Merge autoland to central, a=merge
authorWes Kocher <wkocher@mozilla.com>
Wed, 22 Feb 2017 14:55:21 -0800
changeset 373299 499739e68fada7112afe8e5a9ce4744d1e4f07e6
parent 373260 7abeac2f2d668554f0093fc0bdb1488f9a77d16e (current diff)
parent 373298 073f05a135ccf1a0170f0b5e4fdcf63902ca713e (diff)
child 373341 32dcdde1fc64fc39a9065dc4218265dbc727673f
push id10863
push userjlorenzo@mozilla.com
push dateMon, 06 Mar 2017 23:02:23 +0000
treeherdermozilla-aurora@0931190cd725 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersmerge
milestone54.0a1
Merge autoland to central, a=merge MozReview-Commit-ID: 5l8P3DzMNXz
toolkit/components/extensions/test/mochitest/test_clipboard.html
widget/gtk/mozcontainer.c
--- a/browser/base/content/browser.js
+++ b/browser/base/content/browser.js
@@ -455,48 +455,49 @@ const gStoragePressureObserver = {
 
     const BYTES_IN_GIGABYTE = 1073741824;
     const USAGE_THRESHOLD_BYTES = BYTES_IN_GIGABYTE *
       Services.prefs.getIntPref("browser.storageManager.pressureNotification.usageThresholdGB");
     let msg = "";
     let buttons = [];
     let usage = parseInt(data);
     let prefStrBundle = document.getElementById("bundle_preferences");
+    let brandShortName = document.getElementById("bundle_brand").getString("brandShortName");
     let notificationBox = document.getElementById("high-priority-global-notificationbox");
     buttons.push({
       label: prefStrBundle.getString("spaceAlert.learnMoreButton.label"),
       accessKey: prefStrBundle.getString("spaceAlert.learnMoreButton.accesskey"),
       callback(notificationBar, button) {
         let learnMoreURL = Services.urlFormatter.formatURLPref("app.support.baseURL") + "storage-permissions";
         gBrowser.selectedTab = gBrowser.addTab(learnMoreURL);
       }
     });
     if (usage < USAGE_THRESHOLD_BYTES) {
       // The firefox-used space < 5GB, then warn user to free some disk space.
       // This is because this usage is small and not the main cause for space issue.
       // In order to avoid the bad and wrong impression among users that
       // firefox eats disk space a lot, indicate users to clean up other disk space.
-      msg = prefStrBundle.getString("spaceAlert.under5GB.description");
+      msg = prefStrBundle.getFormattedString("spaceAlert.under5GB.message", [brandShortName]);
       buttons.push({
         label: prefStrBundle.getString("spaceAlert.under5GB.okButton.label"),
         accessKey: prefStrBundle.getString("spaceAlert.under5GB.okButton.accesskey"),
         callback() {}
       });
     } else {
       // The firefox-used space >= 5GB, then guide users to about:preferences
       // to clear some data stored on firefox by websites.
-      let descriptionStringID = "spaceAlert.over5GB.description";
+      let descriptionStringID = "spaceAlert.over5GB.message";
       let prefButtonLabelStringID = "spaceAlert.over5GB.prefButton.label";
       let prefButtonAccesskeyStringID = "spaceAlert.over5GB.prefButton.accesskey";
       if (AppConstants.platform == "win") {
-        descriptionStringID = "spaceAlert.over5GB.descriptionWin";
+        descriptionStringID = "spaceAlert.over5GB.messageWin";
         prefButtonLabelStringID = "spaceAlert.over5GB.prefButtonWin.label";
         prefButtonAccesskeyStringID = "spaceAlert.over5GB.prefButtonWin.accesskey";
       }
-      msg = prefStrBundle.getString(descriptionStringID);
+      msg = prefStrBundle.getFormattedString(descriptionStringID, [brandShortName]);
       buttons.push({
         label: prefStrBundle.getString(prefButtonLabelStringID),
         accessKey: prefStrBundle.getString(prefButtonAccesskeyStringID),
         callback(notificationBar, button) {
           gBrowser.ownerGlobal.openPreferences("advanced", { advancedTab: "networkTab" });
         }
       });
     }
@@ -3430,28 +3431,28 @@ var PrintPreviewListener = {
   _tabBeforePrintPreview: null,
   _simplifyPageTab: null,
 
   getPrintPreviewBrowser() {
     if (!this._printPreviewTab) {
       let browser = gBrowser.selectedBrowser;
       let preferredRemoteType = browser.remoteType;
       this._tabBeforePrintPreview = gBrowser.selectedTab;
-      this._printPreviewTab = gBrowser.loadOneTab("about:blank", {
+      this._printPreviewTab = gBrowser.loadOneTab("about:printpreview", {
         inBackground: false,
         preferredRemoteType,
         sameProcessAsFrameLoader: browser.frameLoader
       });
       gBrowser.selectedTab = this._printPreviewTab;
     }
     return gBrowser.getBrowserForTab(this._printPreviewTab);
   },
   createSimplifiedBrowser() {
     let browser = this._tabBeforePrintPreview.linkedBrowser;
-    this._simplifyPageTab = gBrowser.loadOneTab("about:blank", {
+    this._simplifyPageTab = gBrowser.loadOneTab("about:printpreview", {
       inBackground: true,
       sameProcessAsFrameLoader: browser.frameLoader
      });
     return this.getSimplifiedSourceBrowser();
   },
   getSourceBrowser() {
     return this._tabBeforePrintPreview ?
       this._tabBeforePrintPreview.linkedBrowser : gBrowser.selectedBrowser;
--- a/browser/components/sessionstore/SessionStore.jsm
+++ b/browser/components/sessionstore/SessionStore.jsm
@@ -383,17 +383,17 @@ this.SessionStore = {
    *        The browser state for which we remove worth-saving tabs.
    *        The given object will be modified.
    */
   keepOnlyWorthSavingTabs: function (aState) {
     for (let i = aState.windows.length - 1; i >= 0; i--) {
       let win = aState.windows[i];
       for (let j = win.tabs.length - 1; j >= 0; j--) {
         let tab = win.tabs[j];
-        if (!SessionStoreInternal._shouldSaveTabState(tab)) {
+        if (!SessionStoreInternal._shouldSaveTab(tab)) {
           win.tabs.splice(j, 1);
           if (win.selected > j) {
             win.selected--;
           }
         }
       }
       if (!win.tabs.length) {
         aState.windows.splice(i, 1);
@@ -4193,21 +4193,40 @@ var SessionStoreInternal = {
   _shouldSaveTabState: function ssi_shouldSaveTabState(aTabState) {
     // If the tab has only a transient about: history entry, no other
     // session history, and no userTypedValue, then we don't actually want to
     // store this tab's data.
     return aTabState.entries.length &&
            !(aTabState.entries.length == 1 &&
                 (aTabState.entries[0].url == "about:blank" ||
                  aTabState.entries[0].url == "about:newtab" ||
+                 aTabState.entries[0].url == "about:printpreview" ||
                  aTabState.entries[0].url == "about:privatebrowsing") &&
                  !aTabState.userTypedValue);
   },
 
   /**
+   * Determine if the tab state we're passed is something we should keep to be
+   * reopened at session restore. This is used when we are saving the current
+   * session state to disk. This method is very similar to _shouldSaveTabState,
+   * however, "about:blank" and "about:newtab" tabs will still be saved to disk.
+   *
+   * @param aTabState
+   *        The current tab state
+   * @returns boolean
+   */
+  _shouldSaveTab: function ssi_shouldSaveTab(aTabState) {
+    // If the tab has one of the following transient about: history entry,
+    // then we don't actually want to write this tab's data to disk.
+    return aTabState.entries.length &&
+           !(aTabState.entries[0].url == "about:printpreview" ||
+             aTabState.entries[0].url == "about:privatebrowsing");
+  },
+
+  /**
    * This is going to take a state as provided at startup (via
    * nsISessionStartup.state) and split it into 2 parts. The first part
    * (defaultState) will be a state that should still be restored at startup,
    * while the second part (state) is a state that should be saved for later.
    * defaultState will be comprised of windows with only pinned tabs, extracted
    * from state. It will contain the cookies that go along with the history
    * entries in those tabs. It will also contain window position information.
    *
--- a/browser/extensions/formautofill/FormAutofillContent.jsm
+++ b/browser/extensions/formautofill/FormAutofillContent.jsm
@@ -266,19 +266,20 @@ var FormAutofillContent = {
 
     Services.cpmm.addMessageListener("FormAutofill:enabledStatus", (result) => {
       if (result.data) {
         ProfileAutocomplete.ensureRegistered();
       } else {
         ProfileAutocomplete.ensureUnregistered();
       }
     });
-    Services.cpmm.sendAsyncMessage("FormAutofill:getEnabledStatus");
-    // TODO: use initialProcessData:
-    // Services.cpmm.initialProcessData.autofillEnabled
+
+    if (Services.cpmm.initialProcessData.autofillEnabled) {
+      ProfileAutocomplete.ensureRegistered();
+    }
   },
 
   /**
    * Get the input's information from cache which is created after page identified.
    *
    * @param {HTMLInputElement} element Focused input which triggered profile searching
    * @returns {Object|null}
    *          Return target input's information that cloned from content cache
--- a/browser/extensions/formautofill/FormAutofillParent.jsm
+++ b/browser/extensions/formautofill/FormAutofillParent.jsm
@@ -75,21 +75,20 @@ FormAutofillParent.prototype = {
     this._profileStore = new ProfileStorage(storePath);
     this._profileStore.initialize();
 
     Services.obs.addObserver(this, "advanced-pane-loaded", false);
 
     // Observing the pref and storage changes
     Services.prefs.addObserver(ENABLED_PREF, this, false);
     Services.obs.addObserver(this, "formautofill-storage-changed", false);
-    this._enabled = this._getStatus();
+
     // Force to trigger the onStatusChanged function for setting listeners properly
     // while initizlization
-    this._onStatusChanged();
-    Services.ppmm.addMessageListener("FormAutofill:getEnabledStatus", this);
+    this._setStatus(this._getStatus());
   },
 
   observe(subject, topic, data) {
     log.debug("observe:", topic, "with data:", data);
     switch (topic) {
       case "advanced-pane-loaded": {
         let formAutofillPreferences = new FormAutofillPreferences();
         let document = subject.document;
@@ -99,32 +98,30 @@ FormAutofillParent.prototype = {
         parentNode.insertBefore(prefGroup, insertBeforeNode);
         break;
       }
 
       case "nsPref:changed": {
         // Observe pref changes and update _enabled cache if status is changed.
         let currentStatus = this._getStatus();
         if (currentStatus !== this._enabled) {
-          this._enabled = currentStatus;
-          this._onStatusChanged();
+          this._setStatus(currentStatus);
         }
         break;
       }
 
       case "formautofill-storage-changed": {
         // Early exit if the action is not "add" nor "remove"
         if (data != "add" && data != "remove") {
           break;
         }
 
         let currentStatus = this._getStatus();
         if (currentStatus !== this._enabled) {
-          this._enabled = currentStatus;
-          this._onStatusChanged();
+          this._setStatus(currentStatus);
         }
         break;
       }
 
       default: {
         throw new Error(`FormAutofillParent: Unexpected topic observed: ${topic}`);
       }
     }
@@ -138,16 +135,19 @@ FormAutofillParent.prototype = {
     log.debug("_onStatusChanged: Status changed to", this._enabled);
     if (this._enabled) {
       Services.ppmm.addMessageListener("FormAutofill:GetProfiles", this);
     } else {
       Services.ppmm.removeMessageListener("FormAutofill:GetProfiles", this);
     }
 
     Services.ppmm.broadcastAsyncMessage("FormAutofill:enabledStatus", this._enabled);
+    // Sync process data autofillEnabled to make sure the value up to date
+    // no matter when the new content process is initialized.
+    Services.ppmm.initialProcessData.autofillEnabled = this._enabled;
   },
 
   /**
    * Query pref and storage status to determine the overall status for
    * form autofill feature.
    *
    * @returns {boolean} status of form autofill feature
    */
@@ -155,31 +155,37 @@ FormAutofillParent.prototype = {
     if (!Services.prefs.getBoolPref(ENABLED_PREF)) {
       return false;
     }
 
     return this._profileStore.getAll().length > 0;
   },
 
   /**
+   * Set status and trigger _onStatusChanged.
+   *
+   * @param {boolean} newStatus The latest status we want to set for _enabled
+   */
+  _setStatus(newStatus) {
+    this._enabled = newStatus;
+    this._onStatusChanged();
+  },
+
+  /**
    * Handles the message coming from FormAutofillContent.
    *
    * @param   {string} message.name The name of the message.
    * @param   {object} message.data The data of the message.
    * @param   {nsIFrameMessageManager} message.target Caller's message manager.
    */
   receiveMessage({name, data, target}) {
     switch (name) {
       case "FormAutofill:GetProfiles":
         this._getProfiles(data, target);
         break;
-      case "FormAutofill:getEnabledStatus":
-        Services.ppmm.broadcastAsyncMessage("FormAutofill:enabledStatus",
-                                            this._enabled);
-        break;
     }
   },
 
   /**
    * Returns the instance of ProfileStorage. To avoid syncing issues, anyone
    * who needs to access the profile should request the instance by this instead
    * of creating a new one.
    *
--- a/browser/extensions/formautofill/ProfileAutoCompleteResult.jsm
+++ b/browser/extensions/formautofill/ProfileAutoCompleteResult.jsm
@@ -64,21 +64,21 @@ ProfileAutoCompleteResult.prototype = {
 
   // An array of primary and secondary labels for each profiles.
   _popupLabels: null,
 
   /**
    * @returns {number} The number of results
    */
   get matchCount() {
-    return this._matchingProfiles.length;
+    return this._popupLabels.length;
   },
 
   _checkIndexBounds(index) {
-    if (index < 0 || index >= this._matchingProfiles.length) {
+    if (index < 0 || index >= this._popupLabels.length) {
       throw Components.Exception("Index out of range.", Cr.NS_ERROR_ILLEGAL_VALUE);
     }
   },
 
   /**
    * Get the secondary label based on the focused field name and related field names
    * in the same form.
    * @param   {string} focusedFieldName The field name of the focused input
@@ -118,17 +118,20 @@ ProfileAutoCompleteResult.prototype = {
         return profile[currentFieldName];
       }
     }
 
     return ""; // Nothing matched.
   },
 
   _generateLabels(focusedFieldName, allFieldNames, profiles) {
-    return profiles.map(profile => {
+    // Skip results without a primary label.
+    return profiles.filter(profile => {
+      return !!profile[focusedFieldName];
+    }).map(profile => {
       return {
         primary: profile[focusedFieldName],
         secondary: this._getSecondaryLabel(focusedFieldName,
                                            allFieldNames,
                                            profile),
       };
     });
   },
--- a/browser/extensions/formautofill/test/unit/test_enabledStatus.js
+++ b/browser/extensions/formautofill/test/unit/test_enabledStatus.js
@@ -3,60 +3,62 @@
  */
 
 "use strict";
 
 Cu.import("resource://formautofill/FormAutofillParent.jsm");
 
 add_task(function* test_enabledStatus_init() {
   let formAutofillParent = new FormAutofillParent();
-  sinon.spy(formAutofillParent, "_onStatusChanged");
+  sinon.spy(formAutofillParent, "_setStatus");
 
   // Default status is false before initialization
   do_check_eq(formAutofillParent._enabled, false);
+  do_check_eq(Services.ppmm.initialProcessData.autofillEnabled, undefined);
 
   formAutofillParent.init();
-  do_check_eq(formAutofillParent._onStatusChanged.called, true);
+  do_check_eq(formAutofillParent._setStatus.called, true);
+  do_check_eq(Services.ppmm.initialProcessData.autofillEnabled, false);
 
   formAutofillParent._uninit();
 });
 
 add_task(function* test_enabledStatus_observe() {
   let formAutofillParent = new FormAutofillParent();
   sinon.stub(formAutofillParent, "_getStatus");
-  sinon.spy(formAutofillParent, "_onStatusChanged");
+  sinon.spy(formAutofillParent, "_setStatus");
 
   // _enabled = _getStatus() => No need to trigger onStatusChanged
   formAutofillParent._enabled = true;
   formAutofillParent._getStatus.returns(true);
   formAutofillParent.observe(null, "nsPref:changed", "browser.formautofill.enabled");
-  do_check_eq(formAutofillParent._onStatusChanged.called, false);
+  do_check_eq(formAutofillParent._setStatus.called, false);
 
   // _enabled != _getStatus() => Need to trigger onStatusChanged
   formAutofillParent._getStatus.returns(false);
   formAutofillParent.observe(null, "nsPref:changed", "browser.formautofill.enabled");
-  do_check_eq(formAutofillParent._onStatusChanged.called, true);
+  do_check_eq(formAutofillParent._setStatus.called, true);
 
   // profile added => Need to trigger onStatusChanged
   formAutofillParent._getStatus.returns(!formAutofillParent._enabled);
-  formAutofillParent._onStatusChanged.reset();
+  formAutofillParent._setStatus.reset();
   formAutofillParent.observe(null, "formautofill-storage-changed", "add");
-  do_check_eq(formAutofillParent._onStatusChanged.called, true);
+  do_check_eq(formAutofillParent._setStatus.called, true);
 
   // profile removed => Need to trigger onStatusChanged
   formAutofillParent._getStatus.returns(!formAutofillParent._enabled);
-  formAutofillParent._onStatusChanged.reset();
+  formAutofillParent._setStatus.reset();
   formAutofillParent.observe(null, "formautofill-storage-changed", "remove");
-  do_check_eq(formAutofillParent._onStatusChanged.called, true);
+  do_check_eq(formAutofillParent._setStatus.called, true);
 
   // profile updated => no need to trigger onStatusChanged
   formAutofillParent._getStatus.returns(!formAutofillParent._enabled);
-  formAutofillParent._onStatusChanged.reset();
+  formAutofillParent._setStatus.reset();
   formAutofillParent.observe(null, "formautofill-storage-changed", "update");
-  do_check_eq(formAutofillParent._onStatusChanged.called, false);
+  do_check_eq(formAutofillParent._setStatus.called, false);
 });
 
 add_task(function* test_enabledStatus_getStatus() {
   let formAutofillParent = new FormAutofillParent();
   do_register_cleanup(function cleanup() {
     Services.prefs.clearUserPref("browser.formautofill.enabled");
   });
 
@@ -77,8 +79,24 @@ add_task(function* test_enabledStatus_ge
   // pref is enabled and profile is not empty.
   Services.prefs.setBoolPref("browser.formautofill.enabled", true);
   do_check_eq(formAutofillParent._getStatus(), true);
 
   // pref is disabled and profile is not empty.
   Services.prefs.setBoolPref("browser.formautofill.enabled", false);
   do_check_eq(formAutofillParent._getStatus(), false);
 });
+
+add_task(function* test_enabledStatus_setStatus() {
+  let formAutofillParent = new FormAutofillParent();
+  sinon.spy(formAutofillParent, "_onStatusChanged");
+
+  formAutofillParent._setStatus(true);
+  do_check_eq(formAutofillParent._enabled, true);
+  do_check_eq(Services.ppmm.initialProcessData.autofillEnabled, true);
+  do_check_eq(formAutofillParent._onStatusChanged.called, true);
+
+  formAutofillParent._onStatusChanged.reset();
+  formAutofillParent._setStatus(false);
+  do_check_eq(formAutofillParent._enabled, false);
+  do_check_eq(Services.ppmm.initialProcessData.autofillEnabled, false);
+  do_check_eq(formAutofillParent._onStatusChanged.called, true);
+});
--- a/browser/extensions/formautofill/test/unit/test_profileAutocompleteResult.js
+++ b/browser/extensions/formautofill/test/unit/test_profileAutocompleteResult.js
@@ -7,21 +7,27 @@ let matchingProfiles = [{
   organization: "Sesame Street",
   "street-address": "123 Sesame Street.",
   tel: "1-345-345-3456.",
 }, {
   guid: "test-guid-2",
   organization: "Mozilla",
   "street-address": "331 E. Evelyn Avenue",
   tel: "1-650-903-0800",
+}, {
+  guid: "test-guid-3",
+  organization: "",
+  "street-address": "321, No Name St.",
+  tel: "1-000-000-0000",
 }];
 
 let allFieldNames = ["street-address", "organization", "tel"];
 
 let testCases = [{
+  description: "Focus on an `organization` field",
   options: {},
   matchingProfiles,
   allFieldNames,
   searchString: "",
   fieldName: "organization",
   expected: {
     searchResult: Ci.nsIAutoCompleteResult.RESULT_SUCCESS,
     defaultIndex: 0,
@@ -41,16 +47,17 @@ let testCases = [{
       label: JSON.stringify({
         primary: "Mozilla",
         secondary: "331 E. Evelyn Avenue",
       }),
       image: "",
     }],
   },
 }, {
+  description: "Focus on an `tel` field",
   options: {},
   matchingProfiles,
   allFieldNames,
   searchString: "",
   fieldName: "tel",
   expected: {
     searchResult: Ci.nsIAutoCompleteResult.RESULT_SUCCESS,
     defaultIndex: 0,
@@ -67,19 +74,29 @@ let testCases = [{
       value: "1-650-903-0800",
       style: "autofill-profile",
       comment: JSON.stringify(matchingProfiles[1]),
       label: JSON.stringify({
         primary: "1-650-903-0800",
         secondary: "331 E. Evelyn Avenue",
       }),
       image: "",
+    }, {
+      value: "1-000-000-0000",
+      style: "autofill-profile",
+      comment: JSON.stringify(matchingProfiles[2]),
+      label: JSON.stringify({
+        primary: "1-000-000-0000",
+        secondary: "321, No Name St.",
+      }),
+      image: "",
     }],
   },
 }, {
+  description: "Focus on an `street-address` field",
   options: {},
   matchingProfiles,
   allFieldNames,
   searchString: "",
   fieldName: "street-address",
   expected: {
     searchResult: Ci.nsIAutoCompleteResult.RESULT_SUCCESS,
     defaultIndex: 0,
@@ -96,50 +113,62 @@ let testCases = [{
       value: "331 E. Evelyn Avenue",
       style: "autofill-profile",
       comment: JSON.stringify(matchingProfiles[1]),
       label: JSON.stringify({
         primary: "331 E. Evelyn Avenue",
         secondary: "Mozilla",
       }),
       image: "",
+    }, {
+      value: "321, No Name St.",
+      style: "autofill-profile",
+      comment: JSON.stringify(matchingProfiles[2]),
+      label: JSON.stringify({
+        primary: "321, No Name St.",
+        secondary: "1-000-000-0000",
+      }),
+      image: "",
     }],
   },
 }, {
+  description: "No matching profiles",
   options: {},
   matchingProfiles: [],
   allFieldNames,
   searchString: "",
   fieldName: "",
   expected: {
     searchResult: Ci.nsIAutoCompleteResult.RESULT_NOMATCH,
     defaultIndex: 0,
     items: [],
   },
 }, {
+  description: "Search with failure",
   options: {resultCode: Ci.nsIAutoCompleteResult.RESULT_FAILURE},
   matchingProfiles: [],
   allFieldNames,
   searchString: "",
   fieldName: "",
   expected: {
     searchResult: Ci.nsIAutoCompleteResult.RESULT_FAILURE,
     defaultIndex: 0,
     items: [],
   },
 }];
 
 add_task(function* test_all_patterns() {
-  testCases.forEach(pattern => {
-    let actual = new ProfileAutoCompleteResult(pattern.searchString,
-                                               pattern.fieldName,
-                                               pattern.allFieldNames,
-                                               pattern.matchingProfiles,
-                                               pattern.options);
-    let expectedValue = pattern.expected;
+  testCases.forEach(testCase => {
+    do_print("Starting testcase: " + testCase.description);
+    let actual = new ProfileAutoCompleteResult(testCase.searchString,
+                                               testCase.fieldName,
+                                               testCase.allFieldNames,
+                                               testCase.matchingProfiles,
+                                               testCase.options);
+    let expectedValue = testCase.expected;
     equal(actual.searchResult, expectedValue.searchResult);
     equal(actual.defaultIndex, expectedValue.defaultIndex);
     equal(actual.matchCount, expectedValue.items.length);
     expectedValue.items.forEach((item, index) => {
       equal(actual.getValueAt(index), item.value);
       equal(actual.getCommentAt(index), item.comment);
       equal(actual.getLabelAt(index), item.label);
       equal(actual.getStyleAt(index), item.style);
--- a/browser/installer/package-manifest.in
+++ b/browser/installer/package-manifest.in
@@ -631,16 +631,17 @@
 
 ; [Default Preferences]
 ; All the pref files must be part of base to prevent migration bugs
 @RESPATH@/browser/@PREF_DIR@/firefox.js
 @RESPATH@/browser/@PREF_DIR@/firefox-branding.js
 @RESPATH@/greprefs.js
 @RESPATH@/defaults/autoconfig/prefcalls.js
 @RESPATH@/browser/defaults/permissions
+@RESPATH@/browser/defaults/blocklists
 
 ; Warning: changing the path to channel-prefs.js can cause bugs (Bug 756325)
 ; Technically this is an app pref file, but we are keeping it in the original
 ; gre location for now.
 @RESPATH@/defaults/pref/channel-prefs.js
 
 ; Services (gre) prefs
 @RESPATH@/defaults/pref/services-sync.js
--- a/browser/locales/en-US/chrome/browser/preferences/preferences.properties
+++ b/browser/locales/en-US/chrome/browser/preferences/preferences.properties
@@ -202,22 +202,26 @@ removeAllSiteDataShown.label=Remove All 
 removeAllSiteDataShown.accesskey=e
 spaceAlert.learnMoreButton.label=Learn More
 spaceAlert.learnMoreButton.accesskey=L
 spaceAlert.over5GB.prefButton.label=Open Preferences
 spaceAlert.over5GB.prefButton.accesskey=O
 # LOCALIZATION NOTE (spaceAlert.over5GB.prefButtonWin.label): On Windows Preferences is called Options
 spaceAlert.over5GB.prefButtonWin.label=Open Options
 spaceAlert.over5GB.prefButtonWin.accesskey=O
-spaceAlert.over5GB.description=Firefox is running out of disk space. Website contents may not display properly. You can clear stored site data in Preferences > Advanced > Site Data.
-# LOCALIZATION NOTE (spaceAlert.over5GB.descriptionWin): On Windows Preferences is called Options
-spaceAlert.over5GB.descriptionWin=Firefox is running out of disk space. Website contents may not display properly. You can clear stored site data in Options > Advanced > Site Data.
+# LOCALIZATION NOTE (spaceAlert.over5GB.message): %S = brandShortName
+spaceAlert.over5GB.message=%S is running out of disk space. Website contents may not display properly. You can clear stored site data in Preferences > Advanced > Site Data.
+# LOCALIZATION NOTE (spaceAlert.over5GB.messageWin):
+# - On Windows Preferences is called Options
+# - %S = brandShortName
+spaceAlert.over5GB.messageWin=%S is running out of disk space. Website contents may not display properly. You can clear stored site data in Options > Advanced > Site Data.
 spaceAlert.under5GB.okButton.label=OK, Got it
 spaceAlert.under5GB.okButton.accesskey=K
-spaceAlert.under5GB.description=Firefox is running out of disk space. Website contents may not display properly. Visit “Learn More” to optimize your disk usage for better browsing experience.
+# LOCALIZATION NOTE (spaceAlert.under5GB.message): %S = brandShortName
+spaceAlert.under5GB.message=%S is running out of disk space. Website contents may not display properly. Visit “Learn More” to optimize your disk usage for better browsing experience.
 
 # LOCALIZATION NOTE (featureEnableRequiresRestart, featureDisableRequiresRestart, restartTitle): %S = brandShortName
 featureEnableRequiresRestart=%S must restart to enable this feature.
 featureDisableRequiresRestart=%S must restart to disable this feature.
 shouldRestartTitle=Restart %S
 okToRestartButton=Restart %S now
 revertNoRestartButton=Revert
 
--- a/devtools/client/framework/target-from-url.js
+++ b/devtools/client/framework/target-from-url.js
@@ -1,45 +1,48 @@
 /* This Source Code Form is subject to the terms of the Mozilla Public
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 "use strict";
 
-const { Cu, Ci } = require("chrome");
-
 const { TargetFactory } = require("devtools/client/framework/target");
 const { DebuggerServer } = require("devtools/server/main");
 const { DebuggerClient } = require("devtools/shared/client/main");
 const { Task } = require("devtools/shared/task");
 
 /**
  * Construct a Target for a given URL object having various query parameters:
  *
  * host:
  *    {String} The hostname or IP address to connect to.
  * port:
  *    {Number} The TCP port to connect to, to use with `host` argument.
  * ws:
  *    {Boolean} If true, connect via websocket instread of regular TCP connection.
  *
- * type: tab, process
- *    {String} The type of target to connect to.  Currently tabs and processes are supported types.
+ * type: tab, process, window
+ *    {String} The type of target to connect to.
  *
- * If type="tab":
+ * If type == "tab":
  * id:
  *    {Number} the tab outerWindowID
  * chrome: Optional
- *    {Boolean} Force the creation of a chrome target. Gives more privileges to the tab
- *    actor. Allows chrome execution in the webconsole and see chrome files in
- *    the debugger. (handy when contributing to firefox)
+ *    {Boolean} Force the creation of a chrome target. Gives more privileges to
+ *    the tab actor. Allows chrome execution in the webconsole and see chrome
+ *    files in the debugger. (handy when contributing to firefox)
  *
- * If type="process":
+ * If type == "process":
  * id:
- *    {Number} the process id to debug. Default to 0, which is the parent process.
+ *    {Number} the process id to debug. Default to 0, which is the parent
+ *    process.
+ *
+ * If type == "window":
+ * id:
+ *    {Number} the window outerWindowID
  *
  * @param {URL} url
  *        The url to fetch query params from.
  *
  * @return A target object
  */
 exports.targetFromURL = Task.async(function* (url) {
   let params = url.searchParams;
@@ -88,16 +91,36 @@ exports.targetFromURL = Task.async(funct
         isTabActor = false;
       }
     } catch (ex) {
       if (ex.error == "noProcess") {
         throw new Error("targetFromURL, process with id:'" + id + "' doesn't exist");
       }
       throw ex;
     }
+  } else if (type == "window") {
+    // Fetch target for a remote window actor
+    DebuggerServer.allowChromeProcess = true;
+    try {
+      id = parseInt(id, 10);
+      if (isNaN(id)) {
+        throw new Error("targetFromURL, window requires id parameter");
+      }
+      let response = yield client.mainRoot.getWindow({
+        outerWindowID: id,
+      });
+      form = response.window;
+      chrome = true;
+    } catch (ex) {
+      if (ex.error == "notFound") {
+        throw new Error(`targetFromURL, window with id:'${id}' ` +
+                        "doesn't exist");
+      }
+      throw ex;
+    }
   } else {
     throw new Error("targetFromURL, unsupported type='" + type + "' parameter");
   }
 
   return TargetFactory.forRemoteTab({ client, form, chrome, isTabActor });
 });
 
 function* createClient(params) {
--- a/devtools/client/framework/test/browser_target_from_url.js
+++ b/devtools/client/framework/test/browser_target_from_url.js
@@ -31,18 +31,29 @@ add_task(function* () {
   info("Test invalid type");
   try {
     yield targetFromURL(new URL("http://foo?type=x"));
     ok(false, "Shouldn't pass");
   } catch (e) {
     is(e.message, "targetFromURL, unsupported type='x' parameter");
   }
 
+  info("Test browser window");
+  let windowId = window.QueryInterface(Ci.nsIInterfaceRequestor)
+                       .getInterface(Ci.nsIDOMWindowUtils)
+                       .outerWindowID;
+  target = yield targetFromURL(new URL("http://foo?type=window&id=" + windowId));
+  is(target.url, window.location.href);
+  is(target.isLocalTab, false);
+  is(target.chrome, true);
+  is(target.isTabActor, true);
+  is(target.isRemote, true);
+
   info("Test tab");
-  let windowId = browser.outerWindowID;
+  windowId = browser.outerWindowID;
   target = yield targetFromURL(new URL("http://foo?type=tab&id=" + windowId));
   assertIsTabTarget(target, TEST_URI);
 
   info("Test tab with chrome privileges");
   target = yield targetFromURL(new URL("http://foo?type=tab&id=" + windowId + "&chrome"));
   assertIsTabTarget(target, TEST_URI, true);
 
   info("Test invalid tab id");
--- a/devtools/client/framework/toolbox-init.js
+++ b/devtools/client/framework/toolbox-init.js
@@ -1,12 +1,14 @@
 /* This Source Code Form is subject to the terms of the Mozilla Public
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
+/* eslint-env browser */
+
 "use strict";
 
 // URL constructor doesn't support about: scheme
 let href = window.location.href.replace("about:", "http://");
 let url = new window.URL(href);
 
 // Only use this method to attach the toolbox if some query parameters are given
 if (url.search.length > 1) {
@@ -21,16 +23,33 @@ if (url.search.length > 1) {
   const { DebuggerClient } = require("devtools/shared/client/main");
   const { Task } = require("devtools/shared/task");
 
   // `host` is the frame element loading the toolbox.
   let host = window.QueryInterface(Ci.nsIInterfaceRequestor)
                    .getInterface(Ci.nsIDOMWindowUtils)
                    .containerElement;
 
+  // If there's no containerElement (which happens when loading about:devtools-toolbox as
+  // a top level document), use the current window.
+  if (!host) {
+    host = {
+      contentWindow: window,
+      contentDocument: document,
+      // toolbox-host-manager.js wants to set attributes on the frame that contains it,
+      // but that is fine to skip and doesn't make sense when using the current window.
+      setAttribute() {},
+      ownerDocument: document,
+      // toolbox-host-manager.js wants to listen for unload events from outside the frame,
+      // but this is fine to skip since the toolbox code listens inside the frame as well,
+      // and there is no outer document in this case.
+      addEventListener() {},
+    };
+  }
+
   // Specify the default tool to open
   let tool = url.searchParams.get("tool");
 
   Task.spawn(function* () {
     let target;
     if (url.searchParams.has("target")) {
       // Attach toolbox to a given browser iframe (<xul:browser> or <html:iframe
       // mozbrowser>) whose reference is set on the host iframe.
--- a/devtools/client/inspector/layout/actions/grids.js
+++ b/devtools/client/inspector/layout/actions/grids.js
@@ -1,34 +1,51 @@
 /* This Source Code Form is subject to the terms of the Mozilla Public
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 "use strict";
 
 const {
+  UPDATE_GRID_COLOR,
   UPDATE_GRID_HIGHLIGHTED,
   UPDATE_GRIDS,
 } = require("./index");
 
 module.exports = {
 
   /**
+   * Update the color used for the grid's highlighter.
+   *
+   * @param  {NodeFront} nodeFront
+   *         The NodeFront of the DOM node to toggle the grid highlighter.
+   * @param  {String} color
+   *         The color to use for thie nodeFront's grid highlighter.
+   */
+  updateGridColor(nodeFront, color) {
+    return {
+      type: UPDATE_GRID_COLOR,
+      color,
+      nodeFront,
+    };
+  },
+
+  /**
    * Update the grid highlighted state.
    *
    * @param  {NodeFront} nodeFront
    *         The NodeFront of the DOM node to toggle the grid highlighter.
    * @param  {Boolean} highlighted
    *         Whether or not the grid highlighter is highlighting the grid.
    */
   updateGridHighlighted(nodeFront, highlighted) {
     return {
       type: UPDATE_GRID_HIGHLIGHTED,
+      highlighted,
       nodeFront,
-      highlighted,
     };
   },
 
   /**
    * Update the grid state with the new list of grids.
    */
   updateGrids(grids) {
     return {
--- a/devtools/client/inspector/layout/actions/index.js
+++ b/devtools/client/inspector/layout/actions/index.js
@@ -3,16 +3,19 @@
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 "use strict";
 
 const { createEnum } = require("devtools/client/shared/enum");
 
 createEnum([
 
+  // Update the color used for the overlay of a grid.
+  "UPDATE_GRID_COLOR",
+
   // Update the grid highlighted state.
   "UPDATE_GRID_HIGHLIGHTED",
 
   // Update the entire grids state with the new list of grids.
   "UPDATE_GRIDS",
 
   // Update the layout state with the latest layout properties.
   "UPDATE_LAYOUT",
--- a/devtools/client/inspector/layout/components/App.js
+++ b/devtools/client/inspector/layout/components/App.js
@@ -21,21 +21,23 @@ const BOXMODEL_STRINGS_URI = "devtools/c
 const BOXMODEL_L10N = new LocalizationHelper(BOXMODEL_STRINGS_URI);
 
 const App = createClass({
 
   displayName: "App",
 
   propTypes: {
     boxModel: PropTypes.shape(Types.boxModel).isRequired,
+    getSwatchColorPickerTooltip: PropTypes.func.isRequired,
     grids: PropTypes.arrayOf(PropTypes.shape(Types.grid)).isRequired,
     highlighterSettings: PropTypes.shape(Types.highlighterSettings).isRequired,
     showBoxModelProperties: PropTypes.bool.isRequired,
+    onHideBoxModelHighlighter: PropTypes.func.isRequired,
+    onSetGridOverlayColor: PropTypes.func.isRequired,
     onShowBoxModelEditor: PropTypes.func.isRequired,
-    onHideBoxModelHighlighter: PropTypes.func.isRequired,
     onShowBoxModelHighlighter: PropTypes.func.isRequired,
     onToggleGridHighlighter: PropTypes.func.isRequired,
     onToggleShowGridLineNumbers: PropTypes.func.isRequired,
     onToggleShowInfiniteLines: PropTypes.func.isRequired,
   },
 
   mixins: [ addons.PureRenderMixin ],
 
--- a/devtools/client/inspector/layout/components/Grid.js
+++ b/devtools/client/inspector/layout/components/Grid.js
@@ -13,41 +13,47 @@ const GridList = createFactory(require("
 const Types = require("../types");
 const { getStr } = require("../utils/l10n");
 
 module.exports = createClass({
 
   displayName: "Grid",
 
   propTypes: {
+    getSwatchColorPickerTooltip: PropTypes.func.isRequired,
     grids: PropTypes.arrayOf(PropTypes.shape(Types.grid)).isRequired,
     highlighterSettings: PropTypes.shape(Types.highlighterSettings).isRequired,
+    onSetGridOverlayColor: PropTypes.func.isRequired,
     onToggleGridHighlighter: PropTypes.func.isRequired,
     onToggleShowGridLineNumbers: PropTypes.func.isRequired,
     onToggleShowInfiniteLines: PropTypes.func.isRequired,
   },
 
   mixins: [ addons.PureRenderMixin ],
 
   render() {
     let {
+      getSwatchColorPickerTooltip,
       grids,
       highlighterSettings,
+      onSetGridOverlayColor,
       onToggleGridHighlighter,
       onToggleShowGridLineNumbers,
       onToggleShowInfiniteLines,
     } = this.props;
 
     return grids.length ?
       dom.div(
         {
           id: "layout-grid-container",
         },
         GridList({
+          getSwatchColorPickerTooltip,
           grids,
+          onSetGridOverlayColor,
           onToggleGridHighlighter,
         }),
         GridDisplaySettings({
           highlighterSettings,
           onToggleShowGridLineNumbers,
           onToggleShowInfiniteLines,
         })
       )
new file mode 100644
--- /dev/null
+++ b/devtools/client/inspector/layout/components/GridItem.js
@@ -0,0 +1,118 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+"use strict";
+
+const { addons, createClass, DOM: dom, PropTypes } = require("devtools/client/shared/vendor/react");
+const { findDOMNode } = require("devtools/client/shared/vendor/react-dom");
+
+const Types = require("../types");
+
+module.exports = createClass({
+
+  displayName: "GridItem",
+
+  propTypes: {
+    getSwatchColorPickerTooltip: PropTypes.func.isRequired,
+    grid: PropTypes.shape(Types.grid).isRequired,
+    onSetGridOverlayColor: PropTypes.func.isRequired,
+    onToggleGridHighlighter: PropTypes.func.isRequired,
+  },
+
+  mixins: [ addons.PureRenderMixin ],
+
+  componentDidMount() {
+    let tooltip = this.props.getSwatchColorPickerTooltip();
+    let swatchEl = findDOMNode(this).querySelector(".grid-color-swatch");
+
+    let previousColor;
+    tooltip.addSwatch(swatchEl, {
+      onCommit: this.setGridColor,
+      onPreview: this.setGridColor,
+      onRevert: () => {
+        this.props.onSetGridOverlayColor(this.props.grid.nodeFront, previousColor);
+      },
+      onShow: () => {
+        previousColor = this.props.grid.color;
+      },
+    });
+  },
+
+  componentWillUnmount() {
+    let tooltip = this.props.getSwatchColorPickerTooltip();
+    let swatchEl = findDOMNode(this).querySelector(".grid-color-swatch");
+    tooltip.removeSwatch(swatchEl);
+  },
+
+  setGridColor() {
+    let color = findDOMNode(this).querySelector(".grid-color-value").textContent;
+    this.props.onSetGridOverlayColor(this.props.grid.nodeFront, color);
+  },
+
+  onGridCheckboxClick() {
+    let {
+      grid,
+      onToggleGridHighlighter,
+    } = this.props;
+
+    onToggleGridHighlighter(grid.nodeFront);
+  },
+
+  render() {
+    let { grid } = this.props;
+    let { nodeFront } = grid;
+    let { displayName, attributes } = nodeFront;
+
+    let gridName = displayName;
+
+    let idIndex = attributes.findIndex(({ name }) => name === "id");
+    if (idIndex > -1 && attributes[idIndex].value) {
+      gridName += "#" + attributes[idIndex].value;
+    }
+
+    let classIndex = attributes.findIndex(({name}) => name === "class");
+    if (classIndex > -1 && attributes[classIndex].value) {
+      gridName += "." + attributes[classIndex].value.split(" ").join(".");
+    }
+
+    return dom.li(
+      {
+        key: grid.id,
+        className: "grid-item",
+      },
+      dom.label(
+        {},
+        dom.input(
+          {
+            type: "checkbox",
+            value: grid.id,
+            checked: grid.highlighted,
+            onChange: this.onGridCheckboxClick,
+          }
+        ),
+        gridName
+      ),
+      dom.div(
+        {
+          className: "grid-color-swatch",
+          style: {
+            backgroundColor: grid.color,
+          },
+          title: grid.color,
+        }
+      ),
+      // The SwatchColorPicker relies on the nextSibling of the swatch element to apply
+      // the selected color. This is why we use a span in display: none for now.
+      // Ideally we should modify the SwatchColorPickerTooltip to bypass this requirement.
+      // See https://bugzilla.mozilla.org/show_bug.cgi?id=1341578
+      dom.span(
+        {
+          className: "grid-color-value"
+        },
+        grid.color
+      )
+    );
+  },
+
+});
--- a/devtools/client/inspector/layout/components/GridList.js
+++ b/devtools/client/inspector/layout/components/GridList.js
@@ -1,87 +1,56 @@
 /* This Source Code Form is subject to the terms of the Mozilla Public
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 "use strict";
 
-const { addons, createClass, DOM: dom, PropTypes } =
+const { addons, createClass, createFactory, DOM: dom, PropTypes } =
   require("devtools/client/shared/vendor/react");
 
+const GridItem = createFactory(require("./GridItem"));
+
 const Types = require("../types");
 const { getStr } = require("../utils/l10n");
 
 module.exports = createClass({
 
   displayName: "GridList",
 
   propTypes: {
+    getSwatchColorPickerTooltip: PropTypes.func.isRequired,
     grids: PropTypes.arrayOf(PropTypes.shape(Types.grid)).isRequired,
+    onSetGridOverlayColor: PropTypes.func.isRequired,
     onToggleGridHighlighter: PropTypes.func.isRequired,
   },
 
   mixins: [ addons.PureRenderMixin ],
 
-  onGridCheckboxClick({ target }) {
-    let {
-      grids,
-      onToggleGridHighlighter,
-    } = this.props;
-
-    onToggleGridHighlighter(grids[target.value].nodeFront);
-  },
-
   render() {
     let {
+      getSwatchColorPickerTooltip,
       grids,
+      onSetGridOverlayColor,
+      onToggleGridHighlighter,
     } = this.props;
 
     return dom.div(
       {
         className: "grid-container",
       },
       dom.span(
         {},
         getStr("layout.overlayGrid")
       ),
       dom.ul(
         {},
-        grids.map(grid => {
-          let { nodeFront } = grid;
-          let { displayName, attributes } = nodeFront;
-
-          let gridName = displayName;
-
-          let idIndex = attributes.findIndex(({ name }) => name === "id");
-          if (idIndex > -1 && attributes[idIndex].value) {
-            gridName += "#" + attributes[idIndex].value;
-          }
-
-          let classIndex = attributes.findIndex(({name}) => name === "class");
-          if (classIndex > -1 && attributes[classIndex].value) {
-            gridName += "." + attributes[classIndex].value.split(" ").join(".");
-          }
-
-          return dom.li(
-            {
-              key: grid.id,
-            },
-            dom.label(
-              {},
-              dom.input(
-                {
-                  type: "checkbox",
-                  value: grid.id,
-                  checked: grid.highlighted,
-                  onChange: this.onGridCheckboxClick,
-                }
-              ),
-              gridName
-            )
-          );
-        })
+        grids.map(grid => GridItem({
+          getSwatchColorPickerTooltip,
+          grid,
+          onSetGridOverlayColor,
+          onToggleGridHighlighter,
+        }))
       )
     );
   },
 
 });
-
--- a/devtools/client/inspector/layout/components/moz.build
+++ b/devtools/client/inspector/layout/components/moz.build
@@ -11,10 +11,11 @@ DevToolsModules(
     'BoxModel.js',
     'BoxModelEditable.js',
     'BoxModelInfo.js',
     'BoxModelMain.js',
     'BoxModelProperties.js',
     'ComputedProperty.js',
     'Grid.js',
     'GridDisplaySettings.js',
+    'GridItem.js',
     'GridList.js',
 )
--- a/devtools/client/inspector/layout/layout.js
+++ b/devtools/client/inspector/layout/layout.js
@@ -8,20 +8,23 @@ const Services = require("Services");
 const { Task } = require("devtools/shared/task");
 const { getCssProperties } = require("devtools/shared/fronts/css-properties");
 const { ReflowFront } = require("devtools/shared/fronts/reflow");
 
 const { InplaceEditor } = require("devtools/client/shared/inplace-editor");
 const { createFactory, createElement } = require("devtools/client/shared/vendor/react");
 const { Provider } = require("devtools/client/shared/vendor/react-redux");
 
+const SwatchColorPickerTooltip = require("devtools/client/shared/widgets/tooltip/SwatchColorPickerTooltip");
+
 const {
   updateLayout,
 } = require("./actions/box-model");
 const {
+  updateGridColor,
   updateGridHighlighted,
   updateGrids,
 } = require("./actions/grids");
 const {
   updateShowGridLineNumbers,
   updateShowInfiniteLines,
 } = require("./actions/highlighter-settings");
 
@@ -32,16 +35,28 @@ const EditingSession = require("./utils/
 const { LocalizationHelper } = require("devtools/shared/l10n");
 const INSPECTOR_L10N =
   new LocalizationHelper("devtools/client/locales/inspector.properties");
 
 const NUMERIC = /^-?[\d\.]+$/;
 const SHOW_GRID_LINE_NUMBERS = "devtools.gridinspector.showGridLineNumbers";
 const SHOW_INFINITE_LINES_PREF = "devtools.gridinspector.showInfiniteLines";
 
+// Default grid colors.
+const GRID_COLORS = [
+  "#05E4EE",
+  "#BB9DFF",
+  "#FFB53B",
+  "#71F362",
+  "#FF90FF",
+  "#FF90FF",
+  "#1B80FF",
+  "#FF2647"
+];
+
 function LayoutView(inspector, window) {
   this.document = window.document;
   this.highlighters = inspector.highlighters;
   this.inspector = inspector;
   this.store = inspector.store;
   this.walker = this.inspector.walker;
 
   this.updateBoxModel = this.updateBoxModel.bind(this);
@@ -69,32 +84,71 @@ LayoutView.prototype = {
     if (!this.inspector) {
       return;
     }
 
     this.layoutInspector = yield this.inspector.walker.getLayoutInspector();
 
     this.loadHighlighterSettings();
 
+    // Create a shared SwatchColorPicker instance to be reused by all GridItem components.
+    this.swatchColorPickerTooltip = new SwatchColorPickerTooltip(
+      this.inspector.toolbox.doc,
+      this.inspector,
+      {
+        supportsCssColor4ColorFunction: () => false
+      }
+    );
+
     let app = App({
       /**
+       * Retrieve the shared SwatchColorPicker instance.
+       */
+      getSwatchColorPickerTooltip: () => {
+        return this.swatchColorPickerTooltip;
+      },
+
+      /**
        * Shows the box model properties under the box model if true, otherwise, hidden by
        * default.
        */
       showBoxModelProperties: true,
 
