798-87d4-8df1-b275-177456d2f1c8","last_modified":1480349163302},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CskruA==","id":"e92cad12-4098-0817-e317-3674d4242ba9","last_modified":1480349163280},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"a12RvBNhznU=","id":"33154d98-0f20-7e7d-d2d0-3244a7d1f971","last_modified":1480349163257},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CjM=","id":"283b292b-1212-a713-c8be-c976c0222410","last_modified":1480349162955},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"NTgf4iwIfeyJPIomw2dwSXEwtxQ=","id":"542dbfc0-0faa-2398-9670-cd249525fd2c","last_modified":1480349162930},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cd/dug==","id":"3cf54b7b-336d-7c80-4596-d5a7762329d9","last_modified":1480349162902},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"M64Z5ufZzDRVTHkJR1uXzw==","id":"5d6d86a0-7e3e-b832-83e5-afc1eb2e294f","last_modified":1480349162880},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABIBnBjWg=","id":"0713fba9-386c-888f-cbe5-5188ff2696a4","last_modified":1480349162857},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"fWK0j/Vi8vNWg3VAGjc02w==","id":"a4428979-4be6-3ba2-f435-aa8e4574ffe0","last_modified":1480349162835},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","serialNumber":"JpUvYJyWjdGmeoH7YcYunw==","id":"929de7d6-0669-5601-0b8f-9a192bf1cb17","last_modified":1480349162803},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"45KI4WIxyXfNrdtdj7C6","id":"7cb25ddb-9f7e-7297-e8b4-c50d019f0cf7","last_modified":1480349162781},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:15:22Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"BQ==","id":"7c28e9e7-b9ce-f4ed-8d5a-e7b9e534fba5","last_modified":1480349162758},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:19Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"F7PAjw2k0dTX5escPnyVOBo=","id":"3c7e3e8e-5c25-8fbf-0006-2c92256e0a4b","last_modified":1480349162734},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"Sx51x7V8pYe8rp7PMP/3qg==","id":"4006917e-3260-59cd-eb3f-f4d1167cf888","last_modified":1480349162710},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"DHmmaw==","id":"0abfb8ad-d1b7-5f0e-cbea-630f2424171d","last_modified":1480349162686},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CcHC/g==","id":"cba8acd8-a291-1ad6-9581-ed647dd5d56d","last_modified":1480349162661},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","who":".","why":".","name":"Intermediate CA's under Staat der Nederlanden Root CA","created":"2015-05-08T10:53:13Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ATE0vw==","id":"fc71cbb8-4e2a-2835-d5be-4c48cd3650bb","last_modified":1480349162632},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABLF5/HXY=","id":"ca59600c-e90a-e85a-43b8-22bc76bb0e1f","last_modified":1480349162610},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","serialNumber":"BXA=","id":"a44b5bf8-8158-1924-7626-e1ba2d2031f7","last_modified":1480349162580},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:24:01Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"VOcIuNbTqkpOMUyI108FOg==","id":"43e72628-c1a5-2091-2dcd-41bbde768c73","last_modified":1480349162557},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","who":".","why":".","name":"Intermediate CA's under Staat der Nederlanden Root CA","created":"2015-05-08T10:53:40Z"},"enabled":true,"issuerName":"MFkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKjAoBgNVBAMTIVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPdmVyaGVpZCBDQQ==","serialNumber":"ATFpsA==","id":"325bb598-839b-f7aa-8a22-08ab8c09e803","last_modified":1480349162533},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:50Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"UV9aaDeNRNtQuXjRYk4Skhg=","id":"c11dd0af-83d5-61ec-63af-5b816a3ae557","last_modified":1480349162506},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"bzTw0uq05TUYEGS98bh0Ww==","id":"6b743fc3-1ce6-8dfe-52f1-9f3e6a31f15a","last_modified":1480349162483},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:21:30Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"Gd/pPu+qLnXUdvP9sW73CQ==","id":"2da11236-c2d8-7804-7de3-ffd711406b04","last_modified":1480349162460},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:09Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABJ/v3ZwA=","id":"9f6615be-a0b9-519a-1e26-2bd7aaf5953b","last_modified":1480349162438},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:05Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABGMGjftY=","id":"5f1ab732-8d48-0102-fb50-46ce74fc1a90","last_modified":1480349162415},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"Rvm2CEw2IC2Mu/ax0A46QQ==","id":"82f97501-85ba-bb19-f68f-ca7ce68ca7b3","last_modified":1480349162392},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABJpQ0AbA=","id":"520cee2c-e36a-936e-d551-a51ee9c659c8","last_modified":1480349162369},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfHkw==","id":"74d82589-0fde-91da-20cc-22fbd84cd0aa","last_modified":1480349161997},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESC8DawWRiAyEMd38UXbfgPR","id":"6147b64f-da46-ba30-2b9e-30b515e8f6b9","last_modified":1480349161969},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABK84ykc0=","id":"0a42070f-3149-2b91-1bbe-c54de4ed1be8","last_modified":1480349161946},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnM=","id":"dc28966b-d7db-b55f-1606-c5bff610bf99","last_modified":1480349161925},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"FJl6tXgNpSg=","id":"bab58b65-8ef7-f3c2-fc13-88f72a0840f7","last_modified":1480349161902},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESDItX4ruWiLnrlz0rk4/bmz","id":"c12d5f3c-b722-948f-b367-857845ed5e8e","last_modified":1480349161872},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","serialNumber":"bx/XHJqcwxDOptxJ2lh5vw==","id":"a0da0bd1-8bec-4c82-fb9b-636ddcde057d","last_modified":1480349161850},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:47:39Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"Mq0P6o03FDk0B2bnJ+mYPGo=","id":"54f096a5-3608-9b68-ddca-a200e799ba06","last_modified":1480349161828},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:00Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJ/ufQg8=","id":"61db13cb-74d9-e675-a1e8-db5f78eb3f4e","last_modified":1480349161807},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABM6d3Z0s=","id":"b9c439ef-fcf3-2263-c14e-80727cbef898","last_modified":1480349161785},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","serialNumber":"FNISyWWTGi5Yco6fGh58/A==","id":"bab0ff94-c98e-7843-97b3-a4d1e044715b","last_modified":1480349161763},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","serialNumber":"VfTSum25nb65YPlpuhJAvg==","id":"91149dc9-6cc4-a670-1799-7bd05c159858","last_modified":1480349161740},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEwMC4GA1UEAxMnU3ltYW50ZWMgQ2xhc3MgMyBFQ0MgMjU2IGJpdCBFViBDQSAtIEcy","serialNumber":"OhrtngFwotLcm4i+z00SjA==","id":"337e2f4b-02c4-c70d-55be-09c8ea41731c","last_modified":1480349161718},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181126","who":".","why":".","name":"RCS Certification Authority","created":"2015-07-13T09:05:40Z"},"enabled":true,"issuerName":"MDcxJDAiBgNVBAMTG1JDUyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEPMA0GA1UEChMGSFQgc3Js","serialNumber":"AN9bfYOvlR1t","id":"18c0d37b-739d-04c6-04f2-a615be5b9948","last_modified":1480349161696},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5BhENPfVw==","id":"72a65abf-9828-365f-4d4a-78457d7bdec4","last_modified":1480349161666},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESISuBo/wdW2tBztKmHdFCFz","id":"2ad44cbf-32ca-5245-c881-6d6f290ac2c1","last_modified":1480349161641},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205651","who":".","why":".","name":"Misused certificate","created":"2015-09-21T13:21:25Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHjAcBgNVBAMTFXRoYXd0ZSBFViBTU0wgQ0EgLSBHMw==","serialNumber":"CrTHPEE6AZSfI3jysin2bA==","id":"13987e52-821e-1fe3-3743-393136b17167","last_modified":1480349161619},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","serialNumber":"WX89jn8yGZVvoKTD9jDfRQ==","id":"a15c9fa5-cd6e-362d-1341-1e95c11c38fb","last_modified":1480349161596},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:22:54Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"JV/LVzSKI/wsDgg3UuZHlA==","id":"ba7935ef-b624-3eef-5ae8-a78044ec3af0","last_modified":1480349161575},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:44:46Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"sPNcCSE9Nkg3jy5IN1xe2Q==","id":"edc761c4-8b47-5314-0cd1-c894612ebfc3","last_modified":1480349161553},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"buROL/l2GuXISv+/JVLkdA==","id":"963548ca-bde2-1843-f140-1c26e8e40def","last_modified":1480349161531},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cfk9oA==","id":"e85980d5-12f0-f624-7904-2d6cedeacd55","last_modified":1480349161510},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"IyIVazG4RE9AERkb+ekH8w==","id":"be3014a7-3d3b-08c7-02d9-5a74f601a1b1","last_modified":1480349161489},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"HNo1DR4XCe4mS1iUMsY6Wg==","id":"fd51f7d8-2006-663f-4779-3cf559ee5e74","last_modified":1480349161466},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Ai7cBJYqBE0I9NdyoZfRrw==","id":"f7582bc8-dbdb-37dd-b24c-418242bbc4e0","last_modified":1480349161443},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"UUFV3S2cUidOOv7ESN65Ng==","id":"24ccf065-b88b-0fc9-1d1f-6c7722ca4faa","last_modified":1480349161103},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","serialNumber":"EDQMI0tR4kSntv1O37N10g==","id":"e7509e16-1cd3-599e-2630-495ab52d3b71","last_modified":1480349161077},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:48:11Z"},"enabled":true,"issuerName":"MIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTElMCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMnR2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENB","serialNumber":"BAAAAAABI54PryQ=","id":"e3bd531e-1ee4-7407-27ce-6fdc9cecbbdc","last_modified":1480349161051},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc68g==","id":"308f27b5-fc0e-da9a-2b7f-e65a1cb5cd47","last_modified":1480349161021},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEkMCIGA1UEAxMbU3ltYW50ZWMgQ2xhc3MgMyBEU0EgU1NMIENB","serialNumber":"AuhvPsYZfVP6UDsuyjeZ4Q==","id":"a0482eed-1e3f-7b9f-a433-94e4a4da49a1","last_modified":1480349160991},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:59Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABMrS7t2g=","id":"41a888b9-2e84-9782-69dc-d9153a3bd3aa","last_modified":1480349160963},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1197885","who":".","why":".","name":"SECOM intermediate certificate","created":"2016-07-21T16:52:32Z"},"enabled":true,"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","serialNumber":"Ermwxw==","id":"1220feb9-9e66-0b24-3409-c5d1a1f8d24f","last_modified":1480349160941},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:36:53Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABCfhiO+s=","id":"e17ded97-6669-eecc-54fa-81f9a81ed281","last_modified":1480349160914},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1288354","who":".","why":".","name":"Symantec AATL ECC Intermediate CA cert","created":"2016-07-21T16:58:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA3IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNA==","serialNumber":"cXXMzbWDHMIdCotb3h64yw==","id":"a9970f7e-bac4-3b91-eae3-b0335ce0d1c2","last_modified":1480349160892},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","serialNumber":"OqQ2rV0ISTc308Z/oQgzFw==","id":"781f8787-6508-d6aa-c508-13ac2bb0d930","last_modified":1480349160870},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cyr1PA==","id":"ec93f86d-fea2-7eea-42d4-7cf7a397e097","last_modified":1480349160848},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5Bg+EziQQ==","id":"64229466-b4da-c63f-e088-ab1b5ba37930","last_modified":1480349160826},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:09Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABEAuMoRs=","id":"fe2dd507-9fc4-a6db-7ee0-255452bea28a","last_modified":1480349160804},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:24Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHkSHlSo=","id":"04460239-09d9-2a76-191e-f344a8e5d0bd","last_modified":1480349160782},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:08Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABKB/OGqI=","id":"6b5475ec-8181-e7b8-4245-c7e2ffed213c","last_modified":1480349160759},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESDu2nhlLPzfx+LYgjlYFP/k","id":"dc98c4eb-836f-6ca0-6673-6678fc45516a","last_modified":1480349160736},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:14:46Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"BA==","id":"765f426d-748a-5f3d-e409-35eac9be8240","last_modified":1480349160714},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"Aw==","id":"644e3fde-7ab5-556a-85ef-c5fac8b8c7de","last_modified":1480349160684},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABMYnGRuw=","id":"0a9335d8-3fa3-5d0b-7b27-72ddd14b5f74","last_modified":1480349160660},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd5cg==","id":"f046b001-5aa9-09b4-995d-23ad9f15db30","last_modified":1480349160638},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESJJweWBPhoXAaB9c8SHwI4O","id":"1bdc6228-2f9d-ad26-30b2-408959ede857","last_modified":1480349160614},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"LTRcDHabRHU=","id":"86e95439-a9f5-e04e-5241-268cf0186425","last_modified":1480349160593},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"YNOos6YJoPC77qwSGCpb7w==","id":"3c4f4898-da76-0a38-a765-18d9436285f2","last_modified":1480349160571},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHkSHki0=","id":"e057bdab-4ad6-7e50-83ce-1099b84cce04","last_modified":1480349160547},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"A9GPKQ8jv9oIxfwiOy7qxQ==","id":"4bb8966b-1db9-844d-4904-d823539cdf7e","last_modified":1480349160524},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cbssdw==","id":"661e65a5-ee0b-7a82-12c3-731cb560e112","last_modified":1480349160216},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CcHC1w==","id":"26890617-93ad-e85f-550a-afb414cd110c","last_modified":1480349160190},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"DjIvBkX+ECVbB/C3i6w2Gg==","id":"657b91b1-9447-8c4a-db57-e0f0e2b10439","last_modified":1480349160165},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1150585","who":".","why":".","name":"XS4ALL certificate","created":"2015-04-07T11:04:11Z"},"enabled":true,"issuerName":"MIGQMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UEAxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","serialNumber":"UoRGnb96CUDTxIqVry6LBg==","id":"9084bc79-01cf-2ddc-b077-cd6c6251dd2b","last_modified":1480349160143},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"PAdKZPiaac2CvPxbOrsHOw==","id":"b79e2eb5-754d-4c21-1d8a-8c363f70dadc","last_modified":1480349160119},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIGQMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxOzA5BgNVBAMTMkFyaXN0b3RsZSBVbml2ZXJzaXR5IG9mIFRoZXNzYWxvbmlraSBDZW50cmFsIENBIFI0","serialNumber":"EqthLKdUgwI=","id":"5b9744a8-bd65-b926-2920-8d8e5e1acd7d","last_modified":1480349160086},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEiMCAGA1UEAxMZR2VvVHJ1c3QgRFYgU1NMIFNIQTI1NiBDQQ==","serialNumber":"OE4/d+p3YRzzcSl+kmZ8Mw==","id":"fd2fe6f3-d095-5c3d-3c6b-afe00cb665c0","last_modified":1480349160058},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QZCrvA==","id":"32f968f5-4426-66ad-d1ab-9dda7b6f0c85","last_modified":1480349160028},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"AygWP2Fgd2T+iLbmAlKT6g==","id":"e23bcca2-1fb1-abd2-5ed7-892c5f08c4ff","last_modified":1480349159993},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CqL7CA==","id":"1a0c71ac-7f34-eeb0-2f71-1c14ee8e6552","last_modified":1480349159963},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"E77H6yvyFQjO0PcN3x0H+Q==","id":"be9e31eb-6a06-7699-708a-732a081a10c7","last_modified":1480349159939},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:04Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"YRJNfMoc12IpmW+Enpv3Pdo=","id":"3bb8f2d9-511b-121d-da29-23041d3c15c1","last_modified":1480349159914},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","who":".","why":".","name":"Intermediate CA's under Staat der Nederlanden Root CA","created":"2015-05-08T10:54:05Z"},"enabled":true,"issuerName":"MFkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKjAoBgNVBAMTIVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPdmVyaGVpZCBDQQ==","serialNumber":"ATFEdg==","id":"4a17f132-602c-2d30-a781-145087794075","last_modified":1480349159890},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxUaGF3dGUsIEluYy4xGzAZBgNVBAMTElRoYXd0ZSBTR0MgQ0EgLSBHMg==","serialNumber":"e0bEFhI16xx9U1yvlI56rA==","id":"07b97387-d755-0bbb-6e4c-616a7cb69cb4","last_modified":1480349159869},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnA=","id":"b3fb394d-f951-b49e-d856-f93028850feb","last_modified":1480349159846},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAU=","id":"2448ada0-833d-0d4d-3bcd-2c73cff02fb4","last_modified":1480349159825},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:38:03Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABCFiEp9s=","id":"5cef5dc2-95f2-0ac8-3273-153a09d3d227","last_modified":1480349159804},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CSY=","id":"b4c9041b-f5a5-dec1-b221-7286a32a6309","last_modified":1480349159782},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:44:06Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHJRKNmk=","id":"824e9b09-808e-e8cb-f2dd-ba669df011bc","last_modified":1480349159760},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"DYifRdP6aQQ8MLbXZY2f5g==","id":"59a292db-d567-6485-167f-1cb5af33f437","last_modified":1480349159739},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABL07hTcY=","id":"0a5a0233-bb8a-e4cc-5bb6-03cee44a07c2","last_modified":1480349159716},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MF4xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBLSSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"L7tgs/W85vnhV7I7qJ6N/g==","id":"e38e4e46-413a-eac8-9e85-1b9ee06f535d","last_modified":1480349159694},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:40:36Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABLM/7qjk=","id":"62dfeb32-e132-09a3-e4ba-e48c21d027de","last_modified":1480349159673},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:41Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHkSHjz8=","id":"880134d0-617c-ec1b-3568-4c74af31bcc1","last_modified":1480349159649},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cfk9qg==","id":"9debdd66-d615-073f-26f7-011a8c54b484","last_modified":1480349159625},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAM=","id":"e4d16e1f-ac86-e9c0-2122-8a7d7d2dcdc0","last_modified":1480349159267},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESAyW/JX3+hZIp44EAMlXU2b","id":"6b135741-bfc6-1b3f-eb4b-4569aae2ab34","last_modified":1480349159244},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAQ=","id":"263f03a7-53f0-2140-89a5-46e7740d755a","last_modified":1480349159206},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESByYNtAIfizf2L3NMzCH8zZ","id":"853889e5-ad93-77ea-f9c0-a0907c9a3576","last_modified":1480349159183},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"BYOGvG32ukb1Yxj2oKoFyw==","id":"b049208e-5f4c-60a6-ac91-45f093defc33","last_modified":1480349159159},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","serialNumber":"P6G7IYSL2RZxtzTh8I6qPA==","id":"222a4201-120e-64f4-5f6f-b2314470365c","last_modified":1480349159136},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTE2MDQGA1UEAxMtVVROLVVTRVJGaXJzdC1DbGllbnQgQXV0aGVudGljYXRpb24gYW5kIEVtYWls","serialNumber":"D/wZ7+m1Mv8SONSEFcs73w==","id":"d7fdf5b8-f8a5-b105-297d-d0e3617e59fc","last_modified":1480349159113},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"eR1nUEz8k+nDSBD+bb5uIQ==","id":"f6fb7b44-64cd-37b9-b9f6-fbe1210cb160","last_modified":1480349159091},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","serialNumber":"QZBvapTZFvmYktEPsBYLQQ==","id":"b6f5b3ee-6cac-57a7-b4e9-83e84f1020b8","last_modified":1480349159069},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABKUXDqA8=","id":"e48f4383-6df1-0a9b-8063-a2add391a879","last_modified":1480349159034},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABLF5/Gog=","id":"bc0be7d5-b8d3-1ac2-8a63-f5bf8b00ba3c","last_modified":1480349159011},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"UW3oKZKTDsrPy/rfwmGNaQ==","id":"2a14bce1-47bb-e067-74a6-46be30e576a7","last_modified":1480349158980},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CSU=","id":"77e152ae-89a4-53b1-62d4-fb7c2cd5037b","last_modified":1480349158957},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"U3t2Vk8pfxTcaUPpIq0seQ==","id":"2c8f7191-fc5f-c2e0-af8d-852faefcdadf","last_modified":1480349158934},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:38:46Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABAPpuVh0=","id":"fce6cca1-707c-c4f2-6de2-26c4663cda01","last_modified":1480349158899},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"U4P1tUoxl/XkztlVHdtdgw==","id":"ed4d2530-eb3e-800f-41b2-e70023185673","last_modified":1480349158876},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEsMCoGA1UEAxMjU3ltYW50ZWMgQ2xhc3MgMyBFQ0MgMjU2IGJpdCBTU0wgQ0E=","serialNumber":"U3SgRR3J+D6575WuCxuXeQ==","id":"72e44e74-fb5d-fc97-abdd-02050d3ab727","last_modified":1480349158854},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGXMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEfMB0GA1UEAxMWVVROLVVTRVJGaXJzdC1IYXJkd2FyZQ==","serialNumber":"EEpERSryZFMagbsNw/WoWQ==","id":"a4f11626-67e9-24e5-81a5-aca8126934c3","last_modified":1480349158820},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABJQcQQN0=","id":"e7328f54-0f56-48a2-3bab-d4c9b41a2b13","last_modified":1480349158794},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydKkg==","id":"6b9bc0cc-c1fa-50eb-5ece-812ee9bac5b6","last_modified":1480349158772},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","serialNumber":"cpqpXVWPk5AXzGw+zNIcBw==","id":"ac8d05cd-d85d-8caa-ed13-261b83c183c2","last_modified":1480349158750},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEbMBkGA1UEAxMSR2VvVHJ1c3QgRFYgU1NMIENB","serialNumber":"CWhp","id":"ff01b36d-3bcc-2157-1f89-b1841120c97e","last_modified":1480349158726},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCEUbthDurBjJw0/h/FfuNY","id":"2c047b2c-43aa-d0be-e2c9-2acac789bd55","last_modified":1480349158695},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEZMBcGA1UEAxMQU2VjdXJlIEdsb2JhbCBDQQ==","serialNumber":"TXxtAQ==","id":"ea4847df-ca17-c476-11df-b14c1d6658a0","last_modified":1480349158671},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1142137","who":".","why":".","name":"T-Systems intermediate cert","created":"2015-05-08T10:51:23Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpGcmF1bmhvZmVyMSEwHwYDVQQLExhGcmF1bmhvZmVyIENvcnBvcmF0ZSBQS0kxIDAeBgNVBAMTF0ZyYXVuaG9mZXIgUm9vdCBDQSAyMDA3","serialNumber":"YR3YYQAAAAAABA==","id":"ae8bec3c-3b92-822e-53f1-68394cbb1758","last_modified":1480349158647}]} \ No newline at end of file +{"data":[{"schema":1554493303242,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1539007","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2019-03-26T04:37:00Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xNDAyBgNVBAMTK0RpZ2lDZXJ0IFNIQTIgRXh0ZW5kZWQgVmFsaWRhdGlvbiBTZXJ2ZXIgQ0E=","serialNumber":"BFXgjf2ribj8GNKFDT/8+g==","id":"6ef701b6-5e38-4a9a-b6b9-2c1beed8d2a9","last_modified":1554504516759},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AK8tb0kLM7VzymmWJsfD3A==","id":"d3f0522b-2465-405f-9f7b-60b4855dcffb","last_modified":1552492951595},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AJDvcXc7qWv3KL5T8LZTzg==","id":"bf4d016f-5663-41ab-878f-3125a4ed37d3","last_modified":1547837142956},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"atcGz1KKGVTDnXW50L1A","id":"e247e73f-9f9d-4a95-be21-189451d6547d","last_modified":1547837142641},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"T8WaANEU0o+TGJUhLg2r","id":"59f41045-3213-41e4-a57f-b80f6e718319","last_modified":1547837142322},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AITPqUzKZv4eLCI4WjAAJw==","id":"b77e2e29-365d-47ee-ba09-7737a5c9ead3","last_modified":1547837141991},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDElMCMGA1UEAwwcVUNBIEV4dGVuZGVkIFZhbGlkYXRpb24gUm9vdA==","serialNumber":"WfGaLerthIxK19OQTLUGWg==","id":"40c1362f-3787-4984-a6a5-0990d7e49e37","last_modified":1547837141665},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEdsb2JhbCBHMiBSb290","serialNumber":"U3PRzjiR2zDYPa19QJGeCQ==","id":"b2eb4727-dee0-4f6d-a738-e7f7fac9e141","last_modified":1547837141343},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/VqQ==","id":"e38378f4-32d4-4c07-93a5-482380ef4765","last_modified":1547837141021},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzM=","serialNumber":"e41LsLkwucx+Zibwpajkmngu5js=","id":"847dbfce-baf3-4983-a1ee-d88788cbbf14","last_modified":1547837140703},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"T96lTZ6OiZgO5HXc2chfmg==","id":"a07d0ace-fd5c-4c75-a10b-f61f902ba77b","last_modified":1547837140382},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"XLd9GTWYtJqCVi/S1qbPCA==","id":"28365130-2f06-4e4d-8c88-bdb5b67dadb5","last_modified":1547837140050},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dmmZvl03B2fppSvWZ2AhmQ==","id":"70388522-f69e-46af-bad5-030de539f8b8","last_modified":1547837139726},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"T94ltso4x5zl5SmPzGxaRQ==","id":"ff260017-eece-4203-96f7-7fe544eef7ea","last_modified":1547837139403},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ANWeOrGre+B3kYmkmDsQFA==","id":"63ba2af1-3b95-4c2f-86de-8d260c0e7515","last_modified":1547837139075},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"NuO1LvUpC8SX29dTTMDyxg==","id":"4187cbc1-981b-45d8-aabc-55264528b6be","last_modified":1547837138743},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"PLutAhi0cRaKAH2YfGu0ww==","id":"33baf681-54e2-4e2c-a122-c4cd476df1ad","last_modified":1547837138417},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"Aw==","id":"1cefaa15-053b-4ab9-a393-ea6bfcbfd990","last_modified":1547837138096},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"CQ==","id":"04ace127-bc46-4db7-945c-4d0c65c0d526","last_modified":1547837137775},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIIBDDELMAkGA1UEBhMCRVMxDzANBgNVBAgMBk1BRFJJRDEPMA0GA1UEBwwGTUFEUklEMTowOAYDVQQLDDFzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzMSkwJwYDVQQLDCBDSEFNQkVSUyBPRiBDT01NRVJDRSBST09UIC0gMjAxNjESMBAGA1UEBRMJQTgyNzQzMjg3MRgwFgYDVQRhDA9WQVRFUy1BODI3NDMyODcxGzAZBgNVBAoMEkFDIENBTUVSRklSTUEgUy5BLjEpMCcGA1UEAwwgQ0hBTUJFUlMgT0YgQ09NTUVSQ0UgUk9PVCAtIDIwMTY=","serialNumber":"GfVBLKRI50c=","id":"6c625a74-448c-4ea8-8a4a-396ea0e9f212","last_modified":1547837137453},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"Cg==","id":"934dba88-38a3-491b-828b-eb3e3c2e793d","last_modified":1547837137131},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"CA==","id":"c2060e12-c016-498e-8f7a-63a84744145c","last_modified":1547837136780},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1521150","who":"","why":"","name":"","created":"2019-01-18T11:45:13Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"BA==","id":"5d203d0c-a393-4007-bf81-e7468b44a3f9","last_modified":1547837136462},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1513609","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-12-14T18:02:57Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMTwwOgYDVQQDEzNHbG9iYWxTaWduIE9yZ2FuaXphdGlvbiBWYWxpZGF0aW9uIENBIC0gU0hBMjU2IC0gRzI=","serialNumber":"CpI/GtuuSFspBu4E","id":"3a6ab1f4-89cb-4987-b8b2-54797f88930b","last_modified":1544811398633},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"XtxscvsjagmsjDmthiFt","id":"b476fea3-2cdb-4481-89f0-913db8d7498a","last_modified":1544194317387},{"schema":1552491702967,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AJWE4kFAkUQDWa/pTgHq2w==","id":"236e57d7-b146-4be8-b8d1-29e872612646","last_modified":1544194316803},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"C8qNtOLfRJf1IZuBa5YY","id":"c496b743-29d9-421d-be85-cc3f0fe2129c","last_modified":1544194316153},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"ME4xCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxKDAmBgNVBAMTH1N3aXNzU2lnbiBQbGF0aW51bSBSb290IENBIC0gRzM=","serialNumber":"AIDHko+nptD0l30tljroTA==","id":"c7938b05-7beb-446a-98ea-c288e33c6fbb","last_modified":1544194315552},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AKrsBzcrYHp2NTXnbO4+Qg==","id":"8f563a73-5cae-4aa8-b235-482618a31010","last_modified":1544194314942},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"ME4xCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxKDAmBgNVBAMTH1N3aXNzU2lnbiBQbGF0aW51bSBSb290IENBIC0gRzM=","serialNumber":"APbjF26Q/6hfA1ECXToQLg==","id":"589ef449-7393-4474-9c3a-643023fb517c","last_modified":1544194314328},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AJpv8fAILOsYJSFFQ2KtPg==","id":"47970400-9add-4b5f-9e45-411f928e4623","last_modified":1544194313711},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MIGnMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWRdGFuw7pzw610dsOhbnk=","serialNumber":"SUEs5AAf","id":"ab409612-f7ba-430b-bd06-59fdb9a9313b","last_modified":1544194313119},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MIGnMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWRdGFuw7pzw610dsOhbnk=","serialNumber":"SUEs5AAh","id":"14d8c40f-e1d6-43da-9e12-acbaf631466c","last_modified":1544194312511},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"GPo59VlzNyA=","id":"b0e872b6-06dc-4f2e-8944-ce63aa2eb698","last_modified":1544194311831},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESISaOB3ffRv2jD4gcSgycgm","id":"40de616f-9872-4e5b-9c79-772291fdddf8","last_modified":1544194311237},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESImf/mZpsO94hCWJFJDUDPZ","id":"132dad17-7ebb-482a-bc8a-8b1ab06b6132","last_modified":1544194310607},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAk1LMRcwFQYDVQQKEw5LSUJTIEFEIFNrb3BqZTEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEqMCgGA1UEAxMhS2lic1RydXN0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"CiM0WSw//67JHGWCrlZU4Q==","id":"93d297ac-6894-4a83-8406-0ae2585cf9ee","last_modified":1544194310003},