       /**
        * Hides the box-model highlighter on the currently selected element.
        */
       onHideBoxModelHighlighter: () => {
         let toolbox = this.inspector.toolbox;
         toolbox.highlighterUtils.unhighlight();
       },
 
       /**
+       * Handler for a change in the grid overlay color picker for a grid container.
+       *
+       * @param  {NodeFront} node
+       *         The NodeFront of the grid container element for which the grid color is
+       *         being updated.
+       * @param  {String} color
+       *         A hex string representing the color to use.
+       */
+      onSetGridOverlayColor: (node, color) => {
+        this.store.dispatch(updateGridColor(node, color));
+        let { grids } = this.store.getState();
+
+        // If the grid for which the color was updated currently has a highlighter, update
+        // the color.
+        for (let grid of grids) {
+          if (grid.nodeFront === node && grid.highlighted) {
+            let highlighterSettings = this.getGridHighlighterSettings(node);
+            this.highlighters.showGridHighlighter(node, highlighterSettings);
+          }
+        }
+      },
+
+      /**
        * Shows the inplace editor when a box model editable value is clicked on the
        * box model panel.
        *
        * @param  {DOMNode} element
        *         The element that was clicked.
        * @param  {Event} event
        *         The event object.
        * @param  {String} property
@@ -175,37 +229,38 @@ LayoutView.prototype = {
        * Handler for a change in the input checkboxes in the GridList component.
        * Toggles on/off the grid highlighter for the provided grid container element.
        *
        * @param  {NodeFront} node
        *         The NodeFront of the grid container element for which the grid
        *         highlighter is toggled on/off for.
        */
       onToggleGridHighlighter: node => {
-        let { highlighterSettings } = this.store.getState();
+        let highlighterSettings = this.getGridHighlighterSettings(node);
         this.highlighters.toggleGridHighlighter(node, highlighterSettings);
       },
 
       /**
        * Handler for a change in the show grid line numbers checkbox in the
-       * GridDisplaySettings component. TOggles on/off the option to show the grid line
+       * GridDisplaySettings component. Toggles on/off the option to show the grid line
        * numbers in the grid highlighter. Refreshes the shown grid highlighter for the
        * grids currently highlighted.
        *
        * @param  {Boolean} enabled
        *         Whether or not the grid highlighter should show the grid line numbers.
        */
       onToggleShowGridLineNumbers: enabled => {
         this.store.dispatch(updateShowGridLineNumbers(enabled));
         Services.prefs.setBoolPref(SHOW_GRID_LINE_NUMBERS, enabled);
 
-        let { grids, highlighterSettings } = this.store.getState();
+        let { grids } = this.store.getState();
 
         for (let grid of grids) {
           if (grid.highlighted) {
+            let highlighterSettings = this.getGridHighlighterSettings(grid.nodeFront);
             this.highlighters.showGridHighlighter(grid.nodeFront, highlighterSettings);
           }
         }
       },
 
       /**
        * Handler for a change in the extend grid lines infinitely checkbox in the
        * GridDisplaySettings component. Toggles on/off the option to extend the grid
@@ -214,24 +269,25 @@ LayoutView.prototype = {
        *
        * @param  {Boolean} enabled
        *         Whether or not the grid highlighter should extend grid lines infinitely.
        */
       onToggleShowInfiniteLines: enabled => {
         this.store.dispatch(updateShowInfiniteLines(enabled));
         Services.prefs.setBoolPref(SHOW_INFINITE_LINES_PREF, enabled);
 
-        let { grids, highlighterSettings } = this.store.getState();
+        let { grids } = this.store.getState();
 
         for (let grid of grids) {
           if (grid.highlighted) {
+            let highlighterSettings = this.getGridHighlighterSettings(grid.nodeFront);
             this.highlighters.showGridHighlighter(grid.nodeFront, highlighterSettings);
           }
         }
-      },
+      }
     });
 
     let provider = createElement(Provider, {
       store: this.store,
       id: "layoutview",
       title: INSPECTOR_L10N.getStr("inspector.sidebar.layoutViewTitle2"),
       key: "layoutview",
     }, app);
@@ -266,16 +322,53 @@ LayoutView.prototype = {
     this.document = null;
     this.inspector = null;
     this.layoutInspector = null;
     this.store = null;
     this.walker = null;
   },
 
   /**
+   * Returns the color set for the grid highlighter associated with the provided
+   * nodeFront.
+   *
+   * @param  {NodeFront} nodeFront
+   *         The NodeFront for which we need the color.
+   */
+  getGridColorForNodeFront(nodeFront) {
+    let { grids } = this.store.getState();
+
+    for (let grid of grids) {
+      if (grid.nodeFront === nodeFront) {
+        return grid.color;
+      }
+    }
+
+    return null;
+  },
+
+  /**
+   * Create a highlighter settings object for the provided nodeFront.
+   *
+   * @param  {NodeFront} nodeFront
+   *         The NodeFront for which we need highlighter settings.
+   */
+  getGridHighlighterSettings(nodeFront) {
+    let { highlighterSettings } = this.store.getState();
+
+    // Get the grid color for the provided nodeFront.
+    let color = this.getGridColorForNodeFront(nodeFront);
+
+    // Merge the grid color to the generic highlighter settings.
+    return Object.assign({}, highlighterSettings, {
+      color
+    });
+  },
+
+  /**
    * Returns true if the layout panel is visible, and false otherwise.
    */
   isPanelVisible() {
     return this.inspector.toolbox.currentToolId === "inspector" &&
            this.inspector.sidebar &&
            this.inspector.sidebar.getCurrentTabID() === "layoutview";
   },
 
@@ -386,18 +479,22 @@ LayoutView.prototype = {
       gridFronts = yield this.layoutInspector.getAllGrids(this.walker.rootNode);
     }
 
     let grids = [];
     for (let i = 0; i < gridFronts.length; i++) {
       let grid = gridFronts[i];
       let nodeFront = yield this.walker.getNodeFromActor(grid.actorID, ["containerEl"]);
 
+      let fallbackColor = GRID_COLORS[i % GRID_COLORS.length];
+      let color = this.getGridColorForNodeFront(nodeFront) || fallbackColor;
+
       grids.push({
         id: i,
+        color,
         gridFragments: grid.gridFragments,
         highlighted: nodeFront == this.highlighters.gridHighlighterShown,
         nodeFront,
       });
     }
 
     this.store.dispatch(updateGrids(grids));
   }),
--- a/devtools/client/inspector/layout/reducers/grids.js
+++ b/devtools/client/inspector/layout/reducers/grids.js
@@ -1,37 +1,44 @@
 /* This Source Code Form is subject to the terms of the Mozilla Public
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 "use strict";
 
 const {
+  UPDATE_GRID_COLOR,
   UPDATE_GRID_HIGHLIGHTED,
   UPDATE_GRIDS,
 } = require("../actions/index");
 
 const INITIAL_GRIDS = [];
 
 let reducers = {
 
-  [UPDATE_GRID_HIGHLIGHTED](grids, { nodeFront, highlighted }) {
+  [UPDATE_GRID_COLOR](grids, { nodeFront, color }) {
     let newGrids = grids.map(g => {
       if (g.nodeFront == nodeFront) {
-        g.highlighted = highlighted;
-      } else {
-        g.highlighted = false;
+        g.color = color;
       }
 
       return g;
     });
 
     return newGrids;
   },
 
+  [UPDATE_GRID_HIGHLIGHTED](grids, { nodeFront, highlighted }) {
+    return grids.map(g => {
+      return Object.assign({}, g, {
+        highlighted: g.nodeFront === nodeFront ? highlighted : false
+      });
+    });
+  },
+
   [UPDATE_GRIDS](_, { grids }) {
     return grids;
   },
 
 };
 
 module.exports = function (grids = INITIAL_GRIDS, action) {
   let reducer = reducers[action.type];
--- a/devtools/client/inspector/layout/types.js
+++ b/devtools/client/inspector/layout/types.js
@@ -19,16 +19,19 @@ exports.boxModel = {
 /**
  * A single grid container in the document.
  */
 exports.grid = {
 
   // The id of the grid
   id: PropTypes.number,
 
+  // The color for the grid overlay highlighter
+  color: PropTypes.string,
+
   // The grid fragment object of the grid container
   gridFragments: PropTypes.array,
 
   // Whether or not the grid highlighter is highlighting the grid
   highlighted: PropTypes.bool,
 
   // The node front of the grid container
   nodeFront: PropTypes.object,
--- a/devtools/client/themes/layout.css
+++ b/devtools/client/themes/layout.css
@@ -47,8 +47,34 @@
  * Container when no grids are present
  */
 
 .layout-no-grids {
   font-style: italic;
   text-align: center;
   padding: 0.5em;
 }
+
+/**
+ * Grid Item
+ */
+
+.grid-item {
+  display: flex;
+  align-items: center;
+}
+
+.grid-item input {
+  margin: 0 5px;
+}
+
+.grid-color-swatch {
+  width: 12px;
+  height: 12px;
+  margin-left: 5px;
+  border: 1px solid var(--theme-highlight-gray);
+  border-radius: 50%;
+  cursor: pointer;
+}
+
+.grid-color-value {
+  display: none;
+}
--- a/devtools/server/actors/highlighters/css-grid.js
+++ b/devtools/server/actors/highlighters/css-grid.js
@@ -16,38 +16,40 @@ const {
 const {
   getCurrentZoom,
   setIgnoreLayoutChanges,
   getWindowDimensions
 } = require("devtools/shared/layout/utils");
 const { stringifyGridFragments } = require("devtools/server/actors/utils/css-grid-utils");
 
 const CSS_GRID_ENABLED_PREF = "layout.css.grid.enabled";
+const DEFAULT_GRID_COLOR = "#4B0082";
 const ROWS = "rows";
 const COLUMNS = "cols";
+
 const GRID_LINES_PROPERTIES = {
   "edge": {
     lineDash: [0, 0],
-    strokeStyle: "#4B0082"
+    alpha: 1,
   },
   "explicit": {
     lineDash: [5, 3],
-    strokeStyle: "#8A2BE2"
+    alpha: 0.75,
   },
   "implicit": {
     lineDash: [2, 2],
-    strokeStyle: "#9370DB"
+    alpha: 0.5,
   }
 };
 
 // px
 const GRID_GAP_PATTERN_WIDTH = 14;
 const GRID_GAP_PATTERN_HEIGHT = 14;
 const GRID_GAP_PATTERN_LINE_DASH = [5, 3];
-const GRID_GAP_PATTERN_STROKE_STYLE = "#9370DB";
+const GRID_GAP_ALPHA = 0.5;
 
 /**
  * Cached used by `CssGridHighlighter.getGridGapPattern`.
  */
 const gCachedGridPattern = new WeakMap();
 // WeakMap key for the Row grid pattern.
 const ROW_KEY = {};
 // WeakMap key for the Column grid pattern.
@@ -59,16 +61,19 @@ const COLUMN_KEY = {};
  *
  * Usage example:
  * let h = new CssGridHighlighter(env);
  * h.show(node, options);
  * h.hide();
  * h.destroy();
  *
  * Available Options:
+ * - color(colorValue)
+ *     @param  {String} colorValue
+ *     The color that should be used to draw the highlighter for this grid.
  * - showGridArea(areaName)
  *     @param  {String} areaName
  *     Shows the grid area highlight for the given area name.
  * - showAllGridAreas
  *     Shows all the grid area highlights for the current grid.
  * - showGridLineNumbers(isShown)
  *     @param  {Boolean}
  *     Displays the grid line numbers on the grid lines if isShown is true.
@@ -246,16 +251,20 @@ CssGridHighlighter.prototype = extend(Au
   get ctx() {
     return this.canvas.getCanvasContext("2d");
   },
 
   get canvas() {
     return this.getElement("canvas");
   },
 
+  get color() {
+    return this.options.color || DEFAULT_GRID_COLOR;
+  },
+
   /**
    * Gets the grid gap pattern used to render the gap regions.
    *
    * @param  {Object} dimension
    *         Refers to the WeakMap key for the grid dimension type which is either the
    *         constant COLUMN or ROW.
    * @return {CanvasPattern} grid gap pattern.
    */
@@ -265,60 +274,70 @@ CssGridHighlighter.prototype = extend(Au
     }
 
     // Create the diagonal lines pattern for the rendering the grid gaps.
     let canvas = createNode(this.win, { nodeType: "canvas" });
     canvas.width = GRID_GAP_PATTERN_WIDTH;
     canvas.height = GRID_GAP_PATTERN_HEIGHT;
 
     let ctx = canvas.getContext("2d");
+    ctx.save();
     ctx.setLineDash(GRID_GAP_PATTERN_LINE_DASH);
     ctx.beginPath();
     ctx.translate(.5, .5);
 
     if (dimension === COLUMN_KEY) {
       ctx.moveTo(0, 0);
       ctx.lineTo(GRID_GAP_PATTERN_WIDTH, GRID_GAP_PATTERN_HEIGHT);
     } else {
       ctx.moveTo(GRID_GAP_PATTERN_WIDTH, 0);
       ctx.lineTo(0, GRID_GAP_PATTERN_HEIGHT);
     }
 
-    ctx.strokeStyle = GRID_GAP_PATTERN_STROKE_STYLE;
+    ctx.strokeStyle = this.color;
+    ctx.globalAlpha = GRID_GAP_ALPHA;
     ctx.stroke();
+    ctx.restore();
 
     let pattern = ctx.createPattern(canvas, "repeat");
     gCachedGridPattern.set(dimension, pattern);
     return pattern;
   },
 
   /**
    * Called when the page navigates. Used to clear the cached gap patterns and avoid
    * using DeadWrapper objects as gap patterns the next time.
    */
   onNavigate() {
-    gCachedGridPattern.delete(ROW_KEY);
-    gCachedGridPattern.delete(COLUMN_KEY);
+    this._clearCache();
   },
 
   onWillNavigate({ isTopLevel }) {
     if (isTopLevel) {
       this.hide();
     }
   },
 
   _show() {
     if (Services.prefs.getBoolPref(CSS_GRID_ENABLED_PREF) && !this.isGrid()) {
       this.hide();
       return false;
     }
 
+    // The grid pattern cache should be cleared in case the color changed.
+    this._clearCache();
+
     return this._update();
   },
 
+  _clearCache() {
+    gCachedGridPattern.delete(ROW_KEY);
+    gCachedGridPattern.delete(COLUMN_KEY);
+  },
+
   /**
    * Shows the grid area highlight for the given area name.
    *
    * @param  {String} areaName
    *         Grid area name.
    */
   showGridArea(areaName) {
     this.renderGridArea(areaName);
@@ -605,17 +624,19 @@ CssGridHighlighter.prototype = extend(Au
     if (dimensionType === COLUMNS) {
       this.ctx.moveTo(linePos, startPos);
       this.ctx.lineTo(linePos, endPos);
     } else {
       this.ctx.moveTo(startPos, linePos);
       this.ctx.lineTo(endPos, linePos);
     }
 
-    this.ctx.strokeStyle = GRID_LINES_PROPERTIES[lineType].strokeStyle;
+    this.ctx.strokeStyle = this.color;
+    this.ctx.globalAlpha = GRID_LINES_PROPERTIES[lineType].alpha;
+
     this.ctx.stroke();
     this.ctx.restore();
   },
 
   /**
    * Render the grid line number on the css grid highlighter canvas.
    *
    * @param  {Number} lineNumber
@@ -626,21 +647,26 @@ CssGridHighlighter.prototype = extend(Au
    * @param  {Number} startPos
    *         The start position of the cross side of the grid line.
    * @param  {String} dimensionType
    *         The grid dimension type which is either the constant COLUMNS or ROWS.
    */
   renderGridLineNumber(lineNumber, linePos, startPos, dimensionType) {
     this.ctx.save();
 
+    let textWidth = this.ctx.measureText(lineNumber).width;
+    // Guess the font height based on the measured width
+    let textHeight = textWidth * 2;
+
     if (dimensionType === COLUMNS) {
-      this.ctx.fillText(lineNumber, linePos, startPos);
+      let yPos = Math.max(startPos, textHeight);
+      this.ctx.fillText(lineNumber, linePos, yPos);
     } else {
-      let textWidth = this.ctx.measureText(lineNumber).width;
-      this.ctx.fillText(lineNumber, startPos - textWidth, linePos);
+      let xPos = Math.max(startPos, textWidth);
+      this.ctx.fillText(lineNumber, xPos - textWidth, linePos);
     }
 
     this.ctx.restore();
   },
 
   /**
    * Render the grid gap area on the css grid highlighter canvas.
    *
--- a/devtools/server/actors/moz.build
+++ b/devtools/server/actors/moz.build
@@ -61,16 +61,17 @@ DevToolsModules(
     'tab.js',
     'timeline.js',
     'webaudio.js',
     'webbrowser.js',
     'webconsole.js',
     'webextension-inspected-window.js',
     'webextension.js',
     'webgl.js',
+    'window.js',
     'worker-list.js',
     'worker.js',
 )
 
 with Files('animation.js'):
     BUG_COMPONENT = ('Firefox', 'Developer Tools: Animation Inspector')
 
 with Files('breakpoint.js'):
--- a/devtools/server/actors/root.js
+++ b/devtools/server/actors/root.js
@@ -2,23 +2,26 @@
 /* vim: set ft=javascript ts=2 et sw=2 tw=80: */
 /* This Source Code Form is subject to the terms of the Mozilla Public
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 "use strict";
 
 const { Cc, Ci, Cu } = require("chrome");
+const Services = require("Services");
 const { ActorPool, appendExtraActors, createExtraActors } = require("devtools/server/actors/common");
 const { DebuggerServer } = require("devtools/server/main");
 
 loader.lazyGetter(this, "ppmm", () => {
   return Cc["@mozilla.org/parentprocessmessagemanager;1"].getService(
     Ci.nsIMessageBroadcaster);
 });
+loader.lazyRequireGetter(this, "WindowActor",
+  "devtools/server/actors/window", true);
 
 /* Root actor for the remote debugging protocol. */
 
 /**
  * Create a remote debugging protocol root actor.
  *
  * @param connection
  *     The DebuggerServerConnection whose root actor we are constructing.
@@ -162,22 +165,25 @@ RootActor.prototype = {
     // grabbing allocations from the MemoryActor are available for the performance tool
     memoryActorAllocations: true,
     // Added in Gecko 40, indicating that the backend isn't stupid about
     // sending resumption packets on tab navigation.
     noNeedToFakeResumptionOnNavigation: true,
     // Added in Firefox 40. Indicates that the backend supports registering custom
     // commands through the WebConsoleCommands API.
     webConsoleCommands: true,
-    // Whether root actor exposes tab actors
-    // if allowChromeProcess is true, you can fetch a ChromeActor instance
-    // to debug chrome and any non-content ressource via getProcess request
-    // if allocChromeProcess is defined, but not true, it means that root actor
-    // no longer expose tab actors, but also that getProcess forbids
-    // exposing actors for security reasons
+    // Whether root actor exposes tab actors and access to any window.
+    // If allowChromeProcess is true, you can:
+    // * get a ChromeActor instance to debug chrome and any non-content
+    //   resource via getProcess requests
+    // * get a WindowActor instance to debug windows which could be chrome,
+    //   like browser windows via getWindow requests
+    // If allowChromeProcess is defined, but not true, it means that root actor
+    // no longer expose tab actors, but also that the above requests are
+    // forbidden for security reasons.
     get allowChromeProcess() {
       return DebuggerServer.allowChromeProcess;
     },
     // Whether or not `getProfile()` supports specifying a `startTime`
     // and `endTime` to filter out samples. Fx40+
     profilerDataFilterable: true,
     // Whether or not the MemoryActor's heap snapshot abilities are
     // fully equipped to handle heap snapshots for the memory tool. Fx44+
@@ -227,16 +233,17 @@ RootActor.prototype = {
     }
     if (typeof this._parameters.onShutdown === "function") {
       this._parameters.onShutdown();
     }
     this._extraActors = null;
     this.conn = null;
     this._tabActorPool = null;
     this._globalActorPool = null;
+    this._windowActorPool = null;
     this._parameters = null;
     this._chromeActor = null;
     this._processActors.clear();
   },
 
   /* The 'listTabs' request and the 'tabListChanged' notification. */
 
   /**
@@ -333,16 +340,48 @@ RootActor.prototype = {
                     }
                     return {
                       error: "noTab",
                       message: "Unexpected error while calling getTab(): " + error
                     };
                   });
   },
 
+  onGetWindow: function ({ outerWindowID }) {
+    if (!DebuggerServer.allowChromeProcess) {
+      return {
+        from: this.actorID,
+        error: "forbidden",
+        message: "You are not allowed to debug windows."
+      };
+    }
+    let window = Services.wm.getOuterWindowWithId(outerWindowID);
+    if (!window) {
+      return {
+        from: this.actorID,
+        error: "notFound",
+        message: `No window found with outerWindowID ${outerWindowID}`,
+      };
+    }
+
+    if (!this._windowActorPool) {
+      this._windowActorPool = new ActorPool(this.conn);
+      this.conn.addActorPool(this._windowActorPool);
+    }
+
+    let actor = new WindowActor(this.conn, window);
+    actor.parentID = this.actorID;
+    this._windowActorPool.addActor(actor);
+
+    return {
+      from: this.actorID,
+      window: actor.form(),
+    };
+  },
+
   onTabListChanged: function () {
     this.conn.send({ from: this.actorID, type: "tabListChanged" });
     /* It's a one-shot notification; no need to watch any more. */
     this._parameters.tabList.onListChanged = null;
   },
 
   onListAddons: function () {
     let addonList = this._parameters.addonList;
@@ -534,16 +573,17 @@ RootActor.prototype = {
       delete this._extraActors[name];
     }
   }
 };
 
 RootActor.prototype.requestTypes = {
   "listTabs": RootActor.prototype.onListTabs,
   "getTab": RootActor.prototype.onGetTab,
+  "getWindow": RootActor.prototype.onGetWindow,
   "listAddons": RootActor.prototype.onListAddons,
   "listWorkers": RootActor.prototype.onListWorkers,
   "listServiceWorkerRegistrations": RootActor.prototype.onListServiceWorkerRegistrations,
   "listProcesses": RootActor.prototype.onListProcesses,
   "getProcess": RootActor.prototype.onGetProcess,
   "echo": RootActor.prototype.onEcho,
   "protocolDescription": RootActor.prototype.onProtocolDescription
 };
new file mode 100644
--- /dev/null
+++ b/devtools/server/actors/window.js
@@ -0,0 +1,83 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+"use strict";
+
+const { Ci } = require("chrome");
+const Services = require("Services");
+const { TabActor } = require("./tab");
+
+/**
+ * Creates a WindowActor for debugging a single window, like a browser window in Firefox,
+ * but it can be used to reach any window in the process.  (Currently this is parent
+ * process only because the root actor's `onGetWindow` doesn't try to cross process
+ * boundaries.)  Both chrome and content windows are supported.
+ *
+ * Most of the implementation is inherited from TabActor.  WindowActor exposes all tab
+ * actors via its form() request, like TabActor.
+ *
+ * You can request a specific window's actor via RootActor.getWindow().
+ *
+ * @param connection DebuggerServerConnection
+ *        The connection to the client.
+ * @param window DOMWindow
+ *        The window.
+ */
+function WindowActor(connection, window) {
+  TabActor.call(this, connection);
+
+  let docShell = window.QueryInterface(Ci.nsIInterfaceRequestor)
+                       .getInterface(Ci.nsIDocShell);
+  Object.defineProperty(this, "docShell", {
+    value: docShell,
+    configurable: true
+  });
+}
+
+WindowActor.prototype = Object.create(TabActor.prototype);
+
+// Bug 1266561: This setting is mysteriously named, we should split up the
+// functionality that is triggered by it.
+WindowActor.prototype.isRootActor = true;
+
+WindowActor.prototype.observe = function (subject, topic, data) {
+  TabActor.prototype.observe.call(this, subject, topic, data);
+  if (!this.attached) {
+    return;
+  }
+  if (topic == "chrome-webnavigation-destroy") {
+    this._onDocShellDestroy(subject);
+  }
+};
+
+WindowActor.prototype._attach = function () {
+  if (this.attached) {
+    return false;
+  }
+
+  TabActor.prototype._attach.call(this);
+
+  // Listen for chrome docshells in addition to content docshells
+  if (this.docShell.itemType == Ci.nsIDocShellTreeItem.typeChrome) {
+    Services.obs.addObserver(this, "chrome-webnavigation-destroy", false);
+  }
+
+  return true;
+};
+
+WindowActor.prototype._detach = function () {
+  if (!this.attached) {
+    return false;
+  }
+
+  if (this.docShell.itemType == Ci.nsIDocShellTreeItem.typeChrome) {
+    Services.obs.removeObserver(this, "chrome-webnavigation-destroy");
+  }
+
+  TabActor.prototype._detach.call(this);
+
+  return true;
+};
+
+exports.WindowActor = WindowActor;
--- a/devtools/server/docs/actor-hierarchy.md
+++ b/devtools/server/docs/actor-hierarchy.md
@@ -2,17 +2,18 @@
 
 To start with, actors are living within /devtools/server/actors/ folder.
 They are organized in a hierarchy for easier lifecycle/memory management:
 once a parent is removed from the pool, its children are removed as well.
 (See actor-registration.md for more information about how to implement one)
 
 The overall hierarchy of actors looks like this:
 
-  RootActor: First one, automatically instantiated when we start connecting.
+```
+RootActor: First one, automatically instantiated when we start connecting.
    |         Mostly meant to instantiate new actors.
    |
    |--> Global-scoped actors:
    |    Actors exposing features related to the main process,
    |    that are not specific to any particular context (document, tab, app,
    |    add-on, or worker).
    |    A good example is the preference actor.
    |
@@ -22,26 +23,28 @@ The overall hierarchy of actors looks li
           |    one of these for each thing you can point a toolbox at.
           |
           \--> Tab-scoped actors:
                Actors exposing one particular feature set, this time,
                specific to a given context (document, tab, app, add-on, or
                worker).  Examples include the console and inspector actors.
                These actors may extend this hierarchy by having their
                own children, like LongStringActor, WalkerActor, etc.
+```
 
 ## RootActor
 
 The root actor is special. It is automatically created when a client connects.
 It has a special `actorID` which is unique and is "root".
 All other actors have an `actorID` which is computed dynamically,
 so that you need to ask an existing actor to create an Actor
 and returns its `actorID`. That's the main role of RootActor.
 
-  RootActor (root.js)
+```
+RootActor (root.js)
    |
    |-- BrowserTabActor (webbrowser.js)
    |   Targets tabs living in the parent or child process. Note that this is
    |   just a proxy for ContentActor, which is loaded via the tab's message
    |   manager as a frame script in the process containing the tab. This proxy
    |   via message manager is always used, even when e10s is disabled.
    |   Returned by "listTabs" or "getTab" requests.
    |   |
@@ -55,29 +58,35 @@ and returns its `actorID`. That's the ma
    |   Targets a worker (applies to various kinds like web worker, service
    |   worker, etc.).
    |   Returned by "listWorkers" request to the root actor to get all workers.
    |   Returned by "listWorkers" request to a BrowserTabActor to get workers for
    |   a specific tab.
    |   Returned by "listWorkers" request to a ChildProcessActor to get workers
    |   for the chrome of the child process.
    |
+   |-- WindowActor (window.js)
+   |   Targets a single window, such as a browser window in Firefox, but it can
+   |   be used to reach any window in the parent process.
+   |   Returned by "getWindow" request to the root actor.
+   |
    |-- ChromeActor (chrome.js)
    |   Targets all resources in the parent process of firefox
    |   (chrome documents, JSM, JS XPCOM, etc.).
    |   Returned by "getProcess" request without any argument.
    |
    |-- ChildProcessActor (child-process.js)
    |   Targets the chrome of the child process (e10s).
    |   Returned by "getProcess" request with a id argument,
    |   matching the targeted process.
    |
    \-- BrowserAddonActor (addon.js)
        Targets the javascript of add-ons.
        Returned by "listAddons" request.
+```
 
 ## "TabActor"
 
 Those are the actors exposed by the root actors which are meant to track the
 lifetime of a given context: tab, app, process, add-on, or worker. It also
 allows to fetch the tab-scoped actors connected to this context. Actors like
 console, inspector, thread (for debugger), styleinspector, etc. Most of them
 inherit from TabActor (defined in tab.js) which is document centric. It
--- a/devtools/server/tests/browser/animation.html
+++ b/devtools/server/tests/browser/animation.html
@@ -7,18 +7,18 @@
     height: 50px;
     border-radius: 50%;
     background: #eee;
   }
 
   .simple-animation {
     display: inline-block;
 
-    width: 50px;
-    height: 50px;
+    width: 64px;
+    height: 64px;
     border-radius: 50%;
     background: red;
 
     animation: move 200s infinite;
   }
 
   .multiple-animations {
     display: inline-block;
--- a/devtools/shared/client/main.js
+++ b/devtools/shared/client/main.js
@@ -1737,16 +1737,37 @@ RootClient.prototype = {
         throw new Error("Unsupported argument given to getTab request");
       }
     }
 
     return this.request(packet);
   },
 
   /**
+   * Fetch the WindowActor for a specific window, like a browser window in
+   * Firefox, but it can be used to reach any window in the process.
+   *
+   * @param number outerWindowID
+   *        The outerWindowID of the top level window you are looking for.
+   */
+  getWindow: function ({ outerWindowID }) {
+    if (!outerWindowID) {
+      throw new Error("Must specify outerWindowID");
+    }
+
+    let packet = {
+      to: this.actor,
+      type: "getWindow",
+      outerWindowID,
+    };
+
+    return this.request(packet);
+  },
+
+  /**
    * Description of protocol's actors and methods.
    *
    * @param function onResponse
    *        Called with the response packet.
    */
   protocolDescription: DebuggerClient.requester({ type: "protocolDescription" }),
 
   /*
--- a/docshell/base/nsAboutRedirector.cpp
+++ b/docshell/base/nsAboutRedirector.cpp
@@ -133,16 +133,22 @@ static const RedirEntry kRedirMap[] = {
   },
   {
     "telemetry", "chrome://global/content/aboutTelemetry.xhtml",
     nsIAboutModule::ALLOW_SCRIPT
   },
   {
     "webrtc", "chrome://global/content/aboutwebrtc/aboutWebrtc.html",
     nsIAboutModule::ALLOW_SCRIPT
+  },
+  {
+    "printpreview", "about:blank",
+    nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT |
+    nsIAboutModule::HIDE_FROM_ABOUTABOUT |
+    nsIAboutModule::URI_CAN_LOAD_IN_CHILD
   }
 };
 static const int kRedirTotal = mozilla::ArrayLength(kRedirMap);
 
 NS_IMETHODIMP
 nsAboutRedirector::NewChannel(nsIURI* aURI,
                               nsILoadInfo* aLoadInfo,
                               nsIChannel** aResult)
@@ -168,19 +174,21 @@ nsAboutRedirector::NewChannel(nsIURI* aU
       // chrome:// or resource://) then set the LOAD_REPLACE flag on the
       // channel which forces the channel owner to reflect the displayed
       // URL rather then being the systemPrincipal.
       bool isUIResource = false;
       rv = NS_URIChainHasFlags(tempURI, nsIProtocolHandler::URI_IS_UI_RESOURCE,
                                &isUIResource);
       NS_ENSURE_SUCCESS(rv, rv);
 
-      nsLoadFlags loadFlags =
-        isUIResource ? static_cast<nsLoadFlags>(nsIChannel::LOAD_NORMAL)
-                     : static_cast<nsLoadFlags>(nsIChannel::LOAD_REPLACE);
+      bool isAboutBlank = NS_IsAboutBlank(tempURI);
+
+      nsLoadFlags loadFlags = isUIResource || isAboutBlank
+                    ? static_cast<nsLoadFlags>(nsIChannel::LOAD_NORMAL)
+                    : static_cast<nsLoadFlags>(nsIChannel::LOAD_REPLACE);
 
       rv = NS_NewChannelInternal(getter_AddRefs(tempChannel),
                                  tempURI,
                                  aLoadInfo,
                                  nullptr, // aLoadGroup
                                  nullptr, // aCallbacks
                                  loadFlags);
       NS_ENSURE_SUCCESS(rv, rv);
--- a/docshell/base/nsDocShell.cpp
+++ b/docshell/base/nsDocShell.cpp
@@ -14342,20 +14342,29 @@ nsDocShell::StopDocumentLoad(void)
 
 NS_IMETHODIMP
 nsDocShell::GetPrintPreview(nsIWebBrowserPrint** aPrintPreview)
 {
   *aPrintPreview = nullptr;
 #if NS_PRINT_PREVIEW
   nsCOMPtr<nsIDocumentViewerPrint> print = do_QueryInterface(mContentViewer);
   if (!print || !print->IsInitializedForPrintPreview()) {
+    // XXX: Creating a brand new content viewer to host preview every
+    // time we enter here seems overwork. We could skip ahead to where
+    // we QI the mContentViewer if the current URI is either about:blank
+    // or about:printpreview.
     Stop(nsIWebNavigation::STOP_ALL);
     nsCOMPtr<nsIPrincipal> principal = nsNullPrincipal::CreateWithInheritedAttributes(this);
-    nsresult rv = CreateAboutBlankContentViewer(principal, nullptr);
+    nsCOMPtr<nsIURI> uri;
+    NS_NewURI(getter_AddRefs(uri), NS_LITERAL_CSTRING("about:printpreview"));
+    nsresult rv = CreateAboutBlankContentViewer(principal, uri);
     NS_ENSURE_SUCCESS(rv, rv);
+    // Here we manually set current URI since we have just created a
+    // brand new content viewer (about:blank) to host preview.
+    SetCurrentURI(uri, nullptr, true, 0);
     print = do_QueryInterface(mContentViewer);
     NS_ENSURE_STATE(print);
     print->InitializeForPrintPreview();
   }
   nsCOMPtr<nsIWebBrowserPrint> result = do_QueryInterface(print);
   result.forget(aPrintPreview);
   return NS_OK;
 #else
--- a/docshell/build/nsDocShellModule.cpp
+++ b/docshell/build/nsDocShellModule.cpp
@@ -184,16 +184,17 @@ const mozilla::Module::ContractIDEntry k
   { NS_ABOUT_MODULE_CONTRACTID_PREFIX "serviceworkers", &kNS_ABOUT_REDIRECTOR_MODULE_CID },
 #ifndef ANDROID
   { NS_ABOUT_MODULE_CONTRACTID_PREFIX "profiles", &kNS_ABOUT_REDIRECTOR_MODULE_CID },
 #endif
   { NS_ABOUT_MODULE_CONTRACTID_PREFIX "srcdoc", &kNS_ABOUT_REDIRECTOR_MODULE_CID },
   { NS_ABOUT_MODULE_CONTRACTID_PREFIX "support", &kNS_ABOUT_REDIRECTOR_MODULE_CID },
   { NS_ABOUT_MODULE_CONTRACTID_PREFIX "telemetry", &kNS_ABOUT_REDIRECTOR_MODULE_CID },
   { NS_ABOUT_MODULE_CONTRACTID_PREFIX "webrtc", &kNS_ABOUT_REDIRECTOR_MODULE_CID },
+  { NS_ABOUT_MODULE_CONTRACTID_PREFIX "printpreview", &kNS_ABOUT_REDIRECTOR_MODULE_CID },
   { NS_URI_LOADER_CONTRACTID, &kNS_URI_LOADER_CID },
   { NS_DOCUMENTLOADER_SERVICE_CONTRACTID, &kNS_DOCUMENTLOADER_SERVICE_CID },
   { NS_HANDLERSERVICE_CONTRACTID, &kNS_CONTENTHANDLERSERVICE_CID, mozilla::Module::CONTENT_PROCESS_ONLY },
   { NS_EXTERNALHELPERAPPSERVICE_CONTRACTID, &kNS_EXTERNALHELPERAPPSERVICE_CID },
   { NS_EXTERNALPROTOCOLSERVICE_CONTRACTID, &kNS_EXTERNALHELPERAPPSERVICE_CID },
   { NS_MIMESERVICE_CONTRACTID, &kNS_EXTERNALHELPERAPPSERVICE_CID },
   { NS_NETWORK_PROTOCOL_CONTRACTID_PREFIX"default", &kNS_EXTERNALPROTOCOLHANDLER_CID },
   { NS_PREFETCHSERVICE_CONTRACTID, &kNS_PREFETCHSERVICE_CID },
--- a/dom/animation/AnimationPerformanceWarning.cpp
+++ b/dom/animation/AnimationPerformanceWarning.cpp
@@ -28,23 +28,16 @@ AnimationPerformanceWarning::ToLocalized
 
 bool
 AnimationPerformanceWarning::ToLocalizedString(
   nsXPIDLString& aLocalizedString) const
 {
   const char* key = nullptr;
 
   switch (mType) {
-    case Type::ContentTooSmall:
-      MOZ_ASSERT(mParams && mParams->Length() == 2,
-                 "Parameter's length should be 2 for ContentTooSmall");
-
-      return NS_SUCCEEDED(
-        ToLocalizedStringWithIntParams<2>(
-          "CompositorAnimationWarningContentTooSmall", aLocalizedString));
     case Type::ContentTooLarge:
       MOZ_ASSERT(mParams && mParams->Length() == 6,
                  "Parameter's length should be 6 for ContentTooLarge");
 
       return NS_SUCCEEDED(
         ToLocalizedStringWithIntParams<7>(
           "CompositorAnimationWarningContentTooLarge2", aLocalizedString));
     case Type::TransformBackfaceVisibilityHidden:
--- a/dom/animation/AnimationPerformanceWarning.h
+++ b/dom/animation/AnimationPerformanceWarning.h
@@ -15,17 +15,16 @@
 class nsXPIDLString;
 
 namespace mozilla {
 
 // Represents the reason why we can't run the CSS property on the compositor.
 struct AnimationPerformanceWarning
 {
   enum class Type : uint8_t {
-    ContentTooSmall,
     ContentTooLarge,
     TransformBackfaceVisibilityHidden,
     TransformPreserve3D,
     TransformSVG,
     TransformWithGeometricProperties,
     TransformWithSyncGeometricAnimations,
     TransformFrameInactive,
     OpacityFrameInactive,
--- a/dom/animation/test/chrome/file_animation_performance_warning.html
+++ b/dom/animation/test/chrome/file_animation_performance_warning.html
@@ -835,47 +835,45 @@ function testMultipleAnimationsWithGeome
       });
     }, 'Multiple async animations and geometric animation: ' + subtest.desc);
   });
 }
 
 function testSmallElements() {
   [
     {
-      desc: 'opacity on too small element',
+      desc: 'opacity on small element',
       frames: {
         opacity: [0, 1]
       },
       style: { style: 'width: 8px; height: 8px; background-color: red;' +
                       // We need to set transform here to try creating an
                       // individual frame for this opacity element.
                       // Without this, this small element is created on the same
                       // nsIFrame of mochitest iframe, i.e. the document which are
                       // running this test, as a result the layer corresponding
                       // to the frame is sent to compositor.
                       'transform: translateX(100px);' },
       expected: [
         {
           property: 'opacity',
-          runningOnCompositor: false,
-          warning: /Animation cannot be run on the compositor because frame size \(8, 8\) is smaller than \(16, 16\)/
+          runningOnCompositor: true
         }
       ]
     },
     {
-      desc: 'transform on too small element',
+      desc: 'transform on small element',
       frames: {
         transform: ['translate(0px)', 'translate(100px)']
       },
       style: { style: 'width: 8px; height: 8px; background-color: red;' },
       expected: [
         {
           property: 'transform',
-          runningOnCompositor: false,
-          warning: /Animation cannot be run on the compositor because frame size \(8, 8\) is smaller than \(16, 16\)/
+          runningOnCompositor: true
         }
       ]
     },
   ].forEach(subtest => {
     promise_test(function(t) {
     var div = addDiv(t, subtest.style);
     var animation = div.animate(subtest.frames, 100 * MS_PER_SEC);
       return animation.ready.then(function() {
--- a/dom/locales/en-US/chrome/layout/layout_errors.properties
+++ b/dom/locales/en-US/chrome/layout/layout_errors.properties
@@ -6,19 +6,16 @@ ImageMapRectBoundsError=The “coords” attribute of the <area shape="rect"> tag is not in the “left,top,right,bottom” format.
 ImageMapCircleWrongNumberOfCoords=The “coords” attribute of the <area shape="circle"> tag is not in the “center-x,center-y,radius” format.
 ImageMapCircleNegativeRadius=The “coords” attribute of the <area shape="circle"> tag has a negative radius.
 ImageMapPolyWrongNumberOfCoords=The “coords” attribute of the <area shape="poly"> tag is not in the “x1,y1,x2,y2 …” format.
 ImageMapPolyOddNumberOfCoords=The “coords” attribute of the <area shape="poly"> tag is missing the last “y” coordinate (the correct format is “x1,y1,x2,y2 …”).
 
 TablePartRelPosWarning=Relative positioning of table rows and row groups is now supported. This site may need to be updated because it may depend on this feature having no effect.
 ScrollLinkedEffectFound2=This site appears to use a scroll-linked positioning effect. This may not work well with asynchronous panning; see https://developer.mozilla.org/docs/Mozilla/Performance/ScrollLinkedEffects for further details and to join the discussion on related tools and features!
 
-## LOCALIZATION NOTE(CompositorAnimationWarningContentTooSmall):
-## (%1$S, %2$S) is a pair of integer values of the frame size
-CompositorAnimationWarningContentTooSmall=Animation cannot be run on the compositor because frame size (%1$S, %2$S) is smaller than (16, 16)
 ## LOCALIZATION NOTE(CompositorAnimationWarningContentTooLarge2):
 ## (%1$S, %2$S) is a pair of integer values of the frame size
 ## (%3$S, %4$S) is a pair of integer values of a limit based on the viewport size
 ## (%5$S, %6$S) is a pair of integer values of an absolute limit
 CompositorAnimationWarningContentTooLarge2=Animation cannot be run on the compositor because the frame size (%1$S, %2$S) is too large relative to the viewport (larger than (%3$S, %4$S)) or larger than the maximum allowed value (%5$S, %6$S)
 ## LOCALIZATION NOTE(CompositorAnimationWarningTransformBackfaceVisibilityHidden):
 ## 'backface-visibility: hidden' is a CSS property, don't translate it.
 CompositorAnimationWarningTransformBackfaceVisibilityHidden=Animations of ‘backface-visibility: hidden’ transforms cannot be run on the compositor
--- a/dom/media/MediaPrefs.h
+++ b/dom/media/MediaPrefs.h
@@ -85,20 +85,21 @@ private:
   };
 
   // This is where DECL_MEDIA_PREF for each of the preferences should go.
 
   // AudioSink
   DECL_MEDIA_PREF("accessibility.monoaudio.enable",           MonoAudio, bool, false);
   DECL_MEDIA_PREF("media.resampling.enabled",                 AudioSinkResampling, bool, false);
   DECL_MEDIA_PREF("media.resampling.rate",                    AudioSinkResampleRate, uint32_t, 48000);
-#if defined(ANDROID)
+#if defined(XP_WIN) || defined(XP_DARWIN) || defined(MOZ_PULSEAUDIO)
+  // libcubeb backend implement .get_preferred_channel_layout
+  DECL_MEDIA_PREF("media.forcestereo.enabled",                AudioSinkForceStereo, bool, false);
+#else
   DECL_MEDIA_PREF("media.forcestereo.enabled",                AudioSinkForceStereo, bool, true);
-#else
-  DECL_MEDIA_PREF("media.forcestereo.enabled",                AudioSinkForceStereo, bool, false);
 #endif
   // VideoSink
   DECL_MEDIA_PREF("media.ruin-av-sync.enabled",               RuinAvSync, bool, false);
 
   // Encrypted Media Extensions
   DECL_MEDIA_PREF("media.clearkey.persistent-license.enabled", ClearKeyPersistentLicenseEnabled, bool, false);
 
   // PlatformDecoderModule
--- a/gfx/thebes/gfxPrefs.h
+++ b/gfx/thebes/gfxPrefs.h
@@ -551,16 +551,17 @@ private:
   DECL_GFX_PREF(Live, "layout.css.scroll-snap.prediction-max-velocity", ScrollSnapPredictionMaxVelocity, int32_t, 2000);
   DECL_GFX_PREF(Live, "layout.css.scroll-snap.prediction-sensitivity", ScrollSnapPredictionSensitivity, float, 0.750f);
   DECL_GFX_PREF(Live, "layout.css.scroll-snap.proximity-threshold", ScrollSnapProximityThreshold, int32_t, 200);
   DECL_GFX_PREF(Live, "layout.css.touch_action.enabled",       TouchActionEnabled, bool, false);
   DECL_GFX_PREF(Live, "layout.display-list.dump",              LayoutDumpDisplayList, bool, false);
   DECL_GFX_PREF(Live, "layout.display-list.dump-content",      LayoutDumpDisplayListContent, bool, false);
   DECL_GFX_PREF(Live, "layout.event-regions.enabled",          LayoutEventRegionsEnabledDoNotUseDirectly, bool, false);
   DECL_GFX_PREF(Once, "layout.frame_rate",                     LayoutFrameRate, int32_t, -1);
+  DECL_GFX_PREF(Live, "layout.min-active-layer-size",          LayoutMinActiveLayerSize, int, 64);
   DECL_GFX_PREF(Once, "layout.paint_rects_separately",         LayoutPaintRectsSeparately, bool, true);
 
   // This and code dependent on it should be removed once containerless scrolling looks stable.
   DECL_GFX_PREF(Once, "layout.scroll.root-frame-containers",   LayoutUseContainersForRootFrames, bool, true);
   DECL_GFX_PREF(Live, "layout.smaller-painted-layers",         LayoutSmallerPaintedLayers, bool, false);
 
   DECL_GFX_PREF(Once, "media.hardware-video-decoding.force-enabled",
                                                                HardwareVideoDecodingForceEnabled, bool, false);
new file mode 100644
--- /dev/null
+++ b/js/src/jit-test/tests/ion/bug1273858-1.js
@@ -0,0 +1,53 @@
+// |jit-test| --no-threads
+
+function t1() {
+    let x = [];
+
+    for (let k = 0; k < 100; ++k)
+        x[k] = () => k; // Lexical capture
+
+    try {
+        eval("k");
+        throw false;
+    }
+    catch (e) {
+        if (!(e instanceof ReferenceError))
+            throw "Loop index escaped block";
+    }
+
+    for (var i = 0; i < 100; ++i)
+        if (x[i]() != i)
+            throw "Bad let capture";
+}
+t1();
+t1();
+t1();
+t1();
+
+function t2() {
+    let x = [];
+    let y = {};
+
+    for (var i = 0; i < 100; ++i)
+        x[i] = i;
+
+    for (const k of x)
+        y[k] = () => k; // Lexical capture
+
+    try {
+        eval("k");
+        throw false;
+    }
+    catch (e) {
+        if (!(e instanceof ReferenceError))
+            throw "Loop index escaped block";
+    }
+
+    for (var i = 0; i < 100; ++i)
+        if (y[i]() != i)
+            throw "Bad const capture";
+}
+t2();
+t2();
+t2();
+t2();
new file mode 100644
--- /dev/null
+++ b/js/src/jit-test/tests/ion/bug1273858-2.js
@@ -0,0 +1,46 @@
+// |jit-test| --no-threads
+
+function t1() {
+    let x = [];
+
+    try
+    {
+        for (let k = 0; k < 100; ++k)
+        {
+            let w = () => k; // Lexical capture
+
+            if (w() > 10)
+            {
+                throw () => w; // Lexical capture
+            }
+
+            x[k] = w;
+        }
+    }
+    catch (e)
+    {
+        // 'w' and 'k' should leave scope as exception unwinds
+
+        try {
+            eval("k");
+            throw false;
+        }
+        catch (e) {
+            if (!(e instanceof ReferenceError))
+                throw "Loop index escaped block";
+        }
+
+        try {
+            eval("w");
+            throw false;
+        }
+        catch (e) {
+            if (!(e instanceof ReferenceError))
+                throw "Local name escaped block";
+        }
+    }
+}
+t1();
+t1();
+t1();
+t1();
--- a/js/src/jit/BaselineBailouts.cpp
+++ b/js/src/jit/BaselineBailouts.cpp
@@ -132,16 +132,18 @@ struct BaselineStackBuilder
         header_->copyStackBottom = header_->copyStackTop;
         header_->setR0 = 0;
         header_->valueR0 = UndefinedValue();
         header_->setR1 = 0;
         header_->valueR1 = UndefinedValue();
         header_->resumeFramePtr = nullptr;
         header_->resumeAddr = nullptr;
         header_->resumePC = nullptr;
+        header_->tryPC = nullptr;
+        header_->faultPC = nullptr;
         header_->monitorStub = nullptr;
         header_->numFrames = 0;
         header_->checkGlobalDeclarationConflicts = false;
         return true;
     }
 
     MOZ_MUST_USE bool enlarge() {
         MOZ_ASSERT(buffer_ != nullptr);
@@ -724,24 +726,22 @@ InitFromBailout(JSContext* cx, HandleScr
                     "      Bailout_ArgumentCheck for script with argumentsHasVarBinding!"
                     "Using empty arguments object");
             iter.skip();
         }
     } else {
         Value v = iter.read();
         if (v.isObject()) {
             envChain = &v.toObject();
-            if (fun &&
-                ((fun->needsCallObject() && envChain->is<CallObject>()) ||
-                 (fun->needsNamedLambdaEnvironment() &&
-                  !fun->needsCallObject() &&
-                  envChain->is<LexicalEnvironmentObject>() &&
-                  &envChain->as<LexicalEnvironmentObject>().scope() ==
-                  script->maybeNamedLambdaScope())))
-            {
+
+            // If Ion has updated env slot from UndefinedValue, it will be the
+            // complete initial environment, so we can set the HAS_INITIAL_ENV
+            // flag if needed.
+            if (fun && fun->needsFunctionEnvironmentObjects()) {
+                MOZ_ASSERT(fun->nonLazyScript()->initialEnvironmentShape());
                 MOZ_ASSERT(!fun->needsExtraBodyVarEnvironment());
                 flags |= BaselineFrame::HAS_INITIAL_ENV;
             }
         } else {
             MOZ_ASSERT(v.isUndefined() || v.isMagic(JS_OPTIMIZED_OUT));
 
             // Get env chain from function or script.
             if (fun) {
@@ -1817,16 +1817,18 @@ jit::FinishBailoutToBaseline(BaselineBai
 
     // The current native code pc may not have a corresponding ICEntry, so we
     // store the bytecode pc in the frame for frame iterators. This pc is
     // cleared at the end of this function. If we return false, we don't clear
     // it: the exception handler also needs it and will clear it for us.
     BaselineFrame* topFrame = GetTopBaselineFrame(cx);
     topFrame->setOverridePc(bailoutInfo->resumePC);
 
+    jsbytecode* faultPC = bailoutInfo->faultPC;
+    jsbytecode* tryPC = bailoutInfo->tryPC;
     uint32_t numFrames = bailoutInfo->numFrames;
     MOZ_ASSERT(numFrames > 0);
     BailoutKind bailoutKind = bailoutInfo->bailoutKind;
     bool checkGlobalDeclarationConflicts = bailoutInfo->checkGlobalDeclarationConflicts;
 
     // Free the bailout buffer.
     js_free(bailoutInfo);
     bailoutInfo = nullptr;
@@ -1934,16 +1936,23 @@ jit::FinishBailoutToBaseline(BaselineBai
         // After copying from all the rematerialized frames, remove them from
         // the table to keep the table up to date.
         act->removeRematerializedFrame(outerFp);
 
         if (!ok)
             return false;
     }
 
+    // If we are catching an exception, we need to unwind scopes.
+    // See |SettleOnTryNote|
+    if (cx->isExceptionPending() && faultPC) {
+        EnvironmentIter ei(cx, topFrame, faultPC);
+        UnwindEnvironment(cx, ei, tryPC);
+    }
+
     JitSpew(JitSpew_BaselineBailouts,
             "  Restored outerScript=(%s:%" PRIuSIZE ",%u) innerScript=(%s:%" PRIuSIZE ",%u) (bailoutKind=%u)",
             outerScript->filename(), outerScript->lineno(), outerScript->getWarmUpCount(),
             innerScript->filename(), innerScript->lineno(), innerScript->getWarmUpCount(),
             (unsigned) bailoutKind);
 
     switch (bailoutKind) {
       // Normal bailouts.
--- a/js/src/jit/BaselineJIT.h
+++ b/js/src/jit/BaselineJIT.h
@@ -587,16 +587,20 @@ struct BaselineBailoutInfo
     void* resumeFramePtr;
 
     // The native code address to resume into.
     void* resumeAddr;
 
     // The bytecode pc where we will resume.
     jsbytecode* resumePC;
 
+    // The bytecode pc of try block and fault block.
+    jsbytecode* tryPC;
+    jsbytecode* faultPC;
+
     // If resuming into a TypeMonitor IC chain, this field holds the
     // address of the first stub in that chain.  If this field is
     // set, then the actual jitcode resumed into is the jitcode for
     // the first stub, not the resumeAddr above.  The resumeAddr
     // above, in this case, is pushed onto the stack so that the
     // TypeMonitor chain can tail-return into the main jitcode when done.
     ICStub* monitorStub;
 
--- a/js/src/jit/BytecodeAnalysis.cpp
+++ b/js/src/jit/BytecodeAnalysis.cpp
@@ -163,16 +163,18 @@ BytecodeAnalysis::init(TempAllocator& al
           case JSOP_STRICTSETNAME:
           case JSOP_DELNAME:
           case JSOP_GETALIASEDVAR:
           case JSOP_SETALIASEDVAR:
           case JSOP_LAMBDA:
           case JSOP_LAMBDA_ARROW:
           case JSOP_DEFFUN:
           case JSOP_DEFVAR:
+          case JSOP_PUSHLEXICALENV:
+          case JSOP_POPLEXICALENV:
             usesEnvironmentChain_ = true;
             break;
 
           case JSOP_GETGNAME:
           case JSOP_SETGNAME:
           case JSOP_STRICTSETGNAME:
             if (script_->hasNonSyntacticScope())
                 usesEnvironmentChain_ = true;
--- a/js/src/jit/CodeGenerator.cpp
+++ b/js/src/jit/CodeGenerator.cpp
@@ -3428,16 +3428,45 @@ CodeGenerator::visitMaybeCopyElementsFor
 
 void
 CodeGenerator::visitFunctionEnvironment(LFunctionEnvironment* lir)
 {
     Address environment(ToRegister(lir->function()), JSFunction::offsetOfEnvironment());
     masm.loadPtr(environment, ToRegister(lir->output()));
 }
 
+typedef LexicalEnvironmentObject* (*NewLexicalEnvironmentObjectFn)(JSContext*,
+                                                                   Handle<LexicalScope*>,
+                                                                   HandleObject, gc::InitialHeap);
+static const VMFunction NewLexicalEnvironmentObjectInfo =
+    FunctionInfo<NewLexicalEnvironmentObjectFn>(LexicalEnvironmentObject::create,
+                                                "LexicalEnvironmentObject::create");
+
+void
+CodeGenerator::visitNewLexicalEnvironmentObject(LNewLexicalEnvironmentObject* lir)
+{
+    pushArg(Imm32(gc::DefaultHeap));
+    pushArg(ToRegister(lir->enclosing()));
+    pushArg(ImmGCPtr(lir->mir()->scope()));
+    callVM(NewLexicalEnvironmentObjectInfo, lir);
+}
+
+typedef JSObject* (*CopyLexicalEnvironmentObjectFn)(JSContext*, HandleObject, bool);
+static const VMFunction CopyLexicalEnvironmentObjectInfo =
+    FunctionInfo<CopyLexicalEnvironmentObjectFn>(js::jit::CopyLexicalEnvironmentObject,
+                                                "js::jit::CopyLexicalEnvironmentObject");
+
+void
+CodeGenerator::visitCopyLexicalEnvironmentObject(LCopyLexicalEnvironmentObject* lir)
+{
+    pushArg(Imm32(lir->mir()->copySlots()));
+    pushArg(ToRegister(lir->env()));
+    callVM(CopyLexicalEnvironmentObjectInfo, lir);
+}
+
 void
 CodeGenerator::visitGuardObjectIdentity(LGuardObjectIdentity* guard)
 {
     Register input = ToRegister(guard->input());
     Register expected = ToRegister(guard->expected());
 
     Assembler::Condition cond =
         guard->mir()->bailOnEquality() ? Assembler::Equal : Assembler::NotEqual;
--- a/js/src/jit/CodeGenerator.h
+++ b/js/src/jit/CodeGenerator.h
@@ -282,16 +282,18 @@ class CodeGenerator final : public CodeG
     void emitConcat(LInstruction* lir, Register lhs, Register rhs, Register output);
     void visitConcat(LConcat* lir);
     void visitCharCodeAt(LCharCodeAt* lir);
     void visitFromCharCode(LFromCharCode* lir);
     void visitFromCodePoint(LFromCodePoint* lir);
     void visitSinCos(LSinCos *lir);
     void visitStringSplit(LStringSplit* lir);
     void visitFunctionEnvironment(LFunctionEnvironment* lir);
+    void visitNewLexicalEnvironmentObject(LNewLexicalEnvironmentObject* lir);
+    void visitCopyLexicalEnvironmentObject(LCopyLexicalEnvironmentObject* lir);
     void visitCallGetProperty(LCallGetProperty* lir);
     void visitCallGetElement(LCallGetElement* lir);
     void visitCallSetElement(LCallSetElement* lir);
     void visitCallInitElementArray(LCallInitElementArray* lir);
     void visitThrow(LThrow* lir);
     void visitTypeOfV(LTypeOfV* lir);
     void visitOutOfLineTypeOfV(OutOfLineTypeOfV* ool);
     void visitToAsync(LToAsync* lir);
--- a/js/src/jit/IonBuilder.cpp
+++ b/js/src/jit/IonBuilder.cpp
@@ -1167,16 +1167,19 @@ IonBuilder::initEnvironmentChain(MDefini
     } else {
         // For global scripts without a non-syntactic global scope, the env
         // chain is the global lexical env.
         MOZ_ASSERT(!script()->isForEval());
         MOZ_ASSERT(!script()->hasNonSyntacticScope());
         env = constant(ObjectValue(script()->global().lexicalEnvironment()));
     }
 
+    // Update the environment slot from UndefinedValue only after initial
+    // environment is created so that bailout doesn't see a partial env.
+    // See: |InitFromBailout|
     current->setEnvironmentChain(env);
     return Ok();
 }
 
 void
 IonBuilder::initArgumentsObject()
 {
     JitSpew(JitSpew_IonMIR, "%s:%" PRIuSIZE " - Emitting code to initialize arguments object! block=%p",
@@ -2199,16 +2202,29 @@ IonBuilder::inspectOpcode(JSOp op)
         return jsop_lambda(info().getFunction(pc));
 
       case JSOP_LAMBDA_ARROW:
         return jsop_lambda_arrow(info().getFunction(pc));
 
       case JSOP_SETFUNNAME:
         return jsop_setfunname(GET_UINT8(pc));
 
+      case JSOP_PUSHLEXICALENV:
+        return jsop_pushlexicalenv(GET_UINT32_INDEX(pc));
+
+      case JSOP_POPLEXICALENV:
+        current->setEnvironmentChain(walkEnvironmentChain(1));
+        return Ok();
+
+      case JSOP_FRESHENLEXICALENV:
+        return jsop_copylexicalenv(true);
+
+      case JSOP_RECREATELEXICALENV:
+        return jsop_copylexicalenv(false);
+
       case JSOP_ITER:
         return jsop_iter(GET_INT8(pc));
 
       case JSOP_MOREITER:
         return jsop_itermore();
 
       case JSOP_ISNOITER:
         return jsop_isnoiter();
@@ -2261,28 +2277,16 @@ IonBuilder::inspectOpcode(JSOp op)
 #endif
         return Ok();
       }
 
       case JSOP_IS_CONSTRUCTING:
         pushConstant(MagicValue(JS_IS_CONSTRUCTING));
         return Ok();
 
-#ifdef DEBUG
-      case JSOP_PUSHLEXICALENV:
-      case JSOP_FRESHENLEXICALENV:
-      case JSOP_RECREATELEXICALENV:
-      case JSOP_POPLEXICALENV:
-        // These opcodes are currently unhandled by Ion, but in principle
-        // there's no reason they couldn't be.  Whenever this happens, OSR
-        // will have to consider that JSOP_{FRESHEN,RECREATE}LEXICALENV
-        // mutates the env chain -- right now MBasicBlock::environmentChain()
-        // caches the env chain.  JSOP_{FRESHEN,RECREATE}LEXICALENV must
-        // update that stale value.
-#endif
       default:
         break;
     }
 
     // Track a simpler message, since the actionable abort message is a
     // static string, and the internal opcode name isn't an actionable
     // thing anyways.
     trackActionableAbort("Unsupported bytecode");
@@ -11842,16 +11846,45 @@ IonBuilder::jsop_setfunname(uint8_t pref
 
     current->add(ins);
     current->push(fun);
 
     return resumeAfter(ins);
 }
 
 AbortReasonOr<Ok>
+IonBuilder::jsop_pushlexicalenv(uint32_t index)
+{
+    MOZ_ASSERT(analysis().usesEnvironmentChain());
+
+    LexicalScope* scope = &script()->getScope(index)->as<LexicalScope>();
+    MNewLexicalEnvironmentObject* ins =
+        MNewLexicalEnvironmentObject::New(alloc(), current->environmentChain(), scope);
+
+    current->add(ins);
+    current->setEnvironmentChain(ins);
+
+    return resumeAfter(ins);
+}
+
+AbortReasonOr<Ok>
+IonBuilder::jsop_copylexicalenv(bool copySlots)
+{
+    MOZ_ASSERT(analysis().usesEnvironmentChain());
+
+    MCopyLexicalEnvironmentObject* ins =
+        MCopyLexicalEnvironmentObject::New(alloc(), current->environmentChain(), copySlots);
+
+    current->add(ins);
+    current->setEnvironmentChain(ins);
+
+    return resumeAfter(ins);
+}
+
+AbortReasonOr<Ok>
 IonBuilder::jsop_setarg(uint32_t arg)
 {
     // To handle this case, we should spill the arguments to the space where
     // actual arguments are stored. The tricky part is that if we add a MIR
     // to wrap the spilling action, we don't want the spilling to be
     // captured by the GETARG and by the resume point, only by
     // MGetFrameArgument.
     MOZ_ASSERT(analysis_.hasSetArg());
--- a/js/src/jit/IonBuilder.h
+++ b/js/src/jit/IonBuilder.h
@@ -556,16 +556,18 @@ class IonBuilder
     AbortReasonOr<Ok> jsop_mutateproto();
     AbortReasonOr<Ok> jsop_initprop(PropertyName* name);
     AbortReasonOr<Ok> jsop_initprop_getter_setter(PropertyName* name);
     AbortReasonOr<Ok> jsop_regexp(RegExpObject* reobj);
     AbortReasonOr<Ok> jsop_object(JSObject* obj);
     AbortReasonOr<Ok> jsop_lambda(JSFunction* fun);
     AbortReasonOr<Ok> jsop_lambda_arrow(JSFunction* fun);
     AbortReasonOr<Ok> jsop_setfunname(uint8_t prefixKind);
+    AbortReasonOr<Ok> jsop_pushlexicalenv(uint32_t index);
+    AbortReasonOr<Ok> jsop_copylexicalenv(bool copySlots);
     AbortReasonOr<Ok> jsop_functionthis();
     AbortReasonOr<Ok> jsop_globalthis();
     AbortReasonOr<Ok> jsop_typeof();
     AbortReasonOr<Ok> jsop_toasync();
     AbortReasonOr<Ok> jsop_toid();
     AbortReasonOr<Ok> jsop_iter(uint8_t flags);
     AbortReasonOr<Ok> jsop_itermore();
     AbortReasonOr<Ok> jsop_isnoiter();
--- a/js/src/jit/JitFrames.cpp
+++ b/js/src/jit/JitFrames.cpp
@@ -459,18 +459,24 @@ HandleExceptionIon(JSContext* cx, const 
                 // exceptions is slow. Reset the warm-up counter so that if we
                 // catch many exceptions we won't Ion-compile the script.
                 script->resetWarmUpCounter();
 
                 // Bailout at the start of the catch block.
                 jsbytecode* catchPC = script->main() + tn->start + tn->length;
                 ExceptionBailoutInfo excInfo(frame.frameNo(), catchPC, tn->stackDepth);
                 uint32_t retval = ExceptionHandlerBailout(cx, frame, rfe, excInfo, overrecursed);
-                if (retval == BAILOUT_RETURN_OK)
+                if (retval == BAILOUT_RETURN_OK) {
+                    // Record exception locations to allow scope unwinding in
+                    // |FinishBailoutToBaseline|
+                    MOZ_ASSERT(cx->isExceptionPending());
+                    rfe->bailoutInfo->tryPC = UnwindEnvironmentToTryPc(frame.script(), tn);
+                    rfe->bailoutInfo->faultPC = frame.pc();
                     return;
+                }
 
                 // Error on bailout clears pending exception.
                 MOZ_ASSERT(!cx->isExceptionPending());
             }
             break;
 
           default:
             MOZ_CRASH("Unexpected try note");
--- a/js/src/jit/Lowering.cpp
+++ b/js/src/jit/Lowering.cpp
@@ -2513,16 +2513,42 @@ LIRGenerator::visitSetFunName(MSetFunNam
 
     LSetFunName* lir = new(alloc()) LSetFunName(useRegisterAtStart(ins->fun()),
                                                 useBoxAtStart(ins->name()));
     add(lir, ins);
     assignSafepoint(lir, ins);
 }
 
 void
+LIRGenerator::visitNewLexicalEnvironmentObject(MNewLexicalEnvironmentObject* ins)
+{
+    MDefinition* enclosing = ins->enclosing();
+    MOZ_ASSERT(enclosing->type() == MIRType::Object);
+
+    LNewLexicalEnvironmentObject* lir =
+        new(alloc()) LNewLexicalEnvironmentObject(useRegisterAtStart(enclosing));
+
+    defineReturn(lir, ins);
+    assignSafepoint(lir, ins);
+}
+
+void
+LIRGenerator::visitCopyLexicalEnvironmentObject(MCopyLexicalEnvironmentObject* ins)
+{
+    MDefinition* env = ins->env();
+    MOZ_ASSERT(env->type() == MIRType::Object);
+
+    LCopyLexicalEnvironmentObject* lir =
+        new(alloc()) LCopyLexicalEnvironmentObject(useRegisterAtStart(env));
+
+    defineReturn(lir, ins);
+    assignSafepoint(lir, ins);
+}
+
+void
 LIRGenerator::visitKeepAliveObject(MKeepAliveObject* ins)
 {
     MDefinition* obj = ins->object();
     MOZ_ASSERT(obj->type() == MIRType::Object);
 
     add(new(alloc()) LKeepAliveObject(useKeepalive(obj)), ins);
 }
 
--- a/js/src/jit/Lowering.h
+++ b/js/src/jit/Lowering.h
@@ -181,16 +181,18 @@ class LIRGenerator : public LIRGenerator
     void visitGetFirstDollarIndex(MGetFirstDollarIndex* ins);
     void visitStringReplace(MStringReplace* ins);
     void visitBinarySharedStub(MBinarySharedStub* ins);
     void visitUnarySharedStub(MUnarySharedStub* ins);
     void visitNullarySharedStub(MNullarySharedStub* ins);
     void visitLambda(MLambda* ins);
     void visitLambdaArrow(MLambdaArrow* ins);
     void visitSetFunName(MSetFunName* ins);
+    void visitNewLexicalEnvironmentObject(MNewLexicalEnvironmentObject* ins);
+    void visitCopyLexicalEnvironmentObject(MCopyLexicalEnvironmentObject* ins);
     void visitKeepAliveObject(MKeepAliveObject* ins);
     void visitSlots(MSlots* ins);
     void visitElements(MElements* ins);
     void visitConstantElements(MConstantElements* ins);
     void visitConvertElementsToDoubles(MConvertElementsToDoubles* ins);
     void visitMaybeToDoubleElement(MMaybeToDoubleElement* ins);
     void visitMaybeCopyElementsForWrite(MMaybeCopyElementsForWrite* ins);
     void visitLoadSlot(MLoadSlot* ins);
--- a/js/src/jit/MIR.h
+++ b/js/src/jit/MIR.h
@@ -11525,16 +11525,73 @@ class MFunctionEnvironment
     MDefinition* foldsTo(TempAllocator& alloc) override;
 
     // A function's environment is fixed.
     AliasSet getAliasSet() const override {
         return AliasSet::None();
     }
 };
 
+// Allocate a new LexicalEnvironmentObject.
+class MNewLexicalEnvironmentObject
+  : public MUnaryInstruction,
+    public SingleObjectPolicy::Data
+{
+    CompilerGCPointer<LexicalScope*> scope_;
+
+    MNewLexicalEnvironmentObject(MDefinition* enclosing, LexicalScope* scope)
+      : MUnaryInstruction(enclosing),
+        scope_(scope)
+    {
+        setResultType(MIRType::Object);
+    }
+
+  public:
+    INSTRUCTION_HEADER(NewLexicalEnvironmentObject)
+    TRIVIAL_NEW_WRAPPERS
+    NAMED_OPERANDS((0, enclosing))
+
+    LexicalScope* scope() const {
+        return scope_;
+    }
+    bool possiblyCalls() const override {
+        return true;
+    }
+    bool appendRoots(MRootList& roots) const override {
+        return roots.append(scope_);
+    }
+};
+
+// Allocate a new LexicalEnvironmentObject from existing one
+class MCopyLexicalEnvironmentObject
+  : public MUnaryInstruction,
+    public SingleObjectPolicy::Data
+{
+    bool copySlots_;
+
+    MCopyLexicalEnvironmentObject(MDefinition* env, bool copySlots)
+      : MUnaryInstruction(env),
+        copySlots_(copySlots)
+    {
+        setResultType(MIRType::Object);
+    }
+
+  public:
+    INSTRUCTION_HEADER(CopyLexicalEnvironmentObject)
+    TRIVIAL_NEW_WRAPPERS
+    NAMED_OPERANDS((0, env))
+
+    bool copySlots() const {
+        return copySlots_;
+    }
+    bool possiblyCalls() const override {
+        return true;
+    }
+};
+
 // Store to vp[slot] (slots that are not inline in an object).
 class MStoreSlot
   : public MBinaryInstruction,
     public MixPolicy<ObjectPolicy<0>, NoFloatPolicy<1> >::Data
 {
     uint32_t slot_;
     MIRType slotType_;
     bool needsBarrier_;
--- a/js/src/jit/MOpcodes.h
+++ b/js/src/jit/MOpcodes.h
@@ -167,16 +167,18 @@ namespace jit {
     _(Elements)                                                             \
     _(ConstantElements)                                                     \
     _(ConvertElementsToDoubles)                                             \
     _(MaybeToDoubleElement)                                                 \
     _(MaybeCopyElementsForWrite)                                            \
     _(LoadSlot)                                                             \
     _(StoreSlot)                                                            \
     _(FunctionEnvironment)                                                  \
+    _(NewLexicalEnvironmentObject)                                          \
+    _(CopyLexicalEnvironmentObject)                                         \
     _(FilterTypeSet)                                                        \
     _(TypeBarrier)                                                          \
     _(MonitorTypes)                                                         \
     _(PostWriteBarrier)                                                     \
     _(PostWriteElementBarrier)                                              \
     _(GetPropertyCache)                                                     \
     _(GetPropertyPolymorphic)                                               \
     _(SetPropertyPolymorphic)                                               \
--- a/js/src/jit/VMFunctions.cpp
+++ b/js/src/jit/VMFunctions.cpp
@@ -920,16 +920,27 @@ NewArgumentsObject(JSContext* cx, Baseli
     ArgumentsObject* obj = ArgumentsObject::createExpected(cx, frame);
     if (!obj)
         return false;
     res.setObject(*obj);
     return true;
 }
 
 JSObject*
+CopyLexicalEnvironmentObject(JSContext* cx, HandleObject env, bool copySlots)
+{
+    Handle<LexicalEnvironmentObject*> lexicalEnv = env.as<LexicalEnvironmentObject>();
+
+    if (copySlots)
+        return LexicalEnvironmentObject::clone(cx, lexicalEnv);
+
+    return LexicalEnvironmentObject::recreate(cx, lexicalEnv);
+}
+
+JSObject*
 InitRestParameter(JSContext* cx, uint32_t length, Value* rest, HandleObject templateObj,
                   HandleObject objRes)
 {
     if (objRes) {
         Rooted<ArrayObject*> arrRes(cx, &objRes->as<ArrayObject>());
 
         MOZ_ASSERT(!arrRes->getDenseInitializedLength());
         MOZ_ASSERT(arrRes->group() == templateObj->group());
--- a/js/src/jit/VMFunctions.h
+++ b/js/src/jit/VMFunctions.h
@@ -273,16 +273,17 @@ struct VMFunction
 
 template <class> struct TypeToDataType { /* Unexpected return type for a VMFunction. */ };
 template <> struct TypeToDataType<bool> { static const DataType result = Type_Bool; };
 template <> struct TypeToDataType<JSObject*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<NativeObject*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<PlainObject*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<InlineTypedObject*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<NamedLambdaObject*> { static const DataType result = Type_Object; };
+template <> struct TypeToDataType<LexicalEnvironmentObject*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<ArrayObject*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<TypedArrayObject*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<JSString*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<JSFlatString*> { static const DataType result = Type_Object; };
 template <> struct TypeToDataType<HandleObject> { static const DataType result = Type_Handle; };
 template <> struct TypeToDataType<HandleString> { static const DataType result = Type_Handle; };
 template <> struct TypeToDataType<HandlePropertyName> { static const DataType result = Type_Handle; };
 template <> struct TypeToDataType<HandleFunction> { static const DataType result = Type_Handle; };
@@ -708,16 +709,18 @@ GlobalNameConflictsCheckFromIon(JSContex
 MOZ_MUST_USE bool
 CheckGlobalOrEvalDeclarationConflicts(JSContext* cx, BaselineFrame* frame);
 MOZ_MUST_USE bool
 InitFunctionEnvironmentObjects(JSContext* cx, BaselineFrame* frame);
 
 MOZ_MUST_USE bool
 NewArgumentsObject(JSContext* cx, BaselineFrame* frame, MutableHandleValue res);
 
+JSObject* CopyLexicalEnvironmentObject(JSContext* cx, HandleObject env, bool copySlots);
+
 JSObject* InitRestParameter(JSContext* cx, uint32_t length, Value* rest, HandleObject templateObj,
                             HandleObject res);
 
 MOZ_MUST_USE bool
 HandleDebugTrap(JSContext* cx, BaselineFrame* frame, uint8_t* retAddr, bool* mustReturn);
 MOZ_MUST_USE bool
 OnDebuggerStatement(JSContext* cx, BaselineFrame* frame, jsbytecode* pc, bool* mustReturn);
 MOZ_MUST_USE bool
--- a/js/src/jit/shared/LIR-shared.h
+++ b/js/src/jit/shared/LIR-shared.h
@@ -7045,16 +7045,52 @@ class LFunctionEnvironment : public LIns
     explicit LFunctionEnvironment(const LAllocation& function) {
         setOperand(0, function);
     }
     const LAllocation* function() {
         return getOperand(0);
     }
 };
 
+// Allocate a new LexicalEnvironmentObject.
+class LNewLexicalEnvironmentObject : public LCallInstructionHelper<1, 1, 0>
+{
+  public:
+    LIR_HEADER(NewLexicalEnvironmentObject)
+
+    explicit LNewLexicalEnvironmentObject(const LAllocation& enclosing) {
+        setOperand(0, enclosing);
+    }
+    const LAllocation* enclosing() {
+        return getOperand(0);
+    }
+
+    MNewLexicalEnvironmentObject* mir() const {
+        return mir_->toNewLexicalEnvironmentObject();
+    }
+};
+
+// Copy a LexicalEnvironmentObject.
+class LCopyLexicalEnvironmentObject : public LCallInstructionHelper<1, 1, 0>
+{
+  public:
+    LIR_HEADER(CopyLexicalEnvironmentObject)
+
+    explicit LCopyLexicalEnvironmentObject(const LAllocation& env) {
+        setOperand(0, env);
+    }
+    const LAllocation* env() {
+        return getOperand(0);
+    }
+
+    MCopyLexicalEnvironmentObject* mir() const {
+        return mir_->toCopyLexicalEnvironmentObject();
+    }
+};
+
 class LCallGetProperty : public LCallInstructionHelper<BOX_PIECES, BOX_PIECES, 0>
 {
   public:
     LIR_HEADER(CallGetProperty)
 
     static const size_t Value = 0;
 
     explicit LCallGetProperty(const LBoxAllocation& val) {
--- a/js/src/jit/shared/LOpcodes-shared.h
+++ b/js/src/jit/shared/LOpcodes-shared.h
@@ -314,16 +314,18 @@
     _(ClampDToUint8)                \
     _(ClampVToUint8)                \
     _(LoadFixedSlotV)               \
     _(LoadFixedSlotT)               \
     _(LoadFixedSlotAndUnbox)        \
     _(StoreFixedSlotV)              \
     _(StoreFixedSlotT)              \
     _(FunctionEnvironment)          \
+    _(NewLexicalEnvironmentObject)  \
+    _(CopyLexicalEnvironmentObject) \
     _(GetPropertyCacheV)            \
     _(GetPropertyCacheT)            \
     _(GetPropertyPolymorphicV)      \
     _(GetPropertyPolymorphicT)      \
     _(BindNameCache)                \
     _(CallBindVar)                  \
     _(CallGetProperty)              \
     _(GetNameCache)                 \
--- a/js/src/vm/EnvironmentObject.cpp
+++ b/js/src/vm/EnvironmentObject.cpp
@@ -884,18 +884,18 @@ LexicalEnvironmentObject::createTemplate
 
     if (enclosing)
         env->initEnclosingEnvironment(enclosing);
 
     return env;
 }
 
 /* static */ LexicalEnvironmentObject*
-LexicalEnvironmentObject::createTemplateObject(JSContext* cx, Handle<LexicalScope*> scope,
-                                               HandleObject enclosing, gc::InitialHeap heap)
+LexicalEnvironmentObject::create(JSContext* cx, Handle<LexicalScope*> scope,
+                                 HandleObject enclosing, gc::InitialHeap heap)
 {
     assertSameCompartment(cx, enclosing);
     MOZ_ASSERT(scope->hasEnvironment());
 
     RootedShape shape(cx, scope->environmentShape());
     LexicalEnvironmentObject* env = createTemplateObject(cx, shape, enclosing, heap);
     if (!env)
         return nullptr;
@@ -910,17 +910,17 @@ LexicalEnvironmentObject::createTemplate
     return env;
 }
 
 /* static */ LexicalEnvironmentObject*
 LexicalEnvironmentObject::create(JSContext* cx, Handle<LexicalScope*> scope,
                                  AbstractFramePtr frame)
 {
     RootedObject enclosing(cx, frame.environmentChain());
-    return createTemplateObject(cx, scope, enclosing, gc::DefaultHeap);
+    return create(cx, scope, enclosing, gc::DefaultHeap);
 }
 
 /* static */ LexicalEnvironmentObject*
 LexicalEnvironmentObject::createGlobal(JSContext* cx, Handle<GlobalObject*> global)
 {
     MOZ_ASSERT(global);
 
     RootedShape shape(cx, LexicalScope::getEmptyExtensibleEnvironmentShape(cx));
@@ -992,18 +992,17 @@ LexicalEnvironmentObject::createHollowFo
     return env;
 }
 
 /* static */ LexicalEnvironmentObject*
 LexicalEnvironmentObject::clone(JSContext* cx, Handle<LexicalEnvironmentObject*> env)
 {
     Rooted<LexicalScope*> scope(cx, &env->scope());
     RootedObject enclosing(cx, &env->enclosingEnvironment());
-    Rooted<LexicalEnvironmentObject*> copy(cx, createTemplateObject(cx, scope, enclosing,
-                                                                    gc::TenuredHeap));
+    Rooted<LexicalEnvironmentObject*> copy(cx, create(cx, scope, enclosing, gc::TenuredHeap));
     if (!copy)
         return nullptr;
 
     // We can't assert that the clone has the same shape, because it could
     // have been reshaped by PurgeEnvironmentChain.
     MOZ_ASSERT(env->slotSpan() == copy->slotSpan());
     for (uint32_t i = JSSLOT_FREE(&class_); i < copy->slotSpan(); i++)
         copy->setSlot(i, env->getSlot(i));
@@ -1011,17 +1010,17 @@ LexicalEnvironmentObject::clone(JSContex
     return copy;
 }
 
 /* static */ LexicalEnvironmentObject*
 LexicalEnvironmentObject::recreate(JSContext* cx, Handle<LexicalEnvironmentObject*> env)
 {
     Rooted<LexicalScope*> scope(cx, &env->scope());
     RootedObject enclosing(cx, &env->enclosingEnvironment());
-    return createTemplateObject(cx, scope, enclosing, gc::TenuredHeap);
+    return create(cx, scope, enclosing, gc::TenuredHeap);
 }
 
 bool
 LexicalEnvironmentObject::isExtensible() const
 {
     return nonProxyIsExtensible();
 }
 
@@ -1066,18 +1065,17 @@ NamedLambdaObject::create(JSContext* cx,
 #ifdef DEBUG
     // There should be exactly one binding in the named lambda scope.
     BindingIter bi(scope);
     bi++;
     MOZ_ASSERT(bi.done());
 #endif
 
     LexicalEnvironmentObject* obj =
-        LexicalEnvironmentObject::createTemplateObject(cx, scope.as<LexicalScope>(),
-                                                       enclosing, heap);
+        LexicalEnvironmentObject::create(cx, scope.as<LexicalScope>(), enclosing, heap);
     if (!obj)
         return nullptr;
 
     obj->initFixedSlot(lambdaSlot(), ObjectValue(*func));
     return static_cast<NamedLambdaObject*>(obj);
 }
 
 /* static */ NamedLambdaObject*
--- a/js/src/vm/EnvironmentObject.h
+++ b/js/src/vm/EnvironmentObject.h
@@ -472,21 +472,18 @@ class LexicalEnvironmentObject : public 
 
     void initScope(LexicalScope* scope) {
         MOZ_ASSERT(!isGlobal());
         MOZ_ASSERT(isSyntactic());
         initScopeUnchecked(scope);
     }
 
   public:
-    static LexicalEnvironmentObject* createTemplateObject(JSContext* cx,
-                                                          Handle<LexicalScope*> scope,
-                                                          HandleObject enclosing,
-                                                          gc::InitialHeap heap);
-
+    static LexicalEnvironmentObject* create(JSContext* cx, Handle<LexicalScope*> scope,
+                                            HandleObject enclosing, gc::InitialHeap heap);
     static LexicalEnvironmentObject* create(JSContext* cx, Handle<LexicalScope*> scope,
                                             AbstractFramePtr frame);
     static LexicalEnvironmentObject* createGlobal(JSContext* cx, Handle<GlobalObject*> global);
     static LexicalEnvironmentObject* createNonSyntactic(JSContext* cx, HandleObject enclosing);
     static LexicalEnvironmentObject* createHollowForDebug(JSContext* cx,
                                                           Handle<LexicalScope*> scope);
 
     // Create a new LexicalEnvironmentObject with the same enclosing env and
--- a/layout/painting/nsDisplayList.cpp
+++ b/layout/painting/nsDisplayList.cpp
@@ -5207,53 +5207,30 @@ nsDisplayOpacity::BuildLayer(nsDisplayLi
  * rendered at a higher (or lower) resolution, affecting the retained layer
  * size --- but this should be good enough.
  */
 static bool
 IsItemTooSmallForActiveLayer(nsIFrame* aFrame)
 {
   nsIntRect visibleDevPixels = aFrame->GetVisualOverflowRectRelativeToSelf().ToOutsidePixels(
           aFrame->PresContext()->AppUnitsPerDevPixel());
-  static const int MIN_ACTIVE_LAYER_SIZE_DEV_PIXELS = 16;
   return visibleDevPixels.Size() <
-    nsIntSize(MIN_ACTIVE_LAYER_SIZE_DEV_PIXELS, MIN_ACTIVE_LAYER_SIZE_DEV_PIXELS);
-}
-
-static void
-SetAnimationPerformanceWarningForTooSmallItem(nsIFrame* aFrame,
-                                              nsCSSPropertyID aProperty)
-{
-  // We use ToNearestPixels() here since ToOutsidePixels causes some sort of
-  // errors. See https://bugzilla.mozilla.org/show_bug.cgi?id=1258904#c19
-  nsIntRect visibleDevPixels = aFrame->GetVisualOverflowRectRelativeToSelf().ToNearestPixels(
-          aFrame->PresContext()->AppUnitsPerDevPixel());
-
-  // Set performance warning only if the visible dev pixels is not empty
-  // because dev pixels is empty if the frame has 'preserve-3d' style.
-  if (visibleDevPixels.IsEmpty()) {
-    return;
-  }
-
-  EffectCompositor::SetPerformanceWarning(aFrame, aProperty,
-      AnimationPerformanceWarning(
-        AnimationPerformanceWarning::Type::ContentTooSmall,
-        { visibleDevPixels.Width(), visibleDevPixels.Height() }));
+    nsIntSize(gfxPrefs::LayoutMinActiveLayerSize(),
+              gfxPrefs::LayoutMinActiveLayerSize());
 }
 
 /* static */ bool
 nsDisplayOpacity::NeedsActiveLayer(nsDisplayListBuilder* aBuilder, nsIFrame* aFrame)
 {
-  if (ActiveLayerTracker::IsStyleAnimated(aBuilder, aFrame,
-                                          eCSSProperty_opacity) ||
-      EffectCompositor::HasAnimationsForCompositor(aFrame,
-                                                   eCSSProperty_opacity)) {
-    if (!IsItemTooSmallForActiveLayer(aFrame)) {
-      return true;
-    }
-    SetAnimationPerformanceWarningForTooSmallItem(aFrame, eCSSProperty_opacity);
+  if (EffectCompositor::HasAnimationsForCompositor(aFrame,
+                                                   eCSSProperty_opacity) ||
+      (ActiveLayerTracker::IsStyleAnimated(aBuilder, aFrame,
+                                           eCSSProperty_opacity) &&
+       !IsItemTooSmallForActiveLayer(aFrame))) {
+    return true;
   }
   return false;
 }
 
 void
 nsDisplayOpacity::ApplyOpacity(nsDisplayListBuilder* aBuilder,
                              float aOpacity,
                              const DisplayItemClipChain* aClip)
@@ -6876,27 +6853,30 @@ already_AddRefed<Layer> nsDisplayTransfo
     container->SetContentFlags(container->GetContentFlags() & ~Layer::CONTENT_MAY_CHANGE_TRANSFORM);
   }
   return container.forget();
 }
 
 bool
 nsDisplayTransform::MayBeAnimated(nsDisplayListBuilder* aBuilder)
 {
-  // Here we check if the *post-transform* bounds of this item are big enough
-  // to justify an active layer.
-  if (ActiveLayerTracker::IsStyleAnimated(aBuilder,
-                                          mFrame,
-                                          eCSSProperty_transform) ||
-      EffectCompositor::HasAnimationsForCompositor(mFrame,
-                                                   eCSSProperty_transform)) {
-    if (!IsItemTooSmallForActiveLayer(mFrame)) {
-      return true;
-    }
-    SetAnimationPerformanceWarningForTooSmallItem(mFrame, eCSSProperty_transform);
+  // If EffectCompositor::HasAnimationsForCompositor() is true then we can
+  // completely bypass the main thread for this animation, so it is always
+  // worthwhile.
+  // For ActiveLayerTracker::IsStyleAnimated() cases the main thread is
+  // already involved so there is less to be gained.
+  // Therefore we check that the *post-transform* bounds of this item are
+  // big enough to justify an active layer.
+  if (EffectCompositor::HasAnimationsForCompositor(mFrame,
+                                                   eCSSProperty_transform) ||
+      (ActiveLayerTracker::IsStyleAnimated(aBuilder,
+                                           mFrame,
+                                           eCSSProperty_transform) &&
+       !IsItemTooSmallForActiveLayer(mFrame))) {
+    return true;
   }
   return false;
 }
 
 nsDisplayItem::LayerState
 nsDisplayTransform::GetLayerState(nsDisplayListBuilder* aBuilder,
                                   LayerManager* aManager,
                                   const ContainerLayerParameters& aParameters) {
--- a/layout/svg/nsSVGIntegrationUtils.cpp
+++ b/layout/svg/nsSVGIntegrationUtils.cpp
@@ -50,134 +50,82 @@ public:
    * If the pre-effects visual overflow rect of the frame being examined
    * happens to be known, it can be passed in as aCurrentFrame and its
    * pre-effects visual overflow rect can be passed in as
    * aCurrentFrameOverflowArea. This is just an optimization to save a
    * frame property lookup - these arguments are optional.
    */
   PreEffectsVisualOverflowCollector(nsIFrame* aFirstContinuation,
                                     nsIFrame* aCurrentFrame,
-                                    const nsRect& aCurrentFrameOverflowArea,
-                                    bool aCheckPreEffectsBBoxPropCache)
+                                    const nsRect& aCurrentFrameOverflowArea)
     : mFirstContinuation(aFirstContinuation)
     , mCurrentFrame(aCurrentFrame)
     , mCurrentFrameOverflowArea(aCurrentFrameOverflowArea)
-    , mCheckPreEffectsBBoxPropCache(aCheckPreEffectsBBoxPropCache)
   {
     NS_ASSERTION(!mFirstContinuation->GetPrevContinuation(),
                  "We want the first continuation here");
   }
 
   virtual void AddBox(nsIFrame* aFrame) override {
     nsRect overflow = (aFrame == mCurrentFrame)
       ? mCurrentFrameOverflowArea
-      : GetPreEffectsVisualOverflowRect(aFrame, mCheckPreEffectsBBoxPropCache);
+      : GetPreEffectsVisualOverflowRect(aFrame);
     mResult.UnionRect(mResult, overflow + aFrame->GetOffsetTo(mFirstContinuation));
   }
 
   nsRect GetResult() const {
     return mResult;
   }
 
 private:
 
-  static nsRect GetPreEffectsVisualOverflowRect(nsIFrame* aFrame,
-                                                bool aCheckPropCache) {
+  static nsRect GetPreEffectsVisualOverflowRect(nsIFrame* aFrame) {
     nsRect* r = aFrame->Properties().Get(nsIFrame::PreEffectsBBoxProperty());
     if (r) {
       return *r;
     }
-    // Despite the fact that we're invoked for frames with SVG effects applied,
-    // we can actually get here. All continuations and IB split siblings of a
-    // frame with SVG effects applied will have the PreEffectsBBoxProperty
-    // property set on them. Therefore, the frames that are passed to us will
-    // always have that property set...well, with one exception. If the frames
-    // for an element with SVG effects applied have been subject to an "IB
-    // split", then the block frame(s) that caused the split will have been
-    // wrapped in anonymous, inline-block, nsBlockFrames of pseudo-type
-    // nsCSSAnonBoxes::mozAnonymousBlock. These "IB split sibling" anonymous
-    // blocks will have the PreEffectsBBoxProperty property set on them, but
-    // they will never be passed to us. Instead, we'll be passed the block
-    // children that they wrap, which don't have the PreEffectsBBoxProperty
-    // property set on them. This is actually okay. What we care about is
-    // collecting the _pre_ effects visual overflow rects of the frames to
-    // which the SVG effects have been applied. Since the IB split results in
-    // any overflow rect adjustments for transforms, effects, etc. taking
-    // place on the anonymous block wrappers, the wrapped children are left
-    // with their overflow rects unaffected. In other words, calling
-    // GetVisualOverflowRect() on the children will return their pre-effects
-    // visual overflow rects, just as we need.
-    //
-    // A couple of tests that demonstrate the IB split and cause us to get here
-    // are:
-    //
-    //  * reftests/svg/svg-integration/clipPath-html-06.xhtml
-    //  * reftests/svg/svg-integration/clipPath-html-06-extref.xhtml
-    //
-    // If we ever got passed a frame with the PreTransformOverflowAreasProperty
-    // property set, that would be bad, since then our GetVisualOverflowRect()
-    // call would give us the post-effects, and post-transform, overflow rect.
-    //
-    // There is one more exceptions, in
-    // nsStyleImageLayers::Layer::CalcDifference, we do not add
-    // nsChangeHint_UpdateOverflow hint when image mask(not SVG mask) property
-    // value changed, since replace image mask does not cause layout change.
-    // So even if we apply a new mask image to this frame,
-    // PreEffectsBBoxProperty might still left empty.
+
 #ifdef DEBUG
-    if (aCheckPropCache) {
-      nsIFrame* firstFrame =
-        nsLayoutUtils::FirstContinuationOrIBSplitSibling(aFrame);
-      bool mightHaveNoneSVGMask =
-        nsSVGEffects::GetEffectProperties(firstFrame).MightHaveNoneSVGMask();
+    // Having PreTransformOverflowAreasProperty cached means
+    // GetVisualOverflowRect() will return post-effect rect, which is not what
+    // we want. This function intentional reports pre-effect rect. But it does
+    // not matter if there is no SVG effect on this frame, since no effect
+    // means post-effect rect matches pre-effect rect.
+    if (nsSVGIntegrationUtils::UsingEffectsForFrame(aFrame)) {
+      nsOverflowAreas* preTransformOverflows =
+        aFrame->Properties().Get(aFrame->PreTransformOverflowAreasProperty());
 
-      NS_ASSERTION(mightHaveNoneSVGMask ||
-                   aFrame->GetParent()->StyleContext()->GetPseudo() ==
-                   nsCSSAnonBoxes::mozAnonymousBlock,
-                   "How did we getting here, then?");
+      MOZ_ASSERT(!preTransformOverflows,
+                 "GetVisualOverflowRect() won't return the pre-effects rect!");
     }
-
-    bool hasEffect = nsSVGIntegrationUtils::UsingEffectsForFrame(aFrame);
-    nsOverflowAreas* preTransformOverflows =
-      aFrame->Properties().Get(aFrame->PreTransformOverflowAreasProperty());
-    // Having PreTransformOverflowAreasProperty means GetVisualOverflowRect()
-    // will return post-effect rect, which is not what we want, this function
-    // intentional reports pre-effect rect. But it does not matter if there is
-    // no SVG effect on this frame, since no effect means post-effect rect
-    // matches pre-effect rect.
-    MOZ_ASSERT(!hasEffect || !preTransformOverflows,
-               "GetVisualOverflowRect() won't return the pre-effects rect!");
 #endif
     return aFrame->GetVisualOverflowRect();
   }
 
   nsIFrame*     mFirstContinuation;
   nsIFrame*     mCurrentFrame;
   const nsRect& mCurrentFrameOverflowArea;
   nsRect        mResult;
-  bool          mCheckPreEffectsBBoxPropCache;
 };
 
 /**
  * Gets the union of the pre-effects visual overflow rects of all of a frame's
  * continuations, in "user space".
  */
 static nsRect
 GetPreEffectsVisualOverflowUnion(nsIFrame* aFirstContinuation,
                                  nsIFrame* aCurrentFrame,
                                  const nsRect& aCurrentFramePreEffectsOverflow,
-                                 const nsPoint& aFirstContinuationToUserSpace,
-                                 bool aCheckPreEffectsBBoxPropCache)
+                                 const nsPoint& aFirstContinuationToUserSpace)
 {
   NS_ASSERTION(!aFirstContinuation->GetPrevContinuation(),
                "Need first continuation here");
   PreEffectsVisualOverflowCollector collector(aFirstContinuation,
                                               aCurrentFrame,
-                                              aCurrentFramePreEffectsOverflow,
-                                              aCheckPreEffectsBBoxPropCache);
+                                              aCurrentFramePreEffectsOverflow);
   // Compute union of all overflow areas relative to aFirstContinuation:
   nsLayoutUtils::GetAllInFlowBoxes(aFirstContinuation, &collector);
   // Return the result in user space:
   return collector.GetResult() + aFirstContinuationToUserSpace;
 }
 
 
 bool
@@ -245,18 +193,17 @@ gfxRect
 nsSVGIntegrationUtils::GetSVGBBoxForNonSVGFrame(nsIFrame* aNonSVGFrame)
 {
   NS_ASSERTION(!aNonSVGFrame->IsFrameOfType(nsIFrame::eSVG),
                "SVG frames should not get here");
   nsIFrame* firstFrame =
     nsLayoutUtils::FirstContinuationOrIBSplitSibling(aNonSVGFrame);
   // 'r' is in "user space":
   nsRect r = GetPreEffectsVisualOverflowUnion(firstFrame, nullptr, nsRect(),
-                                              GetOffsetToBoundingBox(firstFrame),
-                                              true);
+                                              GetOffsetToBoundingBox(firstFrame));
   return nsLayoutUtils::RectToGfxRect(r,
            aNonSVGFrame->PresContext()->AppUnitsPerCSSPixel());
 }
 
 // XXX Since we're called during reflow, this method is broken for frames with
 // continuations. When we're called for a frame with continuations, we're
 // called for each continuation in turn as it's reflowed. However, it isn't
 // until the last continuation is reflowed that this method's
@@ -308,21 +255,17 @@ nsRect
   nsPoint firstFrameToBoundingBox = GetOffsetToBoundingBox(firstFrame);
   // overrideBBox is in "user space", in _CSS_ pixels:
   // XXX Why are we rounding out to pixel boundaries? We don't do that in
   // GetSVGBBoxForNonSVGFrame, and it doesn't appear to be necessary.
   gfxRect overrideBBox =
     nsLayoutUtils::RectToGfxRect(
       GetPreEffectsVisualOverflowUnion(firstFrame, aFrame,
                                        aPreEffectsOverflowRect,
-                                       firstFrameToBoundingBox,
-                                       false /* See the beginning of the
-                                                comment above this function to
-                                                know why we skip this
-                                                checking. */),
+                                       firstFrameToBoundingBox),
       aFrame->PresContext()->AppUnitsPerCSSPixel());
   overrideBBox.RoundOut();
 
   nsRect overflowRect =
     nsFilterInstance::GetPostFilterBounds(firstFrame, &overrideBBox);
 