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeHHg==","id":"e3f98761-7fae-4684-bc3b-8c8da50e5ba1","last_modified":1544194309375},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDqg==","id":"2b01f223-8b3a-4da7-8925-44af81bd1279","last_modified":1544194308748},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeuLg==","id":"a0a574cb-2efb-42a7-bc70-51ce91e560db","last_modified":1544194308135},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDtw==","id":"5050d06f-ae56-40f4-8131-5019beeeec79","last_modified":1544194307534},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bfb2Rs8N620oUcAWs41vjA==","id":"d53e3b7e-da21-4cdb-8e68-dacd97d1d079","last_modified":1544194306886},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByemYA==","id":"62d36dac-38c1-49d1-b96d-6e018d7a5ef5","last_modified":1544194306284},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAk1LMRcwFQYDVQQKEw5LSUJTIEFEIFNrb3BqZTEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEqMCgGA1UEAxMhS2lic1RydXN0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"UK9vtGRfZt5a3QiUAQUTaQ==","id":"783e58c7-e899-4297-af4e-95d3c6253ce7","last_modified":1544194305696},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkNOMTAwLgYDVQQKDCdDaGluYSBGaW5hbmNpYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFTATBgNVBAMMDENGQ0EgRVYgUk9PVA==","serialNumber":"ZHKPuIaZ7pI39g==","id":"8d006e7e-9f46-4413-909b-52795a0bfff4","last_modified":1544194305082},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkNOMTAwLgYDVQQKDCdDaGluYSBGaW5hbmNpYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFTATBgNVBAMMDENGQ0EgRVYgUk9PVA==","serialNumber":"fs7i7UJNxcrb9w==","id":"e67cb2f1-f829-4659-8823-831d8abb7a46","last_modified":1544194304064},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"KKdkWIX7TIM=","id":"abbc3079-34c6-4101-a577-2db27ca8cbd7","last_modified":1544194302086},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1512640","who":"","why":"","name":"","created":"2018-12-07T09:51:34Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"dyRJDorYkgE=","id":"7e0b53c6-5915-4be1-847b-4c1785fb50e7","last_modified":1544194300987},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484798","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-12-07T14:23:59Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJESzEQMA4GA1UECAwHRGVubWFyazEpMCcGA1UEBwwgaW5kdXN0cmlwYXJrZW4gMjcsIDI3NTAgQmFsbGVydXAxJjAkBgNVBAoMHVNlbm5oZWlzZXIgQ29tbXVuaWNhdGlvbnMgQS9TMQwwCgYDVQQLDANSJkQxFjAUBgNVBAMMDVNlbm5jb21Sb290Q0ExIjAgBgkqhkiG9w0BCQEWE3N1cHBvcnRAc2VubmNvbS5jb20=","serialNumber":"APSjDtifEQeh","id":"188e1d62-6db0-42ec-b603-ff08649962e1","last_modified":1544194300329},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMTAvBgNVBAMMKFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBJbnRlcm1lZGlhaXIgQ0E=","serialNumber":"VAgHVTPgNwAuYo/y/jkd5A==","id":"9cb67873-dc81-4fb2-9e08-ff4aacaf9fb2","last_modified":1541184580803},{"schema":1552492991594,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQQ==","serialNumber":"DDbXyG6tZ+P3+B11YPItUw==","id":"ba22132a-97ca-42f1-a521-87fed171e1b7","last_modified":1541184580485},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ArkguT7SeGHAA9ts1IOWWg==","id":"76e65b53-7470-4e1d-8b75-672633474bc2","last_modified":1541184580122},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfHkg==","id":"b323ad96-398b-4225-aa75-1745251dffcb","last_modified":1541184579802},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeoVA==","id":"ad2f2b7a-3f07-4945-8bf6-ec8606df1a00","last_modified":1541184579472},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQQ==","serialNumber":"CkE6FgBN+nIkANMmgOQkiQ==","id":"de69d003-2a1e-4b76-a367-a4cdc26b2a58","last_modified":1541184579160},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGwxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xKzApBgNVBAMTIkRpZ2lDZXJ0IEhpZ2ggQXNzdXJhbmNlIEVWIFJvb3QgQ0E=","serialNumber":"DPWCOBgZnlb4K9ZS7Sft6Q==","id":"6c73cf52-b339-421b-8c2d-cb5a6b9f459b","last_modified":1541184578848},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJhg==","id":"9d3e708c-2edc-4ffd-8414-cb9dc0edf46e","last_modified":1541184578526},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfNbg==","id":"583b6241-3ab7-4c50-90ea-112bff931a2b","last_modified":1541184578212},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQQ==","serialNumber":"Ajx7/tYZjpFt5dBByJo9JQ==","id":"78be56f6-6b69-42ea-abaa-356d066b3c38","last_modified":1541184577902},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDqw==","id":"6ca65a6d-8aeb-47ae-b6b5-6c24509a73b1","last_modified":1541184577589},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeekQ==","id":"1ea21ad4-2362-45ba-a738-de15afc58297","last_modified":1541184577274},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDtg==","id":"846ddb44-f14a-4712-a1fb-6780e38300b5","last_modified":1541184576961},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"AXscEecDK83Ks/XoEFX8RQ==","id":"33b2de43-06a8-4984-85b5-5808c0baa6fd","last_modified":1541184576649},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd7Zg==","id":"c164ebb8-e020-45c4-ac6b-9bd57b761aa0","last_modified":1541184576330},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RDQTEx","serialNumber":"HQ4ijQIlTBpJKXTUo0geJ5AI4VI=","id":"b7bff651-6a6c-45d9-8bb3-d795ed07bdac","last_modified":1541184576013},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1504300","who":"","why":"","name":"","created":"2018-11-02T11:49:33Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"dMGHU/futOojjYQWtax2Rg==","id":"a9080b65-0185-4097-ab66-3c059b2a04ad","last_modified":1541184575682},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxSDcTuZO2","id":"db09a4fa-41d9-4e6c-b80f-a9be26cc70b2","last_modified":1535652552759},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxSjphH9DY","id":"1179bdb8-27ac-4bba-8e7e-f9c065b0dad4","last_modified":1535652552456},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxTNGDGgYt","id":"5f5530aa-7a1c-4b8f-bc35-1d123477d217","last_modified":1535652552111},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxSxsaAPaT","id":"ac2d20b0-5c89-4575-831a-51ef341f0ebc","last_modified":1535652551805},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxST2Fhyj5","id":"225ca652-d633-46e6-aef2-d97708ea696f","last_modified":1535652551494},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MF0xCzAJBgNVBAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScwJQYDVQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTI=","serialNumber":"IrmxST2Fhyj5","id":"752a5350-9895-434e-abe7-04b85863341e","last_modified":1535652551184},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"Qks10R3Zqs4AAAAAUdNX8Q==","id":"bc1bcbe5-4db7-4a41-8f10-e900f4eee969","last_modified":1535652550869},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfTSg==","id":"06039f5d-19e5-4760-9a27-656f4c949f71","last_modified":1535652550558},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfTSw==","id":"5cddfcfb-2136-4b37-8208-1b0d8dce98c4","last_modified":1535652550249},{"schema":1552492993020,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkg==","id":"1d0f7585-ddb3-44f2-86b5-afacda2fdfdb","last_modified":1535652549936},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeO7w==","id":"6183f199-c1c5-4705-a178-911f35de4916","last_modified":1535652549620},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkA==","id":"424db874-09b3-4a92-8fe6-61c6e10a0c69","last_modified":1535652549313},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeO7g==","id":"e0cb6242-a46f-4c43-a435-0f8550dd1e6a","last_modified":1535652549004},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"W2qOjVqGcY8=","id":"0093c3c1-1c5c-4524-a29b-9d6a857af2d7","last_modified":1535652548629},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"W2qOjVqGcY8=","id":"724dc57b-1305-4bc3-82af-90d7457e08b7","last_modified":1535652548311},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1487485","who":"","why":"","name":"","created":"2018-08-30T11:09:06Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"W2qOjVqGcY8=","id":"aa81cbe1-031c-4e40-b2d1-e6b9ec6abd7e","last_modified":1535652547990},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484798","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-08-29T17:35:07Z"},"enabled":true,"issuerName":"ME0xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxJzAlBgNVBAMTHkRpZ2lDZXJ0IFNIQTIgU2VjdXJlIFNlcnZlciBDQQ==","serialNumber":"CR8HWlsGr6Sdlw/mzOv8gA==","id":"cdd584ce-f3a2-4b7a-927e-1d479586f224","last_modified":1535564772911},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1480853","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-08-29T17:33:12Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJSYXBpZFNTTCBTSEEyNTYgQ0E=","serialNumber":"L41amoCH4B2agSUpD8Wd2A==","id":"8a401bee-cee4-40d8-a61e-903ca0cda17f","last_modified":1535564772595},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1480853","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-08-29T17:32:10Z"},"enabled":true,"issuerName":"MIGWMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE8MDoGA1UEAxMzQ09NT0RPIFJTQSBPcmdhbml6YXRpb24gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","serialNumber":"AMN6iHtOgy68QBu3kXiaFc8=","id":"514b3b98-0554-4aff-b117-faeafe5f4897","last_modified":1535564772273},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MDcxFDASBgNVBAoMC1RlbGlhU29uZXJhMR8wHQYDVQQDDBZUZWxpYVNvbmVyYSBSb290IENBIHYx","serialNumber":"ANdqi8UFCQChm0RchyjMpjY=","id":"4307675d-416f-4104-b7ca-6d728920cb91","last_modified":1534541096333},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MDcxFDASBgNVBAoMC1RlbGlhU29uZXJhMR8wHQYDVQQDDBZUZWxpYVNvbmVyYSBSb290IENBIHYx","serialNumber":"A3XEm35jzkM3B/8ZhDel7w==","id":"68edcd97-5fc4-40ea-b459-306f4339e987","last_modified":1534541095459},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"AISaJcSkfQq9","id":"7c47f219-cff9-4fef-a855-007eb636ecb4","last_modified":1534541094267},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MEkxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxIzAhBgNVBAMTGlN3aXNzU2lnbiBQbGF0aW51bSBDQSAtIEcy","serialNumber":"SUUmDL8PIBZ0EkIfCV6N","id":"7cc984ca-7513-4e31-bf91-f32799747ef9","last_modified":1534541093107},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"TA7JMQ==","id":"b4858c0b-2060-4327-9a27-0f3ab43765d6","last_modified":1534541092217},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"RWua3A==","id":"fc4c7ef0-5d5e-4a2c-86dc-99f2586d9774","last_modified":1534541091322},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"TA7JGA==","id":"2558efc4-46b1-4769-a57e-f8ac3971ed01","last_modified":1534541090496},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"Beo=","id":"9ff5d4c3-8d66-48ff-9add-343a90b031a6","last_modified":1534541089654},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"U4S9ZGx1FCY3wppgMwTn0Q==","id":"bd9d1022-f109-47a4-84be-ebf91cc901cb","last_modified":1534541088707},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"JMRsU4iZEfeLdmXeFIjy4w==","id":"85acb0b3-8291-4ee5-8137-3147412a22af","last_modified":1534541087581},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"BnG7G8DueagyBXomN87dYA==","id":"cde8301e-94ce-4808-935a-8dc1dc550d1f","last_modified":1534541086654},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"PtgfuDU/40rxF87UP4HpIw==","id":"c2c44bd7-a0d9-48ac-95b7-9b42250f09bb","last_modified":1534541085650},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGBMQswCQYDVQQGEwJCUjEtMCsGA1UEChMkQ2VydGlzaWduIENlcnRpZmljYWRvcmEgRGlnaXRhbCBTLkEuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSIwIAYDVQQDExlDZXJ0aXNpZ24gQ2xhc3MgMiBDQSAtIEcz","serialNumber":"FdJweu3BTeU/YzTvayJksQ==","id":"961d1883-8b9a-4523-8ee5-43ed4ccfc347","last_modified":1534541084620},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"cDosFiyvqdvDoYinOV6PDg==","id":"1c8e5f98-3a13-4f90-9d16-d15580d1c3fe","last_modified":1534541083590},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"LiJxautXUrJeoN4q4RX/Rg==","id":"3cd4e097-6f1d-44e6-9e51-43ca50114727","last_modified":1534541082464},{"schema":1552492994435,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpBTFBIQSBCQU5LMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMRswGQYDVQQDExJBTFBIQSBCQU5LIENBIC0gRzI=","serialNumber":"aqcSP+AsWAmN9xWwAseOqg==","id":"fe1c41a4-4a07-4bfa-b7dc-850433c2e433","last_modified":1534541081450},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByekbQ==","id":"0597bdd4-fb5d-4418-860e-f8e23349c9ff","last_modified":1534541080214},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByekbA==","id":"b797348e-1bfc-4996-be6e-a9f9cb9856cc","last_modified":1534541079187},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"BILpOL1LYav6JuQxlNetFA==","id":"fb097e62-de6b-4b55-afc9-b5102081e107","last_modified":1534541078056},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHNA==","serialNumber":"IW5rxECQ5LEyRGPeZE91ug==","id":"b83dfdc9-8db9-4668-858f-3fb24473e8e0","last_modified":1534541077133},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHNA==","serialNumber":"USISWFWRHGp530VQc2S1/Q==","id":"cb72eb7e-7a95-4a55-9e6f-a0b2286287e6","last_modified":1534541076012},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpBTFBIQSBCQU5LMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMRswGQYDVQQDExJBTFBIQSBCQU5LIENBIC0gRzI=","serialNumber":"I5cyb4y1eoVQS44pO3PAww==","id":"7e42ae24-9a36-4b9c-805e-786c45bd4b2b","last_modified":1534541074363},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpBTFBIQSBCQU5LMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMRswGQYDVQQDExJBTFBIQSBCQU5LIENBIC0gRzI=","serialNumber":"SoA0BJz+EzihvsNlkwlJTg==","id":"18832146-8b40-4eb2-992e-bf066afd87e0","last_modified":1534541073330},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Jje4sy72uF/upHdwh0gBGg==","id":"12d06d11-7118-4d7d-aad8-d6a3a5abf4dc","last_modified":1534541072103},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"e9fp8poJ4jDqpHxVc+7SoA==","id":"c318da0b-ae36-4297-9b3b-54b3704c415a","last_modified":1534541071195},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"H3xY9eXX+IpIl9ixQf3lzQ==","id":"a152bd2e-c4dc-4b8a-9367-68d233e3293d","last_modified":1534541070166},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAkdSMRQwEgYDVQQKEwtBREFDT00gUy5BLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEfMB0GA1UEAxMWQURBQ09NIENsYXNzIDIgQ0EgLSBHNA==","serialNumber":"YfdCZWyRV1sSx5XxyoXKSQ==","id":"5a6a2309-ef7f-4294-a5f5-35713e6b09ef","last_modified":1534541069146},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"SrterKaDHA8hZ+z9gwFXnw==","id":"9a9f2ce5-4adf-44ab-9419-46b2a9c23c0b","last_modified":1534541067931},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"HxapAqDOXuN5BHzREkFFtg==","id":"ccbb9f74-6a49-488f-9a63-d760e364a097","last_modified":1534541066804},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"MyEj11s2KJH0vdnfUfuNIw==","id":"aae675ae-903f-443f-aeb9-b9dbdad319a9","last_modified":1534541065882},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"C95Fob0ttu7S7dIXnjqiBA==","id":"d4aebc29-de67-49a0-ba42-255f38d35437","last_modified":1534541064843},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"A7XRsyidfS8L2dlFuTsfGA==","id":"f5c969f7-ddec-42f6-9ebf-595fbb7c6fca","last_modified":1534541063714},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc3DA==","id":"2bc17daa-0e8d-4d68-bfa4-ba4e68ab506c","last_modified":1534541062617},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByekcA==","id":"5bff7385-6327-424d-9190-6fc5e49e6204","last_modified":1534541061659},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"HvAB3BwhY8g=","id":"95957db4-01f6-458e-9702-b6bac846e794","last_modified":1534541060556},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"ThcGy6zgwpM=","id":"af35a216-5439-4e22-ac65-06b46b10f1e4","last_modified":1534541059412},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"YfJj9o3IPBI=","id":"f5764907-12d4-448f-a9ff-0c7bd49b6e2e","last_modified":1534541058504},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1484351","who":"","why":"","name":"","created":"2018-08-17T22:24:14Z"},"enabled":true,"issuerName":"MIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwOA==","serialNumber":"AahE5mpsDY4=","id":"10e71a2b-68ae-4c3e-aece-21b68e0c9c17","last_modified":1534541057381},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"AQ8=","id":"c056f51e-560e-4386-ab51-aa1447c3f778","last_modified":1527680138898},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARA=","id":"7e68e021-3514-4f54-bff4-16562a15fd8b","last_modified":1527680137878},{"schema":1552492995883,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARE=","id":"680e1552-a9c7-465b-9230-796fbaae08af","last_modified":1527680136981},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ATEz9w==","id":"95d4aa6a-e99d-4706-b071-b6c9d18f38f4","last_modified":1527680136034},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"Q704nTrqxVY=","id":"1507de3d-b758-4803-8048-edaf5b747848","last_modified":1527680135116},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMw==","serialNumber":"SMwb3p7dSlA=","id":"57ec979f-fa95-401a-8791-8adf2edd0223","last_modified":1527680134190},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOjA4BgNVBAMMMVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBQZXJzb29uIENBIC0gRzM=","serialNumber":"XJI7ULS6xv8=","id":"56e35d02-2284-4f72-9dd2-8606c005b3e7","last_modified":1527680133272},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"eNYPiDzOMtQ=","id":"d47cb30c-c61b-4514-9435-14998929b8e1","last_modified":1527680132390},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIGRMQswCQYDVQQGEwJOTDEiMCAGA1UEChMZS1BOIENvcnBvcmF0ZSBNYXJrZXQgQi5WLjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazE9MDsGA1UEAxM0S1BOIENvcnBvcmF0ZSBNYXJrZXQgQ2xhc3MgMiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"M9pDPXYgyiimYdML5Wg4zQ==","id":"ce3da6f2-bb52-4ea8-b2ca-334a49f34494","last_modified":1527680131497},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"X407nWyYC7u8lCrBrW2cRA==","id":"3c05d750-a448-4a72-8fe6-337efe7b68f0","last_modified":1527680130603},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"DmbpIZh1fhYcSThCcjaohA==","id":"e3c45873-f60c-4a04-be49-48e84b26c842","last_modified":1527680129682},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"TpTE/3d2UBJYfYHw2LSoww==","id":"4c6efcb4-ab11-4ebc-a527-bb9d4b5d54a9","last_modified":1527680128734},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"W9KDjZvaDeWwN4jQG9TO3w==","id":"4c841dba-55af-4fb2-ac56-9a4e9e090e9d","last_modified":1527680127636},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"RWHsRyzP3KFyjhTLPO4FPA==","id":"49638a65-fc28-4f9f-bac5-618e2c4df184","last_modified":1527680126713},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABECVWTJM=","id":"fafb930f-555d-4185-b11c-51542f67e9ed","last_modified":1527680125794},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABI75RcWk=","id":"cb02a3fb-31a6-4e59-9b7b-298a675dcfaf","last_modified":1527680124869},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABKkKSw14=","id":"ea62e720-34bf-43e3-863a-b920c4f9f3c0","last_modified":1527680123965},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc3Cg==","id":"291cf8ea-ad61-4a25-a829-8444ab7ff3e0","last_modified":1527680123024},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABSOXEgNk=","id":"a2b79aa8-7b05-43f2-8774-33be4e58e12a","last_modified":1527680122103},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkw==","id":"e6b1307d-9179-4d0c-baf0-486fc60f9e3d","last_modified":1527680121187},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"QHdGjRdEcAz+FjRyuIJmog==","id":"e7dd6129-27e9-43c3-832e-465f281653fd","last_modified":1527680120267},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"JekvfVn3h2+OX/V8Ef6vpg==","id":"69975669-0ed8-4c98-8bfe-0179eca26f16","last_modified":1527680119342},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"CHF76YGUdPMMCJ4njfsnwQ==","id":"f09d52b1-8a8b-4ca6-8d3e-aedcdfa2a2a2","last_modified":1527680118421},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"OBGSpfa3Oz6a7zeF/OywMg==","id":"e8d4263a-45aa-4965-b66b-fff4c766fd35","last_modified":1527680117502},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"deh5gFVej9+uQBqlb1fIig==","id":"496ee295-b927-4d33-9fd1-fc87b0327af5","last_modified":1527680116475},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"aKsZrWDpsFlVL0xkShb22A==","id":"79eccf3a-91ef-4238-b579-373bbfc64546","last_modified":1527680115348},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MHQxCzAJBgNVBAYTAkdCMScwJQYDVQQKEx5Ccml0aXNoIFRlbGVjb21tdW5pY2F0aW9ucyBwbGMxHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxGzAZBgNVBAMTEkJUIENsYXNzIDIgQ0EgLSBHMw==","serialNumber":"SFuFrFB7MZnZ6tsqwS47tw==","id":"b52359b1-3f41-4c09-bbfa-8b9e507ec567","last_modified":1527680114428},{"schema":1552492997313,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJkQ==","id":"783843ba-bada-4793-af9d-ba731980deb8","last_modified":1527680113504},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byeekg==","id":"d8d6e770-d17f-4d6e-bbd9-e977a8b433d7","last_modified":1527680112688},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byekaw==","id":"7726f4b7-43ab-4446-82de-5b94436243ef","last_modified":1527680111761},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycpXg==","id":"fe0212f9-fd42-4659-8052-86a4c39e358c","last_modified":1527680110845},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byekag==","id":"b86acd44-3dc4-4652-b48d-b0903b1ca74a","last_modified":1527680109917},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycpXw==","id":"c8acece6-3bd4-433f-ad93-ac379de4e8d7","last_modified":1527680108997},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"Mi/Y+W40ChdUGpag8vaUjQ==","id":"9f89002a-a395-46a0-b050-e5f32733e807","last_modified":1527680108078},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"eRdKqRQXNv4Vp8qfLP9FiA==","id":"1ad54d87-3100-49f5-8fd1-a156f5a479fd","last_modified":1527680107215},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"EOqAPvgqxt8=","id":"5e5f0c19-5509-4c2d-96d4-7e89771a75ff","last_modified":1527680106336},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1465399","who":"","why":"","name":"","created":"2018-05-30T12:35:03Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"amYSY2usyXU=","id":"0a3b7dd0-23ee-4ec6-8237-ceba9815e4ee","last_modified":1527680105419},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"KZlCQ0XnAo+GY3mKKJoNoNucjT0=","id":"b604fa72-f222-48f6-a8b7-8c7907a5b697","last_modified":1525201514127},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"JJfQeI7SQbQcPQ8Wc4+X2nlpWho=","id":"e5d6417c-1b43-45e0-a9d5-ccad984a9170","last_modified":1525201512695},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"bdheRp0SfvS84GGiPaBnyFhE8EY=","id":"8e9d1e04-962c-4495-89be-f25d3cd7d8d3","last_modified":1525201511157},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"Z6RtH7xmDM0r66IKSlpCZNrlRfY=","id":"cc7d8a02-77da-415a-842b-83d2f60e1bf3","last_modified":1525201509729},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"VOQX5SLKeMGyQdoF0X9h38gYrks=","id":"d34174b6-22f9-47b4-af3f-7d78b2ce313f","last_modified":1525201508294},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"ATE7Ow==","id":"6d27a296-13e2-4b53-880e-32f7030708a6","last_modified":1525201506960},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGAxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMTAvBgNVBAMMKFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBJbnRlcm1lZGlhaXIgQ0E=","serialNumber":"a5DOAqSUlLm2s6kL0x8gkQ==","id":"04216f09-9d99-4699-bf56-81cb74464d6e","last_modified":1525201505526},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"AeUotGv9K4mpvLzWxw==","id":"ac3d127c-2b79-4a52-94fa-b3ce9f420f2c","last_modified":1525201504399},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFI2MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"Ro51e1DpnjbH3LKdghY=","id":"e63eb91d-a23d-4f90-babb-9c4c2baf3da0","last_modified":1525201502761},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"R8MQVHZjYD/8LqGrob8=","id":"3264ae57-4d3d-482a-a169-f66652d93ff9","last_modified":1525201501429},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIx","serialNumber":"B6AKfwrKX6H1AAAAAAAAAAE=","id":"7647d289-2123-401d-b316-d84482d851a9","last_modified":1525201500273},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMuMRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIy","serialNumber":"CMUHBBak0idMAAAAAAAAAAE=","id":"a792f002-d392-4bb5-ac92-94fe71853dbc","last_modified":1525201498941},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMSIwIAYDVQQKExlLUE4gQ29ycG9yYXRlIE1hcmtldCBCLlYuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSgwJgYDVQQDEx9LUE4gQ29ycG9yYXRlIE1hcmtldCBDbGFzcyAyIENB","serialNumber":"GARMIB0Iaz3xxucE70O9Qg==","id":"dd5c26f0-c931-4d95-ade1-f243ba56a7eb","last_modified":1525201497640},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAktSMRMwEQYDVQQKEwpLRUNBLCBJbmMuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSIwIAYDVQQDExlDcm9zc0NlcnQgQ2xhc3MgMiBDQSAtIEcz","serialNumber":"fLpClvRi4IMKsokzVKT9Yg==","id":"2e3b108e-3455-44e3-b519-262869934aea","last_modified":1525201496208},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"JFcRHv1L89Vu8gagzuR3Pg==","id":"7732cbbc-9821-492e-8f1e-7b8754a1dc12","last_modified":1525201494877},{"schema":1552492998736,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"CAEyq5GePgxvZbmFx5WW6A==","id":"5f6842bc-4062-4445-a442-17ec20539f59","last_modified":1525201493653},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAk1ZMR8wHQYDVQQKExZNU0MgVHJ1c3RnYXRlLmNvbSBTZG4uMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSowKAYDVQQDEyFNU0MgVHJ1c3RnYXRlLmNvbSBDbGFzcyAyIENBIC0gRzI=","serialNumber":"L3UnLdK9iz8XVM1rbm3tTw==","id":"f2d9c522-665c-4d09-b6c2-e0653ca8dc8e","last_modified":1525201492418},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAk1ZMSQwIgYDVQQKExtNU0MgVHJ1c3RnYXRlLmNvbSBTZG4uIEJoZC4xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxKDAmBgNVBAMTH01TQyBUcnVzdGdhdGUuY29tIENsYXNzIDIgQ0EtRzM=","serialNumber":"Q0dKwXPiEec83XZPgsQh+g==","id":"119dc8cc-5dde-4e71-aa7a-dd2058aaaced","last_modified":1525201490985},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"PpIe9Q1JUVu5nN/+4HWAoA==","id":"b06fa973-e8ef-4deb-8dd6-af1f306563b6","last_modified":1525201489551},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Baw9WIPUcpFvYe8bilTVVQ==","id":"3105cae8-2380-44c9-943b-62bb59978626","last_modified":1525201488149},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"CpSHXk6RnrLSRVVJhVZEWA==","id":"a91e0705-eaae-417a-8cf5-f990c819c96f","last_modified":1525201486895},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"Bxt4PMyN1f5tIXW8W62DhA==","id":"ef5a0861-7a80-4bef-8189-6b190481cd0f","last_modified":1525201485456},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"bcIU/gztAKdw8elgpRh2vA==","id":"451f9b8a-ce9e-4393-866c-2a62440afa7a","last_modified":1525201484131},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"U51Qij2xILJB29u2m4ePyw==","id":"5ae5d4d8-47cd-4519-86f0-9e764f1fd1ec","last_modified":1525201482589},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIGUMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxRTBDBgNVBAMTPFN5bWFudGVjIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNg==","serialNumber":"VedYmG4aoUcioKT467SDcg==","id":"5c06e662-9307-463e-bdb9-07abfd4f311d","last_modified":1525201481154},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"HkN+3VDzRBFAw/QQ6XZ2gA==","id":"d284e696-c47e-4f9f-97b0-610dc7313438","last_modified":1525201480132},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"XaqJA1pYkpSOSst7Hmcxew==","id":"78487925-3b88-480a-ba6b-1d5e139b1ec9","last_modified":1525201478595},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"cIHLIBl0M9N90NNjZwhwSA==","id":"289275cc-72e5-4d51-b4f1-07346c5e237e","last_modified":1525201477470},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMSIwIAYDVQQKExlLUE4gQ29ycG9yYXRlIE1hcmtldCBCLlYuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSgwJgYDVQQDEx9LUE4gQ29ycG9yYXRlIE1hcmtldCBDbGFzcyAyIENB","serialNumber":"I+zjm9Bi1ZVKLF0R96thFQ==","id":"efd22973-74ee-4157-8ddf-057a44f23c03","last_modified":1525201475931},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMS0wKwYDVQQKEyRHZXRyb25pY3MgUGlua1JvY2NhZGUgTmVkZXJsYW5kIEIuVi4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxHTAbBgNVBAMTFEdldHJvbmljcyBDbGFzcyAyIENB","serialNumber":"MfSUS8xHwG64IFRIU5IHpw==","id":"9e57aa7e-ff8e-468f-98ed-562dd56eee71","last_modified":1525201474704},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMS0wKwYDVQQKEyRHZXRyb25pY3MgUGlua1JvY2NhZGUgTmVkZXJsYW5kIEIuVi4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxHTAbBgNVBAMTFEdldHJvbmljcyBDbGFzcyAyIENB","serialNumber":"VhmAg9gQ0IaL5+lKzrKYPQ==","id":"a801439e-c1b1-414f-acbb-16b5fe362389","last_modified":1525201473562},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGwxCzAJBgNVBAYTAk5MMRkwFwYDVQQKExBLUE4gVGVsZWNvbSBCLlYuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMSEwHwYDVQQDExhLUE4gVGVsZWNvbSBCLlYuIENBIC0gRzI=","serialNumber":"I1kCCASG38Q8TKOJaqQtvQ==","id":"eca07c7f-1a9c-46f5-a61f-a9696f8bdd7a","last_modified":1525201472349},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MGwxCzAJBgNVBAYTAk5MMRkwFwYDVQQKExBLUE4gVGVsZWNvbSBCLlYuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMSEwHwYDVQQDExhLUE4gVGVsZWNvbSBCLlYuIENBIC0gRzI=","serialNumber":"W4sqXNfJgPC3aLKkcOxq9Q==","id":"eac5a645-3936-457a-8d93-f2d8acb71e1f","last_modified":1525201471502},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MHwxCzAJBgNVBAYTAk5MMSIwIAYDVQQKExlLUE4gQ29ycG9yYXRlIE1hcmtldCBCLlYuMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMSgwJgYDVQQDEx9LUE4gQ29ycG9yYXRlIE1hcmtldCBDbGFzcyAyIENB","serialNumber":"F6sWArGVJv7AwBSxbnnqaw==","id":"4a21fbd9-4b39-4d8c-b2c9-82ace310f9c7","last_modified":1525201470403},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"JY5zdgD/mG9A4oB/uzdSwQ==","id":"859ec3d1-70bd-417d-a3a1-bedc847fb4f3","last_modified":1525201469016},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"VBy0L8eIKnVUGpY97OXrkw==","id":"e5ef5cbb-45ad-4ffd-a2db-beb350b195a3","last_modified":1525201468162},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"c+6uFePfrahUGpXs8lhiTw==","id":"b93e70b2-98aa-44d3-a62a-4f3bb49f9966","last_modified":1525201467126},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"PZfTkwQ5Yio+HE2mvtFzDg==","id":"4d559aad-94e9-4240-93d2-054943a9f31a","last_modified":1525201466102},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHpMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxLjAsBgNVBAsTJVNlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8gRUNWLTExNjA0BgNVBAsTLVZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlckNJQy0xICAoYykwMzEhMB8GA1UECxMYR2VuZXJhbGl0YXQgZGUgQ2F0YWx1bnlhMRIwEAYDVQQDEwlFQy1HRU5DQVQ=","serialNumber":"b+8vFPRPzN8+HCEWmIwVNg==","id":"047fdabb-c9a2-4eb1-aaa7-469511a8f1db","last_modified":1525201464668},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIIBGDELMAkGA1UEBhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2VydGlmaWNhY2lvIChOSUYgUS0wODAxMTc2LUkpMTQwMgYDVQQHEytQYXNzYXRnZSBkZSBsYSBDb25jZXBjaW8gMTEgMDgwMDggQmFyY2Vsb25hMS4wLAYDVQQLEyVTZXJ2ZWlzIFB1YmxpY3MgZGUgQ2VydGlmaWNhY2lvIEVDVi0yMTUwMwYDVQQLEyxWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJDSUMtMiAoYykwMzEfMB0GA1UECxMWVW5pdmVyc2l0YXRzIGkgUmVjZXJjYTEOMAwGA1UEAxMFRUMtVVI=","serialNumber":"Y3QACu2RGYVJ6FAnJWZpHA==","id":"703b71d5-0bf4-4af5-885b-d5c2165f4062","last_modified":1525201463440},{"schema":1552493000155,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"BqVfPLKBlSg/4Enn+TGdbA==","id":"f4e4fccb-6400-4fca-8557-849ba24afac1","last_modified":1525201462192},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"cEBA0P3KPBk/ojwnYepwzg==","id":"4c13fe3b-275e-4459-bb38-dc54bf6ba01d","last_modified":1525201460880},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"P0qUU7RhznNP6V9iGYbSbA==","id":"4f6b910c-64a4-4919-8ff5-c9fdd1f7d740","last_modified":1525201459447},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"W99Z2UuV5pFP6V8AYIwcVQ==","id":"66226a62-8d11-4442-8cd4-65279cdc08fa","last_modified":1525201458032},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"dfE2CNAy9IxP6VwZ2IU2cA==","id":"e4012675-11d8-4514-ba99-7a519d9f64c8","last_modified":1525201456987},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"IqW4gO46S81PjTpHBA7mUQ==","id":"54088505-0388-44e8-89f3-54dbeee3d2f5","last_modified":1525201455452},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHpMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxLjAsBgNVBAsMJVNlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8gRUNWLTExNjA0BgNVBAsMLVZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlckNJQy0xICAoYykwMzEhMB8GA1UECwwYR2VuZXJhbGl0YXQgZGUgQ2F0YWx1bnlhMRIwEAYDVQQDDAlFQy1HRU5DQVQ=","serialNumber":"On0bAstcoxZP6WERe150Gw==","id":"d2241dbd-e9df-420f-ba92-0c9c9d8d89f6","last_modified":1525201454025},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIIBGDELMAkGA1UEBhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2VydGlmaWNhY2lvIChOSUYgUS0wODAxMTc2LUkpMTQwMgYDVQQHEytQYXNzYXRnZSBkZSBsYSBDb25jZXBjaW8gMTEgMDgwMDggQmFyY2Vsb25hMS4wLAYDVQQLEyVTZXJ2ZWlzIFB1YmxpY3MgZGUgQ2VydGlmaWNhY2lvIEVDVi0yMTUwMwYDVQQLEyxWZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJDSUMtMiAoYykwMzEfMB0GA1UECxMWVW5pdmVyc2l0YXRzIGkgUmVjZXJjYTEOMAwGA1UEAxMFRUMtVVI=","serialNumber":"JSPC8hAKsUBP6Y3n9JMx8w==","id":"a6240c29-985b-41aa-bfef-a4b5b10c43c4","last_modified":1525201452790},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UECgwyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsMH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsMLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLDCxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAwwGRUMtQUND","serialNumber":"L5tOVjVGKtFP6V84tGEFPg==","id":"7780f12e-5f2c-4382-aa26-25e0b06e2a23","last_modified":1525201451667},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MIHzMQswCQYDVQQGEwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8gKE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBDZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQubmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMgZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUND","serialNumber":"IL094GkEPSU+HAucglL0Ig==","id":"b9db725d-2c89-42ad-8b0b-807311d0a5cb","last_modified":1525201450130},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"ME4xCzAJBgNVBAYTAk5PMR0wGwYDVQQKDBRCdXlwYXNzIEFTLTk4MzE2MzMyNzEgMB4GA1UEAwwXQnV5cGFzcyBDbGFzcyAyIFJvb3QgQ0E=","serialNumber":"KA==","id":"3d04d4fa-8dea-49f3-a47c-71e1443a9136","last_modified":1525201448898},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"UzAV4JqeuGY=","id":"8e357bb0-7738-4fb6-be98-1c3b0f34b883","last_modified":1525201447362},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"bYuYcMtVvjo=","id":"3546a52d-6e2a-4f79-bfda-3c7514eaf39e","last_modified":1525201446066},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1458321","who":"","why":"","name":"","created":"2018-05-01T20:04:01Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"WV2iHxGL6Vg=","id":"7aee1756-65b5-44d6-b368-bf7345dfb4d9","last_modified":1525201444699},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R4af5Q==","id":"6d5c851b-0161-406e-8d63-8d3db27ca4f8","last_modified":1521539068414},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R4b2Vg==","id":"bfd98186-8469-4f90-9caa-ef94ee7e5793","last_modified":1521539067480},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Hl7MT7aU4GbuanaMzc5eAg==","id":"b5d0f6f8-dc6c-42e6-86e3-db86c0f0ef3e","last_modified":1521539066546},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TrUuR7x7VeU7Qvlwt8Sumw==","id":"cd97a51f-ecd0-4cd0-afac-022a5deae387","last_modified":1521539065613},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ajUDfjuO76YmIt3+fyTLXg==","id":"6562ca7d-c4df-4c31-93b9-4a4ed561f830","last_modified":1521539064682},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"G0UY3ZCa+JfTgAVgvFA8qg==","id":"f31c2c71-e3dc-4f33-a12b-fad7aa9e1b66","last_modified":1521539063753},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dtULH8kD2mThpR/g1YJEtw==","id":"690c5b1d-ff08-4827-b7fe-0b43f8363202","last_modified":1521539062819},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"c5EZjjNc7LMOapbOzjEtJA==","id":"bcd2807e-15df-4eba-be88-2677fd17496e","last_modified":1521539061889},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dn2My7LvPi25AtUw3aPEmQ==","id":"1841b57b-5085-4ffd-9b5a-192ed098c6af","last_modified":1521539060941},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Qk03giZwJwxf5QpixTKflQ==","id":"01c7e0fd-4973-44d4-829a-896db0c7e1dd","last_modified":1521539060008},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"cepjeevcJiJnbGEvdJE1jg==","id":"e27659bd-3699-4eea-afb0-a435dfac9bd1","last_modified":1521539059082},{"schema":1552493001571,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"BtDaTXIs6tBSClhSLPXdYg==","id":"33f91455-1f4c-4fd7-aeea-c7f1df9309fd","last_modified":1521539058135},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ej2u88yEVXEb8BP1K49U6Q==","id":"af65bc77-69b0-4afb-9451-b8ae0bcc7b62","last_modified":1521539057196},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"H/Vx9uatDIulnLLrZjXEKg==","id":"d1b51a6b-bcb0-44d0-830c-394a409c3fa0","last_modified":1521539056260},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"PxYWUib8jdriX5MSGW7Ozw==","id":"b8304b34-1fcb-46bd-ac88-796748e0278f","last_modified":1521539055332},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"T3UrJ2tKvT0lyumu37ic6g==","id":"629d62ec-34c0-466d-b9ec-4f1991f45ac4","last_modified":1521539054393},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"And3HzRA33dI3K772oqBCw==","id":"e7cea443-749b-48c0-90e4-72139c44b9a7","last_modified":1521539053460},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"ZpLTr9toPH+XRF7OITitfw==","id":"8e977340-0255-432f-a74f-b45f1d892f59","last_modified":1521539052528},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TpyAwu1JmlIKD9gyf+0d4w==","id":"86c1352b-e5e8-4e7e-9a88-ea8916d08ded","last_modified":1521539051596},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"A09gcxt2IBLNzwqUBAhkDg==","id":"bd99f32d-02fb-4a46-9265-8bdcb343b8f8","last_modified":1521539047661},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"dgkExobSurPQq8GYrxxluA==","id":"190e2d0d-35d1-47b4-8b07-73df5c649ba4","last_modified":1521539046709},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IEVDQyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"UJ3tpbZLsyrhh60M9CMQaQ==","id":"b4c69adc-2247-4aed-8cb9-e0fd1bd4e457","last_modified":1521539045779},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"MpG5djdbcIoI5TIkJ7vENA==","id":"c2b676e2-f636-4489-ad39-ceadad4d122c","last_modified":1521539044827},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IEVDQyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"BlOMLY2hk1OPGflbt/pPXQ==","id":"06096001-fd68-4d0e-be8d-832c24695c75","last_modified":1521539043891},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IEVDQyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"APy7Z8kyJRVBcM/oki5xZ2M=","id":"71a73415-ba8f-4281-86b4-76311c2f0410","last_modified":1521539042956},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"ANjIV8rkvmb5E3Wf3aPV2ys=","id":"ca2547dd-66ec-4991-ab40-362581ebdc69","last_modified":1521539042013},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"AKbcLtOIMMwDPSOrzrclZL8=","id":"f463f5b3-b729-4da8-afc0-c54e54d857bc","last_modified":1521539041071},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"BQ==","id":"821bc34c-45ce-444a-b7c0-0a581a788a52","last_modified":1521539040133},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1447252","who":"","why":"","name":"","created":"2018-03-20T09:43:57Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"Ag==","id":"490cb9c4-e092-4200-9e4b-be790d4db9b6","last_modified":1521539039175},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1436524","who":"wthayer@mozilla.com","why":"key compromise","name":"","created":"2018-02-13T20:30:40Z"},"enabled":true,"issuerName":"MGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMSAwHgYDVQQDExd0aGF3dGUgRFYgU1NMIFNIQTI1NiBDQQ==","serialNumber":"dqN9ZZM/PfFCXStajJdbtQ==","id":"1dea3a27-cf12-440c-b77d-08608dcb4fae","last_modified":1518553957211},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"IsWDgJMv7uY=","id":"6252eb0e-d613-4290-a7ab-1b6698146077","last_modified":1518185155027},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","serialNumber":"WDFms0iypljMkohTzBvf4GmTOu0=","id":"938ea097-b56a-4286-9370-a1dabb46c908","last_modified":1518185154165},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzM=","serialNumber":"PybG62jqpxKYOV5MlXAGPJYDy9M=","id":"495b31a1-84f2-4a2e-b4b0-f24303c0b114","last_modified":1518185153363},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/SsQ==","id":"5373d63b-fdb3-4cf2-82c4-6d5dde47a536","last_modified":1518185152542},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ATEzEQ==","id":"e0589829-384d-4cd8-952f-3b4d5b3116f0","last_modified":1518185151698},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"ATE33w==","id":"b4208886-7ca1-4d3f-a6b7-271f93aaf6cd","last_modified":1518185150862},{"schema":1552493002970,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byecpw==","id":"0a419007-294d-4c7e-8ae4-e26c83633f5a","last_modified":1518185150011},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MHoxCzAJBgNVBAYTAkFVMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazErMCkGA1UEAxMiU3ltYW50ZWMgQXVzdHJhbGlhIENsYXNzIDIgQ0EgLSBHMg==","serialNumber":"MZNwCx0BAjzTOgcvHsmdhQ==","id":"f7ee0207-7809-4310-a334-906a783c94f9","last_modified":1518185149162},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"PWwhjEHh0n5G6P8b+bAkcg==","id":"8ed4a6a5-4222-44bd-b52a-2fc5b2093fd4","last_modified":1518185148285},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye/xA==","id":"49f10bd9-4827-42f8-b6bb-1136cdb8b1f1","last_modified":1518185147458},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkFVMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEmMCQGA1UEAxMdU3ltYW50ZWMgQXVzdHJhbGlhIENsYXNzIDIgQ0E=","serialNumber":"Nn6RHaVImMEtHLbPqlyGEA==","id":"49216c75-cdfa-423a-84cb-a4285e9efc65","last_modified":1518185146632},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"X22XOlwfc1Taw/ORwGOIeg==","id":"21e8b448-bdc3-4549-8436-7b5218662f7b","last_modified":1518185145800},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1437038","who":"","why":"","name":"","created":"2018-02-09T14:05:40Z"},"enabled":true,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"PgImeGqCkapG6P426Ne85w==","id":"9c7330f0-ac62-44f6-9ecc-1f6c8090e22c","last_modified":1518185144953},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1433118","who":"jc@mozilla.com","why":"key compromise","name":"","created":"2018-01-30T17:48:22Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSkwJwYDVQQDEyBDZXJ0dW0gRG9tYWluIFZhbGlkYXRpb24gQ0EgU0hBMg==","serialNumber":"VEav0UR+l38TpKTRi7sS1g==","id":"cb712a6d-3b3d-4642-b0f0-5f765f615559","last_modified":1517334651604},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432467","who":"","why":"","name":"","created":"2018-01-23T13:41:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye9zg==","id":"fead3048-84a5-4256-9850-cf412c8cce88","last_modified":1516714883099},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432467","who":"","why":"","name":"","created":"2018-01-23T13:41:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeWyA==","id":"5d178546-44d0-4756-8bc1-aa84c958ec6d","last_modified":1516714882194},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1432467","who":"","why":"","name":"","created":"2018-01-23T13:41:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye9zw==","id":"ce6dc2f0-5709-49d6-a762-87e297e2c4f3","last_modified":1516714881354},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1427034","who":"mgoodwin@mozilla.com","why":"","name":"key compromise","created":"2018-01-17T13:03:45.551668672Z"},"enabled":true,"issuerName":"MHAxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xLzAtBgNVBAMTJkRpZ2lDZXJ0IFNIQTIgSGlnaCBBc3N1cmFuY2UgU2VydmVyIENB","serialNumber":"Cn+uUpLudsH09lYYIPTK5A==","id":"37450b9d-89e2-4144-af21-c01dfb50d5e8","last_modified":1516714880459},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430498","who":"jc@mozilla.com","why":"","name":"registry problem","created":"2018-01-17T00:30:37.551668672Z"},"enabled":true,"issuerName":"MHIxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJUWDEQMA4GA1UEBxMHSG91c3RvbjEVMBMGA1UEChMMY1BhbmVsLCBJbmMuMS0wKwYDVQQDEyRjUGFuZWwsIEluYy4gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"AJk3QFH13eHUHHVnsvwS0Vo=","id":"c3485d18-5309-46f4-a324-b72aae76d2fa","last_modified":1516150019120},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430498","who":"jc@mozilla.com","why":"","name":"registry problem - remove after Feb 2018","created":"2018-01-16T14:26:03.648712626Z"},"enabled":true,"issuerName":"MHIxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJUWDEQMA4GA1UEBxMHSG91c3RvbjEVMBMGA1UEChMMY1BhbmVsLCBJbmMuMS0wKwYDVQQDEyRjUGFuZWwsIEluYy4gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"NlLRZJFLco/An3cLAGjGgQ==","id":"ee550d4f-2e5e-4a92-84a0-97595775682d","last_modified":1516119227966},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1430172","who":"jc@mozilla.com","why":"","name":"key compromise","created":"2018-01-12T16:24:38.732932137Z"},"enabled":true,"issuerName":"MIGSMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE4MDYGA1UEAxMvQ09NT0RPIFJTQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIgQ0E=","serialNumber":"TasC8Zd8BT8kXEE67cFQmA==","id":"fd5a2c90-20dc-49fa-8d98-4ce4f75a9e67","last_modified":1515779270416},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1425376","who":"jc@mozilla.com","why":"","name":"key compromise","created":"2018-01-12T16:10:12.532698105Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"UDE/uwr4z5V8eZI4+1gkAw==","id":"c848badb-926d-4a4b-84ca-776d8e83afbd","last_modified":1515773559723},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429636","who":"jc@mozilla.com","why":"","name":"key compromise","created":"2018-01-12T16:07:30.989396006Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEUMBIGA1UEBxMLU2FudGEgQ2xhcmExGjAYBgNVBAoTEUludGVsIENvcnBvcmF0aW9uMSUwIwYDVQQDExxJbnRlbCBFeHRlcm5hbCBJc3N1aW5nIENBIDZC","serialNumber":"HwAABsvzDP+DIzUG6QAAAAAGyw==","id":"754959ef-52da-40c2-9f01-6d58cee4bb6e","last_modified":1515773559394},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MFQxCzAJBgNVBAYTAkJNMRkwFwYDVQQKDBBRdW9WYWRpcyBMaW1pdGVkMSowKAYDVQQDDCFRdW9WYWRpcyBFbnRlcnByaXNlIFRydXN0IENBIDIgRzM=","serialNumber":"bqapwACCtKhVagTl7cEP7KFbM0E=","id":"557dce95-1f9d-4292-b0e3-1e6190ceb6b2","last_modified":1515506204155},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"BFA=","id":"8b5b2498-3bda-404a-b778-8231f31548ed","last_modified":1515506203323},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfNbw==","id":"54bc1bfd-3c57-4698-9702-bf18862330e5","last_modified":1515506202308},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1429055","who":"","why":"","name":"","created":"2018-01-09T13:56:39Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"Eg==","id":"bc46d429-2528-4068-b205-b0f853e3865b","last_modified":1515506201306},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1425166","who":"jc@mozilla.com","why":".","name":"key compromise","created":"2017-12-14T17:17:08.723413Z"},"enabled":true,"issuerName":"MIG0MQswCQYDVQQGEwJVUzEQMA4GA1UECBMHQXJpem9uYTETMBEGA1UEBxMKU2NvdHRzZGFsZTEaMBgGA1UEChMRR29EYWRkeS5jb20sIEluYy4xLTArBgNVBAsTJGh0dHA6Ly9jZXJ0cy5nb2RhZGR5LmNvbS9yZXBvc2l0b3J5LzEzMDEGA1UEAxMqR28gRGFkZHkgU2VjdXJlIENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcy","serialNumber":"AOfHzdPzlvw5","id":"47a94296-eb80-4f80-a327-d6c0dcf96e83","last_modified":1513273512012},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423400","who":"mgoodwin","why":"Added per CA request","name":"Microsoft IT SSL SHA2 revocation 2","created":"2017-12-06T16:51:03Z"},"enabled":true,"issuerName":"MIGLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMRUwEwYDVQQLEwxNaWNyb3NvZnQgSVQxHjAcBgNVBAMTFU1pY3Jvc29mdCBJVCBTU0wgU0hBMg==","serialNumber":"WgAFElbyxxPA8BdM4gABAAUSVg==","id":"41d101d3-2258-4c62-94b4-288e140a4205","last_modified":1512596195433},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423400","who":"mgoodwin","why":"Added per CA request","name":"Microsoft IT SSL SHA2 revocation 1","created":"2017-12-06T16:51:03Z"},"enabled":true,"issuerName":"MIGLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMRUwEwYDVQQLEwxNaWNyb3NvZnQgSVQxHjAcBgNVBAMTFU1pY3Jvc29mdCBJVCBTU0wgU0hBMg==","serialNumber":"WgAFElcDxFjoswSzjAABAAUSVw==","id":"d6e37caf-2691-4a82-8682-72b454419d8c","last_modified":1512596194454},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"em/HTY01Cvv6ITgkH+ftlg==","id":"7b48e485-3f00-4838-98d7-78c731f014e7","last_modified":1512488574225},{"schema":1552493004389,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"a2GKnRbYMZ0oZkRzJE8NIw==","id":"0efe9970-3656-4aa9-8fd2-cfe290ca2c7e","last_modified":1512488573423},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"QspbHxzWb41SX9TUhF1N1A==","id":"bb2d8dfc-6dd0-47c3-a46c-c0f8235418a4","last_modified":1512488572398},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"PbXdgANzAyCOCZ5qa/7E6A==","id":"f3f7d94c-c3d6-48f1-b807-43c97784dcdc","last_modified":1512488571476},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"EgtJ1f+/tZwlGfg0Uu7XCQ==","id":"331b24c7-b0dd-4289-9ef7-a4f92eb4f449","last_modified":1512488570451},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"TbPyD9NnsEcxyK6LIsr78g==","id":"eb7bda20-89d0-4ed5-a731-0896127de01e","last_modified":1512488569530},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"JjjcXrfGjTCi1ug/AEeYlg==","id":"0f7d3bf7-ddeb-4c1b-ba24-7ae9157bba15","last_modified":1512488568584},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"HGD2RtvXMaPDqHIPLdXocw==","id":"b26128cc-3096-438e-858f-7c2cbaf3c903","last_modified":1512488567585},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"fa9agGguMHfBorMTXXMd9g==","id":"2ace54b8-3856-4aa9-bd26-45f573e737ce","last_modified":1512488566638},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"WfPUsnnSF04ShWVYEa/KRA==","id":"5bc1d739-7788-4f13-b92c-5b6a8662319b","last_modified":1512488565741},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"LzVYePklc3vH3jkk0BZr9g==","id":"bc7eea97-3ee7-49a0-80a7-c0f1a346a1c4","last_modified":1512488564721},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"BWuckD4dPHZYW5ThBsl+aQ==","id":"2a474462-256d-4583-9103-297077b85bad","last_modified":1512488563751},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"LJ8wKbrQXgT8VExZ6vEfWA==","id":"4a1c1053-a8a9-42ff-bb3e-3ac5c536d5c3","last_modified":1512488562853},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"GskXrIFkzLS+4yohQM9EUA==","id":"a3b8a885-9d36-483c-8b4c-c80e8795bb92","last_modified":1512488561945},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"X3iUdzxCEtOAKpiTLsqjBA==","id":"7fc162c0-b668-4336-ad9a-cf6ac4bf7f88","last_modified":1512488560934},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"UKM/CNF2OvC4giYnAUG/Ag==","id":"7f8575f4-dcd7-4e51-9540-674ea52a0afc","last_modified":1512488559917},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"fZ10MyCe51jAjZCsDgqaxA==","id":"a943a2dc-e783-4560-90ec-5b2ce4936f60","last_modified":1512488558952},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"Gz4uHrL2usrTZrPCHeuF5g==","id":"cf84a41a-afeb-4727-b51e-f1489075f5a0","last_modified":1512488557959},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"bf8hEJywo1lAp4UNcLl5Ew==","id":"26c0ae81-c15c-4f37-930c-f3c39fca709a","last_modified":1512488557038},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"P4sUnc++hlU/bXj0zSTlcQ==","id":"1a68fa22-b801-4f56-81b2-a6575dd928ac","last_modified":1512488556115},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"KUZMXOUj2sdY2i2Rfgp/5Q==","id":"4c1f25cc-e17b-4ce4-a0c8-ab871a370238","last_modified":1512488555092},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"a9HDb1beqQYmkvFH0qExcg==","id":"b876cede-af38-44ff-952b-cf1652e0eff4","last_modified":1512488554136},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"C2tQZWb2eoQD2XC3F5JSzg==","id":"67c163b1-7be2-434d-9a17-24ab282e0906","last_modified":1512488553221},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"QjiuX0y1agXQQqmDB2yh3w==","id":"966bf4c9-229d-40ea-8783-cdd20a90e7d0","last_modified":1512488552326},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"YwslVqGwc9CHkaZkXNZ4xw==","id":"e35a9cd7-72a9-44b6-bb42-c43054e279d3","last_modified":1512488551279},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"KRfQOuBdOSpEmAxSpDZGZg==","id":"3901e046-eee7-462e-9207-62a2074d5555","last_modified":1512488550258},{"schema":1552493005810,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"IARKrBjlKQLyVGA4X52L7w==","id":"59872bbc-66b1-4627-890b-b8e9aee46d08","last_modified":1512488549244},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"TsaDDThhoyhX10SURO3NMg==","id":"477a1238-b526-4dbf-9e7d-8807315f8e5a","last_modified":1512488548206},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"dSBsq/te0hzZauKHgJ3EWg==","id":"320c2435-4a3d-4a9c-898e-0be3e7314601","last_modified":1512488547208},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"JLLEdDl2iHqqyenVWwQ/XA==","id":"d1d33ccd-4ea7-4b1f-9969-b77036da72c0","last_modified":1512488546183},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"D4dSwi4udjGtMftKLTSFyg==","id":"36e0661b-bbce-412d-b181-f51599b5133f","last_modified":1512488545212},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltmw=","id":"7ab02aa8-9300-4e05-bd35-1a8a0dc66114","last_modified":1512488544217},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltm8=","id":"3128a9a7-5929-495d-b6e9-d1322d8969cc","last_modified":1512488543316},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"N4XreFRrqFQ=","id":"0cf09345-c803-4248-8e8f-4fd437efc225","last_modified":1512488542191},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwOA==","serialNumber":"Ah69dEvrzT4=","id":"eabda172-8673-4d9d-b955-ae33491273d0","last_modified":1512488541251},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4","serialNumber":"RXJFI0h6EJY=","id":"0ac03d6a-f013-45f1-a611-8d408d81cda2","last_modified":1512488540265},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBBODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIwIAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290","serialNumber":"DA==","id":"8374c965-72aa-4411-96a9-d0ed94b6eff5","last_modified":1512488539210},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1423239","who":"","why":"","name":"","created":"2017-12-05T15:42:15Z"},"enabled":true,"issuerName":"MIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwOA==","serialNumber":"AklaZYwhC9k=","id":"0ef6e97e-f104-472f-a639-f5095bee2cec","last_modified":1512488538203},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGcMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxFzAVBgNVBAMMDlRydXN0Q29yIEVDQS0x","serialNumber":"APB/jQRgyP8Q","id":"89031d16-d554-432c-b874-29611e57ddc7","last_modified":1511530774264},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGkMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRydXN0Q29yIFJvb3RDZXJ0IENBLTE=","serialNumber":"AOVojQRgyPcY","id":"365afa37-c1b7-49a1-b426-3ad6f41062ce","last_modified":1511530773342},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGkMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRydXN0Q29yIFJvb3RDZXJ0IENBLTI=","serialNumber":"APB/jQRgyPca","id":"469dc3f7-856e-46e9-bcd4-4690669a1164","last_modified":1511530772420},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGkMQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRydXN0Q29yIFJvb3RDZXJ0IENBLTE=","serialNumber":"AOVojQRgyPca","id":"350ab323-afb6-4b13-ad9d-4fd751b43b6d","last_modified":1511530771603},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"OeKv0wi+ATDxfQ6CWir1vA==","id":"f9cdfe8d-8646-4f51-a52e-2f8e207dd9af","last_modified":1511530770270},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"VNb2Hjai/t7dmCtOzRXXew==","id":"58ff4957-a4c8-490b-8ed2-28ec1730c0e5","last_modified":1511530769350},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"CuUEKEJM4xhxlFXraPcSpQ==","id":"7601c888-8cc4-4c4a-a1f8-c7035f722d59","last_modified":1511530768331},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"FK+rVRFA0o0PnW+X6V60gQ==","id":"94b0d239-ef85-46fd-8af6-4213e19bbe5a","last_modified":1511530767405},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"UT6GtTGbEC6SXJteWAKy2g==","id":"f232a4f0-ab91-4cde-acd6-28745c3c2bd0","last_modified":1511530766483},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"c0ENPRDbRozjU83garZrdA==","id":"5c07893e-ed64-43c5-aabb-fd7d059100f6","last_modified":1511530765531},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"ODTGURr0vY14WkIt15hHrg==","id":"26b8bba0-1be3-4f66-98d3-936a13c810b8","last_modified":1511530764744},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"RkNUwM80Jt7beb4ek+iI8w==","id":"e28af90b-6ca1-4335-876b-4afedaea6cf8","last_modified":1511530763884},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"dUIqmrcgq/261bRbo7fM1g==","id":"6d8170da-8177-4e04-988b-e24f36c39001","last_modified":1511530762701},{"schema":1552493007210,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"XbPH0u4MjoIrWzN8QCilfg==","id":"a44b3f08-cbb8-4fbe-98c0-e7710dd3e81e","last_modified":1511530761466},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"KvQ5AzK6tQy8eBy7NAD/lQ==","id":"882fa317-43a7-4515-b79b-437119b72cf3","last_modified":1511530760452},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"UfM8pWkcmmLGRiGIVydmoA==","id":"069856d2-6bd0-4b39-a8f5-2debd4535542","last_modified":1511530759416},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"X4C5SJIG0BDeJvpQq4ngCw==","id":"9abf8a9e-66d2-4193-9dd8-3d86f482d44f","last_modified":1511530758551},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"CGo/+42e75JBJ2JcOEaMFw==","id":"879c2baf-c634-45eb-b80b-c1fb0ceb31d9","last_modified":1511530757370},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"Q1r0dRkkG9miuHj/Y52izw==","id":"9e9ecf02-4c1c-4c32-b10a-c7272c416b5f","last_modified":1511530756553},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"WU+jmMhGAumhewqVKrZBmg==","id":"27bf3c0e-8868-4274-b37c-b3a4bde99ba1","last_modified":1511530755428},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"d8ToN4Dfs5RqD2yfAp12yQ==","id":"972f597f-5333-4ec4-8801-751bb5546abe","last_modified":1511530754297},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"ElBUYv/f+6+gnbAJ23qnAA==","id":"6ad92631-7061-4717-93ed-b5f56d8452b1","last_modified":1511530753374},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"DoP7aSdEs/3y+o2Gj9zgWA==","id":"16737b7d-6e89-43d1-8a4a-0f1a931371f8","last_modified":1511530752482},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"XOZMbPKQuJEw8Ib5neDVpQ==","id":"6d117cdb-5081-48b0-8408-4ca74edb943e","last_modified":1511530751226},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"UN78HLEKf7W9vQYkzYpJnw==","id":"e52276ca-6055-4069-8277-e046a6c8dca1","last_modified":1511530750302},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"KNhgX8XuJduYciIyatpOQg==","id":"000e9e4e-75dd-46f1-8acc-acdb9844a1ba","last_modified":1511530749075},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"OIJdAvYxHmLb6YaaMmwmjg==","id":"b2085d97-60ab-449c-ad46-8ca2818da916","last_modified":1511530747846},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"SrQ125q7UcLfxVKepx+lRg==","id":"5b2d0011-e159-4fe2-8d40-72fd5c210474","last_modified":1511530746840},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"EYfoVrySx7V3OUqs4xKvgA==","id":"39bf9bb4-2301-4d71-8c46-7a88f5b0cbae","last_modified":1511530745816},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBFQ0MgUm9vdCAtIEcx","serialNumber":"EkoaKijVTGVYI5c604iweg==","id":"eb900242-3154-40c3-8f90-391c5c15a6d5","last_modified":1511530744778},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEnMCUGA1UEAxMeU3ltYW50ZWMgV2ViIFBLSSBSU0EgUm9vdCAtIEcx","serialNumber":"VIFPnH3Io2OmF0J5KK8gzA==","id":"0aa3a176-7080-48d4-b8f2-8a3c60a6de88","last_modified":1511530743731},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"ANsAyDuSSs7Z83LfMZ+TDw==","id":"f20c25eb-a06f-43ac-a202-710565679819","last_modified":1511530742622},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AIQ8dLGqNIaxxMeg31W16Q==","id":"aec665a0-9d68-4342-9743-18efc713e0f8","last_modified":1511530741394},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AIQ8dLGqNIaxxMeg31W16Q==","id":"8a10108d-b91c-49da-9748-72421d965126","last_modified":1511530740428},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MIGwMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE5MDcGA1UECxMwd3d3LmVudHJ1c3QubmV0L0NQUyBpcyBpbmNvcnBvcmF0ZWQgYnkgcmVmZXJlbmNlMR8wHQYDVQQLExYoYykgMjAwNiBFbnRydXN0LCBJbmMuMS0wKwYDVQQDEyRFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"cFbYT3bxd1sAAAAAUdNX8A==","id":"892f7600-cbf9-41d7-8854-91e39cca6d64","last_modified":1511530739059},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1420411","who":"","why":"","name":"","created":"2017-11-24T13:38:55Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"DNHqTQd9QC+JnMy6AWyhkg==","id":"8f08f0c9-78a0-46cf-ac37-4d272b696046","last_modified":1511530738030},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-02T22:09:46Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AxPlMqxkByCn3XNuYMhYNMcp","id":"eab2fa01-c3d4-4fd1-b3b8-9d88ed9b6657","last_modified":1509980661621},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