   // Return overflowRect relative to aFrame, rather than "user space":
   return overflowRect - (aFrame->GetOffsetTo(firstFrame) + firstFrameToBoundingBox);
--- a/mobile/android/services/src/main/java/org/mozilla/gecko/fxa/activities/FxAccountStatusFragment.java
+++ b/mobile/android/services/src/main/java/org/mozilla/gecko/fxa/activities/FxAccountStatusFragment.java
@@ -466,20 +466,16 @@ public class FxAccountStatusFragment
     FxAccountSyncStatusHelper.getInstance().startObserving(syncStatusDelegate);
 
     // Register a local broadcast receiver to get profile cached notification.
     final IntentFilter intentFilter = new IntentFilter();
     intentFilter.addAction(FxAccountConstants.ACCOUNT_PROFILE_JSON_UPDATED_ACTION);
     accountProfileInformationReceiver = new FxAccountProfileInformationReceiver();
     LocalBroadcastManager.getInstance(getActivity()).registerReceiver(accountProfileInformationReceiver, intentFilter);
 
-    // profilePreference is set during onCreate, so it's definitely not null here.
-    final float cornerRadius = getResources().getDimension(R.dimen.fxaccount_profile_image_width) / 2;
-    profileAvatarTarget = new PicassoPreferenceIconTarget(getResources(), profilePreference, cornerRadius);
-
     refresh();
   }
 
   @Override
   public void onPause() {
     super.onPause();
     FxAccountSyncStatusHelper.getInstance().stopObserving(syncStatusDelegate);
 
@@ -513,16 +509,20 @@ public class FxAccountStatusFragment
   protected void refresh() {
     // refresh is called from our onResume, which can happen before the owning
     // Activity tells us about an account (via our public
     // refresh(AndroidFxAccount) method).
     if (fxAccount == null) {
       throw new IllegalArgumentException("fxAccount must not be null");
     }
 
+    // profilePreference is set during onCreate, so it's definitely not null here.
+    final float cornerRadius = getResources().getDimension(R.dimen.fxaccount_profile_image_width) / 2;
+    profileAvatarTarget = new PicassoPreferenceIconTarget(getResources(), profilePreference, cornerRadius);
+
     updateProfileInformation();
     updateAuthServerPreference();
     updateSyncServerPreference();
 
     try {
       // There are error states determined by Android, not the login state
       // machine, and we have a chance to present these states here. We handle
       // them specially, since we can't surface these states as part of syncing,
--- a/security/manager/ssl/SSLServerCertVerification.cpp
+++ b/security/manager/ssl/SSLServerCertVerification.cpp
@@ -1278,16 +1278,17 @@ GatherTelemetryForSingleSCT(const ct::Ve
       MOZ_ASSERT_UNREACHABLE("Unexpected VerifiedSCT::Status type");
   }
   Telemetry::Accumulate(Telemetry::SSL_SCTS_VERIFICATION_STATUS,
                         verificationStatus);
 }
 
 void
 GatherCertificateTransparencyTelemetry(const UniqueCERTCertList& certList,
+                                       bool isEV,
                                        const CertificateTransparencyInfo& info)
 {
   if (!info.enabled) {
     // No telemetry is gathered when CT is disabled.
     return;
   }
 
   for (const ct::VerifiedSCT& sct : info.verifyResult.verifiedScts) {
@@ -1301,16 +1302,69 @@ GatherCertificateTransparencyTelemetry(c
   }
 
   // Handle the histogram of SCTs counts.
   uint32_t sctsCount =
     static_cast<uint32_t>(info.verifyResult.verifiedScts.length());
   // Note that sctsCount can also be 0 in case we've received SCT binary data,
   // but it failed to parse (e.g. due to unsupported CT protocol version).
   Telemetry::Accumulate(Telemetry::SSL_SCTS_PER_CONNECTION, sctsCount);
+
+  // Report CT Policy compliance of EV certificates.
+  if (isEV) {
+    uint32_t evCompliance = 0;
+    switch (info.policyCompliance) {
+      case ct::CTPolicyCompliance::Compliant:
+        evCompliance = 1;
+        break;
+      case ct::CTPolicyCompliance::NotEnoughScts:
+        evCompliance = 2;
+        break;
+      case ct::CTPolicyCompliance::NotDiverseScts:
+        evCompliance = 3;
+        break;
+      case ct::CTPolicyCompliance::Unknown:
+      default:
+        MOZ_ASSERT_UNREACHABLE("Unexpected CTPolicyCompliance type");
+    }
+    Telemetry::Accumulate(Telemetry::SSL_CT_POLICY_COMPLIANCE_OF_EV_CERTS,
+                          evCompliance);
+  }
+
+  // Get the root cert.
+  CERTCertListNode* rootNode = CERT_LIST_TAIL(certList);
+  MOZ_ASSERT(rootNode);
+  if (!rootNode) {
+    return;
+  }
+  MOZ_ASSERT(!CERT_LIST_END(rootNode, certList));
+  if (CERT_LIST_END(rootNode, certList)) {
+    return;
+  }
+  CERTCertificate* rootCert = rootNode->cert;
+  MOZ_ASSERT(rootCert);
+  if (!rootCert) {
+    return;
+  }
+
+  // Report CT Policy compliance by CA.
+  switch (info.policyCompliance) {
+    case ct::CTPolicyCompliance::Compliant:
+      AccumulateTelemetryForRootCA(
+        Telemetry::SSL_CT_POLICY_COMPLIANT_CONNECTIONS_BY_CA, rootCert);
+      break;
+    case ct::CTPolicyCompliance::NotEnoughScts:
+    case ct::CTPolicyCompliance::NotDiverseScts:
+      AccumulateTelemetryForRootCA(
+        Telemetry::SSL_CT_POLICY_NON_COMPLIANT_CONNECTIONS_BY_CA, rootCert);
+      break;
+    case ct::CTPolicyCompliance::Unknown:
+    default:
+      MOZ_ASSERT_UNREACHABLE("Unexpected CTPolicyCompliance type");
+  }
 }
 
 // Note: Takes ownership of |peerCertChain| if SECSuccess is not returned.
 SECStatus
 AuthCertificate(CertVerifier& certVerifier,
                 nsNSSSocketInfo* infoObject,
                 const UniqueCERTCertificate& cert,
                 UniqueCERTCertList& peerCertChain,
@@ -1385,16 +1439,17 @@ AuthCertificate(CertVerifier& certVerifi
   if (rv == Success) {
     // Certificate verification succeeded. Delete any potential record of
     // certificate error bits.
     RememberCertErrorsTable::GetInstance().RememberCertHasError(infoObject,
                                                                 nullptr,
                                                                 SECSuccess);
     GatherSuccessfulValidationTelemetry(certList);
     GatherCertificateTransparencyTelemetry(certList,
+                                  /*isEV*/ evOidPolicy != SEC_OID_UNKNOWN,
                                            certificateTransparencyInfo);
 
     // The connection may get terminated, for example, if the server requires
     // a client cert. Let's provide a minimal SSLStatus
     // to the caller that contains at least the cert and its status.
     RefPtr<nsSSLStatus> status(infoObject->SSLStatus());
     if (!status) {
       status = new nsSSLStatus();
new file mode 100644
--- /dev/null
+++ b/services/blocklists/addons.json
@@ -0,0 +1,1 @@
+{"data":[{"guid":"ext@alibonus.com","blockID":"i1524","enabled":true,"last_modified":1485301116629,"details":{"who":"All Firefox users who have these versions installed.","created":"2017-01-24T22:45:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333471","name":"Alibonus 1.20.9 and lower","why":"Versions 1.20.9 and lower of this add-on contain critical security issues."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.20.9","severity":1}],"prefs":[],"id":"a015d5a4-9184-95db-0c74-9262af2332fa","schema":1485297431051},{"guid":"{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}","blockID":"i1523","enabled":true,"last_modified":1485297214072,"details":{"who":"All Firefox users who have these versions of the Web of Trust add-on installed.","created":"2017-01-24T22:01:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314332","name":"Web of Trust 20170120 and lower","why":"Versions 20170120 and lower of the Web of Trust add-on send excessive user data to its service, which has been reportedly shared with third parties without sufficient sanitization. These versions are also affected by a vulnerability that could lead to unwanted remote code execution."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"20170120","severity":1}],"prefs":[],"id":"2224c139-9b98-0900-61c1-04031de11ad3","schema":1485295513652},{"guid":"/^(ciscowebexstart1@cisco\\.com|ciscowebexstart_test@cisco\\.com|ciscowebexstart@cisco\\.com|ciscowebexgpc@cisco\\.com)$/","blockID":"i1522","enabled":true,"last_modified":1485215014902,"details":{"who":"All Firefox users who have any Cisco WebEx add-ons installed.","created":"2017-01-23T22:55:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333225","name":"Cisco WebEx add-ons","why":"A critical security vulnerability has been discovered in Cisco WebEx add-ons that enable malicious websites to execute code on the user's system."},"versionRange":[{"targetApplication":[],"minVersion":"1.0.0","maxVersion":"1.0.1","severity":1}],"prefs":[],"id":"30368779-1d3b-490a-0a34-253085af7754","schema":1485212610474},{"guid":"{de71f09a-3342-48c5-95c1-4b0f17567554}","blockID":"i1493","enabled":true,"last_modified":1484867614757,"details":{"who":"All users who have this add-on installed.","created":"2017-01-12T22:17:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329654","name":"Search for Firefox Convertor (malware)","why":"This is a malicious add-on that is installed using a fake name. It changes search and homepage settings."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.3.9","severity":3}],"prefs":[],"id":"d6ec9f54-9945-088e-ba68-40117eaba24e","schema":1484335370642},{"guid":"googlotim@gmail.com","blockID":"i1492","enabled":true,"last_modified":1483646608603,"details":{"who":"All users who have Savogram version 1.3.2 installed. Version 1.3.1 doesn't have this problem and can be installed from the <a href=\"https://addons.mozilla.org/addon/savogram/\">add-on page</a>. Note that this is an older version, so affected users won't be automatically updated to it. New versions should correct this problem if they become available.","created":"2017-01-05T19:58:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1328594","name":"Savogram 1.3.2","why":"Version 1.3.2 of this add-on loads remote code and performs DOM injection in an unsafe manner."},"versionRange":[{"targetApplication":[],"minVersion":"1.3.2","maxVersion":"1.3.2","severity":1}],"prefs":[],"id":"0756ed76-7bc7-ec1e-aba5-3a9fac2107ba","schema":1483389810787},{"guid":"support@update-firefox.com","blockID":"i21","enabled":true,"last_modified":1483389809169,"details":{"who":"All users of the add-on in all Mozilla applications.","created":"2011-01-31T16:23:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629717","name":"Browser Update (spyware)","why":"This add-on is adware/spyware masquerading as a Firefox update mechanism."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dfb06be8-3594-28e4-d163-17e27119f15d","schema":1483387107003},{"guid":"{2224e955-00e9-4613-a844-ce69fccaae91}","blockID":"i7","enabled":true,"last_modified":1483389809147,"details":{"who":"All users of Internet Saving Optimizer for all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=512406","name":"Internet Saving Optimizer (extension)","why":"This add-on causes a high volume of Firefox crashes and is considered malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b9efb796-97c2-6434-d28f-acc83436f8e5","schema":1483387107003},{"guid":"supportaccessplugin@gmail.com","blockID":"i43","enabled":true,"last_modified":1483389809124,"details":{"who":"All users with Firefox Access Plugin installed","created":"2011-10-11T11:24:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=693673","name":"Firefox Access Plugin (spyware)","why":"This add-on is spyware that reports all visited websites to a third party with no user value."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ed230a4-e174-262a-55ab-0c33f93a2529","schema":1483387107003},{"guid":"{8CE11043-9A15-4207-A565-0C94C42D590D}","blockID":"i10","enabled":true,"last_modified":1483389809102,"details":{"who":"All users of this add-on in all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=541302","name":"Internal security options editor (malware)","why":"This add-on secretly hijacks all search results in most major search engines and masks as a security add-on."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e2e0ac09-6d68-75f5-2424-140f51904876","schema":1483387107003},{"guid":"youtube@youtube2.com","blockID":"i47","enabled":true,"last_modified":1483389809079,"details":{"who":"All users with any version of Free Cheesecake Factory installed on any Mozilla product.","created":"2011-12-22T13:11:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=713050","name":"Free Cheesecake Factory (malware)","why":"This add-on hijacks your Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"85f5c1db-433b-bee3-2a3b-325165cacc6e","schema":1483387107003},{"guid":"admin@youtubespeedup.com","blockID":"i48","enabled":true,"last_modified":1483389809057,"details":{"who":"All users with any version of Youtube Speed UP! installed on any Mozilla product.","created":"2011-12-29T19:48:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=714221","name":"Youtube Speed UP! (malware)","why":"This add-on hijacks your Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a93922c4-8a8a-5230-8f76-76fecb0653b6","schema":1483387107003},{"guid":"{E8E88AB0-7182-11DF-904E-6045E0D72085}","blockID":"i13","enabled":true,"last_modified":1483389809035,"details":{"who":"All users of this add-on for all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578085","name":"Mozilla Sniffer (malware)","why":"This add-on intercepts website login credentials and is malware. For more information, please <a href=\"http://blog.mozilla.com/addons/2010/07/13/add-on-security-announcement/\">read our security announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"ebbd6de9-fc8a-3e5b-2a07-232bee589c7c","schema":1483387107003},{"guid":"sigma@labs.mozilla","blockID":"i44","enabled":true,"last_modified":1483389809012,"details":{"who":"All users of Lab Kit in all versions of Firefox.","created":"2011-10-11T11:51:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690819","name":"Mozilla Labs: Lab Kit","why":"The Lab Kit add-on has been retired due to compatibility issues with Firefox 7 and future Firefox browser releases. You can still install Mozilla Labs add-ons <a href=\"https://addons.mozilla.org/en-US/firefox/user/5133025/\">individually</a>.\r\n\r\nFor more information, please read <a href=\"http://mozillalabs.com/blog/2011/10/lab-kit-is-retiring/\">this announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d614e9cd-220f-3a19-287b-57e122f8c4b5","schema":1483387107003},{"guid":"/^(jid0-S9kkzfTvEmC985BVmf8ZOzA5nLM@jetpack|jid1-qps14pkDB6UDvA@jetpack|jid1-Tsr09YnAqIWL0Q@jetpack|shole@ats.ext|{38a64ef0-7181-11e3-981f-0800200c9a66}|eochoa@ualberta.ca)$/","blockID":"i1424","enabled":true,"last_modified":1483378113482,"details":{"who":"All users who have any of the affected versions installed.","created":"2016-12-21T17:22:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","name":"Various vulnerable add-on versions","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"0699488d-2a19-6735-809e-f229849fe00b","schema":1483376308298},{"guid":"pink@rosaplugin.info","blockID":"i84","enabled":true,"last_modified":1482945810971,"details":{"who":"All Firefox users who have this add-on installed","created":"2012-04-09T10:13:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743484","name":"Facebook Rosa (malware)","why":"Add-on acts like malware and performs user actions on Facebook without their consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"66ad8de9-311d-076c-7356-87fde6d30d8f","schema":1482945809444},{"guid":"videoplugin@player.com","blockID":"i90","enabled":true,"last_modified":1482945810949,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-07T08:58:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=752483","name":"FlashPlayer 11 (malware)","why":"This add-on is malware disguised as a Flash Player update. It can hijack Google searches and Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d25943f1-39ef-b9ec-ab77-baeef3498365","schema":1482945809444},{"guid":"youtb3@youtb3.com","blockID":"i60","enabled":true,"last_modified":1482945810927,"details":{"who":"All Firefox users who have this extension installed.","created":"2012-02-02T16:38:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723753","name":"Video extension (malware)","why":"Malicious extension installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cae3093f-a7b3-5352-a264-01dbfbf347ce","schema":1482945809444},{"guid":"{8f42fb8b-b6f6-45de-81c0-d6d39f54f971}","blockID":"i82","enabled":true,"last_modified":1482945810904,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-04-09T10:04:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743012","name":"Face Plus (malware)","why":"This add-on maliciously manipulates Facebook and is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"09319ab3-55e7-fec1-44e0-84067d014b9b","schema":1482945809444},{"guid":"cloudmask@cloudmask.com","blockID":"i1233","enabled":true,"last_modified":1482945810881,"details":{"who":"Any user who has version 2.0.788, or earlier, installed.","created":"2016-06-17T14:31:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280431","name":"CloudMask","why":"These versions of the add-on (before 2.0.788) execute code from a website in a privileged local browser context, potentially allowing dangerous, unreviewed, actions to affect the user's computer.  This is fixed in later versions."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.0.788","severity":1}],"prefs":[],"id":"2a8b40c7-a1d2-29f4-b7d7-ccfc5066bae1","schema":1482945809444},{"guid":"{95ff02bc-ffc6-45f0-a5c8-619b8226a9de}","blockID":"i105","enabled":true,"last_modified":1482945810858,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-08T14:34:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","name":"Eklenti D\u00fcnyas\u0131 (malware)","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"afbbc08d-2414-f51e-fdb8-74c0a2d90323","schema":1482945809444},{"guid":"{fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}","blockID":"i77","enabled":true,"last_modified":1482945810835,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-22T14:39:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738419","name":"Adobe Flash (malware)","why":"This add-on is malware that is installed under false pretenses as an Adobe plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"81753a93-382d-5f9d-a4ca-8a21b679ebb1","schema":1482945809444},{"guid":"youtube@youtube3.com","blockID":"i57","enabled":true,"last_modified":1482945810811,"details":{"who":"All Firefox users that have installed this add-on.","created":"2012-01-31T13:54:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722823","name":"Divx 2012 Plugin (malware)","why":"Malware installed on false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4a93a0eb-a513-7272-6199-bc4d6228ff50","schema":1482945809444},{"guid":"{392e123b-b691-4a5e-b52f-c4c1027e749c}","blockID":"i109","enabled":true,"last_modified":1482945810788,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-29T13:20:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=769781","name":"Zaman Tuneline Hay\u0131r! (malware)","why":"This add-on pretends to be developed by Facebook and injects scripts that manipulate users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b9a805aa-cae7-58d6-5a53-2af4442e4cf6","schema":1482945809444},{"guid":"msntoolbar@msn.com","blockID":"i18","enabled":true,"last_modified":1482945810764,"details":{"who":"Users of Bing Bar 6.0 and older for all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","name":"Bing Bar","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see <a href=\"http://support.microsoft.com/kb/2430460\">this article</a>."},"versionRange":[{"targetApplication":[],"minVersion":" 0","maxVersion":"6.*","severity":1}],"prefs":[],"id":"9b2f2039-b997-8993-d6dc-d881bc1ca7a1","schema":1482945809444},{"guid":"yasd@youasdr3.com","blockID":"i104","enabled":true,"last_modified":1482945810740,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-08T14:33:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","name":"Play Now (malware)","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8a352dff-d09d-1e78-7feb-45dec7ace5a5","schema":1482945809444},{"guid":"fdm_ffext@freedownloadmanager.org","blockID":"i2","enabled":true,"last_modified":1482945810393,"details":{"who":"Users of Firefox 3 and later with versions 1.0 through 1.3.1 of Free Download Manager","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=408445","name":"Free Download Manager","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"1.0","maxVersion":"1.3.1","severity":1}],"prefs":[],"id":"fc46f8e7-0489-b90f-a373-d93109479ca5","schema":1482945809444},{"guid":"flash@adobe.com","blockID":"i56","enabled":true,"last_modified":1482945810371,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-01-30T15:41:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","name":"Adobe Flash Update (malware)","why":"This add-on poses as an Adobe Flash update and injects malicious scripts into web pages. It hides itself in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"696db959-fb0b-8aa4-928e-65f157cdd77a","schema":1482945809444},{"guid":"youtubeer@youtuber.com","blockID":"i66","enabled":true,"last_modified":1482945810348,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-13T15:44:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726787","name":"Plug VDS (malware)","why":"Add-on behaves maliciously, and is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0878ce4e-b476-ffa3-0e06-21a65b7917a1","schema":1482945809444},{"guid":"{B13721C7-F507-4982-B2E5-502A71474FED}","blockID":"i8","enabled":true,"last_modified":1482945810326,"details":{"who":"Users of all versions of the original Skype Toolbar in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","name":"Original Skype Toolbar","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please <a href=\"http://www.skype.com/intl/en/get-skype/on-your-computer/click-and-call/\">update to the latest version</a>. For more information, please <a href=\"http://blog.mozilla.com/addons/2011/01/20/blocking-the-skype-toolbar-in-firefox/\">read our announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5a320611-59a3-0eee-bb30-9052be870e00","schema":1482945809444},{"guid":"yslow@yahoo-inc.com","blockID":"i11","enabled":true,"last_modified":1482945810303,"details":{"who":"Users of YSlow version 2.0.5 for Firefox 3.5.7 and later.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542686","name":"YSlow","why":"This add-on causes a high volume of Firefox crashes and other stability issues. Users should <a href=\"https://addons.mozilla.org/firefox/addon/yslow/\">update to the latest version</a>."},"versionRange":[{"targetApplication":[{"minVersion":"3.5.7","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"2.0.5","maxVersion":"2.0.5","severity":1}],"prefs":[],"id":"a9b34e8f-45ce-9217-b791-98e094c26352","schema":1482945809444},{"guid":"youtube@youtuber.com","blockID":"i63","enabled":true,"last_modified":1482945810281,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-06T15:39:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724691","name":"Mozilla Essentials (malware)","why":"Installs under false pretenses and delivers malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"18216e6f-9d70-816f-4d4c-63861f43ff3c","schema":1482945809444},{"guid":"flash@adobee.com","blockID":"i83","enabled":true,"last_modified":1482945810259,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-04-09T10:08:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743497","name":"FlashPlayer 11 (malware)","why":"This add-on is malware installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"09bb4661-331c-f7ba-865b-9e085dc437af","schema":1482945809444},{"guid":"youtube@2youtube.com","blockID":"i71","enabled":true,"last_modified":1482945810236,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-27T10:23:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730399","name":"YouTube extension (malware)","why":"Extension is malware, installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5d389c1f-b3a0-b06f-6ffb-d1e8aa055e3c","schema":1482945809444},{"guid":"webmaster@buzzzzvideos.info","blockID":"i58","enabled":true,"last_modified":1482945810213,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-01-31T14:51:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722844","name":"Buzz Video (malware)","why":"Malware add-on that is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f7aab105-e2c2-42f5-d9be-280eb9c0c8f7","schema":1482945809444},{"guid":"play5@vide04flash.com","blockID":"i92","enabled":true,"last_modified":1482945810191,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-05-15T13:27:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755443","name":"Lastest Flash PLayer (malware)","why":"This add-on impersonates a Flash Player update (poorly), and inserts malicious scripts into Facebook."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7190860e-fc1f-cd9f-5d25-778e1e9043b2","schema":1482945809444},{"guid":"support3_en@adobe122.com","blockID":"i97","enabled":true,"last_modified":1482945810168,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-28T13:42:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759164","name":"FlashPlayer 11 (malware)","why":"This add-on is malware disguised as the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"decf93a1-2bb0-148c-a1a6-10b3757b554b","schema":1482945809444},{"guid":"a1g0a9g219d@a1.com","blockID":"i73","enabled":true,"last_modified":1482945810146,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-15T15:03:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=736275","name":"Flash Player (malware)","why":"This add-on is malware disguised as Flash Player. It steals user cookies and sends them to a remote location."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6dd66b43-897d-874a-2227-54e240b8520f","schema":1482945809444},{"guid":"ghostviewer@youtube2.com","blockID":"i59","enabled":true,"last_modified":1482945810123,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-02T16:32:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723683","name":"Ghost Viewer (malware)","why":"Malicious add-on that automatically posts to Facebook."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"06dfe833-8c3d-90ee-3aa8-37c3c28f7c56","schema":1482945809444},{"guid":"{46551EC9-40F0-4e47-8E18-8E5CF550CFB8}","blockID":"i19","enabled":true,"last_modified":1482945810101,"details":{"who":"Users of Stylish version 1.1b1 for Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=621660","name":"Stylish","why":"Version 1.1b1 of this add-on causes compatibility issues with Firefox. Users should update to the latest version."},"versionRange":[{"targetApplication":[],"minVersion":"1.1b1","maxVersion":"1.1b1","severity":1}],"prefs":[],"id":"aaea37e1-ff86-4565-8bd5-55a6bf942791","schema":1482945809444},{"guid":"kdrgun@gmail.com","blockID":"i103","enabled":true,"last_modified":1482945810078,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-08T14:32:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","name":"Timeline Kapat (malware)","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a9a46ab2-2f56-1046-201c-5faa3435e248","schema":1482945809444},{"guid":"youtube2@youtube2.com","blockID":"i67","enabled":true,"last_modified":1482945810055,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-18T09:10:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=728476","name":"Youtube Online (malware)","why":"This add-on is malware, installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"14650ece-295b-a667-f9bc-a3d973e2228c","schema":1482945809444},{"guid":"masterfiler@gmail.com","blockID":"i12","enabled":true,"last_modified":1482945810032,"details":{"who":"All users of this add-on for all Mozilla applications.","created":"2010-02-05T15:01:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542081","name":"Master File (malware)","why":"This add-on is malware and attempts to install a Trojan on the user's computer."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a256d79d-5af8-92e9-a29d-350adf822efe","schema":1482945809444},{"guid":"{847b3a00-7ab1-11d4-8f02-006008948af5}","blockID":"i9","enabled":true,"last_modified":1482945810003,"details":{"who":"Users of Enigmail versions older than 0.97a for Thunderbird 3 and later.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=531047","name":"Enigmail","why":"This add-on causes a high volume of crashes and other stability issues. Users should <a href=\"https://addons.mozilla.org/en-US/thunderbird/addon/enigmail/\">update Enigmail</a>."},"versionRange":[{"targetApplication":[{"minVersion":"3.0pre","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"}],"minVersion":"0","maxVersion":"0.97a","severity":1}],"prefs":[],"id":"115f46b6-059d-202a-4373-2ca79b096347","schema":1482945809444},{"guid":"mozilla_cc@internetdownloadmanager.com","blockID":"i14","enabled":true,"last_modified":1482945809979,"details":{"who":"Users of Firefox 4 and later with Internet Download Manager version 6.9.8 and older.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578443","name":"Internet Download Manager","why":"This add-on causes a high volume of crashes and has other stability issues."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1pre","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"6.9.8","severity":1}],"prefs":[],"id":"773ffcfb-75d1-081d-7431-ebe3fa5dbb44","schema":1482945809444},{"guid":"admin@youtubeplayer.com","blockID":"i51","enabled":true,"last_modified":1482945809957,"details":{"who":"All Firefox users with this extension installed.","created":"2012-01-18T14:34:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=717165","name":"Youtube player (malware)","why":"This add-on is malware, doing nothing more than inserting advertisements into websites through iframes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"16b2ce94-88db-0d79-33fc-a93070ceb509","schema":1482945809444},{"guid":"personas@christopher.beard","blockID":"i15","enabled":true,"last_modified":1482945809934,"details":{"who":"All users of Personas Plus 1.6 in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=590978","name":"Personas Plus","why":"This version of Personas Plus is incompatible with certain Firefox functionality and other add-ons. Users should upgrade to the latest version."},"versionRange":[{"targetApplication":[{"minVersion":"3.6","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"3.6.*"}],"minVersion":"1.6","maxVersion":"1.6","severity":1}],"prefs":[],"id":"e36479c6-ca00-48d4-4fd9-ec677fd032da","schema":1482945809444},{"guid":"youtubeee@youtuber3.com","blockID":"i96","enabled":true,"last_modified":1482945809912,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-25T09:26:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=758503","name":"Divx 2012 Plugins (malware)","why":"This is a malicious add-on that is disguised as a DivX plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f01be9cb-5cf2-774a-a4d7-e210a24db5b9","schema":1482945809444},{"guid":"{3252b9ae-c69a-4eaf-9502-dc9c1f6c009e}","blockID":"i17","enabled":true,"last_modified":1482945809886,"details":{"who":"Users of version 2.2 of this add-on in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","name":"Default Manager (Microsoft)","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see <a href=\"http://support.microsoft.com/kb/2430460\">this article</a>."},"versionRange":[{"targetApplication":[],"minVersion":"2.2","maxVersion":"2.2","severity":1}],"prefs":[],"id":"38be28ac-2e30-37fa-4332-852a55fafb43","schema":1482945809444},{"guid":"{68b8676b-99a5-46d1-b390-22411d8bcd61}","blockID":"i93","enabled":true,"last_modified":1482945809863,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-05-16T10:44:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755635","name":"Zaman T\u00fcnelini Kald\u0131r! (malware)","why":"This is a malicious add-on that post content on Facebook accounts and steals user data."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"733aff15-9b1f-ec04-288f-b78a55165a1c","schema":1482945809444},{"guid":"applebeegifts@mozilla.doslash.org","blockID":"i54","enabled":true,"last_modified":1482945809840,"details":{"who":"All Firefox users that install this add-on.","created":"2012-01-26T16:17:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721562","name":"Applebees Gift Card (malware)","why":"Add-on is malware installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1372c8ab-5452-745a-461a-aa78e3e12c4b","schema":1482945809444},{"guid":"activity@facebook.com","blockID":"i65","enabled":true,"last_modified":1482945809437,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-13T15:41:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726803","name":"Facebook extension (malware)","why":"Add-on behaves maliciously and poses as an official Facebook add-on."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"79ad1c9b-0828-7823-4574-dd1cdd46c3d6","schema":1482945112982},{"guid":"jid0-EcdqvFOgWLKHNJPuqAnawlykCGZ@jetpack","blockID":"i62","enabled":true,"last_modified":1482945809415,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-06T14:46:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724650","name":"YouTube extension (malware)","why":"Add-on is installed under false pretenses and delivers malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5ae1e642-b53c-54c0-19e7-5562cfdac3a3","schema":1482945112982},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","blockID":"i25","enabled":true,"last_modified":1482945809393,"details":{"who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","created":"2011-03-14T15:53:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=637542","name":"McAfee SiteAdvisor","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0.1","maxVersion":"3.3.0.*","severity":1}],"prefs":[],"id":"c950501b-1f08-2ab2-d817-7c664c0d16fe","schema":1482945112982},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","blockID":"i38","enabled":true,"last_modified":1482945809371,"details":{"who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","created":"2011-05-27T13:55:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=660111","name":"McAfee SiteAdvisor","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"5.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"3.3.1","maxVersion":"*","severity":1}],"prefs":[],"id":"f11de388-4511-8d06-1414-95d3b2b122c5","schema":1482945112982},{"guid":"{3f963a5b-e555-4543-90e2-c3908898db71}","blockID":"i6","enabled":true,"last_modified":1482945809348,"details":{"who":"Users of AVG SafeSearch version 8.5 and older for all Mozilla applications.","created":"2009-06-17T13:12:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=527135","name":"AVG SafeSearch","why":"This add-on causes a high volume of crashes and causes other stability issues."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"8.5","severity":1}],"prefs":[],"id":"0d6f7d4c-bf5d-538f-1ded-ea4c6b775617","schema":1482945112982},{"guid":"langpack-vi-VN@firefox.mozilla.org","blockID":"i3","enabled":true,"last_modified":1482945809326,"details":{"who":"Users of Vietnamese Language Pack version 2.0 for all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=432406","name":"Vietnamese Language Pack","why":"Corrupted files. For more information, please see <a href=\"http://blog.mozilla.com/security/2008/05/07/compromised-file-in-vietnamese-language-pack-for-firefox-2/\">this blog post</a>."},"versionRange":[{"targetApplication":[],"minVersion":"2.0","maxVersion":"2.0","severity":1}],"prefs":[],"id":"51d4b581-d21c-20a1-6147-b17c3adc7867","schema":1482945112982},{"guid":"youtube@youtube7.com","blockID":"i55","enabled":true,"last_modified":1482945809304,"details":{"who":"All Firefox users with this add-on installed.","created":"2012-01-27T09:39:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721646","name":"Plugin Video (malware)","why":"This is malware posing as video software."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"08ceedf5-c7c1-f54f-db0c-02f01f0e319a","schema":1482945112982},{"guid":"crossriderapp3924@crossrider.com","blockID":"i76","enabled":true,"last_modified":1482945809279,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-22T10:38:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738282","name":"Fblixx (malware)","why":"This add-on compromises Facebook privacy and security and spams friends lists without user intervention."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"39d0a019-62fb-837b-1f1f-6831e56442b5","schema":1482945112982},{"guid":"{45147e67-4020-47e2-8f7a-55464fb535aa}","blockID":"i86","enabled":true,"last_modified":1482945809255,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-04-25T16:33:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748993","name":"Mukemmel Face+","why":"This add-on injects scripts into Facebook and performs malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"960443f9-cf48-0b71-1ff2-b8c34a3411ea","schema":1482945112982},{"guid":"{4B3803EA-5230-4DC3-A7FC-33638F3D3542}","blockID":"i4","enabled":true,"last_modified":1482945809232,"details":{"who":"Users of Firefox 3 and later with version 1.2 of Crawler Toolbar","created":"2008-07-08T10:23:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=441649","name":"Crawler Toolbar","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"1.2","maxVersion":"1.2","severity":1}],"prefs":[],"id":"a9818d53-3a6a-8673-04dd-2a16f5644215","schema":1482945112982},{"guid":"flashupdate@adobe.com","blockID":"i68","enabled":true,"last_modified":1482945809208,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-02-21T13:55:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","name":"Flash Update (malware)","why":"Add-on is malware, installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ba5b46e-790d-5af2-9580-a5f1e6e65522","schema":1482945112982},{"guid":"plugin@youtubeplayer.com","blockID":"i127","enabled":true,"last_modified":1482945809185,"details":{"who":"All users who have this add-on installed.","created":"2012-08-16T13:03:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=783356","name":"Youtube Facebook Player (malware)","why":"This add-on tries to pass as a YouTube player and runs malicious scripts on webpages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"17a8bece-e2df-a55d-8a72-95faff028b83","schema":1482945112982},{"guid":"GifBlock@facebook.com","blockID":"i79","enabled":true,"last_modified":1482945809162,"details":{"who":"All Firefox users who have installed this extension.","created":"2012-03-27T10:53:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739482","name":"Facebook Essentials (malware)","why":"This extension is malicious and is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"728451e8-1273-d887-37e9-5712b1cc3bff","schema":1482945112982},{"guid":"ff-ext@youtube","blockID":"i52","enabled":true,"last_modified":1482945809138,"details":{"who":"All Firefox users that have this add-on installed.","created":"2012-01-19T08:26:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719296","name":"Youtube player (malware)","why":"This add-on poses as a YouTube player while posting spam into Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cd2dd72a-dd52-6752-a0cd-a4b312fd0b65","schema":1482945112982},{"guid":"ShopperReports@ShopperReports.com","blockID":"i22","enabled":true,"last_modified":1482945809115,"details":{"who":"Users of Shopper Reports version 3.1.22.0 in Firefox 4 and later.","created":"2011-02-09T17:03:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=630191","name":"Shopper Reports","why":"This add-on causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[],"minVersion":"3.1.22.0","maxVersion":"3.1.22.0","severity":1}],"prefs":[],"id":"f26b049c-d856-750f-f050-996e6bec7cbb","schema":1482945112982},{"guid":"{27182e60-b5f3-411c-b545-b44205977502}","blockID":"i16","enabled":true,"last_modified":1482945809092,"details":{"who":"Users of version 1.0 of this add-on in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","name":"Search Helper Extension (Microsoft)","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see <a href=\"http://support.microsoft.com/kb/2430460\">this article</a>."},"versionRange":[{"targetApplication":[],"minVersion":"1.0","maxVersion":"1.0","severity":1}],"prefs":[],"id":"2655f230-11f3-fe4c-7c3d-757d37d5f9a5","schema":1482945112982},{"guid":"{841468a1-d7f4-4bd3-84e6-bb0f13a06c64}","blockID":"i46","enabled":true,"last_modified":1482945809069,"details":{"who":"Users of all versions of Nectar Search Toolbar in Firefox 9.","created":"2011-12-20T11:38:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=712369","name":"Nectar Search Toolbar","why":"This add-on causes crashes and other stability issues in Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"9.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.0"}],"minVersion":"0.1","maxVersion":"*","severity":1}],"prefs":[],"id":"b660dabd-0dc0-a55c-4b86-416080b345d9","schema":1482945112982},{"guid":"support@daemon-tools.cc","blockID":"i5","enabled":true,"last_modified":1482945809045,"details":{"who":"Users of Daemon Tools Toolbar version 1.0.0.5 and older for all Mozilla applications.","created":"2009-02-13T18:39:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=459850","name":"Daemon Tools Toolbar","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0.0.5","severity":1}],"prefs":[],"id":"8cabafd3-576a-b487-31c8-ab59e0349a0e","schema":1482945112982},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","blockID":"i53","enabled":true,"last_modified":1482945809021,"details":{"who":"All users of Firefox with this add-on installed.","created":"2012-01-19T15:58:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719605","name":"Peliculas-FLV (malware)","why":"This add-on is being offered as an online movie viewer, when it reality it only inserts scripts and ads into known sites."},"versionRange":[{"targetApplication":[],"minVersion":"2.0.3","maxVersion":"2.0.3","severity":3}],"prefs":[],"id":"07bc0962-60da-087b-c3ab-f2a6ab84d81c","schema":1482945112982},{"guid":"royal@facebook.com","blockID":"i64","enabled":true,"last_modified":1482945808997,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-09T13:24:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=725777","name":"Facebook ! (malware)","why":"Malicious add-on posing as a Facebook tool."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dd1d2623-0d15-c93e-8fbd-ba07b0299a44","schema":1482945112982},{"guid":"{28bfb930-7620-11e1-b0c4-0800200c9a66}","blockID":"i108","enabled":true,"last_modified":1482945808973,"details":{"who":"All Firefox user who have this add-on installed.","created":"2012-06-21T09:24:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=766852","name":"Aplicativo (malware)","why":"This is malware disguised as an Adobe product. It spams Facebook pages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"908dc4fb-ebc9-cea1-438f-55e4507ba834","schema":1482945112982},{"guid":"socialnetworktools@mozilla.doslash.org","blockID":"i78","enabled":true,"last_modified":1482945808950,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-26T16:46:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739441","name":"Social Network Tools (malware)","why":"This add-on hijacks the Facebook UI and adds scripts to track users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1064cd25-3b87-64bb-b0a6-2518ad281574","schema":1482945112982},{"guid":"youtubeeing@youtuberie.com","blockID":"i98","enabled":true,"last_modified":1482945808927,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-30T09:30:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759663","name":"Youtube Video Player (malware)","why":"This add-on is malware disguised as a Youtube add-on."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3484f860-56e1-28e8-5a70-cdcd5ab9d6ee","schema":1482945112982},{"guid":"{3a12052a-66ef-49db-8c39-e5b0bd5c83fa}","blockID":"i101","enabled":true,"last_modified":1482945808904,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-06-05T18:37:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761874","name":"Timeline Remove (malware)","why":"This add-on is malware disguised as a Facebook timeline remover."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b01b321b-6628-7166-bd15-52f21a04d8bd","schema":1482945112982},{"guid":"pfzPXmnzQRXX6@2iABkVe.com","blockID":"i99","enabled":true,"last_modified":1482945808881,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-05-30T17:10:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759950","name":"Flash Player (malware)","why":"This add-on is malware disguised as a Flash Player update."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"29cc4abc-4f52-01f1-eb0b-cad84ba4db13","schema":1482945112982},{"guid":"/^(@pluginscribens_firefox|extension@vidscrab.com|firefox@jjj.ee|firefox@shop-reward.de|FxExtPasteNGoHtk@github.lostdj|himanshudotrai@gmail.com|jid0-bigoD0uivzAMmt07zrf3OHqa418@jetpack|jid0-iXbAR01tjT2BsbApyS6XWnjDhy8@jetpack)$/","blockID":"i1423","enabled":true,"last_modified":1482343886390,"details":{"who":"All users who have any of the affected versions installed.","created":"2016-12-21T17:21:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","name":"Various vulnerable add-on versions","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a58a2836-e4e7-74b5-c109-fa3d41e9ed56","schema":1482341309012},{"guid":"/^(pdftoword@addingapps.com|jid0-EYTXLS0GyfQME5irGbnD4HksnbQ@jetpack|jid1-ZjJ7t75BAcbGCX@jetpack)$/","blockID":"i1425","enabled":true,"last_modified":1482343886365,"details":{"who":"All users who have any of the affected versions installed.","created":"2016-12-21T17:23:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","name":"Various vulnerable add-on versions","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"150e639f-c832-63d0-a775-59313b2e1bf9","schema":1482341309012},{"guid":"{cc8f597b-0765-404e-a575-82aefbd81daf}","blockID":"i380","enabled":true,"last_modified":1480349217152,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-06-19T13:03:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866332","name":"Update My Browser (malware)","why":"This is a malicious add-on that hijacks Facebook accounts and performs unwanted actions on behalf of the user."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4950d7aa-c602-15f5-a7a2-d844182d5cbd","schema":1480349193877},{"guid":"extension@FastFreeConverter.com","blockID":"i470","enabled":true,"last_modified":1480349217071,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"649dd933-debf-69b7-020f-496c2c9f99c8","schema":1480349193877},{"guid":"59D317DB041748fdB89B47E6F96058F3@jetpack","blockID":"i694","enabled":true,"last_modified":1480349217005,"details":{"who":"All Firefox users who have this add-ons installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-21T13:46:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053540","name":"JsInjectExtension","why":"This is a suspicious add-on that appears to be installed without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"75692bd4-18e5-a9be-7ec3-9327e159ef68","schema":1480349193877},{"guid":"/^({bfec236d-e122-4102-864f-f5f19d897f5e}|{3f842035-47f4-4f10-846b-6199b07f09b8}|{92ed4bbd-83f2-4c70-bb4e-f8d3716143fe})$/","blockID":"i527","enabled":true,"last_modified":1480349216927,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:13:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","name":"KeyBar add-on","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and uses multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6d68dd97-7965-0a84-8ca7-435aac3c8040","schema":1480349193877},{"guid":"support@vide1flash2.com","blockID":"i246","enabled":true,"last_modified":1480349216871,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-01-14T09:17:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=830159","name":"Lastest Adobe Flash Player (malware)","why":"This is an add-on that poses as the Adobe Flash Player and runs malicious code in the user's system."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2004fba1-74bf-a072-2a59-6e0ba827b541","schema":1480349193877},{"guid":"extension21804@extension21804.com","blockID":"i312","enabled":true,"last_modified":1480349216827,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-06T14:14:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","name":"Coupon Companion","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"b2cf1256-dadd-6501-1f4e-25902d408692","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i602","enabled":true,"last_modified":1480349216765,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:18:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.8","maxVersion":"3.15.8.*","severity":1}],"prefs":[],"id":"b2b4236d-5d4d-82b2-99cd-00ff688badf1","schema":1480349193877},{"guid":"nosquint@urandom.ca","blockID":"i1232","enabled":true,"last_modified":1480349216711,"details":{"who":"Users on Firefox 47, and higher, using version 2.1.9.1, and earlier, of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-06-10T17:12:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279561","name":"NoSquint","why":"The add-on is breaking the in-built zoom functionality on Firefox 47."},"versionRange":[{"targetApplication":[{"minVersion":"47","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"2.1.9.1-signed.1-signed","severity":1}],"prefs":[],"id":"30e0a35c-056a-054b-04f3-ade68b83985a","schema":1480349193877},{"guid":"{FE1DEEEA-DB6D-44b8-83F0-34FC0F9D1052}","blockID":"i364","enabled":true,"last_modified":1480349216652,"details":{"who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager.","created":"2013-06-10T16:14:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867670","name":"IB Updater","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a59b967c-66ca-7ad9-2dc6-d0ad37ded5fd","schema":1480349193877},{"guid":"vpyekkifgv@vpyekkifgv.org","blockID":"i352","enabled":true,"last_modified":1480349216614,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-14T13:42:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=872211","name":"SQLlite Addon (malware)","why":"Uses a deceptive name and injects ads into pages without user consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8fd981ab-7ee0-e367-d804-0efe29d63178","schema":1480349193877},{"guid":"/^firefox@(albrechto|swiftbrowse|springsmart|storimbo|squirrelweb|betterbrowse|lizardlink|rolimno|browsebeyond|clingclang|weblayers|kasimos|higher-aurum|xaven|bomlabio)\\.(com?|net|org|info|biz)$/","blockID":"i549","enabled":true,"last_modified":1480349216570,"details":{"who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","created":"2014-01-30T15:08:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","name":"Yontoo add-ons","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3a124164-b177-805b-06f7-70a358b37e08","schema":1480349193877},{"guid":"thefoxonlybetter@quicksaver","blockID":"i702","enabled":true,"last_modified":1480349216512,"details":{"who":"All Firefox users who have any of these versions of the add-on installed.","created":"2014-08-27T10:05:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","name":"The Fox, Only Better (malicious versions)","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"1.10","maxVersion":"*","severity":3}],"prefs":[],"id":"60e54f6a-1b10-f889-837f-60a76a98fccc","schema":1480349193877},{"guid":"/@(ft|putlocker|clickmovie|m2k|sharerepo|smarter-?)downloader\\.com$/","blockID":"i396","enabled":true,"last_modified":1480349216487,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T12:48:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881454","name":"PutLockerDownloader and related","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e98ba6e3-f2dd-fdee-b106-3e0d2a03cda4","schema":1480349193877},{"guid":"my7thfakeid@gmail.com","blockID":"i1262","enabled":true,"last_modified":1480349216460,"details":{"who":"Anyone who has this add-on installed.","created":"2016-08-17T10:54:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1295616","name":"Remote Keylogger test 0 addon","why":"This add-on is a keylogger that sends the data to a remote server, and goes under the name Real_player.addon."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"81b380c0-8092-ea5e-11cd-54c7f563ff5a","schema":1480349193877},{"guid":"{f0e59437-6148-4a98-b0a6-60d557ef57f4}","blockID":"i304","enabled":true,"last_modified":1480349216402,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-02-27T13:10:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845975","name":"WhiteSmoke B","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">installation guidelines</a> and is dropped silently into user's profiles."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"0469e643-1a90-f9be-4aad-b347469adcbe","schema":1480349193877},{"guid":"firebug@software.joehewitt.com","blockID":"i75","enabled":true,"last_modified":1480349216375,"details":{"who":"All Firefox 9 users on Mac OS X or Linux who have Firebug 1.9.0 installed.","created":"2012-03-21T16:00:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=718831","name":"Firebug","why":"Firebug 1.9.0 creates stability problems on Firefox 9, on Mac OS X and Linux. Upgrading to Firefox 10 or later, or upgrading to Firebug 1.9.1 or later fixes this problem."},"versionRange":[{"targetApplication":[{"minVersion":"9.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.*"}],"minVersion":"1.9.0","maxVersion":"1.9.0","severity":1}],"prefs":[],"os":"Darwin,Linux","id":"a1f9f055-ef34-1412-c39f-35605a70d031","schema":1480349193877},{"guid":"xz123@ya456.com","blockID":"i486","enabled":true,"last_modified":1480349215808,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-15T13:34:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","name":"BetterSurf (malware)","why":"This add-on appears to be malware and is installed silently in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b9825a25-a96c-407e-e656-46a7948e5745","schema":1480349193877},{"guid":"{C7AE725D-FA5C-4027-BB4C-787EF9F8248A}","blockID":"i424","enabled":true,"last_modified":1480349215779,"details":{"who":"Users of Firefox 23 or later who have RelevantKnowledge 1.0.0.2 or lower.","created":"2013-07-01T10:45:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=860641","name":"RelevantKnowledge 1.0.0.2 and lower","why":"Old versions of this add-on are causing startup crashes in Firefox 23, currently on the Beta channel. RelevantKnowledge users on Firefox 23 and above should update to version 1.0.0.3 of the add-on."},"versionRange":[{"targetApplication":[{"minVersion":"23.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"1.0.0.2","severity":1}],"prefs":[],"id":"c888d167-7970-4b3f-240f-2d8e6f14ded4","schema":1480349193877},{"guid":"{5C655500-E712-41e7-9349-CE462F844B19}","blockID":"i966","enabled":true,"last_modified":1480349215743,"details":{"who":"All users who have this add-on installed.","created":"2015-07-17T13:42:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1175425","name":"Quick Translator","why":"This add-on is vulnerable to a cross-site scripting attack, putting users at risk when using it in arbitrary websites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0.1-signed","severity":1}],"prefs":[],"id":"f34b00a6-c783-7851-a441-0d80fb1d1031","schema":1480349193877},{"guid":"superlrcs@svenyor.net","blockID":"i545","enabled":true,"last_modified":1480349215672,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-01-30T11:52:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","name":"SuperLyrics","why":"This add-on is in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, using multiple add-on IDs and potentially doing other unwanted activities."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"002cd4fa-4c2b-e28b-9220-4a520f4d9ec6","schema":1480349193877},{"guid":"mbrsepone@facebook.com","blockID":"i479","enabled":true,"last_modified":1480349215645,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-11T15:42:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937331","name":"Mozilla Lightweight Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0549645e-5f50-5089-1f24-6e7d3bfab8e0","schema":1480349193877},{"guid":"/^brasilescape.*\\@facebook\\.com$/","blockID":"i453","enabled":true,"last_modified":1480349215591,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2013-09-20T09:54:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=918566","name":"Brasil Escape (malware)","why":"This is a group of malicious add-ons that use deceitful names like \"Facebook Video Pack\" or \"Mozilla Service Pack\" and hijack Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8e6b1176-1794-2117-414e-f0821443f27b","schema":1480349193877},{"guid":"foxyproxy-basic@eric.h.jung","blockID":"i952","enabled":true,"last_modified":1480349215536,"details":{"who":"All users who have this add-on installed on Thunderbird 38 and above.","created":"2015-07-15T09:35:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","name":"FoxyProxy Basic for Thunderbird","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above."},"versionRange":[{"targetApplication":[{"minVersion":"38.0a2","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"},{"minVersion":"2.35","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"0","maxVersion":"3.5.5","severity":1}],"prefs":[],"id":"81658491-feda-2ed3-3c6c-8e60c2b73aee","schema":1480349193877},{"guid":"mbroctone@facebook.com","blockID":"i476","enabled":true,"last_modified":1480349215504,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-08T15:32:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936590","name":"Mozilla Storage Service (malware)","why":"This add-on is malware that hijacks the users' Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"92198396-8756-8d09-7f18-a68d29894f71","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i616","enabled":true,"last_modified":1480349215479,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:24:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.28","maxVersion":"3.15.28.*","severity":1}],"prefs":[],"id":"f11b485f-320e-233c-958b-a63377024fad","schema":1480349193877},{"guid":"/^({e9df9360-97f8-4690-afe6-996c80790da4}|{687578b9-7132-4a7a-80e4-30ee31099e03}|{46a3135d-3683-48cf-b94c-82655cbc0e8a}|{49c795c2-604a-4d18-aeb1-b3eba27e5ea2}|{7473b6bd-4691-4744-a82b-7854eb3d70b6}|{96f454ea-9d38-474f-b504-56193e00c1a5})$/","blockID":"i494","enabled":true,"last_modified":1480349215454,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-02T14:52:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","name":"uTorrent and related","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. It also uses multiple add-on IDs for no apparent reason. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"485210d0-8e69-3436-536f-5d1deeea4167","schema":1480349193877},{"guid":"{EB7508CA-C7B2-46E0-8C04-3E94A035BD49}","blockID":"i162","enabled":true,"last_modified":1480349215428,"details":{"who":"All Firefox users who have installed any of these add-ons.","created":"2012-10-11T12:25:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=799266","name":"Mozilla Safe Browsing and others (Medfos malware)","why":"This block covers a number of malicious add-ons that deceive users, using names like \"Mozilla Safe Browsing\" and \"Translate This!\", and claiming they are developed by \"Mozilla Corp.\". They hijack searches and redirects users to pages they didn't intend to go to.\r\n\r\nNote: this block won't be active until bug 799266 is fixed."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"07566aa3-4ff9-ac4f-9de9-71c77454b4da","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i614","enabled":true,"last_modified":1480349215399,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:23:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.26","maxVersion":"3.15.26.*","severity":1}],"prefs":[],"id":"ede541f3-1748-7b33-9bd6-80e2f948e14f","schema":1480349193877},{"guid":"/^({976cd962-e0ca-4337-aea7-d93fae63a79c}|{525ba996-1ce4-4677-91c5-9fc4ead2d245}|{91659dab-9117-42d1-a09f-13ec28037717}|{c1211069-1163-4ba8-b8b3-32fc724766be})$/","blockID":"i522","enabled":true,"last_modified":1480349215360,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:15:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","name":"appbario7","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"580aed26-dc3b-eef8-fa66-a0a402447b7b","schema":1480349193877},{"guid":"jid0-O6MIff3eO5dIGf5Tcv8RsJDKxrs@jetpack","blockID":"i552","enabled":true,"last_modified":1480349215327,"details":{"who":"All Firefox users who have this extension installed.","created":"2014-02-19T15:26:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","name":"Extension_Protected (malware)","why":"This extension is malware that attempts to make it impossible for a second extension and itself to be disabled, and also forces the new tab page to have a specific URL."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e53063b4-5702-5b66-c860-d368cba4ccb6","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i604","enabled":true,"last_modified":1480349215302,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:18:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.10","maxVersion":"3.15.11.*","severity":1}],"prefs":[],"id":"b910f779-f36e-70e1-b17a-8afb75988c03","schema":1480349193877},{"guid":"brasilescapefive@facebook.com","blockID":"i483","enabled":true,"last_modified":1480349215276,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T09:37:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938473","name":"Facebook Video Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"85ee7840-f262-ad30-eb91-74b3248fd13d","schema":1480349193877},{"guid":"brasilescapeeight@facebook.com","blockID":"i482","enabled":true,"last_modified":1480349215249,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T09:36:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938476","name":"Mozilla Security Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"457a5722-be90-5a9f-5fa0-4c753e9f324c","schema":1480349193877},{"guid":"happylyrics@hpyproductions.net","blockID":"i370","enabled":true,"last_modified":1480349215225,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-06-11T15:42:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881815","name":"Happy Lyrics","why":"This add-on is silently installed into Firefox without the users' consent, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"730e616d-94a7-df0c-d31a-98b7875d60c2","schema":1480349193877},{"guid":"search-snacks@search-snacks.com","blockID":"i872","enabled":true,"last_modified":1480349215198,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-03-04T14:37:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082733","name":"Search Snacks","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"7567b06f-98fb-9400-8007-5d0357c345d9","schema":1480349193877},{"guid":"{ABDE892B-13A8-4d1b-88E6-365A6E755758}","blockID":"i107","enabled":true,"last_modified":1480349215173,"details":{"who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","created":"2012-06-14T13:54:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=764210","name":"RealPlayer Browser Record Plugin","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our <a href=\"http://support.mozilla.com/\">support site</a> for help."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"15.0.5","severity":1}],"prefs":[],"os":"WINNT","id":"e3b89e55-b35f-8694-6f0e-f856e57a191d","schema":1480349193877},{"guid":"/(\\{7aeae561-714b-45f6-ace3-4a8aed6e227b\\})|(\\{01e86e69-a2f8-48a0-b068-83869bdba3d0\\})|(\\{77f5fe49-12e3-4cf5-abb4-d993a0164d9e\\})/","blockID":"i436","enabled":true,"last_modified":1480349215147,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T15:04:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891606","name":"Visual Bee","why":"This add-on doesn't follow the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, changing Firefox default settings and not reverting them on uninstall. If you want to continue using this add-on, it can be enabled in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ad6dc811-ab95-46fa-4bff-42186c149980","schema":1480349193877},{"guid":"amo-validator-bypass@example.com","blockID":"i1058","enabled":true,"last_modified":1480349214743,"details":{"who":"All users who install this add-on.","created":"2015-11-24T09:03:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1227605","name":" AMO Validator Bypass","why":"This add-on is a proof of concept of a malicious add-on that bypasses the code validator."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"86e38e3e-a729-b5a2-20a8-4738b376eea6","schema":1480349193877},{"guid":"6lIy@T.edu","blockID":"i852","enabled":true,"last_modified":1480349214613,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:30:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","name":"unIsaless","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"39798bc2-9c75-f172-148b-13f3ca1dde9b","schema":1480349193877},{"guid":"{394DCBA4-1F92-4f8e-8EC9-8D2CB90CB69B}","blockID":"i100","enabled":true,"last_modified":1480349214568,"details":{"who":"All Firefox users who have Lightshot 2.5.0 installed.","created":"2012-06-05T09:24:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761339","name":"Lightshot","why":"The Lightshot add-on, version 2.5.0, is causing widespread and frequent crashes in Firefox. Lightshot users are strongly recommended to update to version 2.6.0 as soon as possible."},"versionRange":[{"targetApplication":[],"minVersion":"2.5.0","maxVersion":"2.5.0","severity":1}],"prefs":[],"id":"57829ea2-5a95-1b6e-953c-7c4a7b3b21ac","schema":1480349193877},{"guid":"{a7f2cb14-0472-42a1-915a-8adca2280a2c}","blockID":"i686","enabled":true,"last_modified":1480349214537,"details":{"who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","created":"2014-08-06T16:35:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033809","name":"HomeTab","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"33a8f403-b2c8-cadf-e1ba-40b39edeaf18","schema":1480349193877},{"guid":"{CA8C84C6-3918-41b1-BE77-049B2BDD887C}","blockID":"i862","enabled":true,"last_modified":1480349214479,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T12:51:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131230","name":"Ebay Shopping Assistant by Spigot","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"9a9d6da2-90a1-5b71-8b24-96492d57dfd1","schema":1480349193877},{"guid":"update@firefox.com","blockID":"i374","enabled":true,"last_modified":1480349214427,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-06-18T13:58:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781088","name":"Premium Update (malware)","why":"This is a malicious extension that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bb388413-60ea-c9d6-9a3b-c90df950c319","schema":1480349193877},{"guid":"sqlmoz@facebook.com","blockID":"i350","enabled":true,"last_modified":1480349214360,"details":{"who":"All Firefox users who have this extension installed.","created":"2013-05-13T09:43:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=871610","name":"Mozilla Service Pack (malware)","why":"This extension is malware posing as Mozilla software. It hijacks Facebook accounts and spams other Facebook users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"715082e8-7a30-b27b-51aa-186c38e078f6","schema":1480349193877},{"guid":"iobitapps@mybrowserbar.com","blockID":"i562","enabled":true,"last_modified":1480349214299,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-02-27T10:00:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=948695","name":"IObit Apps Toolbar","why":"This add-on is installed silently and changes users settings without reverting them, in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"be9a54f6-20c1-7dee-3aea-300b336b2ae5","schema":1480349193877},{"guid":"{9e09ac65-43c0-4b9d-970f-11e2e9616c55}","blockID":"i376","enabled":true,"last_modified":1480349214246,"details":{"who":"All Firefox users who have installed this add-on.","created":"2013-06-18T14:16:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=857847","name":"The Social Networks (malware)","why":"This add-on is malware that hijacks Facebook accounts and posts content on it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"753638b4-65ca-6d71-f1f5-ce32ba2edf3b","schema":1480349193877},{"guid":"mozillahmpg@mozilla.org","blockID":"i140","enabled":true,"last_modified":1480349214216,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-09-17T16:04:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=791867","name":"Google YouTube HD Player (malware)","why":"This is a malicious add-on that tries to monetize on its users by embedding unauthorized affiliate codes on shopping websites, and sometimes redirecting users to alternate sites that could be malicious in nature."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"98150e2e-cb45-1fee-8458-28d3602ec2ec","schema":1480349193877},{"guid":"astrovia@facebook.com","blockID":"i489","enabled":true,"last_modified":1480349214157,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-25T12:40:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942699","name":"Facebook Security Service (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6f365ff4-e48f-8a06-d19d-55e19fba81f4","schema":1480349193877},{"guid":"{bbea93c6-64a3-4a5a-854a-9cc61c8d309e}","blockID":"i1126","enabled":true,"last_modified":1480349214066,"details":{"who":"All users who have this add-on installed.","created":"2016-02-29T21:58:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","name":"Tab Extension (malware)","why":"This is a malicious add-on that disables various security checks in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5acb9dcc-59d4-46d1-2a11-1194c4948239","schema":1480349193877},{"guid":"ffxtlbr@iminent.com","blockID":"i628","enabled":true,"last_modified":1480349214036,"details":{"who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","created":"2014-06-26T15:47:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","name":"Iminent Minibar","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"4387ad94-8500-d74d-68e3-20564a9aac9e","schema":1480349193877},{"guid":"{28387537-e3f9-4ed7-860c-11e69af4a8a0}","blockID":"i40","enabled":true,"last_modified":1480349214002,"details":{"who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","created":"2011-07-19T10:19:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","name":"MediaBar (2)","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"4.3.1.00","severity":1}],"prefs":[],"id":"ff95664b-93e4-aa73-ac20-5ffb7c87d8b7","schema":1480349193877},{"guid":"{41e5ef7a-171d-4ab5-8351-951c65a29908}","blockID":"i784","enabled":true,"last_modified":1480349213962,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-14T14:37:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"HelpSiteExpert","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0c05a0bb-30b4-979e-33a7-9f3955eba17d","schema":1480349193877},{"guid":"/^({2d7886a0-85bb-4bf2-b684-ba92b4b21d23}|{2fab2e94-d6f9-42de-8839-3510cef6424b}|{c02397f7-75b0-446e-a8fa-6ef70cfbf12b}|{8b337819-d1e8-48d3-8178-168ae8c99c36}|firefox@neurowise.info|firefox@allgenius.info)$/","blockID":"i762","enabled":true,"last_modified":1480349213913,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:58:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082599","name":"SaveSense, neurowise, allgenius","why":"These add-ons are silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c5439f55-ace5-ad73-1270-017c0ba7b2ce","schema":1480349193877},{"guid":"{462be121-2b54-4218-bf00-b9bf8135b23f}","blockID":"i226","enabled":true,"last_modified":1480349213879,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:27:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","name":"WhiteSmoke","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"994c6084-e864-0e4e-ac91-455083ee46c7","schema":1480349193877},{"guid":"firefox@browsefox.com","blockID":"i546","enabled":true,"last_modified":1480349213853,"details":{"who":"All Firefox users who have this add-on installed. If you want to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-01-30T12:26:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936244","name":"BrowseFox","why":"This add-on is silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"407d8c84-8939-cd28-b284-9b680e529bf6","schema":1480349193877},{"guid":"{6926c7f7-6006-42d1-b046-eba1b3010315}","blockID":"i382","enabled":true,"last_modified":1480349213825,"details":{"who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it again in the Add-ons Manager.","created":"2013-06-25T12:05:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844956","name":"appbario7","why":"This add-on is silently installed, bypassing the Firefox opt-in screen and violating our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"2367bd94-2bdd-c615-de89-023ba071a443","schema":1480349193877},{"guid":"faststartff@gmail.com","blockID":"i866","enabled":true,"last_modified":1480349213799,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T13:12:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131217","name":"Fast Start","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9e730bca-c7d1-da82-64f6-c74de216cb7d","schema":1480349193877},{"guid":"05dd836e-2cbd-4204-9ff3-2f8a8665967d@a8876730-fb0c-4057-a2fc-f9c09d438e81.com","blockID":"i468","enabled":true,"last_modified":1480349213774,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T14:43:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935135","name":"Trojan.DownLoader9.50268 (malware)","why":"This add-on appears to be part of a <a href=\"https://www.drwebhk.com/en/virus_techinfo/Trojan.DownLoader9.50268.html\">Trojan software</a> package."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2fd53d9b-7096-f1fb-fbcb-2b40a6193894","schema":1480349193877},{"guid":"jid1-0xtMKhXFEs4jIg@jetpack","blockID":"i586","enabled":true,"last_modified":1480349213717,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-03T15:50:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011286","name":"ep (malware)","why":"This add-on appears to be malware installed without user consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"50ca2179-83ab-1817-163d-39ed2a9fbd28","schema":1480349193877},{"guid":"/^({16e193c8-1706-40bf-b6f3-91403a9a22be}|{284fed43-2e13-4afe-8aeb-50827d510e20}|{5e3cc5d8-ed11-4bed-bc47-35b4c4bc1033}|{7429e64a-1fd4-4112-a186-2b5630816b91}|{8c9980d7-0f09-4459-9197-99b3e559660c}|{8f1d9545-0bb9-4583-bb3c-5e1ac1e2920c})$/","blockID":"i517","enabled":true,"last_modified":1480349213344,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:54:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","name":"Re-markit","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing the add-on, and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e88a28ab-5569-f06d-b0e2-15c51bb2a4b7","schema":1480349193877},{"guid":"safebrowse@safebrowse.co","blockID":"i782","enabled":true,"last_modified":1480349213319,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-12T14:20:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1097696","name":"SafeBrowse","why":"This add-on loads scripts with malicious code that appears intended to steal usernames, passwords, and other private information."