723413Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BPVqx4UbKVAbJSFTKwrcFryU","id":"f644b647-a845-40ef-9f6c-36744f304d08","last_modified":1509744817871},{"schema":1552493008615,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723410Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOncXh7IZp1SNydhtUdyh2O2","id":"58e3d1dd-4602-4b04-9f99-3f6efe1b0653","last_modified":1509744808464},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723407Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOc11keA9WJ9R20XQY8hO7yi","id":"749a02fe-2f0d-4eeb-84ff-f2730ec10bdf","last_modified":1509744807487},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723405Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOPwjyn5eqfeoxs7Z0y3vqNN","id":"9bcd94b9-c798-43da-9520-f15ffd3418e8","last_modified":1509744806955},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723402Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BONHqLIx/ibQE08IQIyoGaXg","id":"1b719105-db02-4597-8d5e-4e60a72167dc","last_modified":1509744802604},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723398Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BOIIipysxAz5xHIMmFRvYchY","id":"6f43ef92-37ea-407d-b113-0d1a2f30af6d","last_modified":1509744793918},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723395Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BLlQHJ611eOZuedFrFgVAfAs","id":"af6370dc-0ee2-4f46-864b-4aba6dad16aa","last_modified":1509744793363},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723392Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BKrxi2/1iFxHEFzyZvegxq5C","id":"8636eb93-74a1-4a6a-9fbe-c027fce6e1f3","last_modified":1509744792878},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723390Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BKobzjrOxa/6kCR0ImKoqaQW","id":"87cdeef4-a32f-4f89-90b2-d979766f66fd","last_modified":1509744792287},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723387Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BJDHnthjoDRutxFRJPFnixbU","id":"fd062b35-a923-4f40-adb6-b438b21dcebb","last_modified":1509744791739},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723385Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BHT6CK6B569m/dd5dEluBOEd","id":"dbd760d1-545a-4c22-9634-8266b173fea7","last_modified":1509744791182},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723382Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"BDV89QWZE9MJYlCpFQUv5Y2W","id":"5933c583-8b53-41b9-a23d-3fa849a39f22","last_modified":1509744790658},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723376Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A/99bZCzSpexYL5y6dSryDn3","id":"62a22818-bb50-4f99-ae28-194943003e28","last_modified":1509744790097},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723373Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A/7DHCczBnP5qUVh0jF2pvwB","id":"930fdbad-652c-445a-be30-1721420d5308","last_modified":1509744789472},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723371Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A+ly3y1rVP59k/MKfcE3DoEq","id":"2be75058-2815-46b4-97de-5f800fac23fb","last_modified":1509744776797},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723368Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A+RCQYwhofmXM+/hxdyoUzkI","id":"ece94a68-9224-462d-aa7d-174e461c3eac","last_modified":1509744776283},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723366Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A9BRwOwbXRRhCe+kcmglgW3z","id":"b17c537a-31c2-4547-90a7-5588e967e0d2","last_modified":1509744775761},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723363Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A8wZnhfuY6VIV1SwGsTGNR7L","id":"06dd2b87-9f23-4ecf-a6d7-1c4e248c377d","last_modified":1509744775215},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723361Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A8aDg1/IA4O8gjMPZHVqPI+w","id":"e90d77e0-1e41-4a45-9c4b-a0b615b0091d","last_modified":1509744774659},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723358Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A8LV4zckxcwdttbQSk0EPnoA","id":"421f4d83-9377-403a-b28b-c7249634e7fc","last_modified":1509744774150},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723356Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7uy+rmTav6tDH4dRrsnvXGH","id":"188d1c6c-c94c-4a1a-8028-cbc7c29069d4","last_modified":1509744773593},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723353Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7T0V6o47rgCKl3oUb7jF2Ph","id":"fee8894c-8624-41fc-ae9a-7180f52714f1","last_modified":1509744773026},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723350Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7RCxMe1S9Hb7ENzRxl0mxGP","id":"fca062d6-5292-4ca1-87ce-a6aa34c6a1ae","last_modified":1509744772514},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723348Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A7GX+szdK8/7Kf0xUuarfyIN","id":"fcaebe3c-564b-46c0-a852-a6e51d8a56cf","last_modified":1509744771973},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723345Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A5oET6WBWx72ColKf0txoWyR","id":"b6cd6dd6-4173-4584-ad06-d3a6400f4c4c","last_modified":1509744771414},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723342Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3ZQibPGSZ8nPVbuccaCvUfa","id":"c67ca525-ccdb-4ef9-8029-422656cbdbc8","last_modified":1509744766044},{"schema":1552493010014,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723340Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3WVy2V+2VFkWtMvA6HFwnhq","id":"69b9dc1c-9178-4090-82d2-4ecb650bf8a6","last_modified":1509744762617},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723337Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3UNTBOHUkbq+k999nJeSJdF","id":"12f76ac6-cb54-42d2-90e2-a06fbf6cc681","last_modified":1509744758183},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723335Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A3TWA5Aylxw0x8bVvrmUSNJd","id":"6765cc1a-15e0-46e8-b74a-30a03f538885","last_modified":1509744757639},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723332Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A1V4dX0tTb1rdTZxdWcuZ7YR","id":"fddf483c-b881-4a58-a24c-03b0f46ca701","last_modified":1509744754400},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723329Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"A0BOaf9UbJxzqBudSyes/cEM","id":"21c2287c-c873-4a06-bd80-8c2498deee0c","last_modified":1509744746034},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723327Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AzL4tLuklekJ8lSh6VnRMSrk","id":"fe19f480-7306-4eb4-a434-bb21e983102e","last_modified":1509744744506},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723324Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AyjNQ4dnGD3FD6WL5gYrYru7","id":"22ef2da0-8e63-40fe-8644-667178538911","last_modified":1509744743907},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723321Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AyYMguSo1my449OZq51C3s3Z","id":"bbb3fb02-ff86-44d0-859b-9b827c4943ad","last_modified":1509744743316},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723318Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"Ax6Jm7ajV49tqHgf9nYnzRCI","id":"f2b5d0ef-312b-4de2-9cd6-e0fb9bf262df","last_modified":1509744742729},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723315Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AxW0+uDsfyCSfhECdsGGpVD8","id":"0266840c-ce0c-47c1-8816-2c4f4b29b3f4","last_modified":1509744742199},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1414039","who":"jc@mozilla.com","why":".","name":"registry problems - remove in Feb 2018","created":"2017-11-03T20:43:04.723168Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQDExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMw==","serialNumber":"AwBGo0Zmp6KRryAguuMvXATI","id":"d5c21685-054a-4233-a633-0af3d769b0e7","last_modified":1509744741583},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARU=","id":"b91f4d33-972a-42ab-859f-0d3c8b68efe4","last_modified":1507714028770},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"RqFXxGPuA18=","id":"c75a0024-f08d-49e1-b8fc-1ca9bbb47965","last_modified":1507714027119},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABQaHhPSY=","id":"ddb917af-e251-48bc-91eb-59076ddf8494","last_modified":1507714025550},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABQaHhNLo=","id":"e606e8ce-32ef-4ffe-b9fd-7eced767b9b2","last_modified":1507714024574},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407559","who":"","why":"","name":"","created":"2017-10-11T10:26:59Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABQaHhOT4=","id":"259ff0a7-151c-4b7e-b449-98922b6bbfe3","last_modified":1507714023126},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMTowOAYDVQQDEzFHbG9iYWxTaWduIFBlcnNvbmFsU2lnbiBQYXJ0bmVycyBDQSAtIFNIQTI1NiAtIEcy","serialNumber":"AeNmeF8oVpDp/4GPvA==","id":"82e8996b-8424-4e5d-849a-9cb6c134773b","last_modified":1507713902396},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MIGRMQswCQYDVQQGEwJERTEQMA4GA1UECgwHU2llbWVuczERMA8GA1UEBRMIWlpaWlpaVjAxOjA4BgNVBAsMMUNvcHlyaWdodCAoQykgU2llbWVucyBBRyAyMDExIEFsbCBSaWdodHMgUmVzZXJ2ZWQxITAfBgNVBAMMGFNpZW1lbnMgSW50ZXJuZXQgQ0EgVjEuMA==","serialNumber":"WW8OCQ==","id":"a8ba8579-79d8-494e-b5bc-f9b8a6efae71","last_modified":1507713900874},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MIGRMQswCQYDVQQGEwJERTEQMA4GA1UECgwHU2llbWVuczERMA8GA1UEBRMIWlpaWlpaVjAxOjA4BgNVBAsMMUNvcHlyaWdodCAoQykgU2llbWVucyBBRyAyMDExIEFsbCBSaWdodHMgUmVzZXJ2ZWQxITAfBgNVBAMMGFNpZW1lbnMgSW50ZXJuZXQgQ0EgVjEuMA==","serialNumber":"AaoZYg==","id":"316627fa-3b68-48e4-909f-9fc58fc69a62","last_modified":1507713899233},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydCwg==","id":"7696b73a-52f8-4902-b6b5-130d22222f15","last_modified":1507713897487},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1407558","who":"","why":"","name":"","created":"2017-10-11T10:24:52Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BEeJFwO0nu759EPo9tKluw==","id":"113485f8-45db-488e-b45a-7917fcf4878c","last_modified":1507713895927},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402158","who":"mgoodwin@mozilla.com","why":".","name":"Certinomis Cross-Signed StartCom certs","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","serialNumber":"Wu0lOm5kylP5uOu6md4xmWC3AtQ=","id":"9945629e-f285-47fd-9241-05cb75c041e6","last_modified":1506372739199},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402158","who":"mgoodwin@mozilla.com","why":".","name":"Certinomis Cross-Signed StartCom certs","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","serialNumber":"Z7mwlz4NA2s+8dnwRzT/RvK9ZZQ=","id":"0f1e6e75-0f69-407f-bccd-5838401393eb","last_modified":1506372738063},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402128","who":"mgoodwin@mozilla.com","why":"These issue only client certificates and do not need to be trusted for SSL/TLS server authentication","name":"Add Cart\u00e3o de Cidad\u00e3o to OneCRL","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"a0zzyZD4OEdRpzTBCGWFnQ==","id":"b931ec9c-45a9-4719-b2fe-fd6c903b63f1","last_modified":1506372736800},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1402128","who":"mgoodwin@mozilla.com","why":"These issue only client certificates and do not need to be trusted for SSL/TLS server authentication","name":"Add Cart\u00e3o de Cidad\u00e3o to OneCRL","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"ObszBuNYqt9If26rE5MLnA==","id":"1aadc1b7-2a94-4178-9ccb-64ba471135b7","last_modified":1506372735297},{"schema":1552493011443,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1400600","who":"mgoodwin@mozilla.com","why":"Three cross certificates issued by the Baltimore Cybertrust Root to the Siemens Internet CA V1.0 have not yet been revoked but should be added to OneCRL.","name":"Baltimore Cybertrust Cross Certificates issued to Siemens Internet CA V1.0","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"CcaPWuZtcdneSnerYJH33A==","id":"2f081df6-2a06-4a11-ba8a-368275363e9c","last_modified":1506372734155},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1400600","who":"mgoodwin@mozilla.com","why":"Three cross certificates issued by the Baltimore Cybertrust Root to the Siemens Internet CA V1.0 have not yet been revoked but should be added to OneCRL.","name":"Baltimore Cybertrust Cross Certificates issued to Siemens Internet CA V1.0","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"DL0FAAzqeadFvWvsl9xaiA==","id":"07eff59c-72ff-4fa5-bdf6-756974fea58c","last_modified":1506372733055},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1400600","who":"mgoodwin@mozilla.com","why":"Three cross certificates issued by the Baltimore Cybertrust Root to the Siemens Internet CA V1.0 have not yet been revoked but should be added to OneCRL.","name":"Baltimore Cybertrust Cross Certificates issued to Siemens Internet CA V1.0","created":"2017-09-22T18:05:01Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydWSw==","id":"f5108d78-08e8-4a73-b7e6-5722bc181931","last_modified":1506372732025},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1394595","who":"mgoodwin@mozilla.com","why":"Unknown","name":"Add Firmaprofesional subCA Santander Digital Signature to OneCRL","created":"2017-09-07T11:55:05Z"},"enabled":false,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"QwCyx4wTlCQ=","id":"56e5b51e-6b90-4b87-8ca0-4f58d49e648d","last_modified":1504798798154},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1393281","who":"mgoodwin@mozilla.com","why":"Unknown","name":"Add FNMT's AC Representaci\u00f3n certificate to OneCRL","created":"2017-09-07T11:55:05Z"},"enabled":false,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"YcLU1PaprndVkma5ja/WIQ==","id":"756c3e21-c95d-4e5d-b5cb-00da9d658a78","last_modified":1504798796757},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1397312","who":"","why":"","name":"","created":"2017-09-06T16:07:44Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"UWMOvf4tj/x5cQN2PXVSww==","id":"0b0401dd-4f39-4740-b911-6ab11ab5edb3","last_modified":1504710470915},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1397312","who":"","why":"","name":"","created":"2017-09-06T16:07:44Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"AINVG9I4T2jgQgW4N9SNhw==","id":"a1d4104f-7bf3-4c00-9174-29b580030fee","last_modified":1504710469413},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1397312","who":"","why":"","name":"","created":"2017-09-06T16:07:44Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","serialNumber":"BUE=","id":"d081997f-6074-4f9e-b5b8-aa572a1d3177","last_modified":1504710467840},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1392378","who":"","why":"","name":"","created":"2017-08-21T20:42:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeLBg==","id":"e130c036-75e7-4e76-a93a-392fb9568b30","last_modified":1503344586238},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1381863","who":"mgoodwin@mozilla.com","why":"CA request","name":"T\u00dcRKTRUST EV SSL Sertifikas\u0131 Hizmetleri H5 - Add TurkTrust Intermediate Certs to OneCRL per CA's request","created":"2017-08-21T16:42:55Z"},"enabled":false,"issuerName":"MIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0wSwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1","serialNumber":"AUMyuCiycPJJ","id":"e8c04b9e-6bbd-4fbf-bcb0-a2177ac9c04a","last_modified":1503344585208},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1381863","who":"mgoodwin@mozilla.com","why":"CA request","name":"T\u00dcRKTRUST Nesne \u0130mzalama Sertifikas\u0131 Hizmetleri H5 - Add TurkTrust Intermediate Certs to OneCRL per CA's request","created":"2017-08-21T16:42:55Z"},"enabled":false,"issuerName":"MIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0wSwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1","serialNumber":"Aay2vr4aoUeZ","id":"af014072-16c1-4375-94ac-e8ee7611ccd3","last_modified":1503344584093},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1381863","who":"mgoodwin@mozilla.com","why":"CA request","name":"T\u00dcRKTRUST Basit Elektronik Sertifika Hizmetleri H5 - Add TurkTrust Intermediate Certs to OneCRL per CA's request","created":"2017-08-21T16:42:55Z"},"enabled":false,"issuerName":"MIGxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMU0wSwYDVQQKDERUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0gR8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLjFCMEAGA1UEAww5VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIEg1","serialNumber":"AZkNBFXrl1Zg","id":"5b62df54-5b45-424c-b126-a6442013861a","last_modified":1503344582959},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1391095","who":".","why":"https://groups.google.com/forum/#!msg/mozilla.dev.security.policy/Qo1ZNwlYKnY/UrAodnoQBwAJ","name":"Add AC FNMT Usuarios certificate to OneCRL","created":"2017-08-17T17:54:25Z"},"enabled":false,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"RV864VwhzbpUT4KqR1Hr2w==","id":"5e3a7625-ad9e-4713-89e7-3cddd3c0a781","last_modified":1503344581693},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"ATk=","id":"b2eaf8f3-f13b-4294-9a7c-5f70cda440b0","last_modified":1501513259932},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"ANU=","id":"d91f7502-e635-4fa6-b2da-9dcbac7a73b5","last_modified":1501513258828},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"QOu0a5Z9rCkw6Nk7Rg1/AQ==","id":"c302fc31-c64b-4105-bec4-2895e7201f97","last_modified":1501513257806},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"Xmo3AIW2VHeeJoR0o09RGQ==","id":"5be4587b-7e7d-4362-90ae-ec54e5c84a59","last_modified":1501513256610},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1385914","who":"","why":"","name":"","created":"2017-07-31T16:00:52Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"SeEzbpTltqUtqW7UiuJ2","id":"8dd80d48-07b1-419d-9992-dac30fced89e","last_modified":1501513255352},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"RMgdRGEBv0KzFCjgGFp0Hg==","id":"5f913c3e-d525-4ecf-b374-45e1e40d75b1","last_modified":1499778717805},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"E/YGRk12iZqZuMfsIiVaeg==","id":"398c4ee1-de04-429c-8dbb-cdc0c232b145","last_modified":1499778716926},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"O2Qh+qhbBRuZA11yDhcLGQ==","id":"d87aa7c0-507c-4795-b4c5-812e387c3eab","last_modified":1499778716028},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"D/VlGqmz9Nai1ywCydT/RQ==","id":"6094fb26-7fbf-48b0-83b0-42750450cb4e","last_modified":1499778715137},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHBMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xPDA6BgNVBAsTM0NsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjE6MDgGA1UECxMxKGMpIDE5OTggVmVyaVNpZ24sIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yaw==","serialNumber":"B8f7CHJUqV3VareLPE+2kA==","id":"33c37dfe-6270-49e8-b437-e593e6905679","last_modified":1499778714260},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"HVRikKXRQ1ouhOpYcOna/A==","id":"18c1851b-db94-4913-8688-368d7ed7bc61","last_modified":1499778713388},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA3IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNA==","serialNumber":"RmI44ARDVCUOgXNK9ACAbg==","id":"f4213dc2-9eb3-44a8-8be4-accb6d408075","last_modified":1499778712492},{"schema":1552493012878,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjE3MDUGA1UECxMuQ2xhc3MgMyBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"Aj/CJN2QWZAF25GXPXADOA==","id":"03a9b3e7-7787-41db-98db-e2fbd024ef45","last_modified":1499778711624},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"CgFBQQAAATjkOB1sAAAAAg==","id":"1b74aa7b-2506-48bd-88bc-39af44ee70ce","last_modified":1499778710731},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1379974","who":"","why":"","name":"","created":"2017-07-11T14:11:47Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjg=","serialNumber":"JGKKnm00uOQ=","id":"c6c10916-eb0c-4c4f-a812-4d6390e8a738","last_modified":1499778709784},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1375006","who":"","why":"","name":"","created":"2017-06-21T13:43:45Z"},"enabled":true,"issuerName":"MGsxCzAJBgNVBAYTAlVTMQ0wCwYDVQQKEwRWSVNBMS8wLQYDVQQLEyZWaXNhIEludGVybmF0aW9uYWwgU2VydmljZSBBc3NvY2lhdGlvbjEcMBoGA1UEAxMTVmlzYSBlQ29tbWVyY2UgUm9vdA==","serialNumber":"B2VhZAPxCDH3s9Mkbu3HfQ==","id":"4961246c-b140-4db0-87d7-d240f049b67e","last_modified":1498049030788},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1375006","who":"","why":"","name":"","created":"2017-06-21T13:43:45Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"ANUANvVYN7xqAISA9rvJPzQ=","id":"bdb19be5-1d67-49a9-bd7e-a7bbd8dcccad","last_modified":1498049029660},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1375006","who":"","why":"","name":"","created":"2017-06-21T13:43:45Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"CgFBQQAAATjtdPY5AAAAAg==","id":"fe6d33ba-fc97-485c-9b8a-639dd6d150d8","last_modified":1498049028433},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1374809","who":".","why":"Private key leaked","name":"Leaked private key for Cisco cert","created":"2017-06-21T12:45:09Z"},"enabled":false,"issuerName":"MF4xCzAJBgNVBAYTAlVTMTAwLgYDVQQKEydIeWRyYW50SUQgKEF2YWxhbmNoZSBDbG91ZCBDb3Jwb3JhdGlvbikxHTAbBgNVBAMTFEh5ZHJhbnRJRCBTU0wgSUNBIEcy","serialNumber":"ZhcM4uyLfYi04utzLnOP46Z89nI=","id":"bb8ba6ba-4e19-407d-ab9d-9f8aafd2c312","last_modified":1498049027284},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372336","who":".","why":"Banca d' Italia does not have a current audit for Baseline Requirements compliance","name":"Banca d'Italia Root's X-Certificate","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByemaA==","id":"7df83512-01f2-4d2c-af53-fcf4d87defd9","last_modified":1497542609610},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1373288","who":".","why":"","name":"Revoked intermediates","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"RsdOCxepZXHEs1ErwPc=","id":"b21c90ad-5618-40c1-ac75-eaf73b2c333b","last_modified":1497542608552},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1373288","who":".","why":"","name":"Revoked intermediates","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByembQ==","id":"e7397769-a603-486d-9696-84693b277203","last_modified":1497542607254},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1373288","who":".","why":"","name":"Revoked intermediates","created":"2017-06-15T16:43:23Z"},"enabled":false,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byemaw==","id":"148f7a38-535a-4097-a7a5-83abc4e35800","last_modified":1497542606104},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:06Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"MWzraR3LLhU9m/qKEhvVLQ==","id":"47786d55-ed71-461d-8ea0-3b074caac874","last_modified":1497362467654},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:05Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"eViJ2GX26lp5HbF+XNp1kQ==","id":"38355da2-f5ab-4882-a7e8-78ea5fc41e39","last_modified":1497362466761},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:04Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"U3KGm6UTqJ/nsMyteiUa2g==","id":"071f5229-616f-4ad1-a506-b48a9dbce21c","last_modified":1497362465694},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:03Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"OgxXyntHYBXnPAHDxY0OXg==","id":"95b7cd91-57b5-4e72-aa52-6a0546883af5","last_modified":1497362464680},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:02Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"GTPOETOFf5mIsbuzrojGfw==","id":"a7e4d7b5-50b7-412f-8592-ceb4f6db29a8","last_modified":1497362463643},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:01Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"NpsJHyt3o1U47AAgw3UNXA==","id":"f2e9d2ab-7220-460e-b4a4-02f3675e7a66","last_modified":1497362462415},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:01:00Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"RbG+tfPUe/vBRfTZF54i8g==","id":"9d320894-4ac4-49fb-bfcb-a71d97ebfe01","last_modified":1497362461438},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:59Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEyMDAGA1UEAxMpVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENBIC0gRzI=","serialNumber":"dhjnNtYx6cojdAE55TgIBA==","id":"fd51db5c-9e30-4cdb-9736-1f10b80376a9","last_modified":1497362460372},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:58Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"Cf0103tCm9oulH1QK0weTA==","id":"a02fbc88-df3e-4d81-b9e3-7a7088e193b0","last_modified":1497362459446},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:57Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"GuJ0aGBYhChXAOljooJZ3A==","id":"375b3822-bf9f-4c3d-8633-02f7a03597ac","last_modified":1497362458420},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:56Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"OOkLFZaa4CXGyJlLTIEjUQ==","id":"815b19c3-6c68-49fd-b9c4-f488317c9e8e","last_modified":1497362457510},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:55Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"A/kVDQpE7c9h+WxlWQFzSQ==","id":"ae9bb73c-5360-4685-a5e9-8098b95617d5","last_modified":1497362456459},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:54Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"VP3bQF/UdNfxq/UOypU1zQ==","id":"9e057902-89e3-49eb-9e56-f878c1c05f4f","last_modified":1497362455630},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:53Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"G8sz+bm+vQjTpQNBh5CfMg==","id":"d7283b5c-18aa-4cda-9158-fae5ae41ad09","last_modified":1497362454734},{"schema":1552493014308,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:52Z"},"enabled":true,"issuerName":"MHYxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29yazEtMCsGA1UEAxMkVmVyaVNpZ24gQ2xhc3MgMyBTU1AgSW50ZXJtZWRpYXRlIENB","serialNumber":"PmDn14AwWY28IlJeBXkDvA==","id":"43838f76-1ecd-4a7e-9a81-f9f2449f31f1","last_modified":1497362453713},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:51Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"aBXsv0oU3xqh2xkUPOi8","id":"380057fa-8d61-4ee2-a6a1-f6bc5d210e40","last_modified":1497362452684},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:50Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2lnbiBHb2xkIENBIC0gRzI=","serialNumber":"AIZ6Wq/4deFQzwC6NnFpUA==","id":"15c3777b-b91b-461c-99c5-761d6185b109","last_modified":1497362451663},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:49Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxITAfBgNVBAMTGFN3aXNzU2lnbiBTaWx2ZXIgQ0EgLSBHMg==","serialNumber":"APiyCXmwAUq+95DYa3DmGw==","id":"583ee36f-2136-418c-bab7-2d5ed62aad0a","last_modified":1497362450536},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:48Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEeMBwGA1UEAxMVU3dpc3Njb20gUm9vdCBFViBDQSAy","serialNumber":"AL691kTvkemG9UQNa6McQg8=","id":"a2fad4bd-2ce5-4ecf-97e2-1612bde41ed2","last_modified":1497362449522},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:47Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"AI7cApIcPA3cfSpQMf40onQ=","id":"7b9f5e88-b3a1-4071-ad7f-fce8459aa3a5","last_modified":1497362448476},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:46Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"OUOBG6TE0Lr+uYYGxeVbHg==","id":"418575d9-15aa-4b24-9ba5-3764748e3245","last_modified":1497362447464},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:45Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEeMBwGA1UEAxMVU3dpc3Njb20gUm9vdCBFViBDQSAy","serialNumber":"QFLH3Zrq+I5WQ6TlWzfUxA==","id":"65123c45-adf1-40a7-9531-a66d818ae6ab","last_modified":1497362446438},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:44Z"},"enabled":true,"issuerName":"MH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYDVQQDEyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"fqRDfSf8haCEh2nWE6O+bA==","id":"07e6dcee-ed47-4aa9-bc69-cd8c50be9eaf","last_modified":1497362445416},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:43Z"},"enabled":true,"issuerName":"MH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYDVQQDEyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"eohOGeS5ZHJeptyBvCu/mQ==","id":"11009f24-3e40-4372-82cb-c640be931a51","last_modified":1497362444493},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:42Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnY=","id":"d4cc9f44-f6a3-416d-92f5-d9d1242eff77","last_modified":1497362443469},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:41Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltm0=","id":"d448448b-1f23-4815-a563-c4a7996615ce","last_modified":1497362442343},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:40Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnQ=","id":"04f35e34-8280-4b48-a5b3-bb61b27445be","last_modified":1497362441423},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:39Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnE=","id":"133ff174-70c2-4cdf-b8d4-4bcc3db4b004","last_modified":1497362440295},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:38Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"LYTXWk7gMu8=","id":"3b0df03c-394f-43bf-bafd-6da07eca3c10","last_modified":1497362439285},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:37Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"azAcTWL+ijs=","id":"0e15f9c5-75e7-4b8c-9f10-99f8998eda98","last_modified":1497362438146},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:36Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"ATE6YA==","id":"73604eec-92dd-48a5-a040-b5644c4c9799","last_modified":1497362437119},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:35Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"ATE6Xw==","id":"7e3d897e-9724-443f-842b-2124ee1cd062","last_modified":1497362436009},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:34Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"ATE5Ig==","id":"cfe99f95-d3d1-4d4e-b312-6a7a0efedf09","last_modified":1497362434869},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:32Z"},"enabled":true,"issuerName":"MGkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOjA4BgNVBAMMMVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBQZXJzb29uIENBIC0gRzM=","serialNumber":"f43O9TualR8=","id":"ab95e89b-21cc-49c0-b4ac-0d1a3773b334","last_modified":1497362433845},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:31Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABL07hW2M=","id":"a2b93b68-1670-4c9d-a94d-e792364d24d4","last_modified":1497362432728},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:30Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABL07hXdQ=","id":"9aba77c3-ae07-443c-a0ba-ca01aadcc3eb","last_modified":1497362431692},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:29Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABL07hRxA=","id":"9065a612-801b-4b7b-9e2b-b87d584332a0","last_modified":1497362430669},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:28Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABL07hSVI=","id":"b1bb540b-be1b-4011-81df-998edb912fe1","last_modified":1497362429542},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:27Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/UQ==","id":"891cdd11-90ff-435c-9688-1a9e7aeb3a70","last_modified":1497362428621},{"schema":1552493015730,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:26Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/Tw==","id":"43770c43-8568-4d25-b5f2-52623d4fcf78","last_modified":1497362427700},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:25Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeBQg==","id":"9ea34ca2-9f9d-483e-8a49-c3a17d055d47","last_modified":1497362426780},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:25Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/Tg==","id":"3d2ac953-a4f2-4f59-a7a6-7c9a8fadf2ca","last_modified":1497362425753},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:23Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/UA==","id":"78529990-77c3-404e-93bf-308ebf7033e9","last_modified":1497362424834},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:22Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd/Ug==","id":"91e8f996-738a-4ff5-bf6a-4823c963d8e5","last_modified":1497362423604},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:21Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfJhw==","id":"7e2f71f1-6463-460c-b6ce-2a8b25624d3a","last_modified":1497362422585},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:20Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeekA==","id":"9a55265f-72e6-4e38-b23b-b3f097136daf","last_modified":1497362421456},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:19Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bycfmw==","id":"d29166c7-29e9-4b00-878f-99f6a415a4d2","last_modified":1497362420326},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:18Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycfpA==","id":"b02d1c65-499b-4cf9-a2e5-cd3d172c06f6","last_modified":1497362419199},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:17Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BycpYA==","id":"b544067a-575f-417a-ab9f-a9ef880c262e","last_modified":1497362418087},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:16Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydIoA==","id":"f91cf838-8125-41b5-9f6f-46891375de0d","last_modified":1497362416981},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:15Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEmMCQGA1UEAwwdQ2VydGlub21pcyAtIEF1dG9yaXTDqSBSYWNpbmU=","serialNumber":"GA==","id":"a980e313-d1dc-41dd-9bb8-921862a834be","last_modified":1497362415923},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:14Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEmMCQGA1UEAwwdQ2VydGlub21pcyAtIEF1dG9yaXTDqSBSYWNpbmU=","serialNumber":"Eg==","id":"8e1465de-a917-4608-b44b-ef02800eeb0a","last_modified":1497362414917},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1372586","who":"","why":"","name":"","created":"2017-06-13T15:00:00Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEmMCQGA1UEAwwdQ2VydGlub21pcyAtIEF1dG9yaXTDqSBSYWNpbmU=","serialNumber":"HQ==","id":"d61c0990-8c57-4141-9fe4-d5a0f46371ec","last_modified":1497362413918},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"Rea7UUYH3jl33BryPIo=","id":"3f5a142c-40a3-4c89-9df1-a056702b984e","last_modified":1494458678750},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"RvCM2iRdkCE82ZOO2dU=","id":"3e1798dd-0356-44c2-917f-76b2f32ee998","last_modified":1494458667510},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExIjAgBgNVBAMTGVRydXN0ZWQgUm9vdCBDQSBTSEEyNTYgRzI=","serialNumber":"RdHgEmEIjdyRFWDRRlk=","id":"f8ebfd47-13fb-46c7-9b4d-334526c6ded9","last_modified":1494458658573},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R/j2qA==","id":"2ba77577-428a-4f7d-9d54-b088ecb696b2","last_modified":1494458649435},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlRXMRIwEAYDVQQKDAlUQUlXQU4tQ0ExEDAOBgNVBAsMB1Jvb3QgQ0ExKjAoBgNVBAMMIVRXQ0EgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QAEy3RIAAAAAAAAMweH5dw==","id":"81126721-940c-454b-bd0e-f538cd5ab646","last_modified":1494458639464},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAlRXMRIwEAYDVQQKDAlUQUlXQU4tQ0ExEDAOBgNVBAsMB1Jvb3QgQ0ExKjAoBgNVBAMMIVRXQ0EgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"DL8=","id":"ff5d47b7-cb50-46f9-9da8-e778892a2caf","last_modified":1494458631103},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"AMs=","id":"6ff3473b-bd64-4b79-98c4-4622661c8e80","last_modified":1494458620210},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"AZ0=","id":"6aa5cbdb-19fb-4f57-9a4e-ddfbf06f50ae","last_modified":1494458595987},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MDMxCzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3RhZG8=","serialNumber":"cx0HrIEQg8JHWTP7DzOxSQ==","id":"bcd2cb94-3cd2-49df-a372-50a258804cc1","last_modified":1494458581014},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"A4g=","id":"124dd7d2-59e3-4eb1-b93a-5e9a33cd6e4f","last_modified":1494458571110},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQKDBBWZXJpem9uIEJ1c2luZXNzMREwDwYDVQQLDAhPbW5pUm9vdDEfMB0GA1UEAwwWVmVyaXpvbiBHbG9iYWwgUm9vdCBDQQ==","serialNumber":"A4w=","id":"0b21265d-dcfb-49c0-b9e9-e900412c1fdf","last_modified":1494458562276},{"schema":1552493017141,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"APt5i5rs4dIIQPwZdk9/ISc=","id":"058e5554-d206-4b11-9791-dff120803f83","last_modified":1494458553816},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"OGPFrg==","id":"f27c1519-908d-4dca-a797-024c43844b52","last_modified":1494458545573},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByemaQ==","id":"cbc37076-9136-40fa-a079-4d443b7071ca","last_modified":1494458533053},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byemag==","id":"b9762946-8b71-40cb-844b-cafa2c0aed12","last_modified":1494458523822},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfDtA==","id":"4b8b97f0-8a72-4ff1-af47-2fcd773c900f","last_modified":1494458510233},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydvrw==","id":"c3724a4d-2ed5-46a0-87dd-d7d339549c8f","last_modified":1494458498850},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAlRXMQ4wDAYDVQQKEwVUYWlDQTESMBAGA1UECxMJUG9saWN5IENBMSQwIgYDVQQDExtUYWlDQSBJbmZvcm1hdGlvbiBQb2xpY3kgQ0E=","serialNumber":"UbQGvw==","id":"20dc1a34-8afa-4d47-856f-810cc0a6f229","last_modified":1494458484988},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"LAVIFm0MWZYH+Sv8Vf+IqkM=","id":"d8f28ce2-8ee3-41a1-9bc0-ddad36f7c72e","last_modified":1494458469413},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"QM1zZ4GZ4gfwpQtUYye3Ne0=","id":"e35ececb-f12b-4fe4-bef8-ff7c3099fbe8","last_modified":1494458454435},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"YUlF+VXF2FWFqCo472HfZlw=","id":"0e806ef9-c9d4-455a-a462-cbb897cd8e20","last_modified":1494458439140},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"IHj3eiEK3K1Xrpu1uvtBuvE=","id":"023bf60f-9ed8-41ef-8ccb-1bf993f3f973","last_modified":1494458422758},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"RVWTeb5EKqE7cy7MUD2oJ3M=","id":"e5723e05-8b15-4cdb-b996-4d36b419a431","last_modified":1494458398872},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1343305","who":".","why":".","name":"Revoked intermediates","created":"2017-05-10T22:53:40Z"},"enabled":true,"issuerName":"MIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMg==","serialNumber":"UdNjvA==","id":"917e8337-dd57-4b8a-8994-2921f2fb69ef","last_modified":1494458377056},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"TA5iEg==","id":"16319df7-453c-d980-4624-d73d9cf43143","last_modified":1485907697001},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:37Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydSYg==","id":"ec171905-2990-30e0-74bb-9fc327c1c4bd","last_modified":1485907696954},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"Iqpyf/YoGgvHc8HiDAxAI8o=","id":"6fa017d2-461c-8de0-f8a1-ab0531097d8e","last_modified":1485907696908},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","serialNumber":"Hwexgn/ZCJicZPcsIyI8zxQ=","id":"4df86909-6b1c-f7cd-c71b-bb4b895d441f","last_modified":1485907696863},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","serialNumber":"RnQ3dg5KdDZs0nyFZk4=","id":"0971a89d-b11f-97c9-2ac2-f706757b75fb","last_modified":1485907696819},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","who":".","why":".","name":"Revoked intermediates","created":"2017-01-31T23:06:38Z"},"enabled":true,"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","serialNumber":"RnQ3dYovwvB0D5q2YGY=","id":"d739cdcd-0078-92a9-2c46-6a5231f3d888","last_modified":1485907696773},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","serialNumber":"ALxyZmb/WL/wAuUiPK5oK/g=","id":"d6bedca3-c2b7-0402-337e-7788b9c97b85","last_modified":1484704581273},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDErMCkGA1UEAxMiQ09NT0RPIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"AKrMYlJmUUin8FOM/0TJrmk=","id":"42e2ce60-f40f-97a6-dd47-3ea2e2dd72d8","last_modified":1484704580920},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","serialNumber":"e7wSpVxmgAS5/ioLi2iBIA==","id":"59b02ba9-97ec-924b-d797-2c61c2be0d87","last_modified":1484704580894},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydrxg==","id":"224d1360-5aed-b81f-f24c-3d34e2ca3ec4","last_modified":1484704580868},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc85g==","id":"25a0eefb-aa44-23df-4dda-bb166836d4c1","last_modified":1484704580840},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"CdYL9vSQCEKzBwjO10ud2w==","id":"479ac2a4-7b6a-8db3-c5a2-be10eb5dec57","last_modified":1484704580815},{"schema":1552493018551,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"fbsHfUkagQtznc3rtY1uDg==","id":"b1b1a5db-3c68-21be-8264-7146b0ee9e6b","last_modified":1484704580787},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"AJiU+bpWh2Uc4xFRf8GM9yA=","id":"60daf8a1-a929-0177-e7ba-76fff95fd20b","last_modified":1484704580760},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"Hnms0W0OxHSYE2F0XE97sw==","id":"55b72394-f4c1-3001-cf84-10f2068f2768","last_modified":1484704580734},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bye2Cg==","id":"e2277fc3-1aac-7c20-0cb7-f4fd6c79eedb","last_modified":1484704580708},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","serialNumber":"CMNfzETd7XxesS9FOUj9Mg==","id":"49251465-af0d-3e93-cb1a-9d0b2ac356b2","last_modified":1484704580680},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","serialNumber":"XJ8pGvGNM9RIcLUG9YQjLQ==","id":"c83b4498-ea23-7723-1c2c-b673115792d8","last_modified":1484704580653},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","serialNumber":"e9JTGBe45yw=","id":"20d69a85-62b2-72c7-1107-110b43d2aeb2","last_modified":1484704580623},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpGcmF1bmhvZmVyMSEwHwYDVQQLExhGcmF1bmhvZmVyIENvcnBvcmF0ZSBQS0kxIDAeBgNVBAMTF0ZyYXVuaG9mZXIgUm9vdCBDQSAyMDA3","serialNumber":"YR0zGQAAAAAAAw==","id":"4204c7d6-1838-5925-2461-1bc0e03515d4","last_modified":1484704580597},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"AQw=","id":"f8c41076-a3f0-439a-9d5e-41e27e019a77","last_modified":1484704580571},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","serialNumber":"ESDDtMgFFiaUfKo7HD9qImM7","id":"ec0960f7-7ae1-23e7-5006-6652da817daa","last_modified":1484704580544},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"RFlmmjulj6Ve7PfBi44nnw==","id":"0e7b9a2c-3604-5b89-4dff-796122174bdc","last_modified":1484704580517},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","serialNumber":"ESBrHE7sFC7CQ8EM681xA3CY","id":"0595dc75-9356-ba32-a15e-05e3072b7f54","last_modified":1484704580491},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"AjpW","id":"b7e26b4d-bbe1-1c4e-ef9b-12471bcb9bf8","last_modified":1484704580465},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","serialNumber":"a9rf7/BmG9JkKvRuy7J5QA==","id":"fcfc3b3c-0a59-d143-f5fd-7600dd8efa87","last_modified":1484704580438},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ZECgRdZEsns=","id":"4652f392-127d-a5bf-4ed6-b07b9fa72247","last_modified":1484704580412},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"AJBQSPqrEvDE2Hz8xH39Low=","id":"c279dd67-2ce1-e090-1e04-0c11fe3ddf8e","last_modified":1484704580385},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"frj5jTuqBnQ4fljPvVU3KA==","id":"85acb18c-16b6-12c7-83ae-1e0d94251362","last_modified":1484704580358},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfFnw==","id":"d0da2ea3-1cad-5c9e-4c75-c83acfeabc8d","last_modified":1484704580332},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:58Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByembA==","id":"fcd51190-7eaf-291e-b6e5-45e447de7291","last_modified":1484704580305},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","who":".","why":".","name":"Revoked intermediates","created":"2017-01-18T01:12:57Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"RH7WhshwXRK6f0VfOfjXgQ==","id":"003234b2-f425-eae6-9596-040747dab2b9","last_modified":1484704580277},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"SurdtfsuPcXXDpY2LkBpYO6BT7o=","id":"034627e4-44c6-fbf2-275a-4ed3431a4094","last_modified":1483471394790},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Er0moq4zwH8ke2pYafIKdg==","id":"85c81ed8-787f-ffcf-2a63-1be622db8d04","last_modified":1483471394768},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydiAg==","id":"9194c97e-3baa-0446-9642-0d6211c3f019","last_modified":1483471394746},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"eLumDUO40KwnecZLJxFM2A==","id":"c2cc63c7-5274-9901-5f67-0a13355a8aa8","last_modified":1483471394725},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Bw==","id":"92e2494f-f3cd-7638-7fe1-a3cb8d8939fa","last_modified":1483471394702},{"schema":1552493019982,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","serialNumber":"GpO48aJ8GngtwECqZhm/xA==","id":"bdfdc34f-ba9a-7b25-6cb6-24c547eb8a10","last_modified":1483471394681},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"Cw==","id":"7574eb9e-6978-dcb7-5a6f-d4c3dd855254","last_modified":1483471394658},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"IA==","id":"d82f446f-181a-5ac3-0ced-854e3cde100c","last_modified":1483471394635},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","serialNumber":"OfJBIhFwAdQ=","id":"b8fdddf1-27c1-5f6e-58a1-295e2c8c0ea5","last_modified":1483471394613},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"MABJTA==","id":"71e08617-c00a-8b62-53c2-2a61e21e6155","last_modified":1483471394591},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"HA==","id":"6a6d36e6-8939-0a83-3fd5-c38652b165ed","last_modified":1483471394569},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:55Z"},"enabled":true,"issuerName":"ME0xCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSMwIQYDVQQDDBpEaWdpZGVudGl0eSBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"DA==","id":"460643a1-23f3-1beb-0f14-ecb4b6e26cc9","last_modified":1483471394547},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CLc=","id":"49eb43cf-91d4-66ce-1a86-b8674ff83d4d","last_modified":1483471394524},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEZMBcGA1UEAxMQU2VjdXJlIEdsb2JhbCBDQQ==","serialNumber":"QAAnEQ==","id":"bb5c827f-3458-93fe-f80f-2982f0d19d34","last_modified":1483471394501},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"AjqK","id":"d6f9a6d9-d936-dfaf-d396-8ae96769ef10","last_modified":1483471394478},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfNeA==","id":"02ec8a09-2ae4-cd2a-4fa1-5037fa945391","last_modified":1483471394453},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"JLiDzgpL7oFNgJN+jIjt7w==","id":"5631f49c-a1fb-803e-ecf2-3ba82ca79f2e","last_modified":1483471394090},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"BwImeaRkSZQLYwFREwKo3R1Jn+8=","id":"c2de8edd-fd89-36dd-63d0-d3a1df92274a","last_modified":1483471394067},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"HxT1XSjIpzjMprp9Qu1gYQ==","id":"46d4712b-6db2-ce7e-0efd-675f3be896cf","last_modified":1483471394046},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QDi5sA==","id":"8acc0cad-dee8-7e2e-1799-e1a7b8b989c3","last_modified":1483471394023},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"BA==","id":"b9ac21bb-8c1e-e562-5418-bbf6f6323c45","last_modified":1483471394000},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"KuzHPJLdK5hNgJRo3R47Ag==","id":"91b7f544-9de1-efea-08d4-4ebafc9a3608","last_modified":1483471393978},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"B+U=","id":"86fe91df-ebb8-f20d-2031-2bc815b14a25","last_modified":1483471393956},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byeaqw==","id":"b97a8dce-04d9-7dba-6463-ae95d61524f4","last_modified":1483471393933},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"LU4d0t7PAsZNgJGZcb+o/w==","id":"efdf0a12-4ba1-f84d-a88d-fc384251583c","last_modified":1483471393911},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABIg08FMU=","id":"6c0561bc-fea3-ba35-bbdb-2b2672b67d36","last_modified":1483471393889},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"AjqL","id":"4be7b89c-27a6-e95e-c6f9-bf652d4a0b97","last_modified":1483471393867},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"FQ==","id":"89946691-d008-fd14-bd7a-443206d647c6","last_modified":1483471393845},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydInw==","id":"e1a83fb0-93df-deb8-68cd-17f4997ea58b","last_modified":1483471393823},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"JD1wxDd8IgmiqX7MyPPg1g==","id":"f5ad7ea6-4ac9-b9cd-776f-d2afb53fb91b","last_modified":1483471393801},{"schema":1552493021474,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/SqA==","id":"ad8a2f72-7124-3e33-3060-414ce2bd8be3","last_modified":1483471393779},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","serialNumber":"J8mznxvTvOR5p4Br3a3sm5j5iM0=","id":"d3f6b499-297d-e9c8-081c-44e2331bcf29","last_modified":1483471393750},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","serialNumber":"AIChpbGNqu4XKp9J70syKEs=","id":"f184ba74-06de-9247-104e-160b6d210962","last_modified":1483471393727},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"Cj0=","id":"c5fdcbc2-71d8-0a58-3375-0c7d92526cf1","last_modified":1483471393705},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Aw==","id":"0e8a05ee-feae-fc46-15b9-eaa2d11f4a60","last_modified":1483471393683},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABRE7wRk4=","id":"ac8d3825-3fef-6d3e-2690-7360d1ef57a4","last_modified":1483471393659},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QDi5sQ==","id":"4b03d4c1-705b-458e-5bdc-f729f67eeb91","last_modified":1483471393637},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","serialNumber":"WJ2qHzWUqTk=","id":"f93061a9-8afa-1d74-e063-4134d318f00b","last_modified":1483471393615},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"VUtahOwvvmJFwlvmGDZP5w==","id":"9c88bc12-466d-fcdd-cc53-349d4e041332","last_modified":1483471393592},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"L1fHogsVxmfMBka5q4uzaQ==","id":"d3c14505-c104-150c-0a2d-e5f9e92b6152","last_modified":1483471393569},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:55Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"cJ+vg4742XhNgJW2ot9eIg==","id":"58bf9d8a-9a68-b41f-453c-8af8844bc07c","last_modified":1483471393547},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"LizeWXFWP5pZPI/dLc+PVQ==","id":"cb1a1172-56d6-4150-1f50-eb2131f442f5","last_modified":1483471393221},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Ew==","id":"a0ff8e3f-e68d-5ee2-21e3-26cd0f46673b","last_modified":1483471393199},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABElatX7I=","id":"00ac492e-04f7-ee6d-5fd2-bb12b97a4b7f","last_modified":1483471393177},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","serialNumber":"ANX8SnNRxCmsE/GCl5hw+8A=","id":"a09db9b3-2faa-73ab-67ff-61dcbf700ec7","last_modified":1483471393155},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"VBSf+IncsTB3RZS4KFCJPQ==","id":"7e816865-7c1d-2519-f114-e69a280768f4","last_modified":1483471393133},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"DA==","id":"5b760d02-fdd7-d6be-cb6f-4d30bf97746e","last_modified":1483471393111},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QDi5rw==","id":"7de029af-ddf3-02be-ca26-5bb95b080d14","last_modified":1483471393088},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"MABJSw==","id":"411b4e82-2ddd-20c2-20b3-8d77145f6901","last_modified":1483471393066},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","serialNumber":"Ermwtg==","id":"9d8a83d8-d651-42a0-ac1c-0ee414f3e31a","last_modified":1483471393043},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","serialNumber":"Nbc68Q8EHza72P/hSWcddw==","id":"d0513de2-6da9-d68d-78cc-a2292a9d18fb","last_modified":1483471393021},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Ig==","id":"872ba8c8-a236-9ac0-85ea-08630f5b17e2","last_modified":1483471392998},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:52Z"},"enabled":true,"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"APdCebq8ZyZr/T0luxlicNw=","id":"7a24e461-9fd0-b17f-01e0-f44866b800f1","last_modified":1483471392976},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","serialNumber":"Ermw0Q==","id":"fff46511-7357-4559-3d36-75fc74034299","last_modified":1483471392954},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"Ajp/","id":"272f2a95-6aec-f333-22ad-709d6118a87b","last_modified":1483471392932},{"schema":1552493022903,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Fw==","id":"4f0dfd30-9278-4f20-25c3-436798595b84","last_modified":1483471392911},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","serialNumber":"K1ftto7Xcb0YKwQ6uMvOIA==","id":"29eab149-524e-b1da-e2b9-dc4a784ab64b","last_modified":1483471392889},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","serialNumber":"STMAFQ==","id":"91609507-ef23-7672-3a5d-06dfb9b0dac4","last_modified":1483471392867},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","serialNumber":"U+1Y1QpJc0FOR5JdCJ01gQ==","id":"79f39790-1151-6bb2-0a50-fc596b82bedd","last_modified":1483471392845},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TAA2G+UIK6mqznQKBT77NA==","id":"d51879d6-0a85-8311-5b14-ad993cec17e6","last_modified":1483471392823},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Iw==","id":"532dd854-cdef-6452-2793-1e36d091d9ec","last_modified":1483471392801},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/O5w==","id":"756ab100-8a14-daf7-bf06-9fe423863208","last_modified":1483471392779},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","serialNumber":"Ajp+","id":"41f2401b-5c31-724f-ad6c-28f3f6f47634","last_modified":1483471392757},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MFExCzAJBgNVBAYTAkpQMRMwEQYDVQQKEwpGdWppIFhlcm94MS0wKwYDVQQDEyRGdWppIFhlcm94IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDI=","serialNumber":"AUa47POQ1dN5","id":"0956d064-8750-eee2-b0c7-7e1c2d1d6f25","last_modified":1483471392735},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:54Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"Pgyeh2mqlVzqI9hFntRbUQ==","id":"134969c5-0bf4-4054-eaa1-b24feaa76aef","last_modified":1483471392712},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","who":".","why":".","name":"Revoked intermediates","created":"2017-01-03T18:41:53Z"},"enabled":true,"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","serialNumber":"Gg==","id":"141d8e99-193b-d108-382b-7d97e6912d8c","last_modified":1483471392689},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESDYXNBhF+dePFjojs7u2vj1","id":"f7f193ca-c34e-866a-8abf-d44188a78cb0","last_modified":1480349168043},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"TA6BjA==","id":"2a9d41c8-d3e7-a40a-a79a-899902aa73cb","last_modified":1480349168021},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","serialNumber":"XhcFm2g619rt8Sro+a4rHA==","id":"a01f2d94-e1ee-2139-5652-c216331e357a","last_modified":1480349167999},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F6QlB/yX+A==","id":"a7fa8b99-3e2a-2c03-dffd-ab341eae59af","last_modified":1480349167976},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydxog==","id":"35f6f9f8-eb17-39d2-50a7-2b40f01e2584","last_modified":1480349167954},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CqnbFQ==","id":"3b60bc42-674b-7822-113f-c8dc6d1b015e","last_modified":1480349167931},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGXMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEfMB0GA1UEAxMWVVROLVVTRVJGaXJzdC1IYXJkd2FyZQ==","serialNumber":"Xrr31RF0DoIzMKXS6XtD+g==","id":"c0d2651b-f567-0f6d-ce3c-16e7d19390d0","last_modified":1480349167904},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/SnQ==","id":"7326aa15-9b3e-44ca-c1c5-0ed1ff29521f","last_modified":1480349167882},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzQ=","serialNumber":"H08=","id":"2ac02b19-f616-0dc3-6d01-28e1bea3dd93","last_modified":1480349167861},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:22:27Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"NMpMcEnex3eXx4ohk9glcQ==","id":"8e453b5c-3f81-2694-2f10-73ec8c406c49","last_modified":1480349167827},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAA=","id":"a3b400ad-0b4d-aa11-e8b5-82019fbc84d5","last_modified":1480349167797},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MIGpMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhhd3RlLCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9uMTgwNgYDVQQLEy8oYykgMjAwNiB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UEAxMWdGhhd3RlIFByaW1hcnkgUm9vdCBDQQ==","serialNumber":"Ikdj3zYXXGsC/Afm9Tvx+g==","id":"e8b2d24e-5aaf-86dd-441e-b4781d5370db","last_modified":1480349167774},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMw==","serialNumber":"acI1CFIgmwSFBoU5+ahDgg==","id":"938358e4-4c70-beb4-0fbe-02009feee6b6","last_modified":1480349167744},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:37Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABA/A35EU=","id":"97fbf7c4-3ef2-f54f-0029-1ba6540c63ea","last_modified":1480349167722},{"schema":1552493024471,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMg==","serialNumber":"UVKsEezpGWOVQ4W9esstng==","id":"c4c22010-0cb9-e9af-005d-2483612d864e","last_modified":1480349167701},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5Bg/C8eXg==","id":"4295bb93-6e34-a58a-4d1c-238615b57cb0","last_modified":1480349167343},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"AImQERVYPoeb","id":"4ca8f1a1-0dc0-881f-b497-cc5574f2494d","last_modified":1480349167322},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"J2La+q+JOURNWkX60OP2lQ==","id":"8662e9a7-fe16-d1fc-0993-d16dd2f01012","last_modified":1480349167291},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDEgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAxIENB","serialNumber":"BAAAAAABHkSl5ao=","id":"7cfc5a53-f950-c15b-4dbb-8124fadcf871","last_modified":1480349167269},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","serialNumber":"RUT1Gehd1KKYPfqOlgspoQ==","id":"8855fafd-e48b-680d-ff15-a022057d9b9e","last_modified":1480349167246},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:26Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABKUXDqxw=","id":"0a92faa8-b870-3a38-036e-9b95185fcb6a","last_modified":1480349167224},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"CqZgEvHAsnzkT//QV9KjXw==","id":"39008976-298e-f664-50c0-56f8ae6c4df5","last_modified":1480349167202},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR8wHQYDVQQDExZHZW9UcnVzdCBTSEEyNTYgU1NMIENB","serialNumber":"OUvvVscW0/NltofkmV9qmg==","id":"a5eb3877-5e7d-200a-cee3-f63b8004d58e","last_modified":1480349167179},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"ORFgmCj072NjcJnrxOMfQA==","id":"995df7f2-6bd4-12c6-b1aa-fcfe7618b193","last_modified":1480349167156},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltms=","id":"460ae779-c915-9daf-9a13-e0bf953322cb","last_modified":1480349167125},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155119","who":".","why":".","name":"T-Systems intermediate certificate","created":"2015-05-05T11:10:09Z"},"enabled":true,"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","serialNumber":"ARQ=","id":"2826cef9-e4b4-53f9-e3cf-c5870fc778dd","last_modified":1480349167102},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:49Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"DAk9hy8DhHSo+aQetvPB/fY=","id":"b42066e0-0c88-e02b-620f-c41c2118c4e7","last_modified":1480349167079},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","who":".","why":".","name":"Hongkong Post e-Cert CA 1-10 certificates","created":"2016-11-03T12:48:38Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","serialNumber":"BHk=","id":"5048a7c5-79c8-68d7-06a3-19e8ba32e5fc","last_modified":1480349167057},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"OnvXX72mvUI2Id/NMzegmg==","id":"92d843e8-4e72-2832-b56f-6e488e677d0f","last_modified":1480349167035},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEiMCAGA1UEAxMZR2VvVHJ1c3QgRFYgU1NMIFNIQTI1NiBDQQ==","serialNumber":"ZgwfEqZnBsUNvNuZ77FbQA==","id":"73ae5fed-730d-94db-04ef-2aafd5ff75b8","last_modified":1480349167012},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Qh/QbQ==","id":"6e4739fe-1aed-2320-4dc3-832043a31fc8","last_modified":1480349166989},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"L79XLVO2ZmtAu7FAG8Wmzw==","id":"7d2a48b3-0b2e-59ae-2002-8edb4da20bd2","last_modified":1480349166968},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"BUrYjru5px1ym4QUN33TOQ==","id":"e95bb238-6d35-2cce-9744-d6a672b0a874","last_modified":1480349166946},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESByNJZ5TPjg9iZyL6a/h5Zx","id":"51935a37-2964-18cf-b34c-a20c2c2250ea","last_modified":1480349166921},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314673","who":".","why":".","name":"SecureSign Public CA11 intermediate CA