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"edd81c91-383b-f041-d8f6-d0b9a90230bd","schema":1480349193877},{"guid":"{af95cc15-3b9b-45ae-8d9b-98d08eda3111}","blockID":"i492","enabled":true,"last_modified":1480349213294,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-02T12:45:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945126","name":"Facebook (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7064e9e2-fba4-7b57-86d7-6f4afbf6f560","schema":1480349193877},{"guid":"{84a93d51-b7a9-431e-8ff8-d60e5d7f5df1}","blockID":"i744","enabled":true,"last_modified":1480349213264,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:47:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","name":"Spigot Shopping Assistant","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"dbc7ef8b-2c48-5dae-73a0-f87288c669f0","schema":1480349193877},{"guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","blockID":"i918","enabled":true,"last_modified":1480349213231,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-02T09:58:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7f2a68f3-aa8a-ae41-1e48-d1f8f63d53c7","schema":1480349193877},{"guid":"831778-poidjao88DASfsAnindsd@jetpack","blockID":"i972","enabled":true,"last_modified":1480349213194,"details":{"who":"All users who have this add-on installed.","created":"2015-08-04T15:18:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190962","name":"Video patch (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"39471221-6926-e11b-175a-b28424d49bf6","schema":1480349193877},{"guid":"lbmsrvfvxcblvpane@lpaezhjez.org","blockID":"i342","enabled":true,"last_modified":1480349213128,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-06T16:18:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863385","name":"RapidFinda","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. It also appears to install itself both locally and globally, producing a confusing uninstall experience."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"98fb4536-07a4-d03a-f7c5-945acecc8203","schema":1480349193877},{"guid":"{babb9931-ad56-444c-b935-38bffe18ad26}","blockID":"i499","enabled":true,"last_modified":1480349213100,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:22:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946086","name":"Facebook Credits (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"be1d19fa-1662-322a-13e6-5fa5474f33a7","schema":1480349193877},{"guid":"{18d5a8fe-5428-485b-968f-b97b05a92b54}","blockID":"i802","enabled":true,"last_modified":1480349213074,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-15T10:52:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","name":"Astromenda Search Addon","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"bc846147-cdc1-141f-5846-b705c48bd6ed","schema":1480349193877},{"guid":"{b6ef1336-69bb-45b6-8cba-e578fc0e4433}","blockID":"i780","enabled":true,"last_modified":1480349213024,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-12T14:00:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Power-SW","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3b080157-2900-d071-60fe-52b0aa376cf0","schema":1480349193877},{"guid":"info@wxdownloadmanager.com","blockID":"i196","enabled":true,"last_modified":1480349212999,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-11-05T09:24:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b62597d0-d2cb-d597-7358-5143a1d13658","schema":1480349193877},{"guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","blockID":"i111","enabled":true,"last_modified":1480349212971,"details":{"who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","created":"2012-07-10T15:28:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=771802","name":"RealPlayer Browser Record Plugin","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our <a href=\"http://support.mozilla.com/\">support site</a> for help."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"15.0.5","severity":1}],"prefs":[],"os":"WINNT","id":"d3f96257-7635-555f-ef48-34d426322992","schema":1480349193877},{"guid":"l@AdLJ7uz.net","blockID":"i728","enabled":true,"last_modified":1480349212911,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-16T16:34:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"GGoSavee","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"e6bfa340-7d8a-1627-5cdf-40c0c4982e9d","schema":1480349193877},{"guid":"{6b2a75c8-6e2e-4267-b955-43e25b54e575}","blockID":"i698","enabled":true,"last_modified":1480349212871,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-08-21T15:46:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052611","name":"BrowserShield","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"492e4e43-f89f-da58-9c09-d99528ee9ca9","schema":1480349193877},{"guid":"/^({65f9f6b7-2dae-46fc-bfaf-f88e4af1beca}|{9ed31f84-c8b3-4926-b950-dff74047ff79}|{0134af61-7a0c-4649-aeca-90d776060cb3}|{02edb56b-9b33-435b-b7df-b2843273a694}|{da51d4f6-3e7e-4ef8-b400-9198e0874606}|{b24577db-155e-4077-bb37-3fdd3c302bb5})$/","blockID":"i525","enabled":true,"last_modified":1480349212839,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:11:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","name":"KeyBar add-on","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and using multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"78562d79-9a64-c259-fb63-ce24e29bb141","schema":1480349193877},{"guid":"adsremoval@adsremoval.net","blockID":"i560","enabled":true,"last_modified":1480349212798,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-02-27T09:57:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=962793","name":"Ad Removal","why":"This add-on is silently installed and changes various user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"4d150ad4-dc22-9790-07a9-36e0a23f857f","schema":1480349193877},{"guid":"firefoxaddon@youtubeenhancer.com","blockID":"i445","enabled":true,"last_modified":1480349212747,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-04T16:53:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=911966","name":"YouTube Enhancer Plus (malware)","why":"This is a malicious add-on that imitates a popular video downloader extension, and attempts to hijack Facebook accounts. The add-on available in the add-ons site is safe to use."},"versionRange":[{"targetApplication":[],"minVersion":"208.7.0","maxVersion":"208.7.0","severity":3}],"prefs":[],"id":"41d75d3f-a57e-d5ad-b95b-22f5fa010b4e","schema":1480349193877},{"guid":"suchpony@suchpony.de","blockID":"i1264","enabled":true,"last_modified":1480349212719,"details":{"who":"All users who have version 1.6.7 or less of this add-on installed.","created":"2016-08-24T10:48:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"Suchpony (pre 1.6.8)","why":"Old versions of this add-on contained code from YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity.  Version 1.6.8 is now okay."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.6.7","severity":3}],"prefs":[],"id":"1bbf00f3-53b5-3777-43c7-0a0b11f9c433","schema":1480349193877},{"guid":"{336D0C35-8A85-403a-B9D2-65C292C39087}","blockID":"i224","enabled":true,"last_modified":1480349212655,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:22:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812292","name":"IB Updater","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c87666e6-ec9a-2f1e-ad03-a722d2fa2a25","schema":1480349193877},{"guid":"G4Ce4@w.net","blockID":"i718","enabled":true,"last_modified":1480349212277,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-02T12:21:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"YoutUbeAdBlaocke","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"3e1e9322-93e9-4ce1-41f5-46ad4ef1471b","schema":1480349193877},{"guid":"extension@Fast_Free_Converter.com","blockID":"i533","enabled":true,"last_modified":1480349212247,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T15:04:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949597","name":"FastFreeConverter","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"726f5645-c0bf-66dc-a97a-d072b46e63e7","schema":1480349193877},{"guid":"@stopad","blockID":"i1266","enabled":true,"last_modified":1480349212214,"details":{"who":"Users who have version 0.0.4 and earlier of the add-on installed.","created":"2016-08-30T12:24:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298780","name":"Stop Ads Addon","why":"Stop Ads sends each visited url to a third party server which is not necessary for the add-on to work or disclosed in a privacy policy or user opt-in.  Versions 0.0.4 and earlier are affected."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.0.4","severity":1}],"prefs":[],"id":"3d1893dd-2092-d1f7-03f3-9629b7d7139e","schema":1480349193877},{"guid":"703db0db-5fe9-44b6-9f53-c6a91a0ad5bd@7314bc82-969e-4d2a-921b-e5edd0b02cf1.com","blockID":"i519","enabled":true,"last_modified":1480349212183,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:57:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","name":"Re-markit","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing the add-on, and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a27d0f9f-7708-3d5f-82e1-e3f29e6098a0","schema":1480349193877},{"guid":"imbaty@taringamp3.com","blockID":"i662","enabled":true,"last_modified":1480349212157,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-07-10T15:39:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Taringa MP3 / Adobe Flash","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f43859d4-46b7-c028-4738-d40a73ddad7b","schema":1480349193877},{"guid":"{13c9f1f9-2322-4d5c-81df-6d4bf8476ba4}","blockID":"i348","enabled":true,"last_modified":1480349212102,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-08T15:55:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867359","name":"mywebsearch","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. It also fails to revert settings changes on removal.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"372cf3df-0810-85d8-b5d7-faffff309a11","schema":1480349193877},{"guid":"{a6e67e6f-8615-4fe0-a599-34a73fc3fba5}","blockID":"i346","enabled":true,"last_modified":1480349212077,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-06T17:06:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867333","name":"Startnow","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. Also, it doesn't reset its settings changes on uninstall.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1caf911c-ff2f-b0f6-0d32-29ef74be81bb","schema":1480349193877},{"guid":"garg_sms@yahoo.in","blockID":"i652","enabled":true,"last_modified":1480349212044,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:17:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Save My YouTube Day!, version 67.9","why":"Certain versions of the Save My YouTube Day! extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"67.9","maxVersion":"67.9","severity":3}],"prefs":[],"id":"e50c0189-a7cd-774d-702b-62eade1bf18e","schema":1480349193877},{"guid":"9518042e-7ad6-4dac-b377-056e28d00c8f@f1cc0a13-4df1-4d66-938f-088db8838882.com","blockID":"i308","enabled":true,"last_modified":1480349212020,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-02-28T13:48:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=846455","name":"Solid Savings","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"df25ee07-74d4-ccd9-dbbe-7eb053015144","schema":1480349193877},{"guid":"jufa098j-LKooapd9jasJ9jliJsd@jetpack","blockID":"i1000","enabled":true,"last_modified":1480349211979,"details":{"who":"All users who have this add-on installed.","created":"2015-09-07T14:00:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201163","name":"Secure Video (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c3a98025-0f4e-3bb4-b475-97329e7b1426","schema":1480349193877},{"guid":"{46eddf51-a4f6-4476-8d6c-31c5187b2a2f}","blockID":"i750","enabled":true,"last_modified":1480349211953,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:17:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","name":"Slick Savings","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9b4ef650-e1ad-d55f-c420-4f26dbb4139c","schema":1480349193877},{"guid":"{DAC3F861-B30D-40dd-9166-F4E75327FAC7}","blockID":"i924","enabled":true,"last_modified":1480349211896,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:28:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"be57998b-9e4d-1040-e6bb-ed9de056338d","schema":1480349193877},{"guid":"JMLv@njMaHh.org","blockID":"i790","enabled":true,"last_modified":1480349211841,"details":{"who":"All users who have this add-on installed.","created":"2014-11-24T14:14:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1103516","name":"YouttubeAdBlocke","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"070d5747-137d-8500-8713-cfc6437558a3","schema":1480349193877},{"guid":"istart_ffnt@gmail.com","blockID":"i888","enabled":true,"last_modified":1480349211785,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","created":"2015-04-10T16:27:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152553","name":"Istart","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"32fad759-38d9-dad9-2295-e44cc6887040","schema":1480349193877},{"guid":"gystqfr@ylgga.com","blockID":"i449","enabled":true,"last_modified":1480349211748,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-13T16:19:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912742","name":"Define Ext","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8fe8f509-c530-777b-dccf-d10d58ae78cf","schema":1480349193877},{"guid":"e9d197d59f2f45f382b1aa5c14d82@8706aaed9b904554b5cb7984e9.com","blockID":"i844","enabled":true,"last_modified":1480349211713,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T15:01:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128324","name":"Sense","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"f8f8695c-a356-a1d6-9291-502b377c63c2","schema":1480349193877},{"guid":"{184AA5E6-741D-464a-820E-94B3ABC2F3B4}","blockID":"i968","enabled":true,"last_modified":1480349211687,"details":{"who":"All users who have this add-on installed.","created":"2015-08-04T09:41:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1164243","name":"Java String Helper (malware)","why":"This is a malicious add-on that poses as a Java extension."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fac1d2cb-eed7-fcef-5d5a-43c556371bd7","schema":1480349193877},{"guid":"7d51fb17-b199-4d8f-894e-decaff4fc36a@a298838b-7f50-4c7c-9277-df6abbd42a0c.com","blockID":"i455","enabled":true,"last_modified":1480349211660,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-25T10:28:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=919792","name":"Video Console (malware)","why":"This is a malicious extension that hijacks Facebook accounts and posts spam to the users' friends."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dd4d2e17-4ce6-36b0-3035-93e9cc5846d4","schema":1480349193877},{"guid":"prositez@prz.com","blockID":"i764","enabled":true,"last_modified":1480349211628,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-29T16:43:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"ProfSitez","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"684ad4fd-2cbd-ce2a-34cd-bc66b20ac8af","schema":1480349193877},{"guid":"/^toolbar[0-9]*@findwide\\.com$/","blockID":"i874","enabled":true,"last_modified":1480349211601,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-03-04T14:54:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082758","name":"FindWide Toolbars","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"a317ad9f-af4d-e086-4afd-cd5eead1ed62","schema":1480349193877},{"guid":"{25D77636-38B1-1260-887C-2D4AFA92D6A4}","blockID":"i536","enabled":true,"last_modified":1480349211555,"details":{"who":"All Firefox users who have this extension installed.","created":"2014-01-13T10:36:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=959279","name":"Microsoft DirectInput Object (malware)","why":"This is a malicious extension that is installed alongside a trojan. It hijacks searches on selected sites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cd174588-940e-f5b3-12ea-896c957bd4b3","schema":1480349193877},{"guid":"fdm_ffext@freedownloadmanager.org","blockID":"i216","enabled":true,"last_modified":1480349211163,"details":{"who":"All Firefox users who have installed version 1.5.7.5 of the Free Download Manager extension.","created":"2012-11-27T12:47:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=789700","name":"Free Download Manager","why":"Version 1.5.7.5 of the Free Download Manager extension is causing frequent crashes in recent versions of Firefox. Version 1.5.7.6 corrects this problem, but it is currently not available on addons.mozilla.org. We recommend all users to update to the new version once it becomes available."},"versionRange":[{"targetApplication":[],"minVersion":"1.5.7.5","maxVersion":"1.5.7.5","severity":1}],"prefs":[],"id":"736417a2-6161-9973-991a-aff566314733","schema":1480349193877},{"guid":"{badea1ae-72ed-4f6a-8c37-4db9a4ac7bc9}","blockID":"i543","enabled":true,"last_modified":1480349211119,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-01-28T14:28:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963809","name":"Address Bar Search","why":"This add-on is apparently malware that is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8c1dd68e-7df6-0c37-2f41-107745a7be54","schema":1480349193877},{"guid":"addon@gemaoff","blockID":"i1230","enabled":true,"last_modified":1480349211044,"details":{"who":"All users who have this add-on installed.","created":"2016-06-08T16:15:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker (addon@gemaoff)","why":"These add-ons are copies of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6bc49e9f-322f-9952-15a6-0a723a61c2d9","schema":1480349193877},{"guid":"{d87d56b2-1379-49f4-b081-af2850c79d8e}","blockID":"i726","enabled":true,"last_modified":1480349211007,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-13T16:01:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","name":"Website Xplorer Lite","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7b0895b4-dd4f-1c91-f4e3-31afdbdf3178","schema":1480349193877},{"guid":"OKitSpace@OKitSpace.es","blockID":"i469","enabled":true,"last_modified":1480349210982,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:35:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6a11aa68-0dae-5524-cc96-a5053a31c466","schema":1480349193877},{"guid":"{c96d1ae6-c4cf-4984-b110-f5f561b33b5a}","blockID":"i808","enabled":true,"last_modified":1480349210956,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-19T09:36:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Better Web","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0413d46b-8205-d9e0-65df-4caa3e6355c4","schema":1480349193877},{"guid":"lightningnewtab@gmail.com","blockID":"i554","enabled":true,"last_modified":1480349210931,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","created":"2014-02-19T15:28:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","name":"Lightning SpeedDial","why":"This add-on is silently installed in Firefox and includes a companion extension that also performs malicious actions."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"875513e1-e6b1-a383-2ec5-eb4deb87eafc","schema":1480349193877},{"guid":"/^ext@bettersurfplus/","blockID":"i506","enabled":true,"last_modified":1480349210905,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-10T15:10:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","name":"BetterSurf (malware)","why":"This add-on appears to be malware and is installed silently in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b4da06d2-a0fd-09b6-aadb-7e3b29c3be3a","schema":1480349193877},{"guid":"thefoxonlybetter@quicksaver","blockID":"i706","enabled":true,"last_modified":1480349210859,"details":{"who":"All Firefox users who have any of these versions of the add-on installed.","created":"2014-08-27T14:50:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","name":"The Fox, Only Better (malicious versions)","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"1.6.160","maxVersion":"1.6.160","severity":3}],"prefs":[],"id":"bb2b2114-f8e7-511d-04dc-abc8366712cc","schema":1480349193877},{"guid":"CortonExt@ext.com","blockID":"i336","enabled":true,"last_modified":1480349210805,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-04-22T16:10:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=864551","name":"CortonExt","why":"This add-on is reported to be installed without user consent, with a non-descriptive name, and ties a number of browser features to Amazon URLs, probably monetizing on affiliate codes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a5bdd05d-eb4c-ce34-9909-a677b4322384","schema":1480349193877},{"guid":"1chtw@facebook.com","blockID":"i430","enabled":true,"last_modified":1480349210773,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-05T16:42:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","name":" Mozilla Service Pack (malware)","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bf1e31c7-ba50-1075-29ae-47368ac1d6de","schema":1480349193877},{"guid":"lrcsTube@hansanddeta.com","blockID":"i344","enabled":true,"last_modified":1480349210718,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-06T16:44:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866944","name":"LyricsTube","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"424b9f39-d028-b1fb-d011-d8ffbbd20fe9","schema":1480349193877},{"guid":"{341f4dac-1966-47ff-aacf-0ce175f1498a}","blockID":"i356","enabled":true,"last_modified":1480349210665,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-23T14:45:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=868129","name":"MyFreeGames","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"560e08b1-3471-ad34-8ca9-463f5ca5328c","schema":1480349193877},{"guid":"/^({d6e79525-4524-4707-9b97-1d70df8e7e59}|{ddb4644d-1a37-4e6d-8b6e-8e35e2a8ea6c}|{e55007f4-80c5-418e-ac33-10c4d60db01e}|{e77d8ca6-3a60-4ae9-8461-53b22fa3125b}|{e89a62b7-248e-492f-9715-43bf8c507a2f}|{5ce3e0cb-aa83-45cb-a7da-a2684f05b8f3})$/","blockID":"i518","enabled":true,"last_modified":1480349210606,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:56:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","name":"Re-markit","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing the add-on, and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"145b0f22-501e-39eb-371e-ec8342a5add9","schema":1480349193877},{"guid":"{72b98dbc-939a-4e0e-b5a9-9fdbf75963ef}","blockID":"i772","enabled":true,"last_modified":1480349210536,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-31T16:15:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"SitezExpert","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"386cb2c9-e674-ce2e-345f-d30a785f90c5","schema":1480349193877},{"guid":"hha8771ui3-Fo9j9h7aH98jsdfa8sda@jetpack","blockID":"i970","enabled":true,"last_modified":1480349210477,"details":{"who":"All users who have this add-on installed.","created":"2015-08-04T15:15:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190963","name":"Video fix (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3ca577d8-3685-4ba9-363b-5b2d8d8dd608","schema":1480349193877},{"guid":"{7e8a1050-cf67-4575-92df-dcc60e7d952d}","blockID":"i478","enabled":true,"last_modified":1480349210416,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-08T15:42:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935796","name":"SweetPacks","why":"This add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1519eb45-fcaa-b531-490d-fe366490ed45","schema":1480349193877},{"guid":"/^({66b103a7-d772-4fcd-ace4-16f79a9056e0}|{6926c7f7-6006-42d1-b046-eba1b3010315}|{72cabc40-64b2-46ed-8648-26d831761150}|{73ee2cf2-7b76-4c49-b659-c3d8cf30825d}|{ca6446a5-73d5-4c35-8aa1-c71dc1024a18}|{5373a31d-9410-45e2-b299-4f61428f0be4})$/","blockID":"i521","enabled":true,"last_modified":1480349210351,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:14:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","name":"appbario7","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"983cb7fe-e0b4-6a2e-f174-d2670876b2cd","schema":1480349193877},{"guid":"{dd6b651f-dfb9-4142-b0bd-09912ad22674}","blockID":"i400","enabled":true,"last_modified":1480349210301,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:16:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"975d2126-f727-f5b9-ca01-b83345b80c56","schema":1480349193877},{"guid":"25p@9eAkaLq.net","blockID":"i730","enabled":true,"last_modified":1480349210275,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-16T16:35:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"YYOutoubeAdBlocke","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"5a0c5818-693f-43ae-f85a-c6928d9c2cc4","schema":1480349193877},{"guid":"thunder@xunlei.com","blockID":"i568","enabled":true,"last_modified":1480349210242,"details":{"who":"All Firefox users who have versions 2.0.6 or lower of the Thunder add-on installed on Mac OS.","created":"2014-03-28T15:48:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=988490","name":"Thunder, 2.0.6 and lower","why":"Versions 2.0.6 and lower of the Thunder add-on are causing startup crashes on Mac OS."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.0.6","severity":1}],"prefs":[],"os":"Darwin","id":"cee484f6-2d5d-f708-88be-cd12d825a79a","schema":1480349193877},{"guid":"tmbepff@trendmicro.com","blockID":"i1222","enabled":true,"last_modified":1480349209818,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-24T12:10:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","name":"Trend Micro BEP 9.1.0.1035 and lower","why":"Add-on  is causing a high-frequency crash in Firefox"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"9.1.0.1035","severity":1}],"prefs":[],"id":"8045c799-486a-927c-b972-b9da1c2dab2f","schema":1480349193877},{"guid":"pricepeep@getpricepeep.com","blockID":"i220","enabled":true,"last_modified":1480349209794,"details":{"who":"All Firefox users who have Pricepeed below 2.1.0.20 installed.","created":"2012-11-29T16:18:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811433","name":"PricePeep","why":"Versions older than 2.1.0.20 of the PricePeep add-on were silently side-installed with other software, injecting advertisements in Firefox. Versions 2.1.0.20 and above don't have the install problems are not blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.1.0.19.99","severity":1}],"prefs":[],"id":"227b9a8d-c18d-239c-135e-d79e614fe392","schema":1480349193877},{"guid":"ytd@mybrowserbar.com","blockID":"i360","enabled":true,"last_modified":1480349209770,"details":{"who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager tab.","created":"2013-06-06T12:29:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845969","name":"YouTube Downloader","why":"The installer that includes this add-on performs Firefox settings changes separately from the add-on install, making it very difficult to opt-out to these changes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"63669524-93fe-4823-95ba-37cf6cbd4914","schema":1480349193877},{"guid":"hoverst@facebook.com","blockID":"i498","enabled":true,"last_modified":1480349209745,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:17:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946029","name":"Adobe Flash Player (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2b25ba3e-45db-0e6c-965a-3acda1a44117","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i606","enabled":true,"last_modified":1480349209713,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:20:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.13","maxVersion":"3.15.13.*","severity":1}],"prefs":[],"id":"c3d88e22-386a-da3b-8aba-3cb526e08053","schema":1480349193877},{"guid":"advance@windowsclient.com","blockID":"i508","enabled":true,"last_modified":1480349209674,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-16T10:15:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950773","name":"Microsoft .NET Framework Assistant (malware)","why":"This is not the <a href=\"https://addons.mozilla.org/addon/microsoft-net-framework-assist/\">Microsoft .NET Framework Assistant</a> created and distributed by Microsoft. It is a malicious extension that is distributed under the same name to trick users into installing it, and turns users into a botnet that conducts SQL injection attacks on visited websites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e5d30a74-732e-c3fa-f13b-097ee28d4b27","schema":1480349193877},{"guid":"{5eeb83d0-96ea-4249-942c-beead6847053}","blockID":"i756","enabled":true,"last_modified":1480349209625,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:30:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080846","name":"SmarterPower","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e101dbc0-190c-f6d8-e168-0c1380581cc9","schema":1480349193877},{"guid":"/^({7e8a1050-cf67-4575-92df-dcc60e7d952d}|{b3420a9c-a397-4409-b90d-bcf22da1a08a}|{eca6641f-2176-42ba-bdbe-f3e327f8e0af}|{707dca12-3f99-4d94-afea-06dcc0ae0108}|{aea20431-87fc-40be-bc5b-18066fe2819c}|{30ee6676-1ba6-455a-a7e8-298fa863a546})$/","blockID":"i523","enabled":true,"last_modified":1480349209559,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:42:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","name":"SweetPacks","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a3a6bc8e-46a1-b3d5-1b20-58b90ba099c3","schema":1480349193877},{"guid":"{e0352044-1439-48ba-99b6-b05ed1a4d2de}","blockID":"i710","enabled":true,"last_modified":1480349209491,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-09-30T15:28:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Site Counselor","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b8fedf07-dcaf-f0e3-b42b-32db75c4c304","schema":1480349193877},{"guid":"{bee6eb20-01e0-ebd1-da83-080329fb9a3a}","blockID":"i642","enabled":true,"last_modified":1480349209443,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:02:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Flash and Video Download, between 40.10.1 and 44.10.1","why":"Certain versions of the Flash and Video Download extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"40.10.1","maxVersion":"44.10.1","severity":3}],"prefs":[],"id":"16db0c85-02ec-4f7c-24a3-a504fbce902d","schema":1480349193877},{"guid":"addlyrics@addlyrics.net","blockID":"i426","enabled":true,"last_modified":1480349209383,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-07-09T15:25:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891605","name":"Add Lyrics","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"81678e9e-ebf0-47d6-e409-085c25e67c7e","schema":1480349193877},{"guid":"{7b1bf0b6-a1b9-42b0-b75d-252036438bdc}","blockID":"i638","enabled":true,"last_modified":1480349209260,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-08T16:07:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036137","name":"YouTube High Definition 27.8 and 27.9","why":"Versions 27.8 and 27.9 of the YouTube High Definition extension weren't developed by the original developer, and are likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"27.8","maxVersion":"27.9","severity":3}],"prefs":[],"id":"ffdc8ba0-d548-dc5b-d2fd-79a20837124b","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i610","enabled":true,"last_modified":1480349209128,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:21:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.22","maxVersion":"3.15.22.*","severity":1}],"prefs":[],"id":"935dfec3-d017-5660-db5b-94ae7cea6e5f","schema":1480349193877},{"guid":"info@allpremiumplay.info","blockID":"i163","enabled":true,"last_modified":1480349209076,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-10-29T16:40:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec-C (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6afbf9b8-ae3a-6a48-0f6c-7a3e065ec043","schema":1480349193877},{"guid":"now.msn.com@services.mozilla.org","blockID":"i490","enabled":true,"last_modified":1480349209021,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-27T08:06:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=926378","name":"MSNNow (discontinued social provider)","why":"As part of their ongoing work to fine-tune their editorial mix, msnNOW has decided that msnNOW will stop publishing on Dec. 3, 2013. Rather than having a single home for trending content, they will continue integrating that material throughout all MSN channels. A big thank you to everyone who followed msnNOW stories using the Firefox sidebar"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"de7d699d-016d-d973-5e39-52568de6ffde","schema":1480349193877},{"guid":"fftoolbar2014@etech.com","blockID":"i858","enabled":true,"last_modified":1480349208988,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-11T15:32:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131078","name":"FF Toolbar","why":"This add-on is silently installed and changes users' settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"6877bf40-9e45-7017-4dac-14d09e7f0ef6","schema":1480349193877},{"guid":"mbrnovone@facebook.com","blockID":"i477","enabled":true,"last_modified":1480349208962,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-08T15:35:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936249","name":"Mozilla Security Service (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"758c2503-766d-a2f5-4c58-7cea93acfe05","schema":1480349193877},{"guid":"{739df940-c5ee-4bab-9d7e-270894ae687a}","blockID":"i530","enabled":true,"last_modified":1480349208933,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:49:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949558","name":"WhiteSmoke New","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f8097aa6-3009-6dfc-59df-353ba6b1142b","schema":1480349193877},{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","blockID":"i115","enabled":true,"last_modified":1480349208904,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-08-01T13:53:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=779014","name":"Adobe Flash Player (malware)","why":"This extension is malware that is installed under false pretenses, and it conducts attacks against certain video websites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aef9312d-5f2e-a44d-464d-6113394148e3","schema":1480349193877},{"guid":"g99hiaoekjoasiijdkoleabsy278djasi@jetpack","blockID":"i1022","enabled":true,"last_modified":1480349208877,"details":{"who":"All users who have this add-on installed.","created":"2015-09-28T15:23:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208708","name":"WatchIt (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"25e057ea-f500-67df-d078-ec3f37f99036","schema":1480349193877},{"guid":"firefoxaddon@youtubeenhancer.com","blockID":"i636","enabled":true,"last_modified":1480349208851,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-08T15:58:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033120","name":"YoutubeEnhancer - Firefox","why":"Version 199.7.0 of the YoutubeEnhancer extension isn't developed by the original developer, and is likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"199.7.0","maxVersion":"199.7.0","severity":3}],"prefs":[],"id":"204a074b-da87-2784-f15b-43a9ea9a6b36","schema":1480349193877},{"guid":"extacylife@a.com","blockID":"i505","enabled":true,"last_modified":1480349208823,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-09T15:08:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947741","name":"Facebook Haber (malware)","why":"This is a malicious extension that hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5acadb8d-d3be-e0e0-4656-9107f9de0ea9","schema":1480349193877},{"guid":"{746505DC-0E21-4667-97F8-72EA6BCF5EEF}","blockID":"i842","enabled":true,"last_modified":1480349208766,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:45:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128325","name":"Shopper-Pro","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5f19c5fb-1c78-cbd6-8a03-1678efb54cbc","schema":1480349193877},{"guid":"{51c77233-c0ad-4220-8388-47c11c18b355}","blockID":"i580","enabled":true,"last_modified":1480349208691,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","created":"2014-04-30T13:55:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004132","name":"Browser Utility","why":"This add-on is silently installed into Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.1.9999999","severity":1}],"prefs":[],"id":"daa2c60a-5009-2c65-a432-161d50bef481","schema":1480349193877},{"guid":"{a2bfe612-4cf5-48ea-907c-f3fb25bc9d6b}","blockID":"i712","enabled":true,"last_modified":1480349208027,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-09-30T15:28:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Website Xplorer","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"13450534-93d7-f2a2-7f0a-e4e3948c4dc1","schema":1480349193877},{"guid":"ScorpionSaver@jetpack","blockID":"i539","enabled":true,"last_modified":1480349207972,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-01-28T14:00:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963826","name":"ScorpionSaver","why":"This add-on is being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3499c968-6e8b-37f1-5f6e-2384807c2a6d","schema":1480349193877},{"guid":"unblocker20@unblocker.yt","blockID":"i1212","enabled":true,"last_modified":1480349207912,"details":{"who":"All users who have this add-on installed.","created":"2016-05-05T18:13:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker 2.0","why":"This add-on is a copy of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.0.0","severity":3}],"prefs":[],"id":"57785030-909f-e985-2a82-8bd057781227","schema":1480349193877},{"guid":"{D19CA586-DD6C-4a0a-96F8-14644F340D60}","blockID":"i42","enabled":true,"last_modified":1480349207877,"details":{"who":"Users of McAfee ScriptScan versions 14.4.0 and below for all versions of Firefox and SeaMonkey.","created":"2011-10-03T09:38:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690184","name":"McAfee ScriptScan","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"14.4.0","severity":1}],"prefs":[],"id":"1d35ac9d-49df-23cf-51f5-f3c228ad0dc9","schema":1480349193877},{"guid":"gjhrjenrengoe@jfdnkwelfwkm.com","blockID":"i1042","enabled":true,"last_modified":1480349207840,"details":{"who":"All users who have this add-on installed.","created":"2015-10-07T13:12:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212174","name":"Avant Player (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d6453893-becc-7617-2050-0db284e0e0db","schema":1480349193877},{"guid":"/^(@9338379C-DD5C-4A45-9A36-9733DC806FAE|9338379C-DD5C-4A45-9A36-9733DC806FAE|@EBC7B466-8A28-4061-81B5-10ACC05FFE53|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4222|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4|@b2d6a97c0-4b18-40ed-bce7-3b7d3309e3c4222)$/","blockID":"i1079","enabled":true,"last_modified":1480349207815,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2016-01-18T12:32:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240597","name":"Default SearchProtected (malware)","why":"These add-ons are malicious, manipulating registry and search settings for users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"ddc5237e-42e4-1bf1-54d3-a5e5799dd828","schema":1480349193877},{"guid":"{33e0daa6-3af3-d8b5-6752-10e949c61516}","blockID":"i282","enabled":true,"last_modified":1480349207789,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-02-15T12:19:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835683","name":"Complitly","why":"This add-on violates our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">add-on guidelines</a>, bypassing the third party opt-in screen."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.1.999","severity":1}],"prefs":[],"id":"1f94bc8d-9d5f-c8f5-45c0-ad1f6e147c71","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i608","enabled":true,"last_modified":1480349207761,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:20:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.18","maxVersion":"3.15.20.*","severity":1}],"prefs":[],"id":"e7d50ff2-5948-d571-6711-37908ccb863f","schema":1480349193877},{"guid":"chiang@programmer.net","blockID":"i340","enabled":true,"last_modified":1480349207736,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-04-30T07:44:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867156","name":"Cache Manager (malware)","why":"This is a malicious add-on that logs keyboard input and sends it to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d50d0434-78e4-faa7-ce2a-9b0a8bb5120e","schema":1480349193877},{"guid":"{63eb5ed4-e1b3-47ec-a253-f8462f205350}","blockID":"i786","enabled":true,"last_modified":1480349207705,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-18T12:33:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"FF-Plugin","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"ca4558a2-8ce4-3ca0-3d29-63019f680c8c","schema":1480349193877},{"guid":"jid1-4vUehhSALFNqCw@jetpack","blockID":"i634","enabled":true,"last_modified":1480349207680,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-04T14:13:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","name":"YouTube Plus Plus 99.7","why":"Version 99.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"99.7","maxVersion":"99.7","severity":3}],"prefs":[],"id":"a6d017cb-e33f-2239-4e42-ab4e7cfb19fe","schema":1480349193877},{"guid":"{aab02ab1-33cf-4dfa-8a9f-f4e60e976d27}","blockID":"i820","enabled":true,"last_modified":1480349207654,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-13T09:27:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Incredible Web","why":"This add-on is silently installed into users' systems without their consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"847ecc6e-1bc1-f7ff-e1d5-a76e6b8447d2","schema":1480349193877},{"guid":"torntv@torntv.com","blockID":"i320","enabled":true,"last_modified":1480349207608,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-20T16:35:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","name":"TornTV","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"cdd492b8-8101-74a9-5760-52ff709fd445","schema":1480349193877},{"guid":"crossriderapp12555@crossrider.com","blockID":"i674","enabled":true,"last_modified":1480349207561,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-07-22T16:26:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=877836","name":"JollyWallet","why":"The add-on is silently installed, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d4467e20-0f71-f0e0-8cd6-40c82b6c7379","schema":1480349193877},{"guid":"pluggets@gmail.com","blockID":"i435","enabled":true,"last_modified":1480349207535,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T13:12:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903544","name":"Facebook Pluggets Plugin (malware)","why":"This add-on is malware that hijacks users' Facebook accounts and posts spam on their behalf. "},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3a63fd92-9290-02fb-a2e8-bc1b4424201a","schema":1480349193877},{"guid":"344141-fasf9jas08hasoiesj9ia8ws@jetpack","blockID":"i1038","enabled":true,"last_modified":1480349207485,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:42:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211169","name":"Video Plugin (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f7986b7b-9b5a-d372-8147-8b4bd6f5a29b","schema":1480349193877},{"guid":"/^brasilescape.*\\@facebook\\.com$//","blockID":"i485","enabled":true,"last_modified":1480349207424,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T15:57:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938835","name":"Facebook Video Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"17a2bf85-b44a-4745-1b48-8be0c151d697","schema":1480349193877},{"guid":"meOYKQEbBBjH5Ml91z0p9Aosgus8P55bjTa4KPfl@jetpack","blockID":"i998","enabled":true,"last_modified":1480349207370,"details":{"who":"All users who have this add-on installed.","created":"2015-09-07T13:54:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201164","name":"Smooth Player (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"30c3e511-9e8d-15ee-0867-d61047e56515","schema":1480349193877},{"guid":"{8dc5c42e-9204-2a64-8b97-fa94ff8a241f}","blockID":"i770","enabled":true,"last_modified":1480349207320,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-30T14:52:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","name":"Astrmenda Search","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"8a9c7702-0349-70d6-e64e-3a666ab084c6","schema":1480349193877},{"guid":"savingsslider@mybrowserbar.com","blockID":"i752","enabled":true,"last_modified":1480349207290,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:18:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","name":"Slick Savings","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9b1faf30-5725-7847-d993-b5cdaabc9829","schema":1480349193877},{"guid":"youtubeunblocker__web@unblocker.yt","blockID":"i1129","enabled":true,"last_modified":1480349207262,"details":{"who":"All users who have this add-on installed.","created":"2016-03-01T21:20:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aa246b36-0a80-81e3-2129-4847e872d5fe","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i612","enabled":true,"last_modified":1480349206818,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:23:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.24","maxVersion":"3.15.24.*","severity":1}],"prefs":[],"id":"e0ff9df4-60e4-dbd0-8018-57f395e6610a","schema":1480349193877},{"guid":"{1e4ea5fc-09e5-4f45-a43b-c048304899fc}","blockID":"i812","enabled":true,"last_modified":1480349206784,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-06T13:22:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Great Finder","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ea40b9f-2423-a2fd-a5e9-4ec1df2715f4","schema":1480349193877},{"guid":"psid-vhvxQHMZBOzUZA@jetpack","blockID":"i70","enabled":true,"last_modified":1480349206758,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-23T13:44:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730059","name":"PublishSync (malware)","why":"Add-on spams Facebook accounts and blocks Facebook warnings."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f1528b02-7cef-0e80-f747-8bbf1f0f2f06","schema":1480349193877},{"guid":"{B18B1E5C-4D81-11E1-9C00-AFEB4824019B}","blockID":"i447","enabled":true,"last_modified":1480349206733,"details":{"who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","created":"2013-09-06T16:00:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","name":"My Smart Tabs","why":"This add-on is installed silently, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"40332fae-0444-a141-ade9-8d9e50370f56","schema":1480349193877},{"guid":"crossriderapp8812@crossrider.com","blockID":"i314","enabled":true,"last_modified":1480349206708,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-06T14:14:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","name":"Coupon Companion","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"06c07e28-0a34-e5ee-e724-491a2f6ce586","schema":1480349193877},{"guid":"/^(ffxtlbr@mixidj\\.com|{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}|{67097627-fd8e-4f6b-af4b-ecb65e50112e}|{f6f0f973-a4a3-48cf-9a7a-b7a69c30d71a}|{a3d0e35f-f1da-4ccb-ae77-e9d27777e68d}|{1122b43d-30ee-403f-9bfa-3cc99b0caddd})$/","blockID":"i540","enabled":true,"last_modified":1480349206678,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-01-28T14:07:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","name":"MixiDJ (malware)","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4c03ddda-bb3f-f097-0a7b-b7b77b050584","schema":1480349193877},{"guid":"hansin@topvest.id","blockID":"i836","enabled":true,"last_modified":1480349206628,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:17:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130406","name":"Inside News (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0945a657-f28d-a02c-01b2-5115b3f90d7a","schema":1480349193877},{"guid":"lfind@nijadsoft.net","blockID":"i358","enabled":true,"last_modified":1480349206603,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-24T14:09:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=874131","name":"Lyrics Finder","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"2307f11c-6216-0dbf-a464-b2921055ce2b","schema":1480349193877},{"guid":"plugin@getwebcake.com","blockID":"i484","enabled":true,"last_modified":1480349206578,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T09:55:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938264","name":"WebCake","why":"This add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> and is broadly considered to be malware. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"2865addd-da1c-20c4-742f-6a2270da2e78","schema":1480349193877},{"guid":"{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}","blockID":"i354","enabled":true,"last_modified":1480349206525,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-23T14:31:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=837838","name":"Mixi DJ","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"03a745c3-0ee7-e262-ba31-62d4f78ddb62","schema":1480349193877},{"guid":"/^({7316e43a-3ebd-4bb4-95c1-9caf6756c97f}|{0cc09160-108c-4759-bab1-5c12c216e005}|{ef03e721-f564-4333-a331-d4062cee6f2b}|{465fcfbb-47a4-4866-a5d5-d12f9a77da00}|{7557724b-30a9-42a4-98eb-77fcb0fd1be3}|{b7c7d4b0-7a84-4b73-a7ef-48ef59a52c3b})$/","blockID":"i520","enabled":true,"last_modified":1480349206491,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:11:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","name":"appbario7","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e3901c48-9c06-fecb-87d3-efffd9940c22","schema":1480349193877},{"guid":"{354dbb0a-71d5-4e9f-9c02-6c88b9d387ba}","blockID":"i538","enabled":true,"last_modified":1480349206465,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-01-27T10:13:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964081","name":"Show Mask ON (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aad90253-8921-b5df-3658-45a70d75f3d7","schema":1480349193877},{"guid":"{8E9E3331-D360-4f87-8803-52DE43566502}","blockID":"i461","enabled":true,"last_modified":1480349206437,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-10-17T16:10:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=906071","name":"Updater By SweetPacks","why":"This is a companion add-on for the SweetPacks Toolbar which is <a href=\"https://addons.mozilla.org/firefox/blocked/i392\">blocked</a> due to guideline violations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ae8cca6e-4258-545f-9a69-3d908264a701","schema":1480349193877},{"guid":"info@bflix.info","blockID":"i172","enabled":true,"last_modified":1480349206384,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-10-30T13:39:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","name":"Bflix (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7a9062f4-218d-51d2-9b8c-b282e6eada4f","schema":1480349193877},{"guid":"{dff137ae-1ffd-11e3-8277-b8ac6f996f26}","blockID":"i450","enabled":true,"last_modified":1480349206312,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-18T16:19:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=917861","name":"Addons Engine (malware)","why":"This is add-on is malware that silently redirects popular search queries to a third party."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8e583fe4-1c09-9bea-2473-faecf3260685","schema":1480349193877},{"guid":"12x3q@3244516.com","blockID":"i493","enabled":true,"last_modified":1480349206286,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-02T12:49:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","name":"BetterSurf (malware)","why":"This add-on appears to be malware and is installed silently in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"af2a9e74-3753-9ff1-d899-5d1e79ed3dce","schema":1480349193877},{"guid":"{20AD702C-661E-4534-8CE9-BA4EC9AD6ECC}","blockID":"i626","enabled":true,"last_modified":1480349206261,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-19T15:16:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1027886","name":"V-Bates","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"9b9ccabe-8f9a-e3d1-a689-1aefba1f33b6","schema":1480349193877},{"guid":"{c5e48979-bd7f-4cf7-9b73-2482a67a4f37}","blockID":"i736","enabled":true,"last_modified":1480349206231,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:22:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080842","name":"ClearThink","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6e8b3e4f-2f59-cde3-e6d2-5bc6e216c506","schema":1480349193877},{"guid":"{41339ee8-61ed-489d-b049-01e41fd5d7e0}","blockID":"i810","enabled":true,"last_modified":1480349206165,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-23T10:32:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"FireWeb","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a35f2ca6-aec4-c01d-170e-650258ebcd2c","schema":1480349193877},{"guid":"jid0-l9BxpNUhx1UUgRfKigWzSfrZqAc@jetpack","blockID":"i640","enabled":true,"last_modified":1480349206133,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-07-09T14:35:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036640","name":"Bitcoin Mining Software","why":"This add-on attempts to gather private user data and send it to a remote location. It doesn't appear to be very effective at it, but its malicious nature is undeniable."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8fe3c35e-1a6f-a89a-fa96-81bda3b71db1","schema":1480349193877},{"guid":"{845cab51-d8d2-472f-8bd9-2b44642d97c2}","blockID":"i460","enabled":true,"last_modified":1480349205746,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-10-17T15:50:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=927456","name":"Vafmusic9","why":"This add-on is silently installed and handles users' settings, violating some of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8538ccb4-3b71-9858-3f6d-c0fff7af58b0","schema":1480349193877},{"guid":"SpecialSavings@SpecialSavings.com","blockID":"i676","enabled":true,"last_modified":1480349205688,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-07-22T16:31:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881511","name":"SpecialSavings","why":"This is add-on is generally considered to be unwanted and is probably silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5e921810-fc3a-0729-6749-47e38ad10a22","schema":1480349193877},{"guid":"afurladvisor@anchorfree.com","blockID":"i434","enabled":true,"last_modified":1480349205645,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T11:26:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","name":"Hotspot Shield Helper","why":"This add-on bypasses the external install opt in screen in Firefox, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"083585eb-d7e7-e228-5fbf-bf35c52044e4","schema":1480349193877},{"guid":"addonhack@mozilla.kewis.ch","blockID":"i994","enabled":true,"last_modified":1480349205584,"details":{"who":"All users who have this add-on installed.","created":"2015-09-01T15:32:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1200848","name":"Addon Hack","why":"This add-on is a proof of concept of malicious behavior in an add-on. In itself it doesn't cause any harm, but it still needs to be blocked for security reasons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"81f75571-ca2a-0e50-a925-daf2037ce63c","schema":1480349193877},{"guid":"info@thebflix.com","blockID":"i174","enabled":true,"last_modified":1480349205526,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-10-30T13:40:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","name":"Bflix (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"811a61d4-9435-133e-6262-fb72486c36b0","schema":1480349193877},{"guid":"{EEE6C361-6118-11DC-9C72-001320C79847}","blockID":"i392","enabled":true,"last_modified":1480349205455,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T12:38:45Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","name":"SweetPacks Toolbar","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c1dc6607-4c0a-4031-9f14-70ef1ae1edcb","schema":1480349193877},{"guid":"/^(4cb61367-efbf-4aa1-8e3a-7f776c9d5763@cdece6e9-b2ef-40a9-b178-291da9870c59\\.com|0efc9c38-1ec7-49ed-8915-53a48b6b7600@e7f17679-2a42-4659-83c5-7ba961fdf75a\\.com|6be3335b-ef79-4b0b-a0ba-b87afbc6f4ad@6bbb4d2e-e33e-4fa5-9b37-934f4fb50182\\.com)$/","blockID":"i531","enabled":true,"last_modified":1480349205287,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T15:01:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","name":"Feven","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and using multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"46aa79a9-d329-f713-d4f2-07d31fe7071e","schema":1480349193877},{"guid":"afext@anchorfree.com","blockID":"i466","enabled":true,"last_modified":1480349205108,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T13:32:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=933988","name":"Hotspot Shield Extension","why":"This add-on doesn't respect user choice, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8176f879-bd73-5468-e908-2d7cfc115ac2","schema":1480349193877},{"guid":"{FCE04E1F-9378-4f39-96F6-5689A9159E45}","blockID":"i920","enabled":true,"last_modified":1480349204978,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:26:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"eb191ff0-20f4-6e04-4344-d880af4faf51","schema":1480349193877},{"guid":"{9CE11043-9A15-4207-A565-0C94C42D590D}","blockID":"i503","enabled":true,"last_modified":1480349204951,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-06T11:58:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947384","name":"XUL Cache (malware)","why":"This is a malicious extension that uses a deceptive name to stay in users' systems."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dcdae267-8d3a-5671-dff2-f960febbbb20","schema":1480349193877},{"guid":"/^[a-z0-9]+@foxysecure[a-z0-9]*\\.com$/","blockID":"i766","enabled":true,"last_modified":1480349204925,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-10-30T14:22:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088615","name":"Fox Sec 7","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"503fbd7c-04cd-65f3-9d0e-3ecf427b4a8f","schema":1480349193877},{"guid":"/^(jid1-W4CLFIRExukJIFW@jetpack|jid1-W4CLFIRExukJIFW@jetpack_1|jid1-W3CLwrP[a-z]+@jetpack)$/","blockID":"i1078","enabled":true,"last_modified":1480349204899,"details":{"who":"All Firefox users who have this add-on installed.","created":"2016-01-18T10:31:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240561","name":"Adobe Flash Player (malware)","why":"This is a malicious extension that tries to pass itself for the Adobe Flash Player and hides itself in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b026fe67-ec77-a240-2fa1-e78f581a6fe4","schema":1480349193877},{"guid":"{0153E448-190B-4987-BDE1-F256CADA672F}","blockID":"i914","enabled":true,"last_modified":1480349204871,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.","created":"2015-06-02T09:56:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above."},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2bfe0d89-e458-9d0e-f944-ddeaf8c4db6c","schema":1480349193877},{"guid":"{77beece6-3997-403a-92fa-0055bfcf88e5}","blockID":"i452","enabled":true,"last_modified":1480349204844,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-18T16:34:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","name":"Entrusted11","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d348f91f-caeb-a803-dfd9-fd5d285aa0fa","schema":1480349193877},{"guid":"dealcabby@jetpack","blockID":"i222","enabled":true,"last_modified":1480349204818,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:20:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811435","name":"DealCabby","why":"This add-on is silently side-installed with other software, injecting advertisements in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6585f0bd-4f66-71e8-c565-d9762c5c084a","schema":1480349193877},{"guid":"{3c9a72a0-b849-40f3-8c84-219109c27554}","blockID":"i510","enabled":true,"last_modified":1480349204778,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-17T14:27:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=951301","name":"Facebook Haber (malware)","why":"This add-on is malware that hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7cfa3d0b-0ab2-5e3a-8143-1031c180e32f","schema":1480349193877},{"guid":"{4ED1F68A-5463-4931-9384-8FFF5ED91D92}","blockID":"i1245","enabled":true,"last_modified":1480349204748,"details":{"who":"All users who have McAfee SiteAdvisor lower than 4.0. \r\n\r\nTo resolve this issue, users will need to uninstall McAfee SiteAdvisor/WebAdvisor, reboot the computer, and then reinstall McAfee SiteAdvisor/WebAdvisor. \r\n\r\nFor detailed instructions, please refer to the <a href=\"https://service.mcafee.com/webcenter/portal/cp/home/articleview?locale=en-CA&articleId=TS102554\">McAfee support knowledge base</a>.","created":"2016-07-14T21:24:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286368","name":"McAfee SiteAdvisor lower than 4.0","why":"Old versions of McAfee SiteAdvisor cause startup crashes starting with Firefox 48.0 beta."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.9.9","severity":1}],"prefs":[],"id":"d727d8c5-3329-c98a-7c7e-38b0813ca516","schema":1480349193877},{"guid":"{2aab351c-ad56-444c-b935-38bffe18ad26}","blockID":"i500","enabled":true,"last_modified":1480349204716,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:29:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946087","name":"Adobe Photo (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f7a76d34-ddcd-155e-9fae-5967bd796041","schema":1480349193877},{"guid":"jid1-4P0kohSJxU1qGg@jetpack","blockID":"i488","enabled":true,"last_modified":1480349204668,"details":{"who":"All Firefox users who have version 1.2.50 of the Hola extension. Updating to the latest version should remove the block.","created":"2013-11-25T12:14:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942935","name":"Hola, version 1.2.50","why":"Version 1.2.50 of the Hola extension is causing frequent crashes in Firefox. All users are strongly recommended to update to the latest version, which shouldn't have this problem."},"versionRange":[{"targetApplication":[],"minVersion":"1.2.50","maxVersion":"1.2.50","severity":1}],"prefs":[],"id":"5c7f1635-b39d-4278-5f95-9042399c776e","schema":1480349193877},{"guid":"{0A92F062-6AC6-8180-5881-B6E0C0DC2CC5}","blockID":"i864","enabled":true,"last_modified":1480349204612,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T12:56:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131220","name":"BlockAndSurf","why":"This add-on is silently installed into users' systems and makes unwanted settings changes, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"acb16d1c-6274-93a3-7c1c-7ed36ede64a9","schema":1480349193877},{"guid":"jid0-Y6TVIzs0r7r4xkOogmJPNAGFGBw@jetpack","blockID":"i322","enabled":true,"last_modified":1480349204532,"details":{"who":"All users who have this add-on installed.","created":"2013-03-22T14:39:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=847018","name":"Flash Player (malware)","why":"This extension is malware, installed pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"54df22cd-19ce-a7f0-63cc-ffe3113748b9","schema":1480349193877},{"guid":"trackerbird@bustany.org","blockID":"i986","enabled":true,"last_modified":1480349204041,"details":{"who":"All Thunderbird users who have this version of the add-on installed on Thunderbird 38.0a2 and above.","created":"2015-08-17T15:56:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1189264","name":"trackerbird 1.2.6","why":"This add-on is causing consistent crashes on Thunderbird 38.0a2 and above."},"versionRange":[{"targetApplication":[{"minVersion":"38.0a2","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"}],"minVersion":"1.2.6","maxVersion":"1.2.6","severity":1}],"prefs":[],"id":"bb1c699e-8790-4528-0b6d-4f83b7a3152d","schema":1480349193877},{"guid":"{0134af61-7a0c-4649-aeca-90d776060cb3}","blockID":"i448","enabled":true,"last_modified":1480349203968,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-13T16:15:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912746","name":"KeyBar add-on","why":"This add-on doesn't follow our Add-on Guidelines. It manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"cf428416-4974-8bb4-7928-c0cb2cfe7957","schema":1480349193877},{"guid":"/^(firefox@vebergreat\\.net|EFGLQA@78ETGYN-0W7FN789T87\\.COM)$/","blockID":"i564","enabled":true,"last_modified":1480349203902,"details":{"who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","created":"2014-03-05T13:02:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","name":"veberGreat and vis (Free Driver Scout bundle)","why":"These add-ons are silently installed by the Free Driver Scout installer, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"487538f1-698e-147e-6395-986759ceed7e","schema":1480349193877},{"guid":"69ffxtbr@PackageTracer_69.com","blockID":"i882","enabled":true,"last_modified":1480349203836,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2015-04-10T16:18:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1153001","name":"PackageTracer","why":"This add-on appears to be malware, hijacking user's settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"0d37b4e0-3c60-fdad-dd8c-59baff6eae87","schema":1480349193877},{"guid":"{ACAA314B-EEBA-48e4-AD47-84E31C44796C}","blockID":"i496","enabled":true,"last_modified":1480349203779,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-03T16:07:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","name":"DVDVideoSoft Menu","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making settings changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"70d2c912-8d04-8065-56d6-d793b13d5f67","schema":1480349193877},{"guid":"jid1-4vUehhSALFNqCw@jetpack","blockID":"i632","enabled":true,"last_modified":1480349203658,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-01T13:16:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","name":"YouTube Plus Plus 100.7","why":"Version 100.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"100.7","maxVersion":"100.7","severity":3}],"prefs":[],"id":"8bef6026-6697-99cd-7c1f-812877c4211d","schema":1480349193877},{"guid":"{a9bb9fa0-4122-4c75-bd9a-bc27db3f9155}","blockID":"i404","enabled":true,"last_modified":1480349203633,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:16:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"fb7a1dc7-16a0-4f70-8289-4df494e0d0fa","schema":1480349193877},{"guid":"P2@D.edu","blockID":"i850","enabled":true,"last_modified":1480349203605,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:29:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","name":"unIsaless","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"49536a29-fc7e-9fd0-f415-e15ac090fa56","schema":1480349193877},{"guid":"linksicle@linksicle.com","blockID":"i472","enabled":true,"last_modified":1480349203581,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"9b5b15b3-6da7-cb7c-3c44-30b4fe079d52","schema":1480349193877},{"guid":"{377e5d4d-77e5-476a-8716-7e70a9272da0}","blockID":"i398","enabled":true,"last_modified":1480349203519,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:15:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ea94df32-2a85-23da-43f7-3fc5714530ec","schema":1480349193877},{"guid":"{4933189D-C7F7-4C6E-834B-A29F087BFD23}","blockID":"i437","enabled":true,"last_modified":1480349203486,"details":{"who":"All Firefox users.","created":"2013-08-09T15:14:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=900695","name":"Win32.SMSWebalta (malware)","why":"This add-on is widely reported to be malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cbef1357-d6bc-c8d3-7a82-44af6b1c390f","schema":1480349193877},{"guid":"{ADFA33FD-16F5-4355-8504-DF4D664CFE10}","blockID":"i306","enabled":true,"last_modified":1480349203460,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-02-28T12:56:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844972","name":"Nation Toolbar","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. It's also possible that it changes user settings without their consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"017fd151-37ca-4646-4763-1d303fb918fa","schema":1480349193877},{"guid":"detgdp@gmail.com","blockID":"i884","enabled":true,"last_modified":1480349203433,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-04-10T16:21:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152614","name":"Security Protection (malware)","why":"This add-on appears to be malware, hijacking user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"1b5cc88e-499d-2a47-d793-982d4c05e6ee","schema":1480349193877},{"guid":"/^(67314b39-24e6-4f05-99f3-3f88c7cddd17@6c5fa560-13a3-4d42-8e90-53d9930111f9\\.com|ffxtlbr@visualbee\\.com|{7aeae561-714b-45f6-ace3-4a8aed6e227b}|{7093ee04-f2e4-4637-a667-0f730797b3a0}|{53c4024f-5a2e-4f2a-b33e-e8784d730938})$/","blockID":"i514","enabled":true,"last_modified":1480349203408,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:25:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","name":"VisualBee Toolbar","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by using multiple add-on IDs and making unwanted settings changes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5f91eee1-7303-3f97-dfe6-1e897a156c7f","schema":1480349193877},{"guid":"FXqG@xeeR.net","blockID":"i720","enabled":true,"last_modified":1480349203341,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-02T12:23:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"GoSSave","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"8ebbc061-a4ff-b75b-ec42-eb17c42a2956","schema":1480349193877},{"guid":"{87934c42-161d-45bc-8cef-ef18abe2a30c}","blockID":"i547","enabled":true,"last_modified":1480349203310,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-01-30T12:42:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=798621","name":"Ad-Aware Security Toolbar","why":"This add-on is silently installed and makes various unwanted changes, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.7.9999999999","severity":1}],"prefs":[],"id":"bcfbc502-24c2-4699-7435-e4837118f05a","schema":1480349193877},{"guid":"kallow@facebook.com","blockID":"i495","enabled":true,"last_modified":1480349203247,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-02T15:09:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945426","name":"Facebook Security Service (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1a2c37a9-e7cc-2d03-2043-098d36b8aca2","schema":1480349193877},{"guid":"support@lastpass.com","blockID":"i1261","enabled":true,"last_modified":1480349203208,"details":{"who":"All users who install affected versions of this add-on - beta versions 4.0 to 4.1.20a from addons.mozilla.org or lastpass.com.","created":"2016-07-29T14:17:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289907","name":"LastPass addon","why":"LastPass have announced there are security issues that would allow a malicious website to perform some actions (e.g. deleting passwords) without the user's knowledge.  Beta versions 4.0 to 4.1.20a of their add-on that were available from addons.mozilla.org are affected and Lastpass also distributed these versions direct from their website."},"versionRange":[{"targetApplication":[],"minVersion":"4.0.0a","maxVersion":"4.1.20a","severity":1}],"prefs":[],"id":"ffe94023-b4aa-87ac-962c-5beabe34b1a0","schema":1480349193877},{"guid":"008abed2-b43a-46c9-9a5b-a771c87b82da@1ad61d53-2bdc-4484-a26b-b888ecae1906.com","blockID":"i528","enabled":true,"last_modified":1480349203131,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:40:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949565","name":"weDownload Manager Pro","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"da46065f-1c68-78f7-80fc-8ae07b5df68d","schema":1480349193877},{"guid":"{25dd52dc-89a8-469d-9e8f-8d483095d1e8}","blockID":"i714","enabled":true,"last_modified":1480349203066,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-01T15:36:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Web Counselor","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e46c31ad-0ab3-e48a-47aa-9fa91b675fda","schema":1480349193877},{"guid":"{B1FC07E1-E05B-4567-8891-E63FBE545BA8}","blockID":"i926","enabled":true,"last_modified":1480349202708,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:28:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"09868783-261a-ac24-059d-fc772218c1ba","schema":1480349193877},{"guid":"/^(torntv@torntv\\.com|trtv3@trtv\\.com|torntv2@torntv\\.com|e2fd07a6-e282-4f2e-8965-85565fcb6384@b69158e6-3c3b-476c-9d98-ae5838c5b707\\.com)$/","blockID":"i529","enabled":true,"last_modified":1480349202677,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:46:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949559","name":"TornTV","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"040e5ec2-ea34-816a-f99f-93296ce845e8","schema":1480349193877},{"guid":"249911bc-d1bd-4d66-8c17-df533609e6d8@c76f3de9-939e-4922-b73c-5d7a3139375d.com","blockID":"i532","enabled":true,"last_modified":1480349202631,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T15:02:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","name":"Feven","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and using multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d32b850d-82d5-b63d-087c-fb2041b2c232","schema":1480349193877},{"guid":"thefoxonlybetter@quicksaver","blockID":"i704","enabled":true,"last_modified":1480349202588,"details":{"who":"All Firefox users who have any of these versions of the add-on installed.","created":"2014-08-27T14:49:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","name":"The Fox, Only Better (malicious versions)","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.*","severity":3}],"prefs":[],"id":"79ea6621-b414-17a4-4872-bfc4af7fd428","schema":1480349193877},{"guid":"{B40794A0-7477-4335-95C5-8CB9BBC5C4A5}","blockID":"i429","enabled":true,"last_modified":1480349202541,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-07-30T14:31:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=899178","name":"Video Player 1.3 (malware)","why":"This add-on is malware that spreads spam through Facebook."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d98b2b76-4082-3387-ae33-971d973fa278","schema":1480349193877},{"guid":"firefoxaddon@youtubeenhancer.com","blockID":"i648","enabled":true,"last_modified":1480349202462,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:12:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"YouTube Enhancer Plus, versions between 199.7.0 and 208.7.0","why":"Certain versions of the YouTube Enhancer Plus extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"199.7.0","maxVersion":"208.7.0","severity":3}],"prefs":[],"id":"7e64d7fc-ff16-8687-dbd1-bc4c7dfc5097","schema":1480349193877},{"guid":"addon@defaulttab.com","blockID":"i362","enabled":true,"last_modified":1480349202429,"details":{"who":"All users who have this add-on installed. Users who wish to enable it again can do so in the Add-ons Manager tab.","created":"2013-06-06T12:57:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863387","name":"Default Tab","why":"Old versions of this add-on had been silently installed into users' systems, without showing the opt-in install page that is built into Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.4.4","severity":1}],"prefs":[],"id":"df3fe753-5bae-bfb4-022b-6b6bfc534937","schema":1480349193877},{"guid":"{7D4F1959-3F72-49d5-8E59-F02F8AA6815D}","blockID":"i394","enabled":true,"last_modified":1480349202341,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T12:40:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","name":"Updater By SweetPacks","why":"This is a companion add-on for the SweetPacks Toolbar which <a href=\"https://addons.mozilla.org/en-US/firefox/blocked/i392\">is blocked</a> due to guideline violations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"851c2b8e-ea19-3a63-eac5-f931a8da5d6e","schema":1480349193877},{"guid":"g@uzcERQ6ko.net","blockID":"i776","enabled":true,"last_modified":1480349202307,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-31T16:23:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"GoSave","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"ee1e1a44-b51b-9f12-819d-64c3e515a147","schema":1480349193877},{"guid":"ffxtlbr@incredibar.com","blockID":"i318","enabled":true,"last_modified":1480349202280,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-20T14:40:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812264","name":"IncrediBar","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9e84b07c-84d5-c932-85f2-589713d7e380","schema":1480349193877},{"guid":"M1uwW0@47z8gRpK8sULXXLivB.com","blockID":"i870","enabled":true,"last_modified":1480349202252,"details":{"who":"All users who have this add-on installed.","created":"2015-03-04T14:34:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131159","name":"Flash Player 11 (malware)","why":"This is a malicious add-on that goes by the the name \"Flash Player 11\"."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"71d961b2-37d1-d393-76f5-3afeef57e749","schema":1480349193877},{"guid":"jid1-qj0w91o64N7Eeg@jetpack","blockID":"i650","enabled":true,"last_modified":1480349202186,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:14:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"YouTube ALL HTML5, versions between 39.5.1 and 47.0.4","why":"Certain versions of the YouTube ALL HTML5 extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"39.5.1","maxVersion":"47.0.4","severity":3}],"prefs":[],"id":"b30b1f7a-2a30-a6cd-fc20-6c9cb23c7198","schema":1480349193877},{"guid":"4zffxtbr-bs@VideoDownloadConverter_4z.com","blockID":"i507","enabled":true,"last_modified":1480349202156,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-12T15:37:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949266","name":"VideoDownloadConverter","why":"Certain versions of this add-on contains an executable that is flagged by multiple tools as malware. Newer versions no longer use it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"5.75.3.25126","severity":1}],"prefs":[],"id":"0a0f106a-ecc6-c537-1818-b36934943e91","schema":1480349193877},{"guid":"hdv@vovcacik.addons.mozilla.org","blockID":"i656","enabled":true,"last_modified":1480349202125,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:22:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"High Definition Video, version 102.0","why":"Certain versions of the High Definition Video extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"102.0","maxVersion":"102.0","severity":3}],"prefs":[],"id":"972249b2-bba8-b508-2ead-c336631135ac","schema":1480349193877},{"guid":"@video_downloader_pro","blockID":"i1265","enabled":true,"last_modified":1480349202099,"details":{"who":"Users of versions of 1.2.1 to 1.2.5 inclusive.","created":"2016-08-26T18:26:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298335","name":"Video Downloader Pro","why":"Versions 1.2.1 to 1.2.5 of Video Downloader Pro included code that violated our polices - affected versions send every visited url to a remote server without the user's consent.  Versions older than 1.2.1 and more recent than 1.2.5 are okay."},"versionRange":[{"targetApplication":[],"minVersion":"1.2.1","maxVersion":"1.2.5","severity":1}],"prefs":[],"id":"ff9c8def-7d50-66b4-d42a-f9a4b04bd224","schema":1480349193877},{"guid":"contato@facefollow.net","blockID":"i509","enabled":true,"last_modified":1480349202067,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-16T16:15:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950846","name":"Face follow","why":"This add-on spams users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"56f15747-af8c-342c-6877-a41eeacded84","schema":1480349193877},{"guid":"wecarereminder@bryan","blockID":"i666","enabled":true,"last_modified":1480349202039,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-07-10T16:18:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=818614","name":"We-Care Reminder","why":"This add-on is being silently installed by various software packages, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"51e0ead7-144c-c1f4-32f2-25fc5fcde870","schema":1480349193877},{"guid":"/^({83a8ce1b-683c-4784-b86d-9eb601b59f38}|{ef1feedd-d8da-4930-96f1-0a1a598375c6}|{79ff1aae-701f-4ca5-aea3-74b3eac6f01b}|{8a184644-a171-4b05-bc9a-28d75ffc9505}|{bc09c55d-0375-4dcc-836e-0e3c8addfbda}|{cef81415-2059-4dd5-9829-1aef3cf27f4f})$/","blockID":"i526","enabled":true,"last_modified":1480349202010,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:12:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","name":"KeyBar add-on","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and uses multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9dfa4e92-bbf2-66d1-59a9-51402d1d226c","schema":1480349193877},{"guid":"{d9284e50-81fc-11da-a72b-0800200c9a66}","blockID":"i806","enabled":true,"last_modified":1480349201976,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable the add-on in the Add-on Manager.","created":"2014-12-16T08:35:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1106948","name":"Yoono","why":"Starting with Firefox 34, current versions of the Yoono add-on cause all tabs to appear blank."},"versionRange":[{"targetApplication":[{"minVersion":"34.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"7.7.34","severity":1}],"prefs":[],"id":"ccdceb04-3083-012f-9d9f-aac85f10b494","schema":1480349193877},{"guid":"{f2548724-373f-45fe-be6a-3a85e87b7711}","blockID":"i768","enabled":true,"last_modified":1480349201854,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-30T14:52:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","name":"Astro New Tab","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"8510e9e2-c7d8-90d0-a2ff-eb09293acc6e","schema":1480349193877},{"guid":"KSqOiTeSJEDZtTGuvc18PdPmYodROmYzfpoyiCr2@jetpack","blockID":"i1032","enabled":true,"last_modified":1480349201504,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:22:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211172","name":"Video Player (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3d9188ac-235f-773a-52a2-261b3ea9c03c","schema":1480349193877},{"guid":"{849ded12-59e9-4dae-8f86-918b70d213dc}","blockID":"i708","enabled":true,"last_modified":1480349201453,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-09-02T16:29:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047102","name":"Astromenda New Tab","why":"This add-on is silently installed and changes homepage and search settings without the user's consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"a319bfee-464f-1c33-61ad-738c52842fbd","schema":1480349193877},{"guid":"grjkntbhr@hgergerherg.com","blockID":"i1018","enabled":true,"last_modified":1480349201425,"details":{"who":"All users who have this add-on installed.","created":"2015-09-24T16:04:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208196","name":"GreenPlayer (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"9c47d940-bdd9-729f-e32e-1774d87f24b5","schema":1480349193877},{"guid":"quick_start@gmail.com","blockID":"i588","enabled":true,"last_modified":1480349201398,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-03T15:53:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011316","name":"Quick Start (malware)","why":"This add-on appears to be malware that is installed without user consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2affbebe-8776-3edb-28b9-237cb8b85f97","schema":1480349193877},{"guid":"/^(matchersite(pro(srcs?)?)?\\@matchersite(pro(srcs?)?)?\\.com)|((pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\@(pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\.com)$/","blockID":"i668","enabled":true,"last_modified":1480349201372,"details":{"who":"All Firefox users who have any of these add-ons installed. User who wish to continue using these add-ons can enable them in the Add-ons Manager.","created":"2014-07-17T14:35:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1039892","name":"Site Matcher","why":"This is a group of add-ons that are being distributed under multiple different IDs and likely being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"52e1a2de-ab35-be27-4810-334f681ccc4a","schema":1480349193877},{"guid":"{EEF73632-A085-4fd3-A778-ECD82C8CB297}","blockID":"i165","enabled":true,"last_modified":1480349201262,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-10-29T16:41:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec-M (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e5ecd02a-20ee-749b-d5cf-3d74d1173a1f","schema":1480349193877},{"guid":"firefox-extension@mozilla.org","blockID":"i688","enabled":true,"last_modified":1480349201235,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-08-06T17:13:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1049533","name":"FinFisher (malware)","why":"This is a malicious add-on that hides itself under the name Java_plugin, among others."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"98aca74a-69c7-9960-cccc-096a4a4adc6c","schema":1480349193877},{"guid":"jid1-vW9nopuIAJiRHw@jetpack","blockID":"i570","enabled":true,"last_modified":1480349201204,"details":{"who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-03-31T16:17:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=990291","name":"SmileysWeLove","why":"This add-on is silently installed, reverts settings changes to enforce its own, and is also causing stability problems in Firefox, all in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"bf2abd66-f910-650e-89aa-cd1d5c2f8a89","schema":1480349193877},{"guid":"87aukfkausiopoawjsuifhasefgased278djasi@jetpack","blockID":"i1050","enabled":true,"last_modified":1480349201157,"details":{"who":"All users who have this add-on installed.","created":"2015-11-02T14:53:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1220461","name":"Trace Video (malware)","why":"This is a malicious add-on that poses as a video update and hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cb4cfac0-79c2-0fbf-206a-324aa3abbea5","schema":1480349193877},{"guid":"{e44a1809-4d10-4ab8-b343-3326b64c7cdd}","blockID":"i451","enabled":true,"last_modified":1480349201128,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-18T16:33:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","name":"Entrusted","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ad5f53ed-7a43-cb1f-cbd7-41808fac1791","schema":1480349193877},{"guid":"{21EAF666-26B3-4A3C-ABD0-CA2F5A326744}","blockID":"i620","enabled":true,"last_modified":1480349201096,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-12T15:27:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024752","name":"V-Bates","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2d8833db-01a7-a758-080f-19e47abc54cb","schema":1480349193877},{"guid":"{1FD91A9C-410C-4090-BBCC-55D3450EF433}","blockID":"i338","enabled":true,"last_modified":1480349201059,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-04-24T11:30:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844979","name":"DataMngr (malware)","why":"This extension overrides search settings, and monitors any further changes done to them so that they can be reverted. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">add-on guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2e35995f-bec6-aa2b-3372-346d3325f72e","schema":1480349193877},{"guid":"9598582LLKmjasieijkaslesae@jetpack","blockID":"i996","enabled":true,"last_modified":1480349201029,"details":{"who":"All users who have this add-on installed.","created":"2015-09-07T13:50:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201165","name":"Secure Player (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"52f9c6e7-f7d5-f52e-cc35-eb99ef8b4b6a","schema":1480349193877},{"guid":"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}","blockID":"i406","enabled":true,"last_modified":1480349201000,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-27T10:46:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","name":"uTorrentBar","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3bcefc4b-110c-f3b8-17ad-f9fc97c1120a","schema":1480349193877},{"guid":"{ce7e73df-6a44-4028-8079-5927a588c948}","blockID":"i117","enabled":true,"last_modified":1480349200972,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-08-10T08:50:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781269","name":"Search By Image (by Google)","why":"The Search By Image (by Google) extension causes very high CPU utilization during regular browsing, often damaging user experience significantly, in a way that is very difficult to associate with the extension.\r\n\r\nUsers who want to continue using the add-on regardless of its performance impact can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0.8","severity":1}],"prefs":[],"id":"fb1f9aed-2f1f-3e2c-705d-3b34ca9168b6","schema":1480349193877},{"guid":"{424b0d11-e7fe-4a04-b7df-8f2c77f58aaf}","blockID":"i800","enabled":true,"last_modified":1480349200939,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-15T10:51:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","name":"Astromenda NT","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"07bdf6aa-cfc8-ed21-6b36-6f90af02b169","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i618","enabled":true,"last_modified":1480349200911,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:25:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.31","maxVersion":"3.15.31.*","severity":1}],"prefs":[],"id":"825feb43-d6c2-7911-4189-6f589f612c34","schema":1480349193877},{"guid":"{167d9323-f7cc-48f5-948a-6f012831a69f}","blockID":"i262","enabled":true,"last_modified":1480349200885,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-01-29T13:33:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","name":"WhiteSmoke (malware)","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a8f249fe-3db8-64b8-da89-7b584337a7af","schema":1480349193877},{"guid":"/^({988919ff-0cd8-4d0c-bc7e-60d55a49eb64}|{494b9726-9084-415c-a499-68c07e187244}|{55b95864-3251-45e9-bb30-1a82589aaff1}|{eef3855c-fc2d-41e6-8d91-d368f51b3055}|{90a1b331-c2b4-4933-9f63-ba7b84d60d58}|{d2cf9842-af95-48cd-b873-bfbb48cd7f5e})$/","blockID":"i541","enabled":true,"last_modified":1480349200819,"details":{"who":"All Firefox users who have this add-on installed","created":"2014-01-28T14:09:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","name":"MixiDJ (malware)","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"36196aed-9d0d-ebee-adf1-d1f7fadbc48f","schema":1480349193877},{"guid":"{29b136c9-938d-4d3d-8df8-d649d9b74d02}","blockID":"i598","enabled":true,"last_modified":1480349200775,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-06-12T13:21:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011322","name":"Mega Browse","why":"This add-on is silently installed, in violation with our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"63b1c965-27c3-cd06-1b76-8721add39edf","schema":1480349193877},{"guid":"{6e7f6f9f-8ce6-4611-add2-05f0f7049ee6}","blockID":"i868","enabled":true,"last_modified":1480349200690,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T14:58:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1086574","name":"Word Proser","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f54797da-cdcd-351a-c95e-874b64b0d226","schema":1480349193877},{"guid":"{02edb56b-9b33-435b-b7df-b2843273a694}","blockID":"i438","enabled":true,"last_modified":1480349200338,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T15:27:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=896581","name":"KeyBar Toolbar","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"896710d2-5a65-e9b0-845b-05aa72c2bd51","schema":1480349193877},{"guid":"{e1aaa9f8-4500-47f1-9a0a-b02bd60e4076}","blockID":"i646","enabled":true,"last_modified":1480349200312,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:10:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Youtube Video Replay, version 178.7.0","why":"Certain versions of the Youtube Video Replay extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"178.7.0","maxVersion":"178.7.0","severity":3}],"prefs":[],"id":"ac5d1083-6753-bbc1-a83d-c63c35371b22","schema":1480349193877},{"guid":"{1cdbda58-45f8-4d91-b566-8edce18f8d0a}","blockID":"i724","enabled":true,"last_modified":1480349200288,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-13T16:00:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","name":"Website Counselor Pro","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7b70bd36-d2f7-26fa-9038-8b8dd132cd81","schema":1480349193877},{"guid":"{b12785f5-d8d0-4530-a3ea-5c4263b85bef}","blockID":"i988","enabled":true,"last_modified":1480349200171,"details":{"who":"All users who have this add-on installed. Those who wish continue using this add-on can enable it in the Add-ons Manager.","created":"2015-08-17T16:04:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1161573","name":"Hero Fighter Community Toolbar","why":"This add-on overrides user's preferences without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3e6d73f2-e8e3-af69-866e-30d3977b09e4","schema":1480349193877},{"guid":"{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}","blockID":"i39","enabled":true,"last_modified":1480349200047,"details":{"who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","created":"2011-07-19T10:18:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","name":"MediaBar","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"4.3.1.00","severity":1}],"prefs":[],"id":"e928a115-9d8e-86a4-e2c7-de39627bd9bf","schema":1480349193877},{"guid":"{9edd0ea8-2819-47c2-8320-b007d5996f8a}","blockID":"i684","enabled":true,"last_modified":1480349199962,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-06T13:33:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033857","name":"webget","why":"This add-on is believed to be silently installed in Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.search.defaultenginename"],"id":"d38561f5-370f-14be-1443-a74dad29b1f3","schema":1480349193877},{"guid":"/^({ad9a41d2-9a49-4fa6-a79e-71a0785364c8})|(ffxtlbr@mysearchdial\\.com)$/","blockID":"i670","enabled":true,"last_modified":1480349199927,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-07-18T15:47:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036740","name":"MySearchDial","why":"This add-on has been repeatedly been silently installed into users' systems, and is known for changing the default search without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.search.defaultenginename"],"id":"a04075e6-5df2-2e1f-85a6-3a0171247349","schema":1480349193877},{"guid":"odtffplugin@ibm.com","blockID":"i982","enabled":true,"last_modified":1480349199886,"details":{"who":"All users who have these versions installed. The latest versions of this add-on aren't blocked, so updating to them should be sufficient to fix this problem.","created":"2015-08-11T11:25:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190630","name":"IBM Endpoint Manager for Remote Control 9.0.1.1 to 9.0.1.100","why":"Certain versions of the IBM Remote Control add-on could leave a machine vulnerable to run untrusted code."},"versionRange":[{"targetApplication":[],"minVersion":"9.0.1.1","maxVersion":"9.0.1.100","severity":1}],"prefs":[],"id":"f6e3e5d2-9331-1097-ba4b-cf2e484b7187","schema":1480349193877},{"guid":"support@todoist.com","blockID":"i1030","enabled":true,"last_modified":1480349199850,"details":{"who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2015-10-01T16:53:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205479","name":"Todoist","why":"This add-on is sending all sites visited by the user to a remote server, additionally doing so in an unsafe way."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.9","severity":1}],"prefs":[],"id":"d0a84aab-0661-b3c5-c184-a2fd3f9dfb9c","schema":1480349193877},{"guid":"/^({1f43c8af-e9e4-4e5a-b77a-f51c7a916324}|{3a3bd700-322e-440a-8a6a-37243d5c7f92}|{6a5b9fc2-733a-4964-a96a-958dd3f3878e}|{7b5d6334-8bc7-4bca-a13e-ff218d5a3f17}|{b87bca5b-2b5d-4ae8-ad53-997aa2e238d4}|{bf8e032b-150f-4656-8f2d-6b5c4a646e0d})$/","blockID":"i1136","enabled":true,"last_modified":1480349199818,"details":{"who":"All users who have this add-on installed.","created":"2016-03-04T17:56:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","name":"Watcher (malware)","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a2d0378f-ebe4-678c-62d8-2e4c6a613c17","schema":1480349193877},{"guid":"liiros@facebook.com","blockID":"i814","enabled":true,"last_modified":1480349199791,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-09T12:49:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119657","name":"One Tab (malware)","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"387c054d-cc9f-7ebd-c814-b4c1fbcb2880","schema":1480349193877},{"guid":"youtubeunblocker@unblocker.yt","blockID":"i1128","enabled":true,"last_modified":1480349199768,"details":{"who":"All users who have this add-on installed.","created":"2016-03-01T21:18:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3395fce1-42dd-e31a-1466-2da3f32456a0","schema":1480349193877},{"guid":"{97E22097-9A2F-45b1-8DAF-36AD648C7EF4}","blockID":"i916","enabled":true,"last_modified":1480349199738,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-02T09:57:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"94fba774-c4e6-046a-bc7d-ede787a9d0fe","schema":1480349193877},{"guid":"{b64982b1-d112-42b5-b1e4-d3867c4533f8}","blockID":"i167","enabled":true,"last_modified":1480349199673,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-10-29T17:17:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=805973","name":"Browser Manager","why":"This add-on is a frequent cause for browser crashes and other problems."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"00bbe501-2d27-7a1c-c344-6eea1c707473","schema":1480349193877},{"guid":"{58bd07eb-0ee0-4df0-8121-dc9b693373df}","blockID":"i286","enabled":true,"last_modified":1480349199619,"details":{"who":"All Firefox users who have this extension installed.","created":"2013-02-18T10:54:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=842206","name":"Browser Protect / bProtector (malware)","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same <a href=\"https://addons.mozilla.org/firefox/addon/browserprotect/\">BrowserProtect extension</a> that is listed on our add-ons site. That one is safe to use."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b40a60d3-b9eb-09eb-bb02-d50b27aaac9f","schema":1480349193877},{"guid":"trtv3@trtv.com","blockID":"i465","enabled":true,"last_modified":1480349199560,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-01T15:21:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","name":"TornTV","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3d4d8a33-2eff-2556-c699-9be0841a8cd4","schema":1480349193877},{"guid":"youtube@downloader.yt","blockID":"i1231","enabled":true,"last_modified":1480349199528,"details":{"who":"All users who have this add-on installed.","created":"2016-06-09T14:50:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1278932","name":"YouTube downloader","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that can being exploited through this website (downloader.yt) to change security settings in Firefox and/or install malicious add-ons. \r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8514eaee-850c-e27a-a058-8badeeafc26e","schema":1480349193877},{"guid":"low_quality_flash@pie2k.com","blockID":"i658","enabled":true,"last_modified":1480349199504,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:27:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Low Quality Flash, versions between 46.2 and 47.1","why":"Certain versions of the Low Quality Flash extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"46.2","maxVersion":"47.1","severity":3}],"prefs":[],"id":"b869fae6-c18c-0d39-59a2-603814656404","schema":1480349193877},{"guid":"{d2cf9842-af95-48cd-b873-bfbb48cd7f5e}","blockID":"i439","enabled":true,"last_modified":1480349199478,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T16:08:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902569","name":"Mixi DJ V45","why":"This is another instance of the <a href=\"https://addons.mozilla.org/en-US/firefox/blocked/i354\">previously blocked</a> Mixi DJ add-on, which doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. If you wish to continue using it, it can be enabled in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e81c31fc-265e-61b9-d4c1-0e2f31f1652e","schema":1480349193877},{"guid":"/^({b95faac1-a3d7-4d69-8943-ddd5a487d966}|{ecce0073-a837-45a2-95b9-600420505f7e}|{2713b394-286f-4d7c-89ea-4174eeab9f5a}|{da7a20cf-bef4-4342-ad78-0240fdf87055})$/","blockID":"i624","enabled":true,"last_modified":1480349199446,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-06-18T13:50:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","name":"WiseConvert","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ed57d7a6-5996-c7da-8e07-1ad125183e84","schema":1480349193877},{"guid":"{f894a29a-f065-40c3-bb19-da6057778493}","blockID":"i742","enabled":true,"last_modified":1480349199083,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:46:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","name":"Spigot Shopping Assistant","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"39d8334e-4b7c-4336-2d90-e6aa2d783967","schema":1480349193877},{"guid":"plugin@analytic-s.com","blockID":"i467","enabled":true,"last_modified":1480349199026,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T14:08:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935797","name":"Analytics","why":"This add-on bypasses the external install opt in screen in Firefox, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ffbed3f3-e5c9-bc6c-7530-f68f47b7efd6","schema":1480349193877},{"guid":"{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}","blockID":"i678","enabled":true,"last_modified":1480349198947,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2014-07-23T14:12:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=895668","name":"DataMngr","why":"This add-on is generally silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"151021fc-ce4e-a734-e075-4ece19610f64","schema":1480349193877},{"guid":"HxLVJK1ioigz9WEWo8QgCs3evE7uW6LEExAniBGG@jetpack","blockID":"i1036","enabled":true,"last_modified":1480349198894,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:37:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211170","name":"Mega Player (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"32e34b41-a73c-72d4-c96c-136917ad1d4d","schema":1480349193877},{"guid":"{6af08a71-380e-42dd-9312-0111d2bc0630}","blockID":"i822","enabled":true,"last_modified":1480349198826,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-27T09:50:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1126353","name":"{6af08a71-380e-42dd-9312-0111d2bc0630} (malware)","why":"This add-on appears to be malware, hiding itself in the Add-ons Manager, and keeping track of certain user actions."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"96d0c12b-a6cf-4539-c1cf-a1c75c14ff24","schema":1480349193877},{"guid":"colmer@yopmail.com","blockID":"i550","enabled":true,"last_modified":1480349198744,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-02-06T15:49:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=968445","name":"Video Plugin Facebook (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c394d10b-384e-cbd0-f357-9c521715c373","schema":1480349193877},{"guid":"fplayer@adobe.flash","blockID":"i444","enabled":true,"last_modified":1480349198667,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-26T14:49:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=909433","name":"Flash Player (malware)","why":"This add-on is malware disguised as the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c6557989-1b59-72a9-da25-b816c4a4c723","schema":1480349193877},{"guid":"ascsurfingprotection@iobit.com","blockID":"i740","enabled":true,"last_modified":1480349198637,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:39:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963776","name":"Advanced SystemCare Surfing Protection","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"4405f99d-c9b7-c496-1b45-268163ce29b7","schema":1480349193877},{"guid":"{6E19037A-12E3-4295-8915-ED48BC341614}","blockID":"i24","enabled":true,"last_modified":1480349198606,"details":{"who":"Users of RelevantKnowledge version 1.3.328.4 and older in Firefox 4 and later.","created":"2011-03-02T17:42:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=615518","name":"comScore RelevantKnowledge","why":"This add-on causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1pre","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0.1","maxVersion":"1.3.328.4","severity":1}],"prefs":[],"id":"7c189c5e-f95b-0aef-e9e3-8e879336503b","schema":1480349193877},{"guid":"crossriderapp4926@crossrider.com","blockID":"i91","enabled":true,"last_modified":1480349198547,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-14T14:16:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=754648","name":"Remove My Timeline (malware)","why":"Versions of this add-on prior to 0.81.44 automatically post message to users' walls and hide them from their view. Version 0.81.44 corrects this."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.81.43","severity":1}],"prefs":[],"id":"5ee3e72e-96fb-c150-fc50-dd581e960963","schema":1480349193877},{"guid":"/^(93abedcf-8e3a-4d02-b761-d1441e437c09@243f129d-aee2-42c2-bcd1-48858e1c22fd\\.com|9acfc440-ac2d-417a-a64c-f6f14653b712@09f9a966-9258-4b12-af32-da29bdcc28c5\\.com|58ad0086-1cfb-48bb-8ad2-33a8905572bc@5715d2be-69b9-4930-8f7e-64bdeb961cfd\\.com)$/","blockID":"i544","enabled":true,"last_modified":1480349198510,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-01-30T11:51:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","name":"SuperLyrics","why":"This add-on is in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, using multiple add-on IDs and potentially doing other unwanted activities."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d8d25967-9814-3b65-0787-a0525c16e11e","schema":1480349193877},{"guid":"wHO@W9.net","blockID":"i980","enabled":true,"last_modified":1480349198483,"details":{"who":"All users who have this add-on installed.","created":"2015-08-11T11:20:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1192468","name":"BestSavEFOrYoU (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4beb917f-68f2-1f91-beed-dff6d83006f8","schema":1480349193877},{"guid":"frhegnejkgner@grhjgewfewf.com","blockID":"i1040","enabled":true,"last_modified":1480349198458,"details":{"who":"All users who have this add-on installed.","created":"2015-10-07T13:03:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212451","name":"Async Codec (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fb6ab4ce-5517-bd68-2cf7-a93a109a528a","schema":1480349193877},{"guid":"firefox@luckyleap.net","blockID":"i471","enabled":true,"last_modified":1480349198433,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3a9e04c7-5e64-6297-8442-2816915aad77","schema":1480349193877},{"guid":"auto-plugin-checker@jetpack","blockID":"i1210","enabled":true,"last_modified":1480349198401,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-04T16:25:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","name":"auto-plugin-checker","why":"This add-on reports every visited URL to a third party without disclosing it to the user."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3e202419-5318-2025-b579-c828af24a06e","schema":1480349193877},{"guid":"lugcla21@gmail.com","blockID":"i432","enabled":true,"last_modified":1480349198372,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-06T13:16:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902072","name":"FB Color Changer (malware)","why":"This add-on includes malicious code that spams users' Facebook accounts with unwanted messages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b6943f35-9429-1f8e-bf8e-fe37979fe183","schema":1480349193877},{"guid":"{99079a25-328f-4bd4-be04-00955acaa0a7}","blockID":"i402","enabled":true,"last_modified":1480349198341,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:16:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"16008331-8b47-57c8-a6f7-989914d1cb8a","schema":1480349193877},{"guid":"{81b13b5d-fba1-49fd-9a6b-189483ac548a}","blockID":"i473","enabled":true,"last_modified":1480349198317,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"76debc7b-b875-6da4-4342-1243cbe437f6","schema":1480349193877},{"guid":"{e935dd68-f90d-46a6-b89e-c4657534b353}","blockID":"i732","enabled":true,"last_modified":1480349198260,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-16T16:38:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Sites Pro","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"97fdc235-ac1a-9f20-1b4a-17c2f0d89ad1","schema":1480349193877},{"guid":"{32da2f20-827d-40aa-a3b4-2fc4a294352e}","blockID":"i748","enabled":true,"last_modified":1480349198223,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:02:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","name":"Start Page","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6c980c8e-4a3c-7912-4a3a-80add457575a","schema":1480349193877},{"guid":"chinaescapeone@facebook.com","blockID":"i431","enabled":true,"last_modified":1480349198192,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-05T16:43:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","name":"F-Secure Security Pack (malware)","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fbd89a9d-9c98-8481-e4cf-93e327ca8be1","schema":1480349193877},{"guid":"{cc6cc772-f121-49e0-b1f0-c26583cb0c5e}","blockID":"i716","enabled":true,"last_modified":1480349198148,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-02T12:12:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Website Counselor","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"debcd28c-884b-ca42-d983-6fabf91034dd","schema":1480349193877},{"guid":"{906000a4-88d9-4d52-b209-7a772970d91f}","blockID":"i474","enabled":true,"last_modified":1480349197744,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"326d05b9-ace7-67c6-b094-aad926c185a5","schema":1480349193877},{"guid":"{A34CAF42-A3E3-11E5-945F-18C31D5D46B0}","blockID":"i1227","enabled":true,"last_modified":1480349197699,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-31T15:45:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1274995","name":"Mococheck WAP browser","why":"This add-on downgrades the security of all iframes from https to http and changes important Firefox security preferences."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["security.csp.enable","security.fileuri.strict_origin_policy","security.mixed_content.block_active_content"],"id":"2230a5ce-a8f8-a20a-7974-3b960a03aba9","schema":1480349193877},{"guid":"{AB2CE124-6272-4b12-94A9-7303C7397BD1}","blockID":"i20","enabled":true,"last_modified":1480349197667,"details":{"who":"Users of Skype extension versions below 5.2.0.7165 for all versions of Firefox.","created":"2011-01-20T18:39:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","name":"Skype extension","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please <a href=\"http://www.skype.com/intl/en/get-skype/on-your-computer/click-and-call/\">update to the latest version</a>. For more information, please <a href=\"http://blog.mozilla.com/addons/2011/01/20/blocking-the-skype-toolbar-in-firefox/\">read our announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"5.2.0.7164","severity":1}],"prefs":[],"id":"60e16015-1803-197a-3241-484aa961d18f","schema":1480349193877},{"guid":"f6682b47-e12f-400b-9bc0-43b3ccae69d1@39d6f481-b198-4349-9ebe-9a93a86f9267.com","blockID":"i682","enabled":true,"last_modified":1480349197636,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-04T16:07:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1043017","name":"enformation","why":"This add-on is being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a7ae65cd-0869-67e8-02f8-6d22c56a83d4","schema":1480349193877},{"guid":"rally_toolbar_ff@bulletmedia.com","blockID":"i537","enabled":true,"last_modified":1480349197604,"details":{"who":"All Firefox users who have this extension installed. If you want to continue using it, you can enable it in the Add-ons Manager.","created":"2014-01-23T15:51:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950267","name":"Rally Toolbar","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"4ac6eb63-b51a-3296-5b02-bae77f424032","schema":1480349193877},{"guid":"x77IjS@xU.net","blockID":"i774","enabled":true,"last_modified":1480349197578,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-31T16:22:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"YoutubeAdBlocke","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"4771da14-bcf2-19b1-3d71-bc61a1c7d457","schema":1480349193877},{"guid":"{49c53dce-afa0-49a1-a08b-2eb8e8444128}","blockID":"i441","enabled":true,"last_modified":1480349197550,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T16:58:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844985","name":"ytbyclick","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5f08d720-58c2-6acb-78ad-7af45c82c90b","schema":1480349193877},{"guid":"searchengine@gmail.com","blockID":"i886","enabled":true,"last_modified":1480349197525,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","created":"2015-04-10T16:25:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152555","name":"Search Enginer","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"46de4f6e-2b29-7334-ebbb-e0048f114f7b","schema":1480349193877},{"guid":"{bb7b7a60-f574-47c2-8a0b-4c56f2da9802}","blockID":"i754","enabled":true,"last_modified":1480349197500,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:27:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080850","name":"AdvanceElite","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f222ceb2-9b69-89d1-8dce-042d8131a12e","schema":1480349193877},{"guid":"/^(test3@test.org|test2@test.org|test@test.org|support@mozilla.org)$/","blockID":"i1119","enabled":true,"last_modified":1480349197468,"details":{"who":"All users who have these add-ons installed.","created":"2016-01-25T13:31:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1242721","name":"test.org add-ons (malware)","why":"These add-ons are malicious, or at least attempts at being malicious, using misleading names and including risky code."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"afd2a0d7-b050-44c9-4e45-b63696d9b22f","schema":1480349193877},{"guid":"/^((34qEOefiyYtRJT@IM5Munavn\\.com)|(Mro5Fm1Qgrmq7B@ByrE69VQfZvZdeg\\.com)|(KtoY3KGxrCe5ie@yITPUzbBtsHWeCdPmGe\\.com)|(9NgIdLK5Dq4ZMwmRo6zk@FNt2GCCLGyUuOD\\.com)|(NNux7bWWW@RBWyXdnl6VGls3WAwi\\.com)|(E3wI2n@PEHTuuNVu\\.com)|(2d3VuWrG6JHBXbQdbr@3BmSnQL\\.com))$/","blockID":"i324","enabled":true,"last_modified":1480349197432,"details":{"who":"All users who have this add-on installed.","created":"2013-03-22T14:48:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","name":"Flash Player (malware)","why":"This extension is malware, installed pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5be3a399-af3e-644e-369d-628273b3fdc2","schema":1480349193877},{"guid":"axtara__web@axtara.com","blockID":"i1263","enabled":true,"last_modified":1480349197404,"details":{"who":"All users who have version 1.1.1 or less of this add-on installed.","created":"2016-08-17T16:47:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"AXTARA Search (pre 1.1.2)","why":"Old versions of this add-on contained code from YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity.  Version 1.1.2 is now okay."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.1.1","severity":3}],"prefs":[],"id":"c58be1c9-3d63-a948-219f-e3225e1eec8e","schema":1480349193877},{"guid":"{8f894ed3-0bf2-498e-a103-27ef6e88899f}","blockID":"i792","enabled":true,"last_modified":1480349197368,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-26T13:49:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"ExtraW","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bebc9e15-59a1-581d-0163-329d7414edff","schema":1480349193877},{"guid":"profsites@pr.com","blockID":"i734","enabled":true,"last_modified":1480349197341,"details":{"who":"All Firefox users who have this add-on installed.\r\n","created":"2014-10-16T16:39:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"ProfSites","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0d6d84d7-0b3f-c5ab-57cc-6b66b0775a23","schema":1480349193877},{"guid":"{872b5b88-9db5-4310-bdd0-ac189557e5f5}","blockID":"i497","enabled":true,"last_modified":1480349197240,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-03T16:08:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","name":"DVDVideoSoft Menu","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making settings changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e8da89c4-c585-77e4-9872-591d20723a7e","schema":1480349193877},{"guid":"123456789@offeringmedia.com","blockID":"i664","enabled":true,"last_modified":1480349197208,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-07-10T15:41:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Taringa MP3 / Adobe Flash","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6d0a7dda-d92a-c8e2-21be-c92b0a88ac8d","schema":1480349193877},{"guid":"firefoxdav@icloud.com","blockID":"i1214","enabled":true,"last_modified":1480349197172,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-17T16:55:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1271358","name":"iCloud Bookmarks","why":"This add-on is causing frequent and persistent crashing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.4.22","severity":1}],"prefs":[],"id":"2dddd7a7-b081-45e2-3eeb-2a7f76a1465f","schema":1480349193877},{"guid":"youplayer@addons.mozilla.org","blockID":"i660","enabled":true,"last_modified":1480349197136,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:31:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"YouPlayer, versions between 79.9.8 and 208.0.1","why":"Certain versions of the YouPlayer extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"79.9.8","maxVersion":"208.0.1","severity":3}],"prefs":[],"id":"82dca22b-b889-5d9d-3fc9-b2184851f2d1","schema":1480349193877},{"guid":"{df6bb2ec-333b-4267-8c4f-3f27dc8c6e07}","blockID":"i487","enabled":true,"last_modified":1480349197109,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-19T14:59:45Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940681","name":"Facebook 2013 (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5867c409-b342-121e-3c3b-426e2f0ba1d4","schema":1480349193877},{"guid":"/^({4e988b08-8c51-45c1-8d74-73e0c8724579}|{93ec97bf-fe43-4bca-a735-5c5d6a0a40c4}|{aed63b38-7428-4003-a052-ca6834d8bad3}|{0b5130a9-cc50-4ced-99d5-cda8cc12ae48}|{C4CFC0DE-134F-4466-B2A2-FF7C59A8BFAD})$/","blockID":"i524","enabled":true,"last_modified":1480349197082,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:43:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","name":"SweetPacks","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1a3a26a2-cdaa-e5ba-f6ac-47b98ae2cc26","schema":1480349193877},{"guid":"foxyproxy@eric.h.jung","blockID":"i950","enabled":true,"last_modified":1480349197056,"details":{"who":"All users who have this add-on installed on Thunderbird 38 and above.","created":"2015-07-15T09:34:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","name":"FoxyProxy Standard for Thunderbird","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above."},"versionRange":[{"targetApplication":[{"minVersion":"38.0a2","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"},{"minVersion":"2.35","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"0","maxVersion":"4.5.5","severity":1}],"prefs":[],"id":"5ee8203d-bea2-6cd5-9ba0-d1922ffb3d21","schema":1480349193877},{"guid":"{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}","blockID":"i1056","enabled":true,"last_modified":1480349197027,"details":{"who":"All users who have this add-on installed in Firefox 43 and above. User who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2015-11-17T14:03:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1225639","name":"Skype Click to Call","why":"This add-on is associated with frequent shutdown crashes in Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"43.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"7.5.0.9082","severity":1}],"prefs":[],"id":"484f8386-c415-7499-a8a0-f4e16f5a142f","schema":1480349193877},{"guid":"{22119944-ED35-4ab1-910B-E619EA06A115}","blockID":"i45","enabled":true,"last_modified":1480349196995,"details":{"who":"Users of version 7.9.20.6 of RoboForm Toolbar and earlier on Firefox 48 and above.","created":"2011-11-19T06:14:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=699134","name":"Roboform","why":"Older versions of the RoboForm Toolbar add-on are causing crashes in Firefox 48 and above.  The developer has released a fix, available in versions 7.9.21+."},"versionRange":[{"targetApplication":[{"minVersion":"8.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0.1","maxVersion":"7.9.20.6","severity":1}],"prefs":[],"id":"5f7f9e13-d3e8-ea74-8341-b83e36d67d94","schema":1480349193877},{"guid":"{87b5a11e-3b54-42d2-9102-0a7cb1f79ebf}","blockID":"i838","enabled":true,"last_modified":1480349196965,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:29:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","name":"Cyti Web (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ba0e57c-4c0c-4eb6-26e7-c2016769c343","schema":1480349193877},{"guid":"/^({bf67a47c-ea97-4caf-a5e3-feeba5331231}|{24a0cfe1-f479-4b19-b627-a96bf1ea3a56})$/","blockID":"i542","enabled":true,"last_modified":1480349196622,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-01-28T14:10:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","name":"MixiDJ (malware)","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fc442b64-1b5d-bebb-c486-f431b154f3db","schema":1480349193877},{"guid":"/^({ebd898f8-fcf6-4694-bc3b-eabc7271eeb1}|{46008e0d-47ac-4daa-a02a-5eb69044431a}|{213c8ed6-1d78-4d8f-8729-25006aa86a76}|{fa23121f-ee7c-4bd8-8c06-123d087282c5}|{19803860-b306-423c-bbb5-f60a7d82cde5})$/","blockID":"i622","enabled":true,"last_modified":1480349196597,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-06-18T13:48:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","name":"WiseConvert","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ffd184fa-aa8f-8a75-ff00-ce285dec5b22","schema":1480349193877},{"guid":"/^({fa95f577-07cb-4470-ac90-e843f5f83c52}|ffxtlbr@speedial\\.com)$/","blockID":"i696","enabled":true,"last_modified":1480349196565,"details":{"who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using these add-ons can enable them in the Add-ons Manager.","created":"2014-08-21T13:55:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1031115","name":"Speedial","why":"These add-ons are silently installed and change homepage and search defaults without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. They are also distributed under more than one add-on ID."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"130c7419-f727-a2fb-3891-627bc69a43bb","schema":1480349193877},{"guid":"pennerdu@faceobooks.ws","blockID":"i442","enabled":true,"last_modified":1480349196541,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-13T14:00:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=904050","name":"Console Video (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fb83e48e-a780-9d06-132c-9ecc65b43674","schema":1480349193877},{"guid":"anttoolbar@ant.com","blockID":"i88","enabled":true,"last_modified":1480349196509,"details":{"who":"All Firefox users who have installed version 2.4.6.4 of the Ant Video Downloader and Player add-on.","created":"2012-05-01T10:32:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748269","name":"Ant Video Downloader and Player","why":"Version 2.4.6.4 of the Ant Video Downloader and Player add-on is causing a very high number of crashes in Firefox. There's an updated version 2.4.6.5 that doesn't have this problem. All users are recommended to update as soon as possible."},"versionRange":[{"targetApplication":[],"minVersion":"2.4.6.4","maxVersion":"2.4.6.4","severity":1}],"prefs":[],"id":"9eef435b-39d4-2b73-0810-44b0d3ff52ad","schema":1480349193877},{"guid":"{E90FA778-C2B7-41D0-9FA9-3FEC1CA54D66}","blockID":"i446","enabled":true,"last_modified":1480349196471,"details":{"who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","created":"2013-09-06T15:59:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","name":"YouTube to MP3 Converter","why":"This add-on is installed silently, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"83eb6337-a3b6-84e4-e76c-ee9200b80796","schema":1480349193877},{"guid":"{ad7ce998-a77b-4062-9ffb-1d0b7cb23183}","blockID":"i804","enabled":true,"last_modified":1480349196438,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-15T10:53:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","name":"Astromenda Search Addon","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"633f9999-c81e-bd7a-e756-de7d34feb39d","schema":1480349193877},{"guid":"{52b0f3db-f988-4788-b9dc-861d016f4487}","blockID":"i584","enabled":true,"last_modified":1480349196363,"details":{"who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","created":"2014-05-22T11:07:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","name":"Web Check (Free Driver Scout bundle)","why":"Versions of this add-on are silently installed by the Free Driver Scout installer, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.1.9999999","severity":1}],"prefs":[],"id":"cba0ac44-90f9-eabb-60b0-8da2b645e067","schema":1480349193877},{"guid":"dodatek@flash2.pl","blockID":"i1279","enabled":true,"last_modified":1480349196331,"details":{"who":"Any user with version 1.3 or newer of this add-on installed.","created":"2016-10-27T15:52:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","name":"Aktualizacja Flash WORK addon","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"1.3","maxVersion":"*","severity":3}],"prefs":[],"id":"2dab5211-f9ec-a1bf-c617-6f94f28b5ee1","schema":1480349193877},{"guid":"{2d069a16-fca1-4e81-81ea-5d5086dcbd0c}","blockID":"i440","enabled":true,"last_modified":1480349196294,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T16:26:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903647","name":"GlitterFun","why":"This add-on is installed silently and doesn't follow many other of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. If you want to continue using this add-on, you can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e3f77f3c-b1d6-3b29-730a-846007b9cb16","schema":1480349193877},{"guid":"xivars@aol.com","blockID":"i501","enabled":true,"last_modified":1480349196247,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:34:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946420","name":"Video Plugin Facebook (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3303d201-7006-3c0d-5fd5-45503e2e690c","schema":1480349193877},{"guid":"2bbadf1f-a5af-499f-9642-9942fcdb7c76@f05a14cc-8842-4eee-be17-744677a917ed.com","blockID":"i700","enabled":true,"last_modified":1480349196212,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-21T16:15:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052599","name":"PIX Image Viewer","why":"This add-on is widely considered malware and is apparently installed silently into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1b72889b-90e6-ea58-4fe8-d48257df7d8b","schema":1480349193877},{"guid":"/^[0-9a-f]+@[0-9a-f]+\\.info/","blockID":"i256","enabled":true,"last_modified":1480349196184,"details":{"who":"All Firefox users who have installed any of these add-ons.","created":"2013-01-22T12:16:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec extensions (malware)","why":"The set of extensions labeled as Codec, Codec-M, Codec-C and other names are malware being distributed as genuine add-ons.\r\n\r\nIf you think an add-on you installed was incorrectly blocked and the block dialog pointed you to this page, please comment on <a href=\"https://blog.mozilla.org/addons/2013/01/22/blocklisting-malicious-codec-add-ons/\">this blog post</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0c654540-00f2-0ad4-c9be-7ca2ace5341e","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i600","enabled":true,"last_modified":1480349196158,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-06-12T14:16:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem."},"versionRange":[{"targetApplication":[],"minVersion":"3.15.5","maxVersion":"3.15.5.*","severity":1}],"prefs":[],"id":"51c4ab3b-9ad3-c5c3-98c8-a220025fc5a3","schema":1480349193877},{"guid":"{729c9605-0626-4792-9584-4cbe65b243e6}","blockID":"i788","enabled":true,"last_modified":1480349196123,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-20T10:07:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Browser Ext Assistance","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3c588238-2501-6a53-65ea-5c8ff0f3e51d","schema":1480349193877},{"guid":"unblocker20__web@unblocker.yt","blockID":"i1213","enabled":true,"last_modified":1480349196088,"details":{"who":"All users who have this add-on installed.","created":"2016-05-09T17:28:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker 2.0","why":"This add-on is a copy of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"de305335-e9f3-f410-cf5c-f88b7ad4b088","schema":1480349193877},{"guid":"webbooster@iminent.com","blockID":"i630","enabled":true,"last_modified":1480349196032,"details":{"who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","created":"2014-06-26T15:49:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","name":"Iminent Minibar","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"d894ea79-8215-7a0c-b0e9-be328c3afceb","schema":1480349193877},{"guid":"jid1-uabu5A9hduqzCw@jetpack","blockID":"i1016","enabled":true,"last_modified":1480349196001,"details":{"who":"All users who have this add-on installed.","created":"2015-09-24T09:49:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208051","name":"SpeedFox (malware)","why":"This add-on is injecting unwanted and unexpected advertisements into all web pages, and masking this behavior as ad-blocking in its code."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"31397419-3dfa-9db3-f1aa-e812d4220669","schema":1480349193877},{"guid":"/^firefox@(jumpflip|webconnect|browsesmart|mybuzzsearch|outobox|greygray|lemurleap|divapton|secretsauce|batbrowse|whilokii|linkswift|qualitink|browsefox|kozaka|diamondata|glindorus|saltarsmart|bizzybolt|websparkle)\\.(com?|net|org|info|biz)$/","blockID":"i548","enabled":true,"last_modified":1480349195955,"details":{"who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","created":"2014-01-30T15:06:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","name":"Yontoo add-ons","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"bfaf3510-397e-48e6-cc4f-74202aaaed54","schema":1480349193877},{"guid":"firefox@bandoo.com","blockID":"i23","enabled":true,"last_modified":1480349195915,"details":{"who":"Users of Bandoo version 5.0 for Firefox 3.6 and later.","created":"2011-03-01T23:30:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629634","name":"Bandoo","why":"This add-on causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1pre","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"5.0","maxVersion":"5.0","severity":1}],"prefs":[],"id":"bd487cf4-3f6a-f956-a6e9-842ac8deeac5","schema":1480349193877},{"guid":"5nc3QHFgcb@r06Ws9gvNNVRfH.com","blockID":"i372","enabled":true,"last_modified":1480349195887,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-06-18T13:23:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=875752","name":"Flash Player 11 (malware)","why":"This add-on is malware pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dc71fcf5-fae4-5a5f-6455-ca7bbe4202db","schema":1480349193877},{"guid":"/^(7tG@zEb\\.net|ru@gfK0J\\.edu)$/","blockID":"i854","enabled":true,"last_modified":1480349195851,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:41:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952255","name":"youtubeadblocker (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cfe42207-67a9-9b88-f80c-994e6bdd0c55","schema":1480349193877},{"guid":"{a7aae4f0-bc2e-a0dd-fb8d-68ce32c9261f}","blockID":"i378","enabled":true,"last_modified":1480349195823,"details":{"who":"All Firefox users who have installed this add-on.","created":"2013-06-18T15:58:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=865090","name":"Myanmar Extension for Facebook (malware)","why":"This extension is malware that hijacks Facebook accounts for malicious purposes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"30ecd9b9-4023-d9ef-812d-f1a75bb189b0","schema":1480349193877},{"guid":"a88a77ahjjfjakckmmabsy278djasi@jetpack","blockID":"i1034","enabled":true,"last_modified":1480349195798,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:28:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211171","name":"Fast Unlock (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f801f112-3e8f-770f-10db-384349a36026","schema":1480349193877},{"guid":"crossriderapp5060@crossrider.com","blockID":"i228","enabled":true,"last_modified":1480349195769,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:31:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=810016","name":"Savings Sidekick","why":"This add-on is silently side-installed by other software, and it overrides user preferences and inserts advertisements in web content."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a37f76ac-7b77-b5a3-bac8-addaacf34bae","schema":1480349193877},{"guid":"/^(saamazon@mybrowserbar\\.com)|(saebay@mybrowserbar\\.com)$/","blockID":"i672","enabled":true,"last_modified":1480349195347,"details":{"who":"All Firefox users who have these add-ons installed. Users wishing to continue using these add-ons can enable them in the Add-ons Manager.","created":"2014-07-22T15:13:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011337","name":"Spigot Shopping Assistant","why":"These add-ons are being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e072a461-ee5a-c83d-8d4e-5686eb585a15","schema":1480349193877},{"guid":"{b99c8534-7800-48fa-bd71-519a46cdc7e1}","blockID":"i596","enabled":true,"last_modified":1480349195319,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-06-12T13:19:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011325","name":"BrowseMark","why":"This add-on is silently installed, in violation with our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f411bb0f-7c82-9061-4a80-cabc8ff45beb","schema":1480349193877},{"guid":"/^({94d62e35-4b43-494c-bf52-ba5935df36ef}|firefox@advanceelite\\.com|{bb7b7a60-f574-47c2-8a0b-4c56f2da9802})$/","blockID":"i856","enabled":true,"last_modified":1480349195286,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:51:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130323","name":"AdvanceElite (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e3d52650-d3e2-4cef-71f7-e6188f56fe4d","schema":1480349193877},{"guid":"{458fb825-2370-4973-bf66-9d7142141847}","blockID":"i1024","enabled":true,"last_modified":1480349195258,"details":{"who":"All users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2015-09-29T09:25:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1209588","name":"Web Shield","why":"This add-on hides itself in the Add-ons Manager, interrupts the Firefox update process, and reportedly causes other problems to users, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["app.update.auto","app.update.enabled","app.update.interval","app.update.url"],"id":"32c5baa7-d547-eaab-302d-b873c83bfe2d","schema":1480349193877},{"guid":"{f2456568-e603-43db-8838-ffa7c4a685c7}","blockID":"i778","enabled":true,"last_modified":1480349195215,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-07T13:53:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Sup-SW","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"93568fa2-0cb7-4e1d-e893-d7261e81547c","schema":1480349193877},{"guid":"{77BEC163-D389-42c1-91A4-C758846296A5}","blockID":"i566","enabled":true,"last_modified":1480349195185,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-on Manager.","created":"2014-03-05T13:20:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964594","name":"V-Bates","why":"This add-on is silently installed into Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"080edbac-25d6-e608-abdd-feb1ce7a9a77","schema":1480349193877},{"guid":"helper@vidscrab.com","blockID":"i1077","enabled":true,"last_modified":1480349195157,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2016-01-14T14:32:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1231010","name":"YouTube Video Downloader (from AddonCrop)","why":"This add-on injects remote scripts and injects unwanted content into web pages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"36b2e1e0-5fda-bde3-db55-dfcbe24dfd04","schema":1480349193877},{"guid":"/^ext@WebexpEnhancedV1alpha[0-9]+\\.net$/","blockID":"i535","enabled":true,"last_modified":1480349195123,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","created":"2014-01-09T11:22:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952717","name":"Webexp Enhanced","why":"This add-on is generally unwanted by users and uses multiple random IDs in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c7d6a30d-f3ee-40fb-5256-138dd4593a61","schema":1480349193877},{"guid":"jid1-XLjasWL55iEE1Q@jetpack","blockID":"i578","enabled":true,"last_modified":1480349195058,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-04-28T16:25:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002037","name":"Flash Player (malware)","why":"This is a malicious add-on that presents itself as \"Flash Player\" but is really injecting unwanted content into Facebook pages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1e75b2f0-02fc-77a4-ad2f-52a4caff1a71","schema":1480349193877},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","blockID":"i142","enabled":true,"last_modified":1480349195007,"details":{"who":"Todos los usuarios de Firefox que instalaron la versi\u00f3n 4.2 del complemento Cuevana Stream.