cert","created":"2016-11-03T12:46:07Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RDQTEx","serialNumber":"Aw==","id":"ec4f91dd-7560-920a-f178-e8ae460dd595","last_modified":1480349166898},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABFUtaxac=","id":"8d87b3cd-b954-f4f1-bfb2-a0e60645301c","last_modified":1480349166876},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","serialNumber":"ATE3ew==","id":"83ac91ce-0f5e-ae4e-2010-b0da5616cd59","last_modified":1480349166855},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"LnfcUaXG/pxV2CpXM5+YSg==","id":"4c743a6f-af95-49a6-bd4a-d1ee8160c537","last_modified":1480349166833},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","who":".","why":".","name":"Hongkong Post e-Cert CA 1-10 certificates","created":"2016-11-03T12:49:39Z"},"enabled":true,"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","serialNumber":"BGU=","id":"4de7908c-45e7-3b7f-a91a-8cefb1ecf830","last_modified":1480349166811},{"schema":1552493026167,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:42:46Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJZbEU4I=","id":"19c9a896-fbf0-8ad0-92cd-4aca2577c006","last_modified":1480349166787},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABIg08D3U=","id":"4aec7420-aa59-53b8-1373-d3c0a7ebc837","last_modified":1480349166478},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","serialNumber":"CgFBQgAAAUFcf/EVAAAAAg==","id":"d60a94e9-3f7f-a20f-1dcc-c87ccc78fb99","last_modified":1480349166455},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"dItWlz2V62Philqj9m6Pbg==","id":"abb0df0d-6716-9a25-ae33-806e93276cd4","last_modified":1480349166433},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CcL+EA==","id":"3cef2b9e-ddcd-cc40-8d59-49408409a3bb","last_modified":1480349166405},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263733","who":".","why":".","name":"Disney CA intermediate CA certificate","created":"2016-04-12T12:50:50Z"},"enabled":true,"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","serialNumber":"TA6EVg==","id":"7b09e4fc-2261-e7c6-e926-5a7b5e74fc5e","last_modified":1480349166381},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"GdXz4L1b6FKNCMG9Jz2tjA==","id":"35f81fe8-9fa4-760b-9fd0-2de1b0191721","last_modified":1480349166358},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:23:14Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"COwoDFvz7GD8R2K7Lo0rYQ==","id":"cc56260c-5f3a-3f4b-c712-78a8e7facd27","last_modified":1480349166330},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIGKMQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEmMCQGA1UECxMdQ29weXJpZ2h0IChjKSAyMDA1IFdJU2VLZXkgU0ExFjAUBgNVBAsTDUludGVybmF0aW9uYWwxKTAnBgNVBAMTIFdJU2VLZXkgQ2VydGlmeUlEIEFkdmFuY2VkIEcxIENB","serialNumber":"WD1AyQAAAAAAJQ==","id":"8c984ecd-c61c-426a-97aa-3a808e4da482","last_modified":1480349166308},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnI=","id":"333f6eb2-cefe-1a3b-3726-a8320b047847","last_modified":1480349166286},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABJQcQRNU=","id":"2258e9bc-1c39-9db3-4fdb-c7eb12d0609c","last_modified":1480349166264},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:15:54Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"Bg==","id":"b7fb6842-6407-8ae4-5e0f-e6daf112ed4f","last_modified":1480349166240},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"IIxFSyNM6mWtCgTG0IL3Og==","id":"6457eeb8-d83a-3818-c416-0dce6d71d471","last_modified":1480349166215},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABHkSl5AQ=","id":"de8e6484-fc97-6889-a1f9-dafd45786606","last_modified":1480349166191},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByeQ9g==","id":"bb5a82a6-8da0-5390-a7d6-843bdb0c02c2","last_modified":1480349166170},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:17:01Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"EQ==","id":"dcce309f-aa60-6484-eaed-aa8310440a5c","last_modified":1480349166148},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"R4af5A==","id":"e60eeeb2-612e-ef08-d0b8-5e9f8e1a23a9","last_modified":1480349166126},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:40:51Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAAA+X/GIyk=","id":"528cd047-ef3b-fc23-e37f-5d67fd3117e4","last_modified":1480349166102},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"BYyEX2b5+K+myAIR7eXaRQ==","id":"9be08dd3-1922-fb30-77dc-5cfcf00164a0","last_modified":1480349166080},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"RurwlgVMxeP6Zepun0LGZA==","id":"22a74468-602c-f4ac-0003-be4ce0167258","last_modified":1480349166058},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKTAnBgNVBAMMIFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBSb290IENB","serialNumber":"AJiWmg==","id":"1525b265-22d6-3253-079c-c4ffca58458f","last_modified":1480349166036},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCLRVuhcUZaluIgIVlRJx+O","id":"a6299e39-84a4-2dce-ffbb-751107660f4f","last_modified":1480349166012},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:20Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABCUVQ9No=","id":"a1d34c2f-4a03-0e35-ba5f-bc14138bcff5","last_modified":1480349165990},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:38:26Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABF2Tb8Bc=","id":"7e19f742-420e-dbe9-f691-2d19430d75b2","last_modified":1480349165968},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9Ltm4=","id":"20732fc6-dd20-fe76-b6b5-b78388b64bdd","last_modified":1480349165947},{"schema":1552493027652,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"fMTRbGCp280pnyE/u53zbA==","id":"44aa21e7-a92c-a0cc-6f6c-85b7ee52a87d","last_modified":1480349165925},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"d8AtKymQwkOPDBj+hjPzFg==","id":"014a5b67-d566-0767-c9d7-48e54115a69a","last_modified":1480349165591},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"Os2rnHWYhryvdOXfgan06A==","id":"dc94f688-044b-f8a0-79f9-5dc2d42e3edb","last_modified":1480349165569},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:19Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"e/fIfg2Dj2tkYIWVu2r82Cc=","id":"9e8ec7bc-0f79-42c2-c9bc-32bfbbd3b591","last_modified":1480349165547},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:16:27Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"EA==","id":"362a0532-ea75-9bc6-2e50-35d9566a6ad2","last_modified":1480349165523},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:06Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"UU3AP1SMxmyhBFq7MRFZmf0=","id":"4f2e59ff-cdf1-48ee-1122-961833187e49","last_modified":1480349165501},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESBqoILo90ntDW7OTK43MS2F","id":"0702b706-86e5-6a48-49fa-6c53b99009f3","last_modified":1480349165479},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"GtXUVojhwOTkaQ4bTKblEQ==","id":"9475e2f6-7247-cbe1-5055-8af86f39a149","last_modified":1480349165453},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"KjoVfZ3by6+pL8fssyfM6A==","id":"f4c8162a-d49b-1cbd-adb9-5e6223793aa4","last_modified":1480349165429},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydr0Q==","id":"a85aef34-3bfe-2135-845d-466adadc414b","last_modified":1480349165407},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Xbevr3ut3Z9m1GuXC9SonA==","id":"549710cf-bcaa-843c-df9d-5962bad88a9a","last_modified":1480349165384},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CeagHQ==","id":"d69db231-b7b5-4d79-147b-49198f93fc10","last_modified":1480349165355},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"EAdmaA==","id":"618009ee-0ef1-af4b-8841-349e6f82eacc","last_modified":1480349165329},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:47:54Z"},"enabled":true,"issuerName":"MIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTElMCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMnR2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENB","serialNumber":"BAAAAAABHkSl7L4=","id":"636c65b9-2d52-8689-023f-7a23a0baec5b","last_modified":1480349165306},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABFqoAZoI=","id":"2b0d58aa-9c96-748f-4fc0-b1f413ca8e20","last_modified":1480349165285},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1250907","who":".","why":".","name":"IdenTrust cross certificate","created":"2016-02-24T20:04:54Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAlVTMRIwEAYDVQQKEwlJZGVuVHJ1c3QxIDAeBgNVBAsTF0lkZW5UcnVzdCBQdWJsaWMgU2VjdG9yMRwwGgYDVQQDExNJZGVuVHJ1c3QgQUNFUyBDQSAx","serialNumber":"fwAAAQAAAUrz/HmrAAAAAg==","id":"352c78aa-997c-bdbe-66ba-930d66fde011","last_modified":1480349165264},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CeFU2w==","id":"e8e298f0-efa2-0d08-458f-c085ee9df8f9","last_modified":1480349165242},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1149603","who":".","why":".","name":"MCSHOLDING intermediate certificate","created":"2015-03-31T14:53:16Z"},"enabled":true,"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","serialNumber":"STMAjg==","id":"c9897d2c-c68e-3c02-2f39-678954b0cf3e","last_modified":1480349165209},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:35Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"bAOrKSMsmA0MLJyAJ5BRsUM=","id":"7d44cb3e-28a5-16dd-024c-796312f780bc","last_modified":1480349165175},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5BhE0zbgQ==","id":"29925947-91ab-16a8-a5af-65558cdb27c2","last_modified":1480349165145},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABL07hUBg=","id":"1240480e-2ef8-8ac3-4314-4e8e494741b9","last_modified":1480349165119},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCyHU+xOECnh9Rf2IvgR8zS","id":"3980401b-c0e2-0533-f0fb-0cc04685d248","last_modified":1480349165097},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CdWFNw==","id":"f06ff510-954e-b917-fda1-2c3153788d7d","last_modified":1480349165075},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"TrKEMhb2PKktH8lHg0AV5A==","id":"8b7985ab-ab8b-fcd2-cf88-cf8dad0f7a97","last_modified":1480349165048},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:56Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJQdAjik=","id":"a75f5980-9149-fff9-70d5-b24121c3eaff","last_modified":1480349165026},{"schema":1552493029193,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cfk9lw==","id":"59b587cb-401b-a5d0-8128-86c3691c4be1","last_modified":1480349165002},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDMgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAzIENB","serialNumber":"BAAAAAABHkSl6mw=","id":"3cc60c06-a870-951e-1d12-4b29ee13989e","last_modified":1480349164725},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","serialNumber":"SdegFrLaFTCsoMAW5ED+zA==","id":"9fbfe267-c715-8f7b-d9ad-166aad9f91af","last_modified":1480349164704},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:42:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABMxvC9bk=","id":"923a5e98-11f7-cdae-b073-45b525fb2294","last_modified":1480349164681},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Bydp0g==","id":"10e51569-072a-611a-c397-3050fdf22649","last_modified":1480349164658},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QZCrvQ==","id":"6d791114-68b4-8c3c-ee3c-29ed83eced2e","last_modified":1480349164636},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAI=","id":"bff9c953-6690-f618-cfea-7b936f3691a6","last_modified":1480349164614},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Aw1SPC56593ZCZ9vCNHKwQ==","id":"c395381f-fe34-7b6c-f56a-f20b20bf0d0d","last_modified":1480349164590},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:44:22Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABAJmPjfQ=","id":"24b096b4-987f-a21a-04d3-aedc9eaafc1e","last_modified":1480349164559},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABK84yjs8=","id":"8078d5ff-c93b-15d1-ebcf-607bdbfc159f","last_modified":1480349164533},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"FJl6tXgNpSk=","id":"7ab0a200-7ecf-576f-bff9-652fb14c3af6","last_modified":1480349164510},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"M0VSOewW3WI=","id":"f3688c95-3934-e80a-e32f-0d5dcb2f0c4c","last_modified":1480349164486},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"VN2yeFexyXjPf34fHGmbhg==","id":"bbcfc451-2fcc-b380-e579-bb6d11fc7d34","last_modified":1480349164463},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","serialNumber":"STMAeg==","id":"a46be506-1dbc-41a9-2775-95d67708fb5f","last_modified":1480349164433},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1300977","who":".","why":".","name":"revoked.badssl.com certificate","created":"2016-09-09T16:26:08Z"},"enabled":true,"issuerName":"ME0xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxJzAlBgNVBAMTHkRpZ2lDZXJ0IFNIQTIgU2VjdXJlIFNlcnZlciBDQQ==","serialNumber":"Aa8e+91erglSMgsk/mtVaA==","id":"4b778ec2-ef45-c5b2-dc44-b00c87b11741","last_modified":1480349164410},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"TurPPI6eivtNeGYdM0ZWXQ==","id":"8192a2fa-165d-3759-fd20-4b7d8e2a0e84","last_modified":1480349164388},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAMTFHRoYXd0ZSBTSEEyNTYgU1NMIENB","serialNumber":"UKKK5ol/rKBZchAAOnZjaA==","id":"ca0c5f15-2808-8c94-3f77-6a277d6738b2","last_modified":1480349164365},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"UMUwXwT1Z4juyQ/CNTf4mw==","id":"c623e511-79c8-cbe6-6a6e-0d9896f07e71","last_modified":1480349164342},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIGTMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEbMBkGA1UEAxMSVVROIC0gREFUQUNvcnAgU0dD","serialNumber":"Ew1ee9Jq7Q/Dig3ACF4V6Q==","id":"c011d2b4-73bc-27e5-3d3a-ab00be2a4d05","last_modified":1480349164320},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"XLhHIg7vP+tWfRqvuKeAxw==","id":"520c26f8-9a60-5949-0372-c9d93f9e95dd","last_modified":1480349164297},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"E5I2y6sIonl4a+TmlXc7fw==","id":"ee842f50-9d56-8fdf-fa55-8b55b8519b81","last_modified":1480349164275},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","serialNumber":"Jq6jgeApiT9O4W2Tx/NTRQ==","id":"3b658f17-11f9-7550-d991-3e9a1397402d","last_modified":1480349164253},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDIgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAyIENB","serialNumber":"BAAAAAABHkSl6Co=","id":"6eb0fa3b-c226-f411-0fab-df88962a5769","last_modified":1480349164232},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESD9YhzIEOwiOT7Nwip+E1KI","id":"d6172148-c2ee-a904-db40-079b10436cca","last_modified":1480349164209},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:17:24Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"Eg==","id":"34561e12-916b-083e-6fa6-181b5b89ec80","last_modified":1480349164187},{"schema":1552493030646,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","serialNumber":"NvEJoRYL2yvAZrAjbDIipQ==","id":"b1119d43-b3b8-1f41-6fbb-9cf2f67a521d","last_modified":1480349164164},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCC9oPNcRdPOox+SjWm9dTX","id":"8858e9fc-cc55-54ea-fe45-c4e533c2e410","last_modified":1480349163834},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1145157","who":".","why":".","name":"live.fi certificate","created":"2015-03-31T11:14:46Z"},"enabled":true,"issuerName":"MIGQMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UEAxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","serialNumber":"D9UltDPl4XVfSSqQOvdiwQ==","id":"0a9323dd-982f-c62d-a9b4-b9d04617fc62","last_modified":1480349163810},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:35Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"OYBKgxEHpW/8XGAGAlvJyMA=","id":"d6dfdc76-52ae-2843-3484-7fbff46f0100","last_modified":1480349163788},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","serialNumber":"EM8bDLBnnoYe4LnWpLIhS4esr3I=","id":"be09b295-68d1-9c01-97ee-10df36acd3ea","last_modified":1480349163764},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:41Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJ/ufRdg=","id":"5d64f82e-9ad8-fde1-a8c9-2d94552a8ad4","last_modified":1480349163739},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:51Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHJRKMpA=","id":"f5b2da3a-5176-b4e4-240a-181f39f6756b","last_modified":1480349163715},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:40:18Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABBHYoIFs=","id":"f59ed73e-f3c5-eef3-4481-3ca8af0b0688","last_modified":1480349163691},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:37:41Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABHhw1vwc=","id":"1b1856c1-f4f5-82ca-ba57-d94739e74576","last_modified":1480349163668},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"TqfXw+FkhxfVgE9GVMgjWQ==","id":"60f6a3be-ad83-a868-d645-7aad77914bc8","last_modified":1480349163645},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:21:56Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"LdbnCbsA9sOgI4mkUpWXPw==","id":"d839b1ed-7d39-5e57-687c-2f4d6f0514e5","last_modified":1480349163622},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","serialNumber":"ANygrItIJ2rcKlyS3Lue07U=","id":"d55572d9-be60-5967-948a-7dae793ab30f","last_modified":1480349163595},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydeGg==","id":"b7d8b0e0-9747-6a09-ab6b-051c57579fe9","last_modified":1480349163572},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCVop+Q4/OBgtf4WJkr01Gh","id":"7602529c-c2ea-d18b-9b2a-fdb70ca936f9","last_modified":1480349163548},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:42:31Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABGMG0Gmw=","id":"317aeda4-6de7-7b11-76cb-3b0afa9aaf86","last_modified":1480349163514},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:47:04Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"O2S99lVUxErLSk56GvWRv+E=","id":"27847bcc-dbaf-196f-ed5e-c1c022798717","last_modified":1480349163492},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:16:35Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"By7fBTreouRwX/qrpgSUsg==","id":"322de470-76d3-a45d-740f-342a6a8eb863","last_modified":1480349163470},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"ezdAeCxKH7BFs7vn3byYaw==","id":"fc5bde6b-45b9-c141-7171-0a6f37e7938a","last_modified":1480349163448},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"VLm3Xe60+1YgPpXCGtXLng==","id":"055d66b6-8fbd-93df-f2c4-dcdb41943212","last_modified":1480349163426},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxUaGF3dGUsIEluYy4xGzAZBgNVBAMTElRoYXd0ZSBTR0MgQ0EgLSBHMg==","serialNumber":"cDggUYfwJ3A1YcdoeT6s4A==","id":"093f20b4-93b8-a171-cbe7-3e24a543c7e9","last_modified":1480349163403},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"a9/VeyVWrzFD7rM2PEHwQA==","id":"c02a9772-b351-59dc-8633-1293ac9addee","last_modified":1480349163377},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCis569omrbb20yySF39+aE","id":"aaa19866-32ce-e842-6431-6d357fafe8d8","last_modified":1480349163350},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5Bg6C237Q==","id":"57ddfa31-3f08-298a-d7bd-712e3aaea567","last_modified":1480349163327},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"HZyLf+K70FKc+jomm8DiDw==","id":"452f4798-87d4-8df1-b275-177456d2f1c8","last_modified":1480349163302},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CskruA==","id":"e92cad12-4098-0817-e317-3674d4242ba9","last_modified":1480349163280},{"schema":1552493032094,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","serialNumber":"a12RvBNhznU=","id":"33154d98-0f20-7e7d-d2d0-3244a7d1f971","last_modified":1480349163257},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CjM=","id":"283b292b-1212-a713-c8be-c976c0222410","last_modified":1480349162955},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"NTgf4iwIfeyJPIomw2dwSXEwtxQ=","id":"542dbfc0-0faa-2398-9670-cd249525fd2c","last_modified":1480349162930},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cd/dug==","id":"3cf54b7b-336d-7c80-4596-d5a7762329d9","last_modified":1480349162902},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","serialNumber":"M64Z5ufZzDRVTHkJR1uXzw==","id":"5d6d86a0-7e3e-b832-83e5-afc1eb2e294f","last_modified":1480349162880},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABIBnBjWg=","id":"0713fba9-386c-888f-cbe5-5188ff2696a4","last_modified":1480349162857},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"fWK0j/Vi8vNWg3VAGjc02w==","id":"a4428979-4be6-3ba2-f435-aa8e4574ffe0","last_modified":1480349162835},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","serialNumber":"JpUvYJyWjdGmeoH7YcYunw==","id":"929de7d6-0669-5601-0b8f-9a192bf1cb17","last_modified":1480349162803},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"45KI4WIxyXfNrdtdj7C6","id":"7cb25ddb-9f7e-7297-e8b4-c50d019f0cf7","last_modified":1480349162781},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:15:22Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"BQ==","id":"7c28e9e7-b9ce-f4ed-8d5a-e7b9e534fba5","last_modified":1480349162758},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:19Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"F7PAjw2k0dTX5escPnyVOBo=","id":"3c7e3e8e-5c25-8fbf-0006-2c92256e0a4b","last_modified":1480349162734},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"Sx51x7V8pYe8rp7PMP/3qg==","id":"4006917e-3260-59cd-eb3f-f4d1167cf888","last_modified":1480349162710},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"DHmmaw==","id":"0abfb8ad-d1b7-5f0e-cbea-630f2424171d","last_modified":1480349162686},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CcHC/g==","id":"cba8acd8-a291-1ad6-9581-ed647dd5d56d","last_modified":1480349162661},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","who":".","why":".","name":"Intermediate CA's under Staat der Nederlanden Root CA","created":"2015-05-08T10:53:13Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"ATE0vw==","id":"fc71cbb8-4e2a-2835-d5be-4c48cd3650bb","last_modified":1480349162632},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABLF5/HXY=","id":"ca59600c-e90a-e85a-43b8-22bc76bb0e1f","last_modified":1480349162610},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","serialNumber":"BXA=","id":"a44b5bf8-8158-1924-7626-e1ba2d2031f7","last_modified":1480349162580},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:24:01Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"VOcIuNbTqkpOMUyI108FOg==","id":"43e72628-c1a5-2091-2dcd-41bbde768c73","last_modified":1480349162557},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","who":".","why":".","name":"Intermediate CA's under Staat der Nederlanden Root CA","created":"2015-05-08T10:53:40Z"},"enabled":true,"issuerName":"MFkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKjAoBgNVBAMTIVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPdmVyaGVpZCBDQQ==","serialNumber":"ATFpsA==","id":"325bb598-839b-f7aa-8a22-08ab8c09e803","last_modified":1480349162533},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:45:50Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"UV9aaDeNRNtQuXjRYk4Skhg=","id":"c11dd0af-83d5-61ec-63af-5b816a3ae557","last_modified":1480349162506},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"bzTw0uq05TUYEGS98bh0Ww==","id":"6b743fc3-1ce6-8dfe-52f1-9f3e6a31f15a","last_modified":1480349162483},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:21:30Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"Gd/pPu+qLnXUdvP9sW73CQ==","id":"2da11236-c2d8-7804-7de3-ffd711406b04","last_modified":1480349162460},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:09Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABJ/v3ZwA=","id":"9f6615be-a0b9-519a-1e26-2bd7aaf5953b","last_modified":1480349162438},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:05Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABGMGjftY=","id":"5f1ab732-8d48-0102-fb50-46ce74fc1a90","last_modified":1480349162415},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"Rvm2CEw2IC2Mu/ax0A46QQ==","id":"82f97501-85ba-bb19-f68f-ca7ce68ca7b3","last_modified":1480349162392},{"schema":1552493033534,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","serialNumber":"BAAAAAABJpQ0AbA=","id":"520cee2c-e36a-936e-d551-a51ee9c659c8","last_modified":1480349162369},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"ByfHkw==","id":"74d82589-0fde-91da-20cc-22fbd84cd0aa","last_modified":1480349161997},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESC8DawWRiAyEMd38UXbfgPR","id":"6147b64f-da46-ba30-2b9e-30b515e8f6b9","last_modified":1480349161969},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABK84ykc0=","id":"0a42070f-3149-2b91-1bbe-c54de4ed1be8","last_modified":1480349161946},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnM=","id":"dc28966b-d7db-b55f-1606-c5bff610bf99","last_modified":1480349161925},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"FJl6tXgNpSg=","id":"bab58b65-8ef7-f3c2-fc13-88f72a0840f7","last_modified":1480349161902},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESDItX4ruWiLnrlz0rk4/bmz","id":"c12d5f3c-b722-948f-b367-857845ed5e8e","last_modified":1480349161872},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","serialNumber":"bx/XHJqcwxDOptxJ2lh5vw==","id":"a0da0bd1-8bec-4c82-fb9b-636ddcde057d","last_modified":1480349161850},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:47:39Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"Mq0P6o03FDk0B2bnJ+mYPGo=","id":"54f096a5-3608-9b68-ddca-a200e799ba06","last_modified":1480349161828},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:43:00Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABJ/ufQg8=","id":"61db13cb-74d9-e675-a1e8-db5f78eb3f4e","last_modified":1480349161807},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABM6d3Z0s=","id":"b9c439ef-fcf3-2263-c14e-80727cbef898","last_modified":1480349161785},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","serialNumber":"FNISyWWTGi5Yco6fGh58/A==","id":"bab0ff94-c98e-7843-97b3-a4d1e044715b","last_modified":1480349161763},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","serialNumber":"VfTSum25nb65YPlpuhJAvg==","id":"91149dc9-6cc4-a670-1799-7bd05c159858","last_modified":1480349161740},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH8xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEwMC4GA1UEAxMnU3ltYW50ZWMgQ2xhc3MgMyBFQ0MgMjU2IGJpdCBFViBDQSAtIEcy","serialNumber":"OhrtngFwotLcm4i+z00SjA==","id":"337e2f4b-02c4-c70d-55be-09c8ea41731c","last_modified":1480349161718},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181126","who":".","why":".","name":"RCS Certification Authority","created":"2015-07-13T09:05:40Z"},"enabled":true,"issuerName":"MDcxJDAiBgNVBAMTG1JDUyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEPMA0GA1UEChMGSFQgc3Js","serialNumber":"AN9bfYOvlR1t","id":"18c0d37b-739d-04c6-04f2-a615be5b9948","last_modified":1480349161696},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5BhENPfVw==","id":"72a65abf-9828-365f-4d4a-78457d7bdec4","last_modified":1480349161666},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESISuBo/wdW2tBztKmHdFCFz","id":"2ad44cbf-32ca-5245-c881-6d6f290ac2c1","last_modified":1480349161641},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205651","who":".","why":".","name":"Misused certificate","created":"2015-09-21T13:21:25Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHjAcBgNVBAMTFXRoYXd0ZSBFViBTU0wgQ0EgLSBHMw==","serialNumber":"CrTHPEE6AZSfI3jysin2bA==","id":"13987e52-821e-1fe3-3743-393136b17167","last_modified":1480349161619},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","serialNumber":"WX89jn8yGZVvoKTD9jDfRQ==","id":"a15c9fa5-cd6e-362d-1341-1e95c11c38fb","last_modified":1480349161596},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","who":".","why":".","name":"exceptional SHA-1 Certificates","created":"2016-03-01T21:22:54Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"JV/LVzSKI/wsDgg3UuZHlA==","id":"ba7935ef-b624-3eef-5ae8-a78044ec3af0","last_modified":1480349161575},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:44:46Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"sPNcCSE9Nkg3jy5IN1xe2Q==","id":"edc761c4-8b47-5314-0cd1-c894612ebfc3","last_modified":1480349161553},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","serialNumber":"buROL/l2GuXISv+/JVLkdA==","id":"963548ca-bde2-1843-f140-1c26e8e40def","last_modified":1480349161531},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cfk9oA==","id":"e85980d5-12f0-f624-7904-2d6cedeacd55","last_modified":1480349161510},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"IyIVazG4RE9AERkb+ekH8w==","id":"be3014a7-3d3b-08c7-02d9-5a74f601a1b1","last_modified":1480349161489},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"HNo1DR4XCe4mS1iUMsY6Wg==","id":"fd51f7d8-2006-663f-4779-3cf559ee5e74","last_modified":1480349161466},{"schema":1552493034992,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"Ai7cBJYqBE0I9NdyoZfRrw==","id":"f7582bc8-dbdb-37dd-b24c-418242bbc4e0","last_modified":1480349161443},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"UUFV3S2cUidOOv7ESN65Ng==","id":"24ccf065-b88b-0fc9-1d1f-6c7722ca4faa","last_modified":1480349161103},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","serialNumber":"EDQMI0tR4kSntv1O37N10g==","id":"e7509e16-1cd3-599e-2630-495ab52d3b71","last_modified":1480349161077},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:48:11Z"},"enabled":true,"issuerName":"MIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTElMCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMnR2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENB","serialNumber":"BAAAAAABI54PryQ=","id":"e3bd531e-1ee4-7407-27ce-6fdc9cecbbdc","last_modified":1480349161051},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byc68g==","id":"308f27b5-fc0e-da9a-2b7f-e65a1cb5cd47","last_modified":1480349161021},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHMxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEkMCIGA1UEAxMbU3ltYW50ZWMgQ2xhc3MgMyBEU0EgU1NMIENB","serialNumber":"AuhvPsYZfVP6UDsuyjeZ4Q==","id":"a0482eed-1e3f-7b9f-a433-94e4a4da49a1","last_modified":1480349160991},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:59Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABMrS7t2g=","id":"41a888b9-2e84-9782-69dc-d9153a3bd3aa","last_modified":1480349160963},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1197885","who":".","why":".","name":"SECOM intermediate certificate","created":"2016-07-21T16:52:32Z"},"enabled":true,"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","serialNumber":"Ermwxw==","id":"1220feb9-9e66-0b24-3409-c5d1a1f8d24f","last_modified":1480349160941},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:36:53Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABCfhiO+s=","id":"e17ded97-6669-eecc-54fa-81f9a81ed281","last_modified":1480349160914},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1288354","who":".","why":".","name":"Symantec AATL ECC Intermediate CA cert","created":"2016-07-21T16:58:57Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA3IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNA==","serialNumber":"cXXMzbWDHMIdCotb3h64yw==","id":"a9970f7e-bac4-3b91-eae3-b0335ce0d1c2","last_modified":1480349160892},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","serialNumber":"OqQ2rV0ISTc308Z/oQgzFw==","id":"781f8787-6508-d6aa-c508-13ac2bb0d930","last_modified":1480349160870},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cyr1PA==","id":"ec93f86d-fea2-7eea-42d4-7cf7a397e097","last_modified":1480349160848},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"F5Bg+EziQQ==","id":"64229466-b4da-c63f-e088-ab1b5ba37930","last_modified":1480349160826},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:09Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABEAuMoRs=","id":"fe2dd507-9fc4-a6db-7ee0-255452bea28a","last_modified":1480349160804},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:39:24Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHkSHlSo=","id":"04460239-09d9-2a76-191e-f344a8e5d0bd","last_modified":1480349160782},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:08Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABKB/OGqI=","id":"6b5475ec-8181-e7b8-4245-c7e2ffed213c","last_modified":1480349160759},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESDu2nhlLPzfx+LYgjlYFP/k","id":"dc98c4eb-836f-6ca0-6673-6678fc45516a","last_modified":1480349160736},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","who":".","why":".","name":"FNMT revoked intermediate certificates","created":"2016-07-28T12:14:46Z"},"enabled":true,"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","serialNumber":"BA==","id":"765f426d-748a-5f3d-e409-35eac9be8240","last_modified":1480349160714},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","serialNumber":"Aw==","id":"644e3fde-7ab5-556a-85ef-c5fac8b8c7de","last_modified":1480349160684},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABMYnGRuw=","id":"0a9335d8-3fa3-5d0b-7b27-72ddd14b5f74","last_modified":1480349160660},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"Byd5cg==","id":"f046b001-5aa9-09b4-995d-23ad9f15db30","last_modified":1480349160638},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESJJweWBPhoXAaB9c8SHwI4O","id":"1bdc6228-2f9d-ad26-30b2-408959ede857","last_modified":1480349160614},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","serialNumber":"LTRcDHabRHU=","id":"86e95439-a9f5-e04e-5241-268cf0186425","last_modified":1480349160593},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"YNOos6YJoPC77qwSGCpb7w==","id":"3c4f4898-da76-0a38-a765-18d9436285f2","last_modified":1480349160571},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHkSHki0=","id":"e057bdab-4ad6-7e50-83ce-1099b84cce04","last_modified":1480349160547},{"schema":1552493036467,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","who":".","why":".","name":"Symantec erroneous SHA-1 certificates","created":"2016-07-14T14:40:23Z"},"enabled":true,"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","serialNumber":"A9GPKQ8jv9oIxfwiOy7qxQ==","id":"4bb8966b-1db9-844d-4904-d823539cdf7e","last_modified":1480349160524},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cbssdw==","id":"661e65a5-ee0b-7a82-12c3-731cb560e112","last_modified":1480349160216},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CcHC1w==","id":"26890617-93ad-e85f-550a-afb414cd110c","last_modified":1480349160190},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"DjIvBkX+ECVbB/C3i6w2Gg==","id":"657b91b1-9447-8c4a-db57-e0f0e2b10439","last_modified":1480349160165},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1150585","who":".","why":".","name":"XS4ALL certificate","created":"2015-04-07T11:04:11Z"},"enabled":true,"issuerName":"MIGQMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UEAxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","serialNumber":"UoRGnb96CUDTxIqVry6LBg==","id":"9084bc79-01cf-2ddc-b077-cd6c6251dd2b","last_modified":1480349160143},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"PAdKZPiaac2CvPxbOrsHOw==","id":"b79e2eb5-754d-4c21-1d8a-8c363f70dadc","last_modified":1480349160119},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIGQMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxOzA5BgNVBAMTMkFyaXN0b3RsZSBVbml2ZXJzaXR5IG9mIFRoZXNzYWxvbmlraSBDZW50cmFsIENBIFI0","serialNumber":"EqthLKdUgwI=","id":"5b9744a8-bd65-b926-2920-8d8e5e1acd7d","last_modified":1480349160086},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MGgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEiMCAGA1UEAxMZR2VvVHJ1c3QgRFYgU1NMIFNIQTI1NiBDQQ==","serialNumber":"OE4/d+p3YRzzcSl+kmZ8Mw==","id":"fd2fe6f3-d095-5c3d-3c6b-afe00cb665c0","last_modified":1480349160058},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","serialNumber":"QZCrvA==","id":"32f968f5-4426-66ad-d1ab-9dda7b6f0c85","last_modified":1480349160028},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"AygWP2Fgd2T+iLbmAlKT6g==","id":"e23bcca2-1fb1-abd2-5ed7-892c5f08c4ff","last_modified":1480349159993},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"CqL7CA==","id":"1a0c71ac-7f34-eeb0-2f71-1c14ee8e6552","last_modified":1480349159963},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","serialNumber":"E77H6yvyFQjO0PcN3x0H+Q==","id":"be9e31eb-6a06-7699-708a-732a081a10c7","last_modified":1480349159939},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:46:04Z"},"enabled":true,"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","serialNumber":"YRJNfMoc12IpmW+Enpv3Pdo=","id":"3bb8f2d9-511b-121d-da29-23041d3c15c1","last_modified":1480349159914},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","who":".","why":".","name":"Intermediate CA's under Staat der Nederlanden Root CA","created":"2015-05-08T10:54:05Z"},"enabled":true,"issuerName":"MFkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKjAoBgNVBAMTIVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPdmVyaGVpZCBDQQ==","serialNumber":"ATFEdg==","id":"4a17f132-602c-2d30-a781-145087794075","last_modified":1480349159890},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxUaGF3dGUsIEluYy4xGzAZBgNVBAMTElRoYXd0ZSBTR0MgQ0EgLSBHMg==","serialNumber":"e0bEFhI16xx9U1yvlI56rA==","id":"07b97387-d755-0bbb-6e4c-616a7cb69cb4","last_modified":1480349159869},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"GN2Hrh9LtnA=","id":"b3fb394d-f951-b49e-d856-f93028850feb","last_modified":1480349159846},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAU=","id":"2448ada0-833d-0d4d-3bcd-2c73cff02fb4","last_modified":1480349159825},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:38:03Z"},"enabled":true,"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","serialNumber":"BAAAAAABCFiEp9s=","id":"5cef5dc2-95f2-0ac8-3273-153a09d3d227","last_modified":1480349159804},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CSY=","id":"b4c9041b-f5a5-dec1-b221-7286a32a6309","last_modified":1480349159782},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:44:06Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHJRKNmk=","id":"824e9b09-808e-e8cb-f2dd-ba669df011bc","last_modified":1480349159760},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","serialNumber":"DYifRdP6aQQ8MLbXZY2f5g==","id":"59a292db-d567-6485-167f-1cb5af33f437","last_modified":1480349159739},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","serialNumber":"BAAAAAABL07hTcY=","id":"0a5a0233-bb8a-e4cc-5bb6-03cee44a07c2","last_modified":1480349159716},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MF4xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBLSSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"L7tgs/W85vnhV7I7qJ6N/g==","id":"e38e4e46-413a-eac8-9e85-1b9ee06f535d","last_modified":1480349159694},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:40:36Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABLM/7qjk=","id":"62dfeb32-e132-09a3-e4ba-e48c21d027de","last_modified":1480349159673},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:41:41Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABHkSHjz8=","id":"880134d0-617c-ec1b-3568-4c74af31bcc1","last_modified":1480349159649},{"schema":1552493037901,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","serialNumber":"Cfk9qg==","id":"9debdd66-d615-073f-26f7-011a8c54b484","last_modified":1480349159625},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAM=","id":"e4d16e1f-ac86-e9c0-2122-8a7d7d2dcdc0","last_modified":1480349159267},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESAyW/JX3+hZIp44EAMlXU2b","id":"6b135741-bfc6-1b3f-eb4b-4569aae2ab34","last_modified":1480349159244},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","serialNumber":"AQAAAAQ=","id":"263f03a7-53f0-2140-89a5-46e7740d755a","last_modified":1480349159206},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESByYNtAIfizf2L3NMzCH8zZ","id":"853889e5-ad93-77ea-f9c0-a0907c9a3576","last_modified":1480349159183},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"BYOGvG32ukb1Yxj2oKoFyw==","id":"b049208e-5f4c-60a6-ac91-45f093defc33","last_modified":1480349159159},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","serialNumber":"P6G7IYSL2RZxtzTh8I6qPA==","id":"222a4201-120e-64f4-5f6f-b2314470365c","last_modified":1480349159136},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:12Z"},"enabled":true,"issuerName":"MIGuMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTE2MDQGA1UEAxMtVVROLVVTRVJGaXJzdC1DbGllbnQgQXV0aGVudGljYXRpb24gYW5kIEVtYWls","serialNumber":"D/wZ7+m1Mv8SONSEFcs73w==","id":"d7fdf5b8-f8a5-b105-297d-d0e3617e59fc","last_modified":1480349159113},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","serialNumber":"eR1nUEz8k+nDSBD+bb5uIQ==","id":"f6fb7b44-64cd-37b9-b9f6-fbe1210cb160","last_modified":1480349159091},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:08Z"},"enabled":true,"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","serialNumber":"QZBvapTZFvmYktEPsBYLQQ==","id":"b6f5b3ee-6cac-57a7-b4e9-83e84f1020b8","last_modified":1480349159069},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABKUXDqA8=","id":"e48f4383-6df1-0a9b-8063-a2add391a879","last_modified":1480349159034},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","serialNumber":"BAAAAAABLF5/Gog=","id":"bc0be7d5-b8d3-1ac2-8a63-f5bf8b00ba3c","last_modified":1480349159011},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","serialNumber":"UW3oKZKTDsrPy/rfwmGNaQ==","id":"2a14bce1-47bb-e067-74a6-46be30e576a7","last_modified":1480349158980},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","serialNumber":"CSU=","id":"77e152ae-89a4-53b1-62d4-fb7c2cd5037b","last_modified":1480349158957},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:14Z"},"enabled":true,"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","serialNumber":"U3t2Vk8pfxTcaUPpIq0seQ==","id":"2c8f7191-fc5f-c2e0-af8d-852faefcdadf","last_modified":1480349158934},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","who":".","why":".","name":"GlobalSign certs","created":"2016-01-18T14:38:46Z"},"enabled":true,"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","serialNumber":"BAAAAAABAPpuVh0=","id":"fce6cca1-707c-c4f2-6de2-26c4663cda01","last_modified":1480349158899},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","serialNumber":"U4P1tUoxl/XkztlVHdtdgw==","id":"ed4d2530-eb3e-800f-41b2-e70023185673","last_modified":1480349158876},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MHsxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEsMCoGA1UEAxMjU3ltYW50ZWMgQ2xhc3MgMyBFQ0MgMjU2IGJpdCBTU0wgQ0E=","serialNumber":"U3SgRR3J+D6575WuCxuXeQ==","id":"72e44e74-fb5d-fc97-abdd-02050d3ab727","last_modified":1480349158854},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MIGXMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEfMB0GA1UEAxMWVVROLVVTRVJGaXJzdC1IYXJkd2FyZQ==","serialNumber":"EEpERSryZFMagbsNw/WoWQ==","id":"a4f11626-67e9-24e5-81a5-aca8126934c3","last_modified":1480349158820},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","serialNumber":"BAAAAAABJQcQQN0=","id":"e7328f54-0f56-48a2-3bab-d4c9b41a2b13","last_modified":1480349158794},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:11Z"},"enabled":true,"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","serialNumber":"BydKkg==","id":"6b9bc0cc-c1fa-50eb-5ece-812ee9bac5b6","last_modified":1480349158772},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:07Z"},"enabled":true,"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","serialNumber":"cpqpXVWPk5AXzGw+zNIcBw==","id":"ac8d05cd-d85d-8caa-ed13-261b83c183c2","last_modified":1480349158750},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","who":".","why":".","name":"Symantec test certificates","created":"2016-04-28T21:08:06Z"},"enabled":true,"issuerName":"MGExCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEbMBkGA1UEAxMSR2VvVHJ1c3QgRFYgU1NMIENB","serialNumber":"CWhp","id":"ff01b36d-3bcc-2157-1f89-b1841120c97e","last_modified":1480349158726},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:13Z"},"enabled":true,"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","serialNumber":"ESCEUbthDurBjJw0/h/FfuNY","id":"2c047b2c-43aa-d0be-e2c9-2acac789bd55","last_modified":1480349158695},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","who":".","why":".","name":"Revoked intermediates","created":"2016-10-27T17:52:10Z"},"enabled":true,"issuerName":"MEoxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEZMBcGA1UEAxMQU2VjdXJlIEdsb2JhbCBDQQ==","serialNumber":"TXxtAQ==","id":"ea4847df-ca17-c476-11df-b14c1d6658a0","last_modified":1480349158671},{"schema":1552493039345,"details":{"bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1142137","who":".","why":".","name":"T-Systems intermediate cert","created":"2015-05-08T10:51:23Z"},"enabled":true,"issuerName":"MGcxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpGcmF1bmhvZmVyMSEwHwYDVQQLExhGcmF1bmhvZmVyIENvcnBvcmF0ZSBQS0kxIDAeBgNVBAMTF0ZyYXVuaG9mZXIgUm9vdCBDQSAyMDA3","serialNumber":"YR3YYQAAAAAABA==","id":"ae8bec3c-3b92-822e-53f1-68394cbb1758","last_modified":1480349158647}]} \ No newline at end of file diff --git a/servo/components/style/gecko/media_queries.rs b/servo/components/style/gecko/media_queries.rs index b39e748ce2b2..4c04d9573e56 100644 --- a/servo/components/style/gecko/media_queries.rs +++ b/servo/components/style/gecko/media_queries.rs @@ -169,7 +169,6 @@ impl Device { self.document() .mPresShell .as_ref()? - ._base .mPresContext .mRawPtr .as_ref() diff --git a/taskcluster/ci/source-test/mozlint.yml b/taskcluster/ci/source-test/mozlint.yml index 7f41ca9bfb9a..5f8d762eaa12 100644 --- a/taskcluster/ci/source-test/mozlint.yml +++ b/taskcluster/ci/source-test/mozlint.yml @@ -174,3 +174,18 @@ shellcheck: when: files-changed: - '**/*.sh' + + +localization: + description: l10n tests for strings with errors and conflicts with cross-channel + platform: lint/opt + treeherder: + symbol: l1nt + run: + mach: lint -l l10n -f treeherder + when: + files-changed: + - '**/locales/en-US/**' + - '**/l10n.toml' + - 'third_party/python/compare-locales/**' + - 'third_party/python/fluent/**' diff --git a/testing/raptor/raptor/cmdline.py b/testing/raptor/raptor/cmdline.py index 0bd152e81146..a33b7a24dabf 100644 --- a/testing/raptor/raptor/cmdline.py +++ b/testing/raptor/raptor/cmdline.py @@ -64,7 +64,9 @@ def create_parser(mach_interface=False): add_arg = parser.add_argument add_arg('-t', '--test', required=True, dest='test', - help="name of raptor test to run") + help="name of raptor test to run (can be a top-level suite name i.e. " + "'--test raptor-speedometer','--test raptor-tp6-1', or for page-load " + "tests a suite sub-test i.e. '--test raptor-tp6-google-firefox')") add_arg('--app', default='firefox', dest='app', help="name of the application we are testing (default: firefox)", choices=APPS.keys()) diff --git a/testing/web-platform/meta/fetch/sec-metadata/window-open.tentative.https.sub.html.ini b/testing/web-platform/meta/fetch/sec-metadata/window-open.tentative.https.sub.html.ini index 0595b8bcbae0..5b4b0514446c 100644 --- a/testing/web-platform/meta/fetch/sec-metadata/window-open.tentative.https.sub.html.ini +++ b/testing/web-platform/meta/fetch/sec-metadata/window-open.tentative.https.sub.html.ini @@ -1,6 +1,7 @@ [window-open.tentative.https.sub.html] disabled: if os == "android" and not e10s: https://bugzilla.mozilla.org/show_bug.cgi?id=1499003 + if debug and (os == "linux") and (bits == 32): https://bugzilla.mozilla.org/show_bug.cgi?id=1539615 [Same-origin window, forced] expected: FAIL diff --git a/testing/web-platform/meta/webaudio/the-audio-api/the-audiobuffer-interface/audiobuffer-copy-channel.html.ini b/testing/web-platform/meta/webaudio/the-audio-api/the-audiobuffer-interface/audiobuffer-copy-channel.html.ini deleted file mode 100644 index a1ff23a13a2a..000000000000 --- a/testing/web-platform/meta/webaudio/the-audio-api/the-audiobuffer-interface/audiobuffer-copy-channel.html.ini +++ /dev/null @@ -1,38 +0,0 @@ -[audiobuffer-copy-channel.html] - expected: ERROR - [X 3: buffer.copyFromChannel(x, -1) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 4: buffer.copyFromChannel(x, 3) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 5: buffer.copyFromChannel(x, 0, -1) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 6: buffer.copyFromChannel(x, 0, 16) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 7: buffer.copyFromChannel(x, 3) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [< [copyFrom-exceptions\] 5 out of 9 assertions were failed.] - expected: FAIL - - [X 2: buffer.copyToChannel(x, -1) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 3: buffer.copyToChannel(x, 3) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 4: buffer.copyToChannel(x, 0, -1) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 5: buffer.copyToChannel(x, 0, 16) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [X 6: buffer.copyToChannel(x, 3) threw "NotSupportedError" instead of IndexSizeError.] - expected: FAIL - - [< [copyTo-exceptions\] 5 out of 8 assertions were failed.] - expected: FAIL - diff --git a/testing/web-platform/tests/webaudio/the-audio-api/the-audiobuffer-interface/audiobuffer-copy-channel.html b/testing/web-platform/tests/webaudio/the-audio-api/the-audiobuffer-interface/audiobuffer-copy-channel.html index e0359953d2e9..a1a5f3fce54e 100644 --- a/testing/web-platform/tests/webaudio/the-audio-api/the-audiobuffer-interface/audiobuffer-copy-channel.html +++ b/testing/web-platform/tests/webaudio/the-audio-api/the-audiobuffer-interface/audiobuffer-copy-channel.html @@ -143,7 +143,7 @@ buffer.copyFromChannel(x, 0, bufferLength); }, '6: buffer.copyFromChannel(x, 0, ' + bufferLength + ')') - .throw(DOMException, 'IndexSizeError'); + .notThrow(); should(() => { buffer.copyFromChannel(x, 3); @@ -198,7 +198,7 @@ buffer.copyToChannel(x, 0, bufferLength); }, '5: buffer.copyToChannel(x, 0, ' + bufferLength + ')') - .throw(DOMException, 'IndexSizeError'); + .notThrow(); should(() => { buffer.copyToChannel(x, 3); @@ -321,7 +321,6 @@ 'buffer.copyToChannel(src10, ' + c + ', ' + startInChannel + ')', buffer.getChannelData(c), 1, src10.length, startInChannel); } - task.done(); }); diff --git a/third_party/python/compare-locales/compare_locales/__init__.py b/third_party/python/compare-locales/compare_locales/__init__.py index 65e77b370d2b..924b40839c23 100644 --- a/third_party/python/compare-locales/compare_locales/__init__.py +++ b/third_party/python/compare-locales/compare_locales/__init__.py @@ -1 +1 @@ -version = "7.0.0" +version = "7.2.1" diff --git a/third_party/python/compare-locales/compare_locales/commands.py b/third_party/python/compare-locales/compare_locales/commands.py index 493b6412de08..c2a2f2fe0198 100644 --- a/third_party/python/compare-locales/compare_locales/commands.py +++ b/third_party/python/compare-locales/compare_locales/commands.py @@ -129,16 +129,20 @@ Be careful to specify the right merge directory when using this option.""") config = TOMLParser().parse(config_path, env=config_env) except ConfigNotFound as e: self.parser.exit('config file %s not found' % e.filename) - if locales: - config.set_locales(locales, deep=locales_deep) + if locales_deep: + if not locales: + # no explicit locales given, force all locales + config.set_locales(config.all_locales, deep=True) + else: + config.set_locales(locales, deep=True) configs.append(config) else: - app = EnumerateApp( - config_path, l10n_base_dir, locales) + app = EnumerateApp(config_path, l10n_base_dir) configs.append(app.asConfig()) try: observers = compareProjects( configs, + locales, l10n_base_dir, quiet=quiet, merge_stage=merge, clobber_merge=clobber) diff --git a/third_party/python/compare-locales/compare_locales/compare/__init__.py b/third_party/python/compare-locales/compare_locales/compare/__init__.py index 3a14d1fdfe1c..434dab955300 100644 --- a/third_party/python/compare-locales/compare_locales/compare/__init__.py +++ b/third_party/python/compare-locales/compare_locales/compare/__init__.py @@ -26,18 +26,19 @@ __all__ = [ def compareProjects( project_configs, + locales, l10n_base_dir, stat_observer=None, merge_stage=None, clobber_merge=False, quiet=0, ): - locales = set() + all_locales = set(locales) comparer = ContentComparer(quiet) observers = comparer.observers for project in project_configs: # disable filter if we're in validation mode - if None in project.locales: + if None in locales: filter = None else: filter = project.filter @@ -46,8 +47,9 @@ def compareProjects( quiet=quiet, filter=filter, )) - locales.update(project.locales) - for locale in sorted(locales): + if not locales: + all_locales.update(project.all_locales) + for locale in sorted(all_locales): files = paths.ProjectFiles(locale, project_configs, mergebase=merge_stage) if merge_stage is not None: diff --git a/third_party/python/compare-locales/compare_locales/compare/content.py b/third_party/python/compare-locales/compare_locales/compare/content.py index 790e3d8a0b2c..2d255f4b1446 100644 --- a/third_party/python/compare-locales/compare_locales/compare/content.py +++ b/third_party/python/compare-locales/compare_locales/compare/content.py @@ -195,11 +195,9 @@ class ContentComparer: if isinstance(l10n_entities[entity_id], parser.Junk): junk = l10n_entities[entity_id] - params = (junk.val,) + junk.position() + junk.position(-1) self.observers.notify( 'error', l10n, - 'Unparsed content "%s" from line %d column %d' - ' to line %d column %d' % params + junk.error_message() ) if merge_file is not None: skips.append(junk) diff --git a/third_party/python/compare-locales/compare_locales/compare/observer.py b/third_party/python/compare-locales/compare_locales/compare/observer.py index 7eca1bb11b16..0a691d5a7cc6 100644 --- a/third_party/python/compare-locales/compare_locales/compare/observer.py +++ b/third_party/python/compare-locales/compare_locales/compare/observer.py @@ -158,11 +158,13 @@ class ObserverList(Observer): } for observer in self.observers: for loc, lst in summaries.items(): - lst.append(observer.summary.get(loc)) + # Not all locales are on all projects, + # default to empty summary + lst.append(observer.summary.get(loc, {})) if len(self.observers) > 1: # add ourselves if there's more than one project for loc, lst in summaries.items(): - lst.append(self.summary.get(loc)) + lst.append(self.summary.get(loc, {})) # normalize missing and missingInFiles -> missing for summarylist in summaries.values(): for summary in summarylist: diff --git a/third_party/python/compare-locales/compare_locales/lint/__init__.py b/third_party/python/compare-locales/compare_locales/lint/__init__.py new file mode 100644 index 000000000000..e69de29bb2d1 diff --git a/third_party/python/compare-locales/compare_locales/lint/cli.py b/third_party/python/compare-locales/compare_locales/lint/cli.py new file mode 100644 index 000000000000..35c026ee22e7 --- /dev/null +++ b/third_party/python/compare-locales/compare_locales/lint/cli.py @@ -0,0 +1,95 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +from __future__ import absolute_import +from __future__ import unicode_literals + +import argparse +import os + +from compare_locales.lint.linter import L10nLinter +from compare_locales.lint.util import ( + default_reference_and_tests, + mirror_reference_and_tests, + l10n_base_reference_and_tests, +) +from compare_locales import mozpath +from compare_locales import paths +from compare_locales import parser +from compare_locales import version + + +epilog = '''\ +moz-l10n-lint checks for common mistakes in localizable files. It tests for +duplicate entries, parsing errors, and the like. Optionally, it can compare +the strings to an external reference with strings and warn if a string might +need to get a new ID. +''' + + +def main(): + p = argparse.ArgumentParser( + description='Validate localizable strings', + epilog=epilog, + ) + p.add_argument('l10n_toml') + p.add_argument( + '--version', action='version', version='%(prog)s ' + version + ) + p.add_argument('-W', action='store_true', help='error on warnings') + p.add_argument( + '--l10n-reference', + dest='l10n_reference', + metavar='PATH', + help='check for conflicts against an l10n-only reference repository ' + 'like gecko-strings', + ) + p.add_argument( + '--reference-project', + dest='ref_project', + metavar='PATH', + help='check for conflicts against a reference project like ' + 'android-l10n', + ) + args = p.parse_args() + if args.l10n_reference: + l10n_base, locale = \ + os.path.split(os.path.abspath(args.l10n_reference)) + if not locale or not os.path.isdir(args.l10n_reference): + p.error('Pass an existing l10n reference') + else: + l10n_base = '.' + locale = None + pc = paths.TOMLParser().parse(args.l10n_toml, env={'l10n_base': l10n_base}) + if locale: + pc.set_locales([locale], deep=True) + files = paths.ProjectFiles(locale, [pc]) + get_reference_and_tests = default_reference_and_tests + if args.l10n_reference: + get_reference_and_tests = l10n_base_reference_and_tests(files) + elif args.ref_project: + get_reference_and_tests = mirror_reference_and_tests( + files, args.ref_project + ) + linter = L10nLinter() + results = linter.lint( + (f for f, _, _, _ in files.iter_reference() if parser.hasParser(f)), + get_reference_and_tests + ) + rv = 0 + if results: + rv = 1 + if all(r['level'] == 'warning' for r in results) and not args.W: + rv = 0 + for result in results: + print('{} ({}:{}): {}'.format( + mozpath.relpath(result['path'], '.'), + result.get('lineno', 0), + result.get('column', 0), + result['message'] + )) + return rv + + +if __name__ == '__main__': + main() diff --git a/third_party/python/compare-locales/compare_locales/lint/linter.py b/third_party/python/compare-locales/compare_locales/lint/linter.py new file mode 100644 index 000000000000..8e681b806934 --- /dev/null +++ b/third_party/python/compare-locales/compare_locales/lint/linter.py @@ -0,0 +1,120 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +from __future__ import absolute_import +from __future__ import unicode_literals + +from collections import Counter +import os + +from compare_locales import parser, checks +from compare_locales.paths import File, REFERENCE_LOCALE + + +class L10nLinter(object): + + def lint(self, files, get_reference_and_tests): + results = [] + for path in files: + if not parser.hasParser(path): + continue + ref, extra_tests = get_reference_and_tests(path) + results.extend(self.lint_file(path, ref, extra_tests)) + return results + + def lint_file(self, path, ref, extra_tests): + file_parser = parser.getParser(path) + if os.path.isfile(ref): + file_parser.readFile(ref) + reference = file_parser.parse() + else: + reference = {} + file_parser.readFile(path) + current = file_parser.parse() + checker = checks.getChecker( + File(path, path, locale=REFERENCE_LOCALE), + extra_tests=extra_tests + ) + if checker and checker.needs_reference: + checker.set_reference(current) + linter = EntityLinter(current, checker, reference) + for current_entity in current: + for result in linter.lint_entity(current_entity): + result['path'] = path + yield result + + +class EntityLinter(object): + '''Factored out helper to run linters on a single entity.''' + def __init__(self, current, checker, reference): + self.key_count = Counter(entity.key for entity in current) + self.checker = checker + self.reference = reference + + def lint_entity(self, current_entity): + res = self.handle_junk(current_entity) + if res: + yield res + return + for res in self.lint_full_entity(current_entity): + yield res + for res in self.lint_value(current_entity): + yield res + + def lint_full_entity(self, current_entity): + '''Checks that go good or bad for a full entity, + without a particular spot inside the entity. + ''' + lineno = col = None + if self.key_count[current_entity.key] > 1: + lineno, col = current_entity.position() + yield { + 'lineno': lineno, + 'column': col, + 'level': 'error', + 'message': 'Duplicate string with ID: {}'.format( + current_entity.key + ) + } + + if current_entity.key in self.reference: + reference_entity = self.reference[current_entity.key] + if not current_entity.equals(reference_entity): + if lineno is None: + lineno, col = current_entity.position() + msg = 'Changes to string require a new ID: {}'.format( + current_entity.key + ) + yield { + 'lineno': lineno, + 'column': col, + 'level': 'warning', + 'message': msg, + } + + def lint_value(self, current_entity): + '''Checks that error on particular locations in the entity value. + ''' + if self.checker: + for tp, pos, msg, cat in self.checker.check( + current_entity, current_entity + ): + lineno, col = current_entity.value_position(pos) + yield { + 'lineno': lineno, + 'column': col, + 'level': tp, + 'message': msg, + } + + def handle_junk(self, current_entity): + if not isinstance(current_entity, parser.Junk): + return None + + lineno, col = current_entity.position() + return { + 'lineno': lineno, + 'column': col, + 'level': 'error', + 'message': current_entity.error_message() + } diff --git a/third_party/python/compare-locales/compare_locales/lint/util.py b/third_party/python/compare-locales/compare_locales/lint/util.py new file mode 100644 index 000000000000..0b2557dfddef --- /dev/null +++ b/third_party/python/compare-locales/compare_locales/lint/util.py @@ -0,0 +1,40 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +from __future__ import absolute_import +from __future__ import unicode_literals + +from compare_locales import paths + + +def default_reference_and_tests(path): + return None, None + + +def mirror_reference_and_tests(files, basedir): + '''Get reference files to check for conflicts in android-l10n and friends. + ''' + def get_reference_and_tests(path): + for matchers in files.matchers: + if 'reference' not in matchers: + continue + matcher = matchers['reference'] + if matcher.match(path) is None: + continue + ref_matcher = paths.Matcher(matcher, root=basedir) + ref_path = matcher.sub(ref_matcher, path) + return ref_path, matchers.get('test') + return None, None + return get_reference_and_tests + + +def l10n_base_reference_and_tests(files): + '''Get reference files to check for conflicts in gecko-strings and friends. + ''' + def get_reference_and_tests(path): + match = files.match(path) + if match is None: + return None, None + ref, _, _, extra_tests = match + return ref, extra_tests + return get_reference_and_tests diff --git a/third_party/python/compare-locales/compare_locales/parser/__init__.py b/third_party/python/compare-locales/compare_locales/parser/__init__.py index 1f1baf60fa34..64081e5bc26c 100644 --- a/third_party/python/compare-locales/compare_locales/parser/__init__.py +++ b/third_party/python/compare-locales/compare_locales/parser/__init__.py @@ -57,6 +57,13 @@ def getParser(path): raise UserWarning("Cannot find Parser") +def hasParser(path): + try: + return bool(getParser(path)) + except UserWarning: + return False + + __constructors = [ ('strings.