\r\n\r\nAll Firefox users who have installed version 4.2 of the Cuevana Stream add-on.","created":"2012-09-18T13:37:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=792132","name":"Cuevana Stream (malicious version)","why":"<strong>Espa\u00f1ol</strong>\r\nUna versi\u00f3n maliciosa del complemento Cuevana Stream (4.2) fue colocada en el sitio Cuevana y distribuida a muchos usuarios del sitio. Esta versi\u00f3n recopila informaci\u00f3n de formularios web y los env\u00eda a una direcci\u00f3n remota con fines maliciosos. Se le recomienda a todos los usuarios que instalaron esta versi\u00f3n que cambien sus contrase\u00f1as inmediatamente, y que se actualicen a la nueva versi\u00f3n segura, que es la 4.3.\r\n\r\n<strong>English</strong>\r\nA malicious version of the Cuevana Stream add-on (4.2) was uploaded to the Cuevana website and distributed to many of its users. This version takes form data and sends it to a remote location with malicious intent. It is recommended that all users who installed this version to update their passwords immediately, and update to the new safe version, version 4.3.\r\n\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"4.2","maxVersion":"4.2","severity":3}],"prefs":[],"id":"91e551b9-7e94-60e2-f1bd-52f25844ab16","schema":1480349193877},{"guid":"{34712C68-7391-4c47-94F3-8F88D49AD632}","blockID":"i922","enabled":true,"last_modified":1480349194976,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:27:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dd350efb-34ac-2bb5-5afd-eed722dbb916","schema":1480349193877},{"guid":"PDVDZDW52397720@XDDWJXW57740856.com","blockID":"i846","enabled":true,"last_modified":1480349194949,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T15:03:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128320","name":"Ge-Force","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"c33e950c-c977-ed89-c86a-3be8c4be1967","schema":1480349193877},{"guid":"{977f3b97-5461-4346-92c8-a14c749b77c9}","blockID":"i69","enabled":true,"last_modified":1480349194919,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-02-22T16:41:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=729356","name":"Zuperface+","why":"This add-on adds apps to users' accounts, with full access permissions, and sends spam posts using these apps, all without any consent from users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f105bdc7-7ebd-587c-6344-1533249f50b3","schema":1480349193877},{"guid":"discoverypro@discoverypro.com","blockID":"i582","enabled":true,"last_modified":1480349194878,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enabled it in the Add-ons Manager.","created":"2014-04-30T16:10:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004231","name":"Website Discovery Pro","why":"This add-on is silently installed by the CNET installer for MP3 Rocket and probably other software packages. This is in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"34eab242-6fbc-a459-a89e-0dc1a0b8355d","schema":1480349193877},{"guid":"jid1-bKSXgRwy1UQeRA@jetpack","blockID":"i680","enabled":true,"last_modified":1480349194851,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-01T16:34:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=979856","name":"Trusted Shopper","why":"This add-on is silently installed into user's systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f701b790-b266-c69d-0fba-f2d189cb0f34","schema":1480349193877},{"guid":"bcVX5@nQm9l.org","blockID":"i848","enabled":true,"last_modified":1480349194799,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:21:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128266","name":"boomdeal","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f8d6d4e1-b9e6-07f5-2b49-192106a45d82","schema":1480349193877},{"guid":"aytac@abc.com","blockID":"i504","enabled":true,"last_modified":1480349194724,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-06T12:07:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947341","name":"Facebook Haber (malware)","why":"This is a malicious extension that hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bfaf8298-dd69-165c-e1ed-ad55584abd18","schema":1480349193877},{"guid":"Adobe@flash.com","blockID":"i136","enabled":true,"last_modified":1480349194647,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-09-10T16:09:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=790100","name":"Adobe Flash (malware)","why":"This add-on is malware posing as a legitimate Adobe product."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"47ac744e-3176-5cb6-1d02-b460e0c7ada0","schema":1480349193877},{"guid":"{515b2424-5911-40bd-8a2c-bdb20286d8f5}","blockID":"i491","enabled":true,"last_modified":1480349194580,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-11-29T14:52:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940753","name":"Connect DLC","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6d658443-b34a-67ad-934e-cbf7cd407460","schema":1480349193877},{"guid":"/^({3f3cddf8-f74d-430c-bd19-d2c9147aed3d}|{515b2424-5911-40bd-8a2c-bdb20286d8f5}|{17464f93-137e-4646-a0c6-0dc13faf0113}|{d1b5aad5-d1ae-4b20-88b1-feeaeb4c1ebc}|{aad50c91-b136-49d9-8b30-0e8d3ead63d0})$/","blockID":"i516","enabled":true,"last_modified":1480349194521,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:38:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947478","name":"Connect DLC","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and being distributed under multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"96f8e157-8b8b-8e2e-76cd-6850599b4370","schema":1480349193877},{"guid":"wxtui502n2xce9j@no14","blockID":"i1012","enabled":true,"last_modified":1480349194463,"details":{"who":"All users who have this add-on installed.","created":"2015-09-21T13:04:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206157","name":"Video fix (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"246798ac-25fa-f4a4-258c-a71f9f6ae091","schema":1480349193877},{"guid":"flashX@adobe.com","blockID":"i168","enabled":true,"last_modified":1480349194428,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-10-30T12:07:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=807052","name":"Zombie Browser Pack","why":"This is an exploit proof-of-concept created for a conference presentation, which will probably be copied and modified for malicious purposes. \r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d7c69812-801c-8d8e-12cb-c5171bdc48a1","schema":1480349193877},{"guid":"/^(ff\\-)?dodate(kKKK|XkKKK|k|kk|kkx|kR)@(firefox|flash(1)?)\\.pl|dode(ee)?k@firefoxnet\\.pl|(addon|1)@upsolutions\\.pl$/","blockID":"i1278","enabled":true,"last_modified":1480349194386,"details":{"who":"Any user with a version of this add-on installed.","created":"2016-10-27T10:52:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","name":"Aktualizacja dodatku Flash Add-on","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"389aec65-a15d-8276-c7a8-691ac283c9f1","schema":1480349193877},{"guid":"tmbepff@trendmicro.com","blockID":"i1223","enabled":true,"last_modified":1480349194331,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-30T17:07:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","name":"Trend Micro BEP 9.2 to 9.2.0.1023","why":"Add-on  is causing a high-frequency crash in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"9.2","maxVersion":"9.2.0.1023","severity":1}],"prefs":[],"id":"46f75b67-2675-bdde-be93-7ea03475d405","schema":1480349193877},{"guid":"{4889ddce-7a83-45e6-afc9-1e4f1149fff4}","blockID":"i840","enabled":true,"last_modified":1480349193867,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:30:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","name":"Cyti Web (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"be600f35-0633-29f3-c571-819e19d85db9","schema":1480343836083},{"guid":"{55dce8ba-9dec-4013-937e-adbf9317d990","blockID":"i690","enabled":true,"last_modified":1480349193833,"details":{"who":"All Firefox users. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-12T16:23:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048647","name":"Deal Keeper","why":"This add-on is being silently installed in users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"512b0d40-a10a-5ddc-963b-b9c487eb1422","schema":1480343836083},{"guid":"/^new@kuot\\.pro|{13ec6687-0b15-4f01-a5a0-7a891c18e4ee}|rebeccahoppkins(ty(tr)?)?@gmail\\.com|{501815af-725e-45be-b0f2-8f36f5617afc}|{9bdb5f1f-b1e1-4a75-be31-bdcaace20a99}|{e9d93e1d-792f-4f95-b738-7adb0e853b7b}|dojadewaskurwa@gmail\\.com$/","blockID":"i1414","enabled":true,"last_modified":1480349193798,"details":{"who":"All users who have this add-on installed.","created":"2016-10-28T18:06:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","name":"Aktualizacja dodatku Flash (malware)","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5cebc983-bc88-d5f8-6807-bd1cbfcd82fd","schema":1480343836083},{"guid":"/^pink@.*\\.info$/","blockID":"i238","enabled":true,"last_modified":1480349193764,"details":{"who":"All Firefox users (Firefox 19 and above) who have any of these add-ons installed.","created":"2012-12-07T13:46:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806543","name":"Pink add-ons (malware)","why":"This is a set of malicious add-ons that affect many users and are installed without their consent."},"versionRange":[{"targetApplication":[{"minVersion":"18.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0d964264-8bd6-b78d-3c6c-92046c7dc8d0","schema":1480343836083},{"guid":"{58d2a791-6199-482f-a9aa-9b725ec61362}","blockID":"i746","enabled":true,"last_modified":1480349193730,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:01:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","name":"Start Page","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8ebbc7d0-635c-b74a-de9f-16eb5837b36a","schema":1480343836083},{"guid":"{94cd2cc3-083f-49ba-a218-4cda4b4829fd}","blockID":"i590","enabled":true,"last_modified":1480349193649,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-06-03T16:12:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013678","name":"Value Apps","why":"This add-on is silently installed into users' profiles, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"556b8d4d-d6c2-199d-9f33-8eccca07e8e7","schema":1480343836083},{"guid":"contentarget@maildrop.cc","blockID":"i818","enabled":true,"last_modified":1480349193622,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-12T09:29:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119971","name":"Astro Play (malware)","why":"This is a malicious extension that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"440e9923-027a-6089-e036-2f78937dc193","schema":1480343836083},{"guid":"unblocker30__web@unblocker.yt","blockID":"i1228","enabled":true,"last_modified":1480349193595,"details":{"who":"All users who have this add-on installed.","created":"2016-06-01T15:17:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker 3.0","why":"This add-on is a copy of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2d83e640-ef9d-f260-f5a3-a1a5c8390bfc","schema":1480343836083},{"guid":"noOpus@outlook.com","blockID":"i816","enabled":true,"last_modified":1480349193537,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-09T12:52:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119659","name":"Full Screen (malware)","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b64d7cef-8b6c-2575-16bc-732fca7db377","schema":1480343836083},{"guid":"{c95a4e8e-816d-4655-8c79-d736da1adb6d}","blockID":"i433","enabled":true,"last_modified":1480349193510,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T11:25:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","name":"Hotspot Shield","why":"This add-on bypasses the external install opt in screen in Firefox, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"b3168278-a8ae-4882-7f26-355bc362bed0","schema":1480343836083},{"guid":"{9802047e-5a84-4da3-b103-c55995d147d1}","blockID":"i722","enabled":true,"last_modified":1480349193482,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-07T12:58:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Web Finder Pro","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"50097c29-26b1-bf45-ffe1-83da217eb127","schema":1480343836083},{"guid":"/^({bf9194c2-b86d-4ebc-9b53-1c08b6ff779e}|{61a83e16-7198-49c6-8874-3e4e8faeb4f3}|{f0af464e-5167-45cf-9cf0-66b396d1918c}|{5d9968c3-101c-4944-ba71-72d77393322d}|{01e86e69-a2f8-48a0-b068-83869bdba3d0})$/","blockID":"i515","enabled":true,"last_modified":1480349193449,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:26:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","name":"VisualBee Toolbar","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by using multiple add-on IDs and making unwanted settings changes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"029fa6f9-2351-40b7-5443-9a66e057f199","schema":1480343836083},{"guid":"/^({d50bfa5f-291d-48a8-909c-5f1a77b31948}|{d54bc985-6e7b-46cd-ad72-a4a266ad879e}|{d89e5de3-5543-4363-b320-a98cf150f86a}|{f3465017-6f51-4980-84a5-7bee2f961eba}|{fae25f38-ff55-46ea-888f-03b49aaf8812})$/","blockID":"i1137","enabled":true,"last_modified":1480349193419,"details":{"who":"All users who have this add-on installed.","created":"2016-03-04T17:56:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","name":"Watcher (malware)","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"252e18d0-85bc-7bb3-6197-5f126424c9b3","schema":1480343836083},{"guid":"ffxtlbr@claro.com","blockID":"i218","enabled":true,"last_modified":1480349193385,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-11-29T16:07:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=816762","name":"Claro Toolbar","why":"The Claro Toolbar is side-installed with other software, unexpectedly changing users' settings and then making it impossible for these settings to be reverted by users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e017a3b2-9b37-b8a0-21b0-bc412ae8a7f4","schema":1480343836083},{"guid":"/^(.*@(unblocker\\.yt|sparpilot\\.com))|(axtara@axtara\\.com)$/","blockID":"i1229","enabled":true,"last_modified":1480349193344,"details":{"who":"All users who have this add-on installed.","created":"2016-06-03T15:28:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker (various)","why":"These add-ons are copies of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c677cc5d-5b1e-8aa2-5cea-5a8dddce2ecf","schema":1480343836083},{"guid":"/^(j003-lqgrmgpcekslhg|SupraSavings|j003-dkqonnnthqjnkq|j003-kaggrpmirxjpzh)@jetpack$/","blockID":"i692","enabled":true,"last_modified":1480349193295,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-12T16:27:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048656","name":"SupraSavings","why":"This add-on is being silently installed in users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"b0d30256-4581-1489-c241-d2e85b6c38f4","schema":1480343836083},{"guid":"helperbar@helperbar.com","blockID":"i258","enabled":true,"last_modified":1480349193254,"details":{"who":"All Firefox users who have this add-on installed. This only applies to version 1.0 of Snap.do. Version 1.1 fixed all the issues for which this block was created.","created":"2013-01-28T13:52:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=817786","name":"Snap.do","why":"This extension violates a number of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, particularly on installation and settings handling. It also causes some stability problems in Firefox due to the way the toolbar is handled.\r\n\r\nUsers who wish to keep the add-on enabled can enable it again in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0","severity":1}],"prefs":[],"id":"f1ede5b8-7757-5ec5-d8ed-1a01889154aa","schema":1480343836083},{"guid":"/^((support2_en@adobe14\\.com)|(XN4Xgjw7n4@yUWgc\\.com)|(C7yFVpIP@WeolS3acxgS\\.com)|(Kbeu4h0z@yNb7QAz7jrYKiiTQ3\\.com)|(aWQzX@a6z4gWdPu8FF\\.com)|(CBSoqAJLYpCbjTP90@JoV0VMywCjsm75Y0toAd\\.com)|(zZ2jWZ1H22Jb5NdELHS@o0jQVWZkY1gx1\\.com))$/","blockID":"i326","enabled":true,"last_modified":1480349193166,"details":{"who":"All users who have this add-on installed.","created":"2013-03-22T14:49:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","name":"Flash Player (malware)","why":"This extension is malware, installed pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3142020b-8af9-1bac-60c5-ce5ad0ff3d42","schema":1480343836083},{"guid":"newmoz@facebook.com","blockID":"i576","enabled":true,"last_modified":1480349193114,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-04-22T14:34:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=997986","name":"Facebook Service Pack (malware)","why":"This add-on is malware that hijacks Facebook user accounts and sends spam on the user's behalf."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d85798d3-9b87-5dd9-ace2-64914b93df77","schema":1480343836083},{"guid":"flvto@hotger.com","blockID":"i1211","enabled":true,"last_modified":1480349193088,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-04T16:26:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","name":"YouTube to MP3 Button","why":"This add-on reports every visited URL to a third party without disclosing it to the user."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a14d355f-719f-3b97-506c-083cc97cebaa","schema":1480343836083},{"guid":"{0F827075-B026-42F3-885D-98981EE7B1AE}","blockID":"i334","enabled":true,"last_modified":1480349192987,"details":{"who":"All Firefox users who have this extension installed.","created":"2013-04-16T13:25:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=862272","name":"Browser Protect / bProtector (malware)","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same <a href=\"https://addons.mozilla.org/firefox/addon/browserprotect/\">BrowserProtect extension</a> that is listed on our add-ons site. That one is safe to use."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aad4545f-8f9d-dd53-2aa8-e8945cad6185","schema":1480343836083}]}
\ No newline at end of file
new file mode 100644
--- /dev/null
+++ b/services/blocklists/certificates.json
@@ -0,0 +1,1 @@
+{"data":[{"serialNumber":"TA5iEg==","enabled":true,"last_modified":1485907697001,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","id":"16319df7-453c-d980-4624-d73d9cf43143","schema":1485795317518},{"serialNumber":"BydSYg==","enabled":true,"last_modified":1485907696954,"details":{"who":".","created":"2017-01-31T23:06:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"ec171905-2990-30e0-74bb-9fc327c1c4bd","schema":1485795317518},{"serialNumber":"Iqpyf/YoGgvHc8HiDAxAI8o=","enabled":true,"last_modified":1485907696908,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"6fa017d2-461c-8de0-f8a1-ab0531097d8e","schema":1485795317518},{"serialNumber":"Hwexgn/ZCJicZPcsIyI8zxQ=","enabled":true,"last_modified":1485907696863,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","id":"4df86909-6b1c-f7cd-c71b-bb4b895d441f","schema":1485795317518},{"serialNumber":"RnQ3dg5KdDZs0nyFZk4=","enabled":true,"last_modified":1485907696819,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","id":"0971a89d-b11f-97c9-2ac2-f706757b75fb","schema":1485795317518},{"serialNumber":"RnQ3dYovwvB0D5q2YGY=","enabled":true,"last_modified":1485907696773,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","id":"d739cdcd-0078-92a9-2c46-6a5231f3d888","schema":1485795317518},{"serialNumber":"ALxyZmb/WL/wAuUiPK5oK/g=","enabled":true,"last_modified":1484704581273,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","id":"d6bedca3-c2b7-0402-337e-7788b9c97b85","schema":1484704580928},{"serialNumber":"AKrMYlJmUUin8FOM/0TJrmk=","enabled":true,"last_modified":1484704580920,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MIGFMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDErMCkGA1UEAxMiQ09NT0RPIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"42e2ce60-f40f-97a6-dd47-3ea2e2dd72d8","schema":1483471396473},{"serialNumber":"e7wSpVxmgAS5/ioLi2iBIA==","enabled":true,"last_modified":1484704580894,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","id":"59b02ba9-97ec-924b-d797-2c61c2be0d87","schema":1483471396473},{"serialNumber":"Bydrxg==","enabled":true,"last_modified":1484704580868,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"224d1360-5aed-b81f-f24c-3d34e2ca3ec4","schema":1483471396473},{"serialNumber":"Byc85g==","enabled":true,"last_modified":1484704580840,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"25a0eefb-aa44-23df-4dda-bb166836d4c1","schema":1483471396473},{"serialNumber":"CdYL9vSQCEKzBwjO10ud2w==","enabled":true,"last_modified":1484704580815,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"479ac2a4-7b6a-8db3-c5a2-be10eb5dec57","schema":1483471396473},{"serialNumber":"fbsHfUkagQtznc3rtY1uDg==","enabled":true,"last_modified":1484704580787,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"b1b1a5db-3c68-21be-8264-7146b0ee9e6b","schema":1483471396473},{"serialNumber":"AJiU+bpWh2Uc4xFRf8GM9yA=","enabled":true,"last_modified":1484704580760,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","id":"60daf8a1-a929-0177-e7ba-76fff95fd20b","schema":1483471396473},{"serialNumber":"Hnms0W0OxHSYE2F0XE97sw==","enabled":true,"last_modified":1484704580734,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"55b72394-f4c1-3001-cf84-10f2068f2768","schema":1483471396473},{"serialNumber":"Bye2Cg==","enabled":true,"last_modified":1484704580708,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"e2277fc3-1aac-7c20-0cb7-f4fd6c79eedb","schema":1483471396473},{"serialNumber":"CMNfzETd7XxesS9FOUj9Mg==","enabled":true,"last_modified":1484704580680,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","id":"49251465-af0d-3e93-cb1a-9d0b2ac356b2","schema":1483471396473},{"serialNumber":"XJ8pGvGNM9RIcLUG9YQjLQ==","enabled":true,"last_modified":1484704580653,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"c83b4498-ea23-7723-1c2c-b673115792d8","schema":1483471396473},{"serialNumber":"e9JTGBe45yw=","enabled":true,"last_modified":1484704580623,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","id":"20d69a85-62b2-72c7-1107-110b43d2aeb2","schema":1483471396473},{"serialNumber":"YR0zGQAAAAAAAw==","enabled":true,"last_modified":1484704580597,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MGcxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpGcmF1bmhvZmVyMSEwHwYDVQQLExhGcmF1bmhvZmVyIENvcnBvcmF0ZSBQS0kxIDAeBgNVBAMTF0ZyYXVuaG9mZXIgUm9vdCBDQSAyMDA3","id":"4204c7d6-1838-5925-2461-1bc0e03515d4","schema":1483471396473},{"serialNumber":"AQw=","enabled":true,"last_modified":1484704580571,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","id":"f8c41076-a3f0-439a-9d5e-41e27e019a77","schema":1483471396473},{"serialNumber":"ESDDtMgFFiaUfKo7HD9qImM7","enabled":true,"last_modified":1484704580544,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","id":"ec0960f7-7ae1-23e7-5006-6652da817daa","schema":1483471396473},{"serialNumber":"RFlmmjulj6Ve7PfBi44nnw==","enabled":true,"last_modified":1484704580517,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"0e7b9a2c-3604-5b89-4dff-796122174bdc","schema":1483471396473},{"serialNumber":"ESBrHE7sFC7CQ8EM681xA3CY","enabled":true,"last_modified":1484704580491,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","id":"0595dc75-9356-ba32-a15e-05e3072b7f54","schema":1483471396473},{"serialNumber":"AjpW","enabled":true,"last_modified":1484704580465,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"b7e26b4d-bbe1-1c4e-ef9b-12471bcb9bf8","schema":1483471396473},{"serialNumber":"a9rf7/BmG9JkKvRuy7J5QA==","enabled":true,"last_modified":1484704580438,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","id":"fcfc3b3c-0a59-d143-f5fd-7600dd8efa87","schema":1483471396473},{"serialNumber":"ZECgRdZEsns=","enabled":true,"last_modified":1484704580412,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"4652f392-127d-a5bf-4ed6-b07b9fa72247","schema":1483471396473},{"serialNumber":"AJBQSPqrEvDE2Hz8xH39Low=","enabled":true,"last_modified":1484704580385,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","id":"c279dd67-2ce1-e090-1e04-0c11fe3ddf8e","schema":1483471396473},{"serialNumber":"frj5jTuqBnQ4fljPvVU3KA==","enabled":true,"last_modified":1484704580358,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"85acb18c-16b6-12c7-83ae-1e0d94251362","schema":1483471396473},{"serialNumber":"ByfFnw==","enabled":true,"last_modified":1484704580332,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"d0da2ea3-1cad-5c9e-4c75-c83acfeabc8d","schema":1483471396473},{"serialNumber":"ByembA==","enabled":true,"last_modified":1484704580305,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"fcd51190-7eaf-291e-b6e5-45e447de7291","schema":1483471396473},{"serialNumber":"RH7WhshwXRK6f0VfOfjXgQ==","enabled":true,"last_modified":1484704580277,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"003234b2-f425-eae6-9596-040747dab2b9","schema":1483471396473},{"serialNumber":"SurdtfsuPcXXDpY2LkBpYO6BT7o=","enabled":true,"last_modified":1483471394790,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"034627e4-44c6-fbf2-275a-4ed3431a4094","schema":1483471393228},{"serialNumber":"Er0moq4zwH8ke2pYafIKdg==","enabled":true,"last_modified":1483471394768,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"85c81ed8-787f-ffcf-2a63-1be622db8d04","schema":1483471393228},{"serialNumber":"BydiAg==","enabled":true,"last_modified":1483471394746,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"9194c97e-3baa-0446-9642-0d6211c3f019","schema":1483471393228},{"serialNumber":"eLumDUO40KwnecZLJxFM2A==","enabled":true,"last_modified":1483471394725,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"c2cc63c7-5274-9901-5f67-0a13355a8aa8","schema":1483471393228},{"serialNumber":"Bw==","enabled":true,"last_modified":1483471394702,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"92e2494f-f3cd-7638-7fe1-a3cb8d8939fa","schema":1483471393228},{"serialNumber":"GpO48aJ8GngtwECqZhm/xA==","enabled":true,"last_modified":1483471394681,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","id":"bdfdc34f-ba9a-7b25-6cb6-24c547eb8a10","schema":1483471393228},{"serialNumber":"Cw==","enabled":true,"last_modified":1483471394658,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"7574eb9e-6978-dcb7-5a6f-d4c3dd855254","schema":1483471393228},{"serialNumber":"IA==","enabled":true,"last_modified":1483471394635,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"d82f446f-181a-5ac3-0ced-854e3cde100c","schema":1483471393228},{"serialNumber":"OfJBIhFwAdQ=","enabled":true,"last_modified":1483471394613,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","id":"b8fdddf1-27c1-5f6e-58a1-295e2c8c0ea5","schema":1483471393228},{"serialNumber":"MABJTA==","enabled":true,"last_modified":1483471394591,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"71e08617-c00a-8b62-53c2-2a61e21e6155","schema":1483471393228},{"serialNumber":"HA==","enabled":true,"last_modified":1483471394569,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"6a6d36e6-8939-0a83-3fd5-c38652b165ed","schema":1483471393228},{"serialNumber":"DA==","enabled":true,"last_modified":1483471394547,"details":{"who":".","created":"2017-01-03T18:41:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"ME0xCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSMwIQYDVQQDDBpEaWdpZGVudGl0eSBCdXJnZXIgQ0EgLSBHMg==","id":"460643a1-23f3-1beb-0f14-ecb4b6e26cc9","schema":1483471393228},{"serialNumber":"CLc=","enabled":true,"last_modified":1483471394524,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"49eb43cf-91d4-66ce-1a86-b8674ff83d4d","schema":1483471393228},{"serialNumber":"QAAnEQ==","enabled":true,"last_modified":1483471394501,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEoxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEZMBcGA1UEAxMQU2VjdXJlIEdsb2JhbCBDQQ==","id":"bb5c827f-3458-93fe-f80f-2982f0d19d34","schema":1483471393228},{"serialNumber":"AjqK","enabled":true,"last_modified":1483471394478,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"d6f9a6d9-d936-dfaf-d396-8ae96769ef10","schema":1483471393228},{"serialNumber":"ByfNeA==","enabled":true,"last_modified":1483471394453,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"02ec8a09-2ae4-cd2a-4fa1-5037fa945391","schema":1483471393228},{"serialNumber":"JLiDzgpL7oFNgJN+jIjt7w==","enabled":true,"last_modified":1483471394090,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"5631f49c-a1fb-803e-ecf2-3ba82ca79f2e","schema":1483471393228},{"serialNumber":"BwImeaRkSZQLYwFREwKo3R1Jn+8=","enabled":true,"last_modified":1483471394067,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"c2de8edd-fd89-36dd-63d0-d3a1df92274a","schema":1483471393228},{"serialNumber":"HxT1XSjIpzjMprp9Qu1gYQ==","enabled":true,"last_modified":1483471394046,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","id":"46d4712b-6db2-ce7e-0efd-675f3be896cf","schema":1483471393228},{"serialNumber":"QDi5sA==","enabled":true,"last_modified":1483471394023,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"8acc0cad-dee8-7e2e-1799-e1a7b8b989c3","schema":1483471393228},{"serialNumber":"BA==","enabled":true,"last_modified":1483471394000,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"b9ac21bb-8c1e-e562-5418-bbf6f6323c45","schema":1483471393228},{"serialNumber":"KuzHPJLdK5hNgJRo3R47Ag==","enabled":true,"last_modified":1483471393978,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"91b7f544-9de1-efea-08d4-4ebafc9a3608","schema":1483471393228},{"serialNumber":"B+U=","enabled":true,"last_modified":1483471393956,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"86fe91df-ebb8-f20d-2031-2bc815b14a25","schema":1483471393228},{"serialNumber":"Byeaqw==","enabled":true,"last_modified":1483471393933,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"b97a8dce-04d9-7dba-6463-ae95d61524f4","schema":1483471393228},{"serialNumber":"LU4d0t7PAsZNgJGZcb+o/w==","enabled":true,"last_modified":1483471393911,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"efdf0a12-4ba1-f84d-a88d-fc384251583c","schema":1483471393228},{"serialNumber":"BAAAAAABIg08FMU=","enabled":true,"last_modified":1483471393889,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"6c0561bc-fea3-ba35-bbdb-2b2672b67d36","schema":1483471393228},{"serialNumber":"AjqL","enabled":true,"last_modified":1483471393867,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"4be7b89c-27a6-e95e-c6f9-bf652d4a0b97","schema":1483471393228},{"serialNumber":"FQ==","enabled":true,"last_modified":1483471393845,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"89946691-d008-fd14-bd7a-443206d647c6","schema":1483471393228},{"serialNumber":"BydInw==","enabled":true,"last_modified":1483471393823,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"e1a83fb0-93df-deb8-68cd-17f4997ea58b","schema":1483471393228},{"serialNumber":"JD1wxDd8IgmiqX7MyPPg1g==","enabled":true,"last_modified":1483471393801,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","id":"f5ad7ea6-4ac9-b9cd-776f-d2afb53fb91b","schema":1483471393228},{"serialNumber":"Qh/SqA==","enabled":true,"last_modified":1483471393779,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"ad8a2f72-7124-3e33-3060-414ce2bd8be3","schema":1483471393228},{"serialNumber":"J8mznxvTvOR5p4Br3a3sm5j5iM0=","enabled":true,"last_modified":1483471393750,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","id":"d3f6b499-297d-e9c8-081c-44e2331bcf29","schema":1483471393228},{"serialNumber":"AIChpbGNqu4XKp9J70syKEs=","enabled":true,"last_modified":1483471393727,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","id":"f184ba74-06de-9247-104e-160b6d210962","schema":1483471393228},{"serialNumber":"Cj0=","enabled":true,"last_modified":1483471393705,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"c5fdcbc2-71d8-0a58-3375-0c7d92526cf1","schema":1483471393228},{"serialNumber":"Aw==","enabled":true,"last_modified":1483471393683,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"0e8a05ee-feae-fc46-15b9-eaa2d11f4a60","schema":1483471393228},{"serialNumber":"BAAAAAABRE7wRk4=","enabled":true,"last_modified":1483471393659,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"ac8d3825-3fef-6d3e-2690-7360d1ef57a4","schema":1483471393228},{"serialNumber":"QDi5sQ==","enabled":true,"last_modified":1483471393637,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"4b03d4c1-705b-458e-5bdc-f729f67eeb91","schema":1483471393228},{"serialNumber":"WJ2qHzWUqTk=","enabled":true,"last_modified":1483471393615,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","id":"f93061a9-8afa-1d74-e063-4134d318f00b","schema":1483471393228},{"serialNumber":"VUtahOwvvmJFwlvmGDZP5w==","enabled":true,"last_modified":1483471393592,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"9c88bc12-466d-fcdd-cc53-349d4e041332","schema":1483471393228},{"serialNumber":"L1fHogsVxmfMBka5q4uzaQ==","enabled":true,"last_modified":1483471393569,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"d3c14505-c104-150c-0a2d-e5f9e92b6152","schema":1483471393228},{"serialNumber":"cJ+vg4742XhNgJW2ot9eIg==","enabled":true,"last_modified":1483471393547,"details":{"who":".","created":"2017-01-03T18:41:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"58bf9d8a-9a68-b41f-453c-8af8844bc07c","schema":1483471393228},{"serialNumber":"LizeWXFWP5pZPI/dLc+PVQ==","enabled":true,"last_modified":1483471393221,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"cb1a1172-56d6-4150-1f50-eb2131f442f5","schema":1480617578654},{"serialNumber":"Ew==","enabled":true,"last_modified":1483471393199,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"a0ff8e3f-e68d-5ee2-21e3-26cd0f46673b","schema":1480617578654},{"serialNumber":"BAAAAAABElatX7I=","enabled":true,"last_modified":1483471393177,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"00ac492e-04f7-ee6d-5fd2-bb12b97a4b7f","schema":1480617578654},{"serialNumber":"ANX8SnNRxCmsE/GCl5hw+8A=","enabled":true,"last_modified":1483471393155,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","id":"a09db9b3-2faa-73ab-67ff-61dcbf700ec7","schema":1480617578654},{"serialNumber":"VBSf+IncsTB3RZS4KFCJPQ==","enabled":true,"last_modified":1483471393133,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"7e816865-7c1d-2519-f114-e69a280768f4","schema":1480617578654},{"serialNumber":"DA==","enabled":true,"last_modified":1483471393111,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"5b760d02-fdd7-d6be-cb6f-4d30bf97746e","schema":1480617578654},{"serialNumber":"QDi5rw==","enabled":true,"last_modified":1483471393088,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"7de029af-ddf3-02be-ca26-5bb95b080d14","schema":1480617578654},{"serialNumber":"MABJSw==","enabled":true,"last_modified":1483471393066,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"411b4e82-2ddd-20c2-20b3-8d77145f6901","schema":1480617578654},{"serialNumber":"Ermwtg==","enabled":true,"last_modified":1483471393043,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","id":"9d8a83d8-d651-42a0-ac1c-0ee414f3e31a","schema":1480617578654},{"serialNumber":"Nbc68Q8EHza72P/hSWcddw==","enabled":true,"last_modified":1483471393021,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"d0513de2-6da9-d68d-78cc-a2292a9d18fb","schema":1480617578654},{"serialNumber":"Ig==","enabled":true,"last_modified":1483471392998,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"872ba8c8-a236-9ac0-85ea-08630f5b17e2","schema":1480617578654},{"serialNumber":"APdCebq8ZyZr/T0luxlicNw=","enabled":true,"last_modified":1483471392976,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","id":"7a24e461-9fd0-b17f-01e0-f44866b800f1","schema":1480617578654},{"serialNumber":"Ermw0Q==","enabled":true,"last_modified":1483471392954,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","id":"fff46511-7357-4559-3d36-75fc74034299","schema":1480617578654},{"serialNumber":"Ajp/","enabled":true,"last_modified":1483471392932,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"272f2a95-6aec-f333-22ad-709d6118a87b","schema":1480617578654},{"serialNumber":"Fw==","enabled":true,"last_modified":1483471392911,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"4f0dfd30-9278-4f20-25c3-436798595b84","schema":1480617578654},{"serialNumber":"K1ftto7Xcb0YKwQ6uMvOIA==","enabled":true,"last_modified":1483471392889,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","id":"29eab149-524e-b1da-e2b9-dc4a784ab64b","schema":1480617578654},{"serialNumber":"STMAFQ==","enabled":true,"last_modified":1483471392867,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","id":"91609507-ef23-7672-3a5d-06dfb9b0dac4","schema":1480617578654},{"serialNumber":"U+1Y1QpJc0FOR5JdCJ01gQ==","enabled":true,"last_modified":1483471392845,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","id":"79f39790-1151-6bb2-0a50-fc596b82bedd","schema":1480617578654},{"serialNumber":"TAA2G+UIK6mqznQKBT77NA==","enabled":true,"last_modified":1483471392823,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"d51879d6-0a85-8311-5b14-ad993cec17e6","schema":1480617578654},{"serialNumber":"Iw==","enabled":true,"last_modified":1483471392801,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"532dd854-cdef-6452-2793-1e36d091d9ec","schema":1480617578654},{"serialNumber":"Qh/O5w==","enabled":true,"last_modified":1483471392779,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"756ab100-8a14-daf7-bf06-9fe423863208","schema":1480617578654},{"serialNumber":"Ajp+","enabled":true,"last_modified":1483471392757,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"41f2401b-5c31-724f-ad6c-28f3f6f47634","schema":1480617578654},{"serialNumber":"AUa47POQ1dN5","enabled":true,"last_modified":1483471392735,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFExCzAJBgNVBAYTAkpQMRMwEQYDVQQKEwpGdWppIFhlcm94MS0wKwYDVQQDEyRGdWppIFhlcm94IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDI=","id":"0956d064-8750-eee2-b0c7-7e1c2d1d6f25","schema":1480617578654},{"serialNumber":"Pgyeh2mqlVzqI9hFntRbUQ==","enabled":true,"last_modified":1483471392712,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"134969c5-0bf4-4054-eaa1-b24feaa76aef","schema":1480617578654},{"serialNumber":"Gg==","enabled":true,"last_modified":1483471392689,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"141d8e99-193b-d108-382b-7d97e6912d8c","schema":1480617578654},{"serialNumber":"ESDYXNBhF+dePFjojs7u2vj1","enabled":true,"last_modified":1480349168043,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"f7f193ca-c34e-866a-8abf-d44188a78cb0","schema":1480349159276},{"serialNumber":"TA6BjA==","enabled":true,"last_modified":1480349168021,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","id":"2a9d41c8-d3e7-a40a-a79a-899902aa73cb","schema":1480349159276},{"serialNumber":"XhcFm2g619rt8Sro+a4rHA==","enabled":true,"last_modified":1480349167999,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","id":"a01f2d94-e1ee-2139-5652-c216331e357a","schema":1480349159276},{"serialNumber":"F6QlB/yX+A==","enabled":true,"last_modified":1480349167976,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"a7fa8b99-3e2a-2c03-dffd-ab341eae59af","schema":1480349159276},{"serialNumber":"Bydxog==","enabled":true,"last_modified":1480349167954,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"35f6f9f8-eb17-39d2-50a7-2b40f01e2584","schema":1480349159276},{"serialNumber":"CqnbFQ==","enabled":true,"last_modified":1480349167931,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"3b60bc42-674b-7822-113f-c8dc6d1b015e","schema":1480349159276},{"serialNumber":"Xrr31RF0DoIzMKXS6XtD+g==","enabled":true,"last_modified":1480349167904,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGXMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEfMB0GA1UEAxMWVVROLVVTRVJGaXJzdC1IYXJkd2FyZQ==","id":"c0d2651b-f567-0f6d-ce3c-16e7d19390d0","schema":1480349159276},{"serialNumber":"Qh/SnQ==","enabled":true,"last_modified":1480349167882,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"7326aa15-9b3e-44ca-c1c5-0ed1ff29521f","schema":1480349159276},{"serialNumber":"H08=","enabled":true,"last_modified":1480349167861,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzQ=","id":"2ac02b19-f616-0dc3-6d01-28e1bea3dd93","schema":1480349159276},{"serialNumber":"NMpMcEnex3eXx4ohk9glcQ==","enabled":true,"last_modified":1480349167827,"details":{"who":".","created":"2016-03-01T21:22:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"8e453b5c-3f81-2694-2f10-73ec8c406c49","schema":1480349159276},{"serialNumber":"AQAAAAA=","enabled":true,"last_modified":1480349167797,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"a3b400ad-0b4d-aa11-e8b5-82019fbc84d5","schema":1480349159276},{"serialNumber":"Ikdj3zYXXGsC/Afm9Tvx+g==","enabled":true,"last_modified":1480349167774,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGpMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhhd3RlLCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9uMTgwNgYDVQQLEy8oYykgMjAwNiB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UEAxMWdGhhd3RlIFByaW1hcnkgUm9vdCBDQQ==","id":"e8b2d24e-5aaf-86dd-441e-b4781d5370db","schema":1480349159276},{"serialNumber":"acI1CFIgmwSFBoU5+ahDgg==","enabled":true,"last_modified":1480349167744,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMw==","id":"938358e4-4c70-beb4-0fbe-02009feee6b6","schema":1480349159276},{"serialNumber":"BAAAAAABA/A35EU=","enabled":true,"last_modified":1480349167722,"details":{"who":".","created":"2016-01-18T14:43:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"97fbf7c4-3ef2-f54f-0029-1ba6540c63ea","schema":1480349159276},{"serialNumber":"UVKsEezpGWOVQ4W9esstng==","enabled":true,"last_modified":1480349167701,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMg==","id":"c4c22010-0cb9-e9af-005d-2483612d864e","schema":1480349159276},{"serialNumber":"F5Bg/C8eXg==","enabled":true,"last_modified":1480349167343,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"4295bb93-6e34-a58a-4d1c-238615b57cb0","schema":1480349159276},{"serialNumber":"AImQERVYPoeb","enabled":true,"last_modified":1480349167322,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","id":"4ca8f1a1-0dc0-881f-b497-cc5574f2494d","schema":1480349159276},{"serialNumber":"J2La+q+JOURNWkX60OP2lQ==","enabled":true,"last_modified":1480349167291,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"8662e9a7-fe16-d1fc-0993-d16dd2f01012","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl5ao=","enabled":true,"last_modified":1480349167269,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDEgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAxIENB","id":"7cfc5a53-f950-c15b-4dbb-8124fadcf871","schema":1480349159276},{"serialNumber":"RUT1Gehd1KKYPfqOlgspoQ==","enabled":true,"last_modified":1480349167246,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","id":"8855fafd-e48b-680d-ff15-a022057d9b9e","schema":1480349159276},{"serialNumber":"BAAAAAABKUXDqxw=","enabled":true,"last_modified":1480349167224,"details":{"who":".","created":"2016-01-18T14:41:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"0a92faa8-b870-3a38-036e-9b95185fcb6a","schema":1480349159276},{"serialNumber":"CqZgEvHAsnzkT//QV9KjXw==","enabled":true,"last_modified":1480349167202,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"39008976-298e-f664-50c0-56f8ae6c4df5","schema":1480349159276},{"serialNumber":"OUvvVscW0/NltofkmV9qmg==","enabled":true,"last_modified":1480349167179,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR8wHQYDVQQDExZHZW9UcnVzdCBTSEEyNTYgU1NMIENB","id":"a5eb3877-5e7d-200a-cee3-f63b8004d58e","schema":1480349159276},{"serialNumber":"ORFgmCj072NjcJnrxOMfQA==","enabled":true,"last_modified":1480349167156,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"995df7f2-6bd4-12c6-b1aa-fcfe7618b193","schema":1480349159276},{"serialNumber":"GN2Hrh9Ltms=","enabled":true,"last_modified":1480349167125,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"460ae779-c915-9daf-9a13-e0bf953322cb","schema":1480349159276},{"serialNumber":"ARQ=","enabled":true,"last_modified":1480349167102,"details":{"who":".","created":"2015-05-05T11:10:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155119","name":"T-Systems intermediate certificate","why":"."},"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","id":"2826cef9-e4b4-53f9-e3cf-c5870fc778dd","schema":1480349159276},{"serialNumber":"DAk9hy8DhHSo+aQetvPB/fY=","enabled":true,"last_modified":1480349167079,"details":{"who":".","created":"2016-01-18T14:46:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"b42066e0-0c88-e02b-620f-c41c2118c4e7","schema":1480349159276},{"serialNumber":"BHk=","enabled":true,"last_modified":1480349167057,"details":{"who":".","created":"2016-11-03T12:48:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","name":"Hongkong Post e-Cert CA 1-10 certificates","why":"."},"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","id":"5048a7c5-79c8-68d7-06a3-19e8ba32e5fc","schema":1480349159276},{"serialNumber":"OnvXX72mvUI2Id/NMzegmg==","enabled":true,"last_modified":1480349167035,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"92d843e8-4e72-2832-b56f-6e488e677d0f","schema":1480349159276},{"serialNumber":"ZgwfEqZnBsUNvNuZ77FbQA==","enabled":true,"last_modified":1480349167012,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEiMCAGA1UEAxMZR2VvVHJ1c3QgRFYgU1NMIFNIQTI1NiBDQQ==","id":"73ae5fed-730d-94db-04ef-2aafd5ff75b8","schema":1480349159276},{"serialNumber":"Qh/QbQ==","enabled":true,"last_modified":1480349166989,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"6e4739fe-1aed-2320-4dc3-832043a31fc8","schema":1480349159276},{"serialNumber":"L79XLVO2ZmtAu7FAG8Wmzw==","enabled":true,"last_modified":1480349166968,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"7d2a48b3-0b2e-59ae-2002-8edb4da20bd2","schema":1480349159276},{"serialNumber":"BUrYjru5px1ym4QUN33TOQ==","enabled":true,"last_modified":1480349166946,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"e95bb238-6d35-2cce-9744-d6a672b0a874","schema":1480349159276},{"serialNumber":"ESByNJZ5TPjg9iZyL6a/h5Zx","enabled":true,"last_modified":1480349166921,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"51935a37-2964-18cf-b34c-a20c2c2250ea","schema":1480349159276},{"serialNumber":"Aw==","enabled":true,"last_modified":1480349166898,"details":{"who":".","created":"2016-11-03T12:46:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314673","name":"SecureSign Public CA11 intermediate CA cert","why":"."},"issuerName":"MFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RDQTEx","id":"ec4f91dd-7560-920a-f178-e8ae460dd595","schema":1480349159276},{"serialNumber":"BAAAAAABFUtaxac=","enabled":true,"last_modified":1480349166876,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"8d87b3cd-b954-f4f1-bfb2-a0e60645301c","schema":1480349159276},{"serialNumber":"ATE3ew==","enabled":true,"last_modified":1480349166855,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","id":"83ac91ce-0f5e-ae4e-2010-b0da5616cd59","schema":1480349159276},{"serialNumber":"LnfcUaXG/pxV2CpXM5+YSg==","enabled":true,"last_modified":1480349166833,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"4c743a6f-af95-49a6-bd4a-d1ee8160c537","schema":1480349159276},{"serialNumber":"BGU=","enabled":true,"last_modified":1480349166811,"details":{"who":".","created":"2016-11-03T12:49:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","name":"Hongkong Post e-Cert CA 1-10 certificates","why":"."},"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","id":"4de7908c-45e7-3b7f-a91a-8cefb1ecf830","schema":1480349159276},{"serialNumber":"BAAAAAABJZbEU4I=","enabled":true,"last_modified":1480349166787,"details":{"who":".","created":"2016-01-18T14:42:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"19c9a896-fbf0-8ad0-92cd-4aca2577c006","schema":1480349159276},{"serialNumber":"BAAAAAABIg08D3U=","enabled":true,"last_modified":1480349166478,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"4aec7420-aa59-53b8-1373-d3c0a7ebc837","schema":1480349159276},{"serialNumber":"CgFBQgAAAUFcf/EVAAAAAg==","enabled":true,"last_modified":1480349166455,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","id":"d60a94e9-3f7f-a20f-1dcc-c87ccc78fb99","schema":1480349159276},{"serialNumber":"dItWlz2V62Philqj9m6Pbg==","enabled":true,"last_modified":1480349166433,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"abb0df0d-6716-9a25-ae33-806e93276cd4","schema":1480349159276},{"serialNumber":"CcL+EA==","enabled":true,"last_modified":1480349166405,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"3cef2b9e-ddcd-cc40-8d59-49408409a3bb","schema":1480349159276},{"serialNumber":"TA6EVg==","enabled":true,"last_modified":1480349166381,"details":{"who":".","created":"2016-04-12T12:50:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263733","name":"Disney CA intermediate CA certificate","why":"."},"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","id":"7b09e4fc-2261-e7c6-e926-5a7b5e74fc5e","schema":1480349159276},{"serialNumber":"GdXz4L1b6FKNCMG9Jz2tjA==","enabled":true,"last_modified":1480349166358,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"35f81fe8-9fa4-760b-9fd0-2de1b0191721","schema":1480349159276},{"serialNumber":"COwoDFvz7GD8R2K7Lo0rYQ==","enabled":true,"last_modified":1480349166330,"details":{"who":".","created":"2016-03-01T21:23:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"cc56260c-5f3a-3f4b-c712-78a8e7facd27","schema":1480349159276},{"serialNumber":"WD1AyQAAAAAAJQ==","enabled":true,"last_modified":1480349166308,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGKMQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEmMCQGA1UECxMdQ29weXJpZ2h0IChjKSAyMDA1IFdJU2VLZXkgU0ExFjAUBgNVBAsTDUludGVybmF0aW9uYWwxKTAnBgNVBAMTIFdJU2VLZXkgQ2VydGlmeUlEIEFkdmFuY2VkIEcxIENB","id":"8c984ecd-c61c-426a-97aa-3a808e4da482","schema":1480349159276},{"serialNumber":"GN2Hrh9LtnI=","enabled":true,"last_modified":1480349166286,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"333f6eb2-cefe-1a3b-3726-a8320b047847","schema":1480349159276},{"serialNumber":"BAAAAAABJQcQRNU=","enabled":true,"last_modified":1480349166264,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"2258e9bc-1c39-9db3-4fdb-c7eb12d0609c","schema":1480349159276},{"serialNumber":"Bg==","enabled":true,"last_modified":1480349166240,"details":{"who":".","created":"2016-07-28T12:15:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"b7fb6842-6407-8ae4-5e0f-e6daf112ed4f","schema":1480349159276},{"serialNumber":"IIxFSyNM6mWtCgTG0IL3Og==","enabled":true,"last_modified":1480349166215,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"6457eeb8-d83a-3818-c416-0dce6d71d471","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl5AQ=","enabled":true,"last_modified":1480349166191,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"de8e6484-fc97-6889-a1f9-dafd45786606","schema":1480349159276},{"serialNumber":"ByeQ9g==","enabled":true,"last_modified":1480349166170,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"bb5a82a6-8da0-5390-a7d6-843bdb0c02c2","schema":1480349159276},{"serialNumber":"EQ==","enabled":true,"last_modified":1480349166148,"details":{"who":".","created":"2016-07-28T12:17:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"dcce309f-aa60-6484-eaed-aa8310440a5c","schema":1480349159276},{"serialNumber":"R4af5A==","enabled":true,"last_modified":1480349166126,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"e60eeeb2-612e-ef08-d0b8-5e9f8e1a23a9","schema":1480349159276},{"serialNumber":"BAAAAAAA+X/GIyk=","enabled":true,"last_modified":1480349166102,"details":{"who":".","created":"2016-01-18T14:40:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"528cd047-ef3b-fc23-e37f-5d67fd3117e4","schema":1480349159276},{"serialNumber":"BYyEX2b5+K+myAIR7eXaRQ==","enabled":true,"last_modified":1480349166080,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"9be08dd3-1922-fb30-77dc-5cfcf00164a0","schema":1480349159276},{"serialNumber":"RurwlgVMxeP6Zepun0LGZA==","enabled":true,"last_modified":1480349166058,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","id":"22a74468-602c-f4ac-0003-be4ce0167258","schema":1480349159276},{"serialNumber":"AJiWmg==","enabled":true,"last_modified":1480349166036,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFgxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKTAnBgNVBAMMIFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBSb290IENB","id":"1525b265-22d6-3253-079c-c4ffca58458f","schema":1480349159276},{"serialNumber":"ESCLRVuhcUZaluIgIVlRJx+O","enabled":true,"last_modified":1480349166012,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"a6299e39-84a4-2dce-ffbb-751107660f4f","schema":1480349159276},{"serialNumber":"BAAAAAABCUVQ9No=","enabled":true,"last_modified":1480349165990,"details":{"who":".","created":"2016-01-18T14:43:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"a1d34c2f-4a03-0e35-ba5f-bc14138bcff5","schema":1480349159276},{"serialNumber":"BAAAAAABF2Tb8Bc=","enabled":true,"last_modified":1480349165968,"details":{"who":".","created":"2016-01-18T14:38:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","id":"7e19f742-420e-dbe9-f691-2d19430d75b2","schema":1480349159276},{"serialNumber":"GN2Hrh9Ltm4=","enabled":true,"last_modified":1480349165947,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"20732fc6-dd20-fe76-b6b5-b78388b64bdd","schema":1480349159276},{"serialNumber":"fMTRbGCp280pnyE/u53zbA==","enabled":true,"last_modified":1480349165925,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"44aa21e7-a92c-a0cc-6f6c-85b7ee52a87d","schema":1480349159276},{"serialNumber":"d8AtKymQwkOPDBj+hjPzFg==","enabled":true,"last_modified":1480349165591,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"014a5b67-d566-0767-c9d7-48e54115a69a","schema":1480349159276},{"serialNumber":"Os2rnHWYhryvdOXfgan06A==","enabled":true,"last_modified":1480349165569,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","id":"dc94f688-044b-f8a0-79f9-5dc2d42e3edb","schema":1480349159276},{"serialNumber":"e/fIfg2Dj2tkYIWVu2r82Cc=","enabled":true,"last_modified":1480349165547,"details":{"who":".","created":"2016-01-18T14:46:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"9e8ec7bc-0f79-42c2-c9bc-32bfbbd3b591","schema":1480349159276},{"serialNumber":"EA==","enabled":true,"last_modified":1480349165523,"details":{"who":".","created":"2016-07-28T12:16:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"362a0532-ea75-9bc6-2e50-35d9566a6ad2","schema":1480349159276},{"serialNumber":"UU3AP1SMxmyhBFq7MRFZmf0=","enabled":true,"last_modified":1480349165501,"details":{"who":".","created":"2016-01-18T14:45:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"4f2e59ff-cdf1-48ee-1122-961833187e49","schema":1480349159276},{"serialNumber":"ESBqoILo90ntDW7OTK43MS2F","enabled":true,"last_modified":1480349165479,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"0702b706-86e5-6a48-49fa-6c53b99009f3","schema":1480349159276},{"serialNumber":"GtXUVojhwOTkaQ4bTKblEQ==","enabled":true,"last_modified":1480349165453,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"9475e2f6-7247-cbe1-5055-8af86f39a149","schema":1480349159276},{"serialNumber":"KjoVfZ3by6+pL8fssyfM6A==","enabled":true,"last_modified":1480349165429,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"f4c8162a-d49b-1cbd-adb9-5e6223793aa4","schema":1480349159276},{"serialNumber":"Bydr0Q==","enabled":true,"last_modified":1480349165407,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"a85aef34-3bfe-2135-845d-466adadc414b","schema":1480349159276},{"serialNumber":"Xbevr3ut3Z9m1GuXC9SonA==","enabled":true,"last_modified":1480349165384,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"549710cf-bcaa-843c-df9d-5962bad88a9a","schema":1480349159276},{"serialNumber":"CeagHQ==","enabled":true,"last_modified":1480349165355,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"d69db231-b7b5-4d79-147b-49198f93fc10","schema":1480349159276},{"serialNumber":"EAdmaA==","enabled":true,"last_modified":1480349165329,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"618009ee-0ef1-af4b-8841-349e6f82eacc","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl7L4=","enabled":true,"last_modified":1480349165306,"details":{"who":".","created":"2016-01-18T14:47:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTElMCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMnR2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENB","id":"636c65b9-2d52-8689-023f-7a23a0baec5b","schema":1480349159276},{"serialNumber":"BAAAAAABFqoAZoI=","enabled":true,"last_modified":1480349165285,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"2b0d58aa-9c96-748f-4fc0-b1f413ca8e20","schema":1480349159276},{"serialNumber":"fwAAAQAAAUrz/HmrAAAAAg==","enabled":true,"last_modified":1480349165264,"details":{"who":".","created":"2016-02-24T20:04:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1250907","name":"IdenTrust cross certificate","why":"."},"issuerName":"MGExCzAJBgNVBAYTAlVTMRIwEAYDVQQKEwlJZGVuVHJ1c3QxIDAeBgNVBAsTF0lkZW5UcnVzdCBQdWJsaWMgU2VjdG9yMRwwGgYDVQQDExNJZGVuVHJ1c3QgQUNFUyBDQSAx","id":"352c78aa-997c-bdbe-66ba-930d66fde011","schema":1480349159276},{"serialNumber":"CeFU2w==","enabled":true,"last_modified":1480349165242,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"e8e298f0-efa2-0d08-458f-c085ee9df8f9","schema":1480349159276},{"serialNumber":"STMAjg==","enabled":true,"last_modified":1480349165209,"details":{"who":".","created":"2015-03-31T14:53:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1149603","name":"MCSHOLDING intermediate certificate","why":"."},"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","id":"c9897d2c-c68e-3c02-2f39-678954b0cf3e","schema":1480349159276},{"serialNumber":"bAOrKSMsmA0MLJyAJ5BRsUM=","enabled":true,"last_modified":1480349165175,"details":{"who":".","created":"2016-01-18T14:46:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"7d44cb3e-28a5-16dd-024c-796312f780bc","schema":1480349159276},{"serialNumber":"F5BhE0zbgQ==","enabled":true,"last_modified":1480349165145,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"29925947-91ab-16a8-a5af-65558cdb27c2","schema":1480349159276},{"serialNumber":"BAAAAAABL07hUBg=","enabled":true,"last_modified":1480349165119,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","id":"1240480e-2ef8-8ac3-4314-4e8e494741b9","schema":1480349159276},{"serialNumber":"ESCyHU+xOECnh9Rf2IvgR8zS","enabled":true,"last_modified":1480349165097,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"3980401b-c0e2-0533-f0fb-0cc04685d248","schema":1480349159276},{"serialNumber":"CdWFNw==","enabled":true,"last_modified":1480349165075,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"f06ff510-954e-b917-fda1-2c3153788d7d","schema":1480349159276},{"serialNumber":"TrKEMhb2PKktH8lHg0AV5A==","enabled":true,"last_modified":1480349165048,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"8b7985ab-ab8b-fcd2-cf88-cf8dad0f7a97","schema":1480349159276},{"serialNumber":"BAAAAAABJQdAjik=","enabled":true,"last_modified":1480349165026,"details":{"who":".","created":"2016-01-18T14:41:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"a75f5980-9149-fff9-70d5-b24121c3eaff","schema":1480349159276},{"serialNumber":"Cfk9lw==","enabled":true,"last_modified":1480349165002,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"59b587cb-401b-a5d0-8128-86c3691c4be1","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl6mw=","enabled":true,"last_modified":1480349164725,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDMgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAzIENB","id":"3cc60c06-a870-951e-1d12-4b29ee13989e","schema":1480349159276},{"serialNumber":"SdegFrLaFTCsoMAW5ED+zA==","enabled":true,"last_modified":1480349164704,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","id":"9fbfe267-c715-8f7b-d9ad-166aad9f91af","schema":1480349159276},{"serialNumber":"BAAAAAABMxvC9bk=","enabled":true,"last_modified":1480349164681,"details":{"who":".","created":"2016-01-18T14:42:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"923a5e98-11f7-cdae-b073-45b525fb2294","schema":1480349159276},{"serialNumber":"Bydp0g==","enabled":true,"last_modified":1480349164658,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"10e51569-072a-611a-c397-3050fdf22649","schema":1480349159276},{"serialNumber":"QZCrvQ==","enabled":true,"last_modified":1480349164636,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"6d791114-68b4-8c3c-ee3c-29ed83eced2e","schema":1480349159276},{"serialNumber":"AQAAAAI=","enabled":true,"last_modified":1480349164614,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"bff9c953-6690-f618-cfea-7b936f3691a6","schema":1480349159276},{"serialNumber":"Aw1SPC56593ZCZ9vCNHKwQ==","enabled":true,"last_modified":1480349164590,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"c395381f-fe34-7b6c-f56a-f20b20bf0d0d","schema":1480349159276},{"serialNumber":"BAAAAAABAJmPjfQ=","enabled":true,"last_modified":1480349164559,"details":{"who":".","created":"2016-01-18T14:44:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"24b096b4-987f-a21a-04d3-aedc9eaafc1e","schema":1480349159276},{"serialNumber":"BAAAAAABK84yjs8=","enabled":true,"last_modified":1480349164533,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","id":"8078d5ff-c93b-15d1-ebcf-607bdbfc159f","schema":1480349159276},{"serialNumber":"FJl6tXgNpSk=","enabled":true,"last_modified":1480349164510,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"7ab0a200-7ecf-576f-bff9-652fb14c3af6","schema":1480349159276},{"serialNumber":"M0VSOewW3WI=","enabled":true,"last_modified":1480349164486,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","id":"f3688c95-3934-e80a-e32f-0d5dcb2f0c4c","schema":1480349159276},{"serialNumber":"VN2yeFexyXjPf34fHGmbhg==","enabled":true,"last_modified":1480349164463,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"bbcfc451-2fcc-b380-e579-bb6d11fc7d34","schema":1480349159276},{"serialNumber":"STMAeg==","enabled":true,"last_modified":1480349164433,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","id":"a46be506-1dbc-41a9-2775-95d67708fb5f","schema":1480349159276},{"serialNumber":"Aa8e+91erglSMgsk/mtVaA==","enabled":true,"last_modified":1480349164410,"details":{"who":".","created":"2016-09-09T16:26:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1300977","name":"revoked.badssl.com certificate","why":"."},"issuerName":"ME0xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxJzAlBgNVBAMTHkRpZ2lDZXJ0IFNIQTIgU2VjdXJlIFNlcnZlciBDQQ==","id":"4b778ec2-ef45-c5b2-dc44-b00c87b11741","schema":1480349159276},{"serialNumber":"TurPPI6eivtNeGYdM0ZWXQ==","enabled":true,"last_modified":1480349164388,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"8192a2fa-165d-3759-fd20-4b7d8e2a0e84","schema":1480349159276},{"serialNumber":"UKKK5ol/rKBZchAAOnZjaA==","enabled":true,"last_modified":1480349164365,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAMTFHRoYXd0ZSBTSEEyNTYgU1NMIENB","id":"ca0c5f15-2808-8c94-3f77-6a277d6738b2","schema":1480349159276},{"serialNumber":"UMUwXwT1Z4juyQ/CNTf4mw==","enabled":true,"last_modified":1480349164342,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"c623e511-79c8-cbe6-6a6e-0d9896f07e71","schema":1480349159276},{"serialNumber":"Ew1ee9Jq7Q/Dig3ACF4V6Q==","enabled":true,"last_modified":1480349164320,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGTMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEbMBkGA1UEAxMSVVROIC0gREFUQUNvcnAgU0dD","id":"c011d2b4-73bc-27e5-3d3a-ab00be2a4d05","schema":1480349159276},{"serialNumber":"XLhHIg7vP+tWfRqvuKeAxw==","enabled":true,"last_modified":1480349164297,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"520c26f8-9a60-5949-0372-c9d93f9e95dd","schema":1480349159276},{"serialNumber":"E5I2y6sIonl4a+TmlXc7fw==","enabled":true,"last_modified":1480349164275,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"ee842f50-9d56-8fdf-fa55-8b55b8519b81","schema":1480349159276},{"serialNumber":"Jq6jgeApiT9O4W2Tx/NTRQ==","enabled":true,"last_modified":1480349164253,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","id":"3b658f17-11f9-7550-d991-3e9a1397402d","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl6Co=","enabled":true,"last_modified":1480349164232,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDIgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAyIENB","id":"6eb0fa3b-c226-f411-0fab-df88962a5769","schema":1480349159276},{"serialNumber":"ESD9YhzIEOwiOT7Nwip+E1KI","enabled":true,"last_modified":1480349164209,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"d6172148-c2ee-a904-db40-079b10436cca","schema":1480349159276},{"serialNumber":"Eg==","enabled":true,"last_modified":1480349164187,"details":{"who":".","created":"2016-07-28T12:17:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"34561e12-916b-083e-6fa6-181b5b89ec80","schema":1480349159276},{"serialNumber":"NvEJoRYL2yvAZrAjbDIipQ==","enabled":true,"last_modified":1480349164164,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","id":"b1119d43-b3b8-1f41-6fbb-9cf2f67a521d","schema":1480349159276},{"serialNumber":"ESCC9oPNcRdPOox+SjWm9dTX","enabled":true,"last_modified":1480349163834,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"8858e9fc-cc55-54ea-fe45-c4e533c2e410","schema":1480349159276},{"serialNumber":"D9UltDPl4XVfSSqQOvdiwQ==","enabled":true,"last_modified":1480349163810,"details":{"who":".","created":"2015-03-31T11:14:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1145157","name":"live.fi certificate","why":"."},"issuerName":"MIGQMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UEAxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","id":"0a9323dd-982f-c62d-a9b4-b9d04617fc62","schema":1480349159276},{"serialNumber":"OYBKgxEHpW/8XGAGAlvJyMA=","enabled":true,"last_modified":1480349163788,"details":{"who":".","created":"2016-01-18T14:45:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"d6dfdc76-52ae-2843-3484-7fbff46f0100","schema":1480349159276},{"serialNumber":"EM8bDLBnnoYe4LnWpLIhS4esr3I=","enabled":true,"last_modified":1480349163764,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","id":"be09b295-68d1-9c01-97ee-10df36acd3ea","schema":1480349159276},{"serialNumber":"BAAAAAABJ/ufRdg=","enabled":true,"last_modified":1480349163739,"details":{"who":".","created":"2016-01-18T14:39:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"5d64f82e-9ad8-fde1-a8c9-2d94552a8ad4","schema":1480349159276},{"serialNumber":"BAAAAAABHJRKMpA=","enabled":true,"last_modified":1480349163715,"details":{"who":".","created":"2016-01-18T14:43:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"f5b2da3a-5176-b4e4-240a-181f39f6756b","schema":1480349159276},{"serialNumber":"BAAAAAABBHYoIFs=","enabled":true,"last_modified":1480349163691,"details":{"who":".","created":"2016-01-18T14:40:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"f59ed73e-f3c5-eef3-4481-3ca8af0b0688","schema":1480349159