*\\.xml$', AndroidParser()), ('\\.dtd$', DTDParser()), diff --git a/third_party/python/compare-locales/compare_locales/parser/android.py b/third_party/python/compare-locales/compare_locales/parser/android.py index b02c1df8b5d2..b4d68056ec49 100644 --- a/third_party/python/compare-locales/compare_locales/parser/android.py +++ b/third_party/python/compare-locales/compare_locales/parser/android.py @@ -61,6 +61,9 @@ class AndroidEntity(Entity): def raw_val(self): return self._raw_val_literal + def position(self, offset=0): + return (0, offset) + def value_position(self, offset=0): return (0, offset) @@ -178,22 +181,22 @@ class AndroidParser(Parser): except Exception: yield XMLJunk(contents) return - if doc.documentElement.nodeName != 'resources': + docElement = doc.documentElement + if docElement.nodeName != 'resources': yield XMLJunk(doc.toxml()) return - root_children = doc.documentElement.childNodes + root_children = docElement.childNodes if not only_localizable: - attributes = ''.join( - ' {}="{}"'.format(attr_name, attr_value) - for attr_name, attr_value in - doc.documentElement.attributes.items() - ) yield DocumentWrapper( '', - '\n'.format( - attributes - ) + '\n', '>') child_num = 0 while child_num < len(root_children): node = root_children[child_num] diff --git a/third_party/python/compare-locales/compare_locales/parser/base.py b/third_party/python/compare-locales/compare_locales/parser/base.py index 91c4b6714099..211dfe05db3c 100644 --- a/third_party/python/compare-locales/compare_locales/parser/base.py +++ b/third_party/python/compare-locales/compare_locales/parser/base.py @@ -266,6 +266,13 @@ class Junk(object): def val(self): return self.all + def error_message(self): + params = (self.val,) + self.position() + self.position(-1) + return ( + 'Unparsed content "%s" from line %d column %d' + ' to line %d column %d' % params + ) + def __repr__(self): return self.key diff --git a/third_party/python/compare-locales/compare_locales/parser/fluent.py b/third_party/python/compare-locales/compare_locales/parser/fluent.py index b98e44a351a6..c172adbc8213 100644 --- a/third_party/python/compare-locales/compare_locales/parser/fluent.py +++ b/third_party/python/compare-locales/compare_locales/parser/fluent.py @@ -109,7 +109,13 @@ class FluentEntity(Entity): # In Fluent we treat entries as a whole. FluentChecker reports errors at # offsets calculated from the beginning of the entry. - def value_position(self, offset=0): + def value_position(self, offset=None): + if offset is None: + # no offset given, use our value start or id end + if self.val_span: + offset = self.val_span[0] - self.span[0] + else: + offset = self.key_span[1] - self.span[0] return self.position(offset) @property diff --git a/third_party/python/compare-locales/compare_locales/paths/files.py b/third_party/python/compare-locales/compare_locales/paths/files.py index 3eda73d0cc5a..87d255872c2a 100644 --- a/third_party/python/compare-locales/compare_locales/paths/files.py +++ b/third_party/python/compare-locales/compare_locales/paths/files.py @@ -23,9 +23,13 @@ class ProjectFiles(object): self.mergebase = mergebase configs = [] for project in projects: + # Only add this project if we're not in validation mode, + # and the given locale is enabled for the project. + if locale is not None and locale not in project.all_locales: + continue configs.extend(project.configs) for pc in configs: - if locale and locale not in pc.locales: + if locale and pc.locales is not None and locale not in pc.locales: continue for paths in pc.paths: if ( diff --git a/third_party/python/compare-locales/compare_locales/paths/ini.py b/third_party/python/compare-locales/compare_locales/paths/ini.py index bc951dc1042b..cb0e593e2b1f 100644 --- a/third_party/python/compare-locales/compare_locales/paths/ini.py +++ b/third_party/python/compare-locales/compare_locales/paths/ini.py @@ -167,14 +167,12 @@ class SourceTreeConfigParser(L10nConfigParser): class EnumerateApp(object): reference = 'en-US' - def __init__(self, inipath, l10nbase, locales=None): + def __init__(self, inipath, l10nbase): self.setupConfigParser(inipath) self.modules = defaultdict(dict) self.l10nbase = mozpath.abspath(l10nbase) self.filters = [] self.addFilters(*self.config.getFilters()) - self.locales = locales or self.config.allLocales() - self.locales.sort() def setupConfigParser(self, inipath): self.config = L10nConfigParser(inipath) @@ -193,7 +191,7 @@ class EnumerateApp(object): filters = self.config.getFilters() if filters: config.set_filter_py(filters[0]) - config.locales += self.locales + config.set_locales(self.config.allLocales(), deep=True) return config def _config_for_ini(self, projectconfig, aConfig): diff --git a/third_party/python/compare-locales/compare_locales/paths/project.py b/third_party/python/compare-locales/compare_locales/paths/project.py index d78dacf1a126..0eab0f1bb6bd 100644 --- a/third_party/python/compare-locales/compare_locales/paths/project.py +++ b/third_party/python/compare-locales/compare_locales/paths/project.py @@ -25,7 +25,9 @@ class ProjectConfig(object): self.root = None self.paths = [] self.rules = [] - self.locales = [] + self.locales = None + # cache for all_locales, as that's not in `filter` + self._all_locales = None self.environ = {} self.children = [] self._cache = None @@ -63,7 +65,7 @@ class ProjectConfig(object): An optional key `test` is allowed to enable additional tests for this path pattern. ''' - + self._all_locales = None # clear cache for d in paths: rv = { 'l10n': Matcher(d['l10n'], env=self.environ, root=self.root), @@ -109,16 +111,16 @@ class ProjectConfig(object): self.rules.extend(self._compile_rule(rule)) def add_child(self, child): + self._all_locales = None # clear cache self.children.append(child) def set_locales(self, locales, deep=False): + self._all_locales = None # clear cache self.locales = locales + if not deep: + return for child in self.children: - if not child.locales or deep: - child.set_locales(locales, deep=deep) - else: - locs = [loc for loc in locales if loc in child.locales] - child.set_locales(locs) + child.set_locales(locales, deep=deep) @property def configs(self): @@ -128,9 +130,25 @@ class ProjectConfig(object): for config in child.configs: yield config + @property + def all_locales(self): + 'Recursively get all locales in this project and its paths' + if self._all_locales is None: + all_locales = set() + for config in self.configs: + if config.locales is not None: + all_locales.update(config.locales) + for paths in config.paths: + if 'locales' in paths: + all_locales.update(paths['locales']) + self._all_locales = sorted(all_locales) + return self._all_locales + def filter(self, l10n_file, entity=None): '''Filter a localization file or entities within, according to this configuration file.''' + if l10n_file.locale not in self.all_locales: + return 'ignore' if self.filter_py is not None: return self.filter_py(l10n_file.module, l10n_file.file, entity=entity) diff --git a/third_party/python/compare-locales/compare_locales/plurals.py b/third_party/python/compare-locales/compare_locales/plurals.py index d234b201a6f6..65bc015d0a2b 100644 --- a/third_party/python/compare-locales/compare_locales/plurals.py +++ b/third_party/python/compare-locales/compare_locales/plurals.py @@ -70,6 +70,7 @@ CATEGORIES_BY_LOCALE = { 'az': CATEGORIES_BY_INDEX[1], 'be': CATEGORIES_BY_INDEX[7], 'bg': CATEGORIES_BY_INDEX[1], + 'bn': CATEGORIES_BY_INDEX[2], 'bn-BD': CATEGORIES_BY_INDEX[2], 'bn-IN': CATEGORIES_BY_INDEX[2], 'br': CATEGORIES_BY_INDEX[16], diff --git a/third_party/python/compare-locales/compare_locales/tests/android/test_merge.py b/third_party/python/compare-locales/compare_locales/tests/android/test_merge.py index 2252d3e65db5..32e13a743960 100644 --- a/third_party/python/compare-locales/compare_locales/tests/android/test_merge.py +++ b/third_party/python/compare-locales/compare_locales/tests/android/test_merge.py @@ -55,4 +55,28 @@ class TestMerge(unittest.TestCase): value +''') + + def test_namespaces(self): + channels = ( + b'''\ + + + string + +''', + b'''\ + + + string + +''' + ) + self.assertEqual( + merge_channels(self.name, channels), b'''\ + + + string + string + ''') diff --git a/third_party/python/compare-locales/compare_locales/tests/android/test_parser.py b/third_party/python/compare-locales/compare_locales/tests/android/test_parser.py index ebec046b869c..f5949a1b8656 100644 --- a/third_party/python/compare-locales/compare_locales/tests/android/test_parser.py +++ b/third_party/python/compare-locales/compare_locales/tests/android/test_parser.py @@ -39,6 +39,7 @@ class TestAndroidParser(ParserTestMixin, unittest.TestCase): source, ( (DocumentWrapper, ''), (Whitespace, '\n '), ('foo', 'value', 'bar'), (Whitespace, '\n'), @@ -79,6 +80,7 @@ class TestAndroidParser(ParserTestMixin, unittest.TestCase): source, ( (DocumentWrapper, ''), (Whitespace, '\n '), ('first', 'value'), (Whitespace, '\n '), @@ -115,6 +117,7 @@ class TestAndroidParser(ParserTestMixin, unittest.TestCase): source, ( (DocumentWrapper, ''), (Whitespace, '\n '), ('one', ''), (Whitespace, '\n '), diff --git a/third_party/python/compare-locales/compare_locales/tests/fluent/test_parser.py b/third_party/python/compare-locales/compare_locales/tests/fluent/test_parser.py index 18f5274cb31b..db767fd5e2cf 100644 --- a/third_party/python/compare-locales/compare_locales/tests/fluent/test_parser.py +++ b/third_party/python/compare-locales/compare_locales/tests/fluent/test_parser.py @@ -113,6 +113,8 @@ abc = def test_message_with_attribute(self): self.parser.readContents(b'''\ + + abc = ABC .attr = Attr ''') @@ -121,6 +123,10 @@ abc = ABC self.assertEqual(abc.key, 'abc') self.assertEqual(abc.raw_val, 'ABC') self.assertEqual(abc.all, 'abc = ABC\n .attr = Attr') + self.assertEqual(abc.position(), (3, 1)) + self.assertEqual(abc.value_position(), (3, 7)) + attr = list(abc.attributes)[0] + self.assertEqual(attr.value_position(), (4, 13)) def test_message_with_attribute_and_no_value(self): self.parser.readContents(b'''\ @@ -137,6 +143,8 @@ abc = attr = attributes[0] self.assertEqual(attr.key, 'attr') self.assertEqual(attr.raw_val, 'Attr') + self.assertEqual(abc.value_position(), (1, 4)) + self.assertEqual(attr.value_position(), (2, 13)) def test_non_localizable(self): self.parser.readContents(b'''\ diff --git a/third_party/python/compare-locales/compare_locales/tests/lint/__init__.py b/third_party/python/compare-locales/compare_locales/tests/lint/__init__.py new file mode 100644 index 000000000000..e69de29bb2d1 diff --git a/third_party/python/compare-locales/compare_locales/tests/lint/test_linter.py b/third_party/python/compare-locales/compare_locales/tests/lint/test_linter.py new file mode 100644 index 000000000000..9abdc57c0835 --- /dev/null +++ b/third_party/python/compare-locales/compare_locales/tests/lint/test_linter.py @@ -0,0 +1,97 @@ +# -*- coding: utf-8 -*- +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +from __future__ import absolute_import +import unittest + +from compare_locales.lint import linter +from compare_locales.parser import base as parser + + +class MockChecker(object): + def __init__(self, mocked): + self.results = mocked + + def check(self, ent, ref): + for r in self.results: + yield r + + +class EntityTest(unittest.TestCase): + def test_junk(self): + el = linter.EntityLinter([], None, {}) + ctx = parser.Parser.Context('foo\nbar\n') + ent = parser.Junk(ctx, (4, 7)) + res = el.handle_junk(ent) + self.assertIsNotNone(res) + self.assertEqual(res['lineno'], 2) + self.assertEqual(res['column'], 1) + ent = parser.LiteralEntity('one', 'two', 'one = two') + self.assertIsNone(el.handle_junk(ent)) + + def test_full_entity(self): + ctx = parser.Parser.Context('''\ +one = two +two = three +one = four +''') + entities = [ + parser.Entity(ctx, None, None, (0, 10), (0, 3), (6, 9)), + parser.Entity(ctx, None, None, (10, 22), (10, 13), (16, 21)), + parser.Entity(ctx, None, None, (22, 33), (22, 25), (28, 32)), + ] + self.assertEqual( + (entities[0].all, entities[0].key, entities[0].val), + ('one = two\n', 'one', 'two') + ) + self.assertEqual( + (entities[1].all, entities[1].key, entities[1].val), + ('two = three\n', 'two', 'three') + ) + self.assertEqual( + (entities[2].all, entities[2].key, entities[2].val), + ('one = four\n', 'one', 'four') + ) + el = linter.EntityLinter(entities, None, {}) + results = list(el.lint_full_entity(entities[1])) + self.assertListEqual(results, []) + results = list(el.lint_full_entity(entities[2])) + self.assertEqual(len(results), 1) + result = results[0] + self.assertEqual(result['level'], 'error') + self.assertEqual(result['lineno'], 3) + self.assertEqual(result['column'], 1) + # finally check for conflict + el.reference = { + 'two': parser.LiteralEntity('two = other', 'two', 'other') + } + results = list(el.lint_full_entity(entities[1])) + self.assertEqual(len(results), 1) + result = results[0] + self.assertEqual(result['level'], 'warning') + self.assertEqual(result['lineno'], 2) + self.assertEqual(result['column'], 1) + + def test_in_value(self): + ctx = parser.Parser.Context('''\ +one = two +''') + entities = [ + parser.Entity(ctx, None, None, (0, 10), (0, 3), (6, 9)), + ] + self.assertEqual( + (entities[0].all, entities[0].key, entities[0].val), + ('one = two\n', 'one', 'two') + ) + checker = MockChecker([ + ('error', 2, 'Incompatible resource types', 'android'), + ]) + el = linter.EntityLinter(entities, checker, {}) + results = list(el.lint_value(entities[0])) + self.assertEqual(len(results), 1) + result = results[0] + self.assertEqual(result['level'], 'error') + self.assertEqual(result['lineno'], 1) + self.assertEqual(result['column'], 9) diff --git a/third_party/python/compare-locales/compare_locales/tests/lint/test_util.py b/third_party/python/compare-locales/compare_locales/tests/lint/test_util.py new file mode 100644 index 000000000000..2a8d30bf2a7d --- /dev/null +++ b/third_party/python/compare-locales/compare_locales/tests/lint/test_util.py @@ -0,0 +1,91 @@ +# -*- coding: utf-8 -*- +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +from __future__ import absolute_import + +import unittest + +from compare_locales.lint import util +from compare_locales.paths.project import ProjectConfig +from compare_locales.paths.files import ProjectFiles +from compare_locales import mozpath + + +class MirrorReferenceTest(unittest.TestCase): + def test_empty(self): + files = ProjectFiles(None, []) + get_reference_and_tests = util.mirror_reference_and_tests(files, 'tld') + ref, tests = get_reference_and_tests('some/path/file.ftl') + self.assertIsNone(ref) + self.assertIsNone(tests) + + def test_no_tests(self): + pc = ProjectConfig(None) + pc.add_paths({ + 'reference': 'some/path/file.ftl', + 'l10n': 'some/{locale}/file.ftl', + }) + files = ProjectFiles(None, [pc]) + get_reference_and_tests = util.mirror_reference_and_tests(files, 'tld') + ref, tests = get_reference_and_tests('some/path/file.ftl') + self.assertEqual(mozpath.relpath(ref, 'tld'), 'some/path/file.ftl') + self.assertEqual(tests, set()) + + def test_with_tests(self): + pc = ProjectConfig(None) + pc.add_paths({ + 'reference': 'some/path/file.ftl', + 'l10n': 'some/{locale}/file.ftl', + 'test': ['more_stuff'], + }) + files = ProjectFiles(None, [pc]) + get_reference_and_tests = util.mirror_reference_and_tests(files, 'tld') + ref, tests = get_reference_and_tests('some/path/file.ftl') + self.assertEqual(mozpath.relpath(ref, 'tld'), 'some/path/file.ftl') + self.assertEqual(tests, {'more_stuff'}) + + +class L10nBaseReferenceTest(unittest.TestCase): + def test_empty(self): + files = ProjectFiles(None, []) + get_reference_and_tests = util.l10n_base_reference_and_tests(files) + ref, tests = get_reference_and_tests('some/path/file.ftl') + self.assertIsNone(ref) + self.assertIsNone(tests) + + def test_no_tests(self): + pc = ProjectConfig(None) + pc.add_environment(l10n_base='l10n_orig') + pc.add_paths({ + 'reference': 'some/path/file.ftl', + 'l10n': '{l10n_base}/{locale}/some/file.ftl', + }) + pc.set_locales(['gecko'], deep=True) + files = ProjectFiles('gecko', [pc]) + get_reference_and_tests = util.l10n_base_reference_and_tests(files) + ref, tests = get_reference_and_tests('some/path/file.ftl') + self.assertEqual( + mozpath.relpath(ref, 'l10n_orig/gecko'), + 'some/file.ftl' + ) + self.assertEqual(tests, set()) + + def test_with_tests(self): + pc = ProjectConfig(None) + pc.add_environment(l10n_base='l10n_orig') + pc.add_paths({ + 'reference': 'some/path/file.ftl', + 'l10n': '{l10n_base}/{locale}/some/file.ftl', + 'test': ['more_stuff'], + }) + pc.set_locales(['gecko'], deep=True) + files = ProjectFiles('gecko', [pc]) + get_reference_and_tests = util.l10n_base_reference_and_tests(files) + ref, tests = get_reference_and_tests('some/path/file.ftl') + self.assertEqual( + mozpath.relpath(ref, 'l10n_orig/gecko'), + 'some/file.ftl' + ) + self.assertEqual(tests, {'more_stuff'}) diff --git a/third_party/python/compare-locales/compare_locales/tests/paths/__init__.py b/third_party/python/compare-locales/compare_locales/tests/paths/__init__.py index 5cfe12106072..7418970e1ded 100644 --- a/third_party/python/compare-locales/compare_locales/tests/paths/__init__.py +++ b/third_party/python/compare-locales/compare_locales/tests/paths/__init__.py @@ -33,6 +33,7 @@ class SetupMixin(object): '/tmp/somedir/de/toolkit/two/one/file.ftl', 'file.ftl', module='toolkit', locale='de') + self.cfg.set_locales(['de']) class MockNode(object): diff --git a/third_party/python/compare-locales/compare_locales/tests/paths/test_files.py b/third_party/python/compare-locales/compare_locales/tests/paths/test_files.py index 171eafc35e14..3bd0692d396d 100644 --- a/third_party/python/compare-locales/compare_locales/tests/paths/test_files.py +++ b/third_party/python/compare-locales/compare_locales/tests/paths/test_files.py @@ -20,7 +20,7 @@ class TestProjectPaths(Rooted, unittest.TestCase): def test_l10n_path(self): cfg = ProjectConfig(None) cfg.add_environment(l10n_base=self.root) - cfg.locales.append('de') + cfg.set_locales(['de']) cfg.add_paths({ 'l10n': '{l10n_base}/{locale}/*' }) @@ -65,7 +65,7 @@ class TestProjectPaths(Rooted, unittest.TestCase): def test_single_reference_path(self): cfg = ProjectConfig(None) cfg.add_environment(l10n_base=self.path('/l10n')) - cfg.locales.append('de') + cfg.set_locales(['de']) cfg.add_paths({ 'l10n': '{l10n_base}/{locale}/good.ftl', 'reference': self.path('/reference/good.ftl') @@ -101,7 +101,7 @@ class TestProjectPaths(Rooted, unittest.TestCase): def test_reference_path(self): cfg = ProjectConfig(None) cfg.add_environment(l10n_base=self.path('/l10n')) - cfg.locales.append('de') + cfg.set_locales(['de']) cfg.add_paths({ 'l10n': '{l10n_base}/{locale}/*', 'reference': self.path('/reference/*') @@ -175,7 +175,7 @@ class TestProjectPaths(Rooted, unittest.TestCase): def test_partial_l10n(self): cfg = ProjectConfig(None) - cfg.locales.extend(['de', 'fr']) + cfg.set_locales(['de', 'fr']) cfg.add_paths({ 'l10n': self.path('/{locale}/major/*') }, { @@ -216,7 +216,7 @@ class TestProjectPaths(Rooted, unittest.TestCase): def test_validation_mode(self): cfg = ProjectConfig(None) cfg.add_environment(l10n_base=self.path('/l10n')) - cfg.locales.append('de') + cfg.set_locales(['de']) cfg.add_paths({ 'l10n': '{l10n_base}/{locale}/*', 'reference': self.path('/reference/*') diff --git a/third_party/python/compare-locales/compare_locales/tests/paths/test_project.py b/third_party/python/compare-locales/compare_locales/tests/paths/test_project.py index b10939733c7b..fe1224548646 100644 --- a/third_party/python/compare-locales/compare_locales/tests/paths/test_project.py +++ b/third_party/python/compare-locales/compare_locales/tests/paths/test_project.py @@ -171,6 +171,32 @@ class TestProjectConfig(unittest.TestCase): pc.add_child(child) self.assertListEqual([pc, child], list(pc.configs)) + def test_locales_in_children(self): + pc = ProjectConfig(None) + child = ProjectConfig(None) + child.add_paths({ + 'l10n': '/tmp/somedir/{locale}/toolkit/**', + }) + child.set_locales([]) + pc.add_child(child) + self.assertListEqual(pc.all_locales, []) + pc.set_locales(['de', 'fr']) + self.assertListEqual(child.locales, []) + self.assertListEqual(pc.all_locales, ['de', 'fr']) + + def test_locales_in_paths(self): + pc = ProjectConfig(None) + child = ProjectConfig(None) + child.add_paths({ + 'l10n': '/tmp/somedir/{locale}/toolkit/**', + 'locales': ['it'] + }) + child.set_locales([]) + pc.add_child(child) + self.assertListEqual(pc.all_locales, ['it']) + pc.set_locales(['de', 'fr']) + self.assertListEqual(pc.all_locales, ['de', 'fr', 'it']) + class TestSameConfig(unittest.TestCase): diff --git a/third_party/python/compare-locales/compare_locales/tests/test_apps.py b/third_party/python/compare-locales/compare_locales/tests/test_apps.py index 0f2c25578d3c..211c03b05f8f 100644 --- a/third_party/python/compare-locales/compare_locales/tests/test_apps.py +++ b/third_party/python/compare-locales/compare_locales/tests/test_apps.py @@ -81,7 +81,7 @@ class TestApp(unittest.TestCase): app = EnumerateApp( mozpath.join(self.stage, 'comm', 'mail', 'locales', 'l10n.ini'), mozpath.join(self.stage, 'l10n-central')) - self.assertListEqual(app.locales, ['af', 'de', 'fr']) + self.assertListEqual(app.config.allLocales(), ['af', 'de', 'fr']) self.assertEqual(len(app.config.children), 1) projectconfig = app.asConfig() self.assertListEqual(projectconfig.locales, ['af', 'de', 'fr']) diff --git a/tools/lint/docs/index.rst b/tools/lint/docs/index.rst index 80318676b9cc..780d012e7d45 100644 --- a/tools/lint/docs/index.rst +++ b/tools/lint/docs/index.rst @@ -28,6 +28,7 @@ like mach, mozreview and taskcluster. create linters/eslint linters/flake8 + linters/l10n Indices and tables ================== diff --git a/tools/lint/docs/linters/l10n.rst b/tools/lint/docs/linters/l10n.rst new file mode 100644 index 000000000000..34161bf9df42 --- /dev/null +++ b/tools/lint/docs/linters/l10n.rst @@ -0,0 +1,39 @@ +L10n +==== + +The l10n linter checks for mistakes and problems in the localizable files. +Most of the code lives inside the +`compare-locales `_ +package, and is shipping as the ``moz-l10n-lint`` command. + +The linter checks for fundamental issues like parsing errors, but it also +finds more subtle mistakes like duplicated messages. It also warns if you're +trying to change a string without changing the ID, or to add a string that's +still in use in a stable channel with a different value. + +The warnings on string ID changes get reported on phabricator, but they're +not making the build fail. To find out when to change IDs and when not to, +read the :doc:`Lifecycle & Workflow ` section in the +localization documentation. + +Run Locally +----------- + +The can be run using mach: + +.. parsed-literal:: + + $ mach lint --linter l10n + +Alternatively, omit the ``--linter l10n`` and run all configured linters, which +will include the l10n linter. + + +Updating the Reference +---------------------- + +The linter checks out the cross-channel localization files into your +``.mozbuild`` state directory. By default this is updated automatically after +48 hours. There might be new strings anyway, if you want to ensure an +updated clone, remove the marker file in +``~/.mozbuild/gecko-strings/.hg/l10n_pull_marker``. diff --git a/tools/lint/l10n.yml b/tools/lint/l10n.yml new file mode 100644 index 000000000000..fcce06b8506a --- /dev/null +++ b/tools/lint/l10n.yml @@ -0,0 +1,41 @@ +--- +l10n: + description: Localization linter + # list of include directories of both + # browser and mobile/android l10n.tomls + include: + - browser/branding/official/locales/en-US + - browser/extensions/formautofill/locales/en-US + - browser/extensions/fxmonitor/locales/en-US + - browser/extensions/report-site-issue/locales/en-US + - browser/locales/en-US + - devtools/client/locales/en-US + - devtools/shared/locales/en-US + - devtools/startup/locales/en-US + - dom/locales/en-US + - mobile/android/base/locales/en-US + - mobile/android/locales/en-US + - mobile/locales/en-US + - netwerk/locales/en-US + - security/manager/locales/en-US + - services/sync/locales/en-US + - toolkit/locales/en-US + - tools/lint/l10n.yml + # files not supported by compare-locales, + # and also not relevant to this linter + exclude: + - browser/locales/en-US/firefox-l10n.js + - mobile/android/locales/en-US/mobile-l10n.js + - toolkit/locales/en-US/chrome/global/intl.css + l10n_configs: + - browser/locales/l10n.toml + - mobile/android/locales/l10n.toml + type: external + payload: python.l10n_lint:lint + setup: python.l10n_lint:gecko_strings_setup + support-files: + - '**/l10n.toml' + - 'third_party/python/compare-locales/**' + - 'third_party/python/fluent/**' + - 'tools/lint/python/l10n_lint.py' + - 'tools/lint/l10n.yml' diff --git a/tools/lint/python/l10n_lint.py b/tools/lint/python/l10n_lint.py new file mode 100644 index 000000000000..1f6fd28ad661 --- /dev/null +++ b/tools/lint/python/l10n_lint.py @@ -0,0 +1,157 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +from __future__ import absolute_import + +from datetime import datetime, timedelta +import os + +from mozboot import util as mb_util +from mozlint import result, pathutils +from mozpack import path as mozpath +import mozversioncontrol.repoupdate + +from compare_locales.lint.linter import L10nLinter +from compare_locales.lint.util import l10n_base_reference_and_tests +from compare_locales import parser +from compare_locales.paths import TOMLParser, ProjectFiles + + +LOCALE = 'gecko-strings' + + +PULL_AFTER = timedelta(days=2) + + +def lint(paths, lintconfig, **lintargs): + l10n_base = mb_util.get_state_dir() + root = lintargs['root'] + exclude = lintconfig.get('exclude') + extensions = lintconfig.get('extensions') + + # Load l10n.toml configs + l10nconfigs = load_configs(lintconfig, root, l10n_base) + + # Check include paths in l10n.yml if it's in our given paths + # Only the l10n.yml will show up here, but if the l10n.toml files + # change, we also get the l10n.yml as the toml files are listed as + # support files. + if lintconfig['path'] in paths: + results = validate_linter_includes(lintconfig, l10nconfigs, lintargs) + paths.remove(lintconfig['path']) + else: + results = [] + + all_files = [] + for p in paths: + fp = pathutils.FilterPath(p) + if fp.isdir: + for _, fileobj in fp.finder: + all_files.append(fileobj.path) + if fp.isfile: + all_files.append(p) + # Filter again, our directories might have picked up files the + # explicitly excluded in the l10n.yml configuration. + # `browser/locales/en-US/firefox-l10n.js` is a good example. + all_files, _ = pathutils.filterpaths( + lintargs['root'], all_files, lintconfig['include'], + exclude=exclude, extensions=extensions + ) + # These should be excluded in l10n.yml + skips = {p for p in all_files if not parser.hasParser(p)} + results.extend( + result.from_config( + lintconfig, + level='warning', + path=path, + message="file format not supported in compare-locales" + ) + for path in skips + ) + all_files = [p for p in all_files if p not in skips] + files = ProjectFiles(LOCALE, l10nconfigs) + + get_reference_and_tests = l10n_base_reference_and_tests(files) + + linter = MozL10nLinter(lintconfig) + results += linter.lint(all_files, get_reference_and_tests) + return results + + +def gecko_strings_setup(**lint_args): + gs = mozpath.join(mb_util.get_state_dir(), LOCALE) + marker = mozpath.join(gs, '.hg', 'l10n_pull_marker') + try: + last_pull = datetime.fromtimestamp(os.stat(marker).st_mtime) + skip_clone = datetime.now() < last_pull + PULL_AFTER + except OSError: + skip_clone = False + if skip_clone: + return + hg = mozversioncontrol.get_tool_path('hg') + mozversioncontrol.repoupdate.update_mercurial_repo( + hg, + 'https://hg.mozilla.org/l10n/gecko-strings', + gs + ) + with open(marker, 'w') as fh: + fh.flush() + + +def load_configs(lintconfig, root, l10n_base): + '''Load l10n configuration files specified in the linter configuration.''' + configs = [] + env = { + 'l10n_base': l10n_base + } + for toml in lintconfig['l10n_configs']: + cfg = TOMLParser().parse( + mozpath.join(root, toml), + env=env, + ignore_missing_includes=True + ) + cfg.set_locales([LOCALE], deep=True) + configs.append(cfg) + return configs + + +def validate_linter_includes(lintconfig, l10nconfigs, lintargs): + '''Check l10n.yml config against l10n.toml configs.''' + reference_paths = set( + mozpath.relpath(p['reference'].prefix, lintargs['root']) + for project in l10nconfigs + for config in project.configs + for p in config.paths + ) + # Just check for directories + reference_dirs = sorted(p for p in reference_paths if os.path.isdir(p)) + missing_in_yml = [ + refd for refd in reference_dirs if refd not in lintconfig['include'] + ] + # These might be subdirectories in the config, though + missing_in_yml = [ + d for d in missing_in_yml + if not any(d.startswith(parent + '/') for parent in lintconfig['include']) + ] + if missing_in_yml: + dirs = ', '.join(missing_in_yml) + return [result.from_config( + lintconfig, path=lintconfig['path'], + message='l10n.yml out of sync with l10n.toml, add: ' + dirs + )] + return [] + + +class MozL10nLinter(L10nLinter): + '''Subclass linter to generate the right result type.''' + def __init__(self, lintconfig): + super(MozL10nLinter, self).__init__() + self.lintconfig = lintconfig + + def lint(self, files, get_reference_and_tests): + return [ + result.from_config(self.lintconfig, **result_data) + for result_data in super(MozL10nLinter, self).lint( + files, get_reference_and_tests + ) + ] diff --git a/widget/nsBaseWidget.cpp b/widget/nsBaseWidget.cpp index c7f6d55c161a..b5eb80efa586 100644 --- a/widget/nsBaseWidget.cpp +++ b/widget/nsBaseWidget.cpp @@ -1800,8 +1800,7 @@ void nsBaseWidget::ZoomToRect(const uint32_t& aPresShellId, a11y::Accessible* nsBaseWidget::GetRootAccessible() { NS_ENSURE_TRUE(mWidgetListener, nullptr); - PresShell* presShell = - static_cast(mWidgetListener->GetPresShell()); + PresShell* presShell = mWidgetListener->GetPresShell(); NS_ENSURE_TRUE(presShell, nullptr); // If container is null then the presshell is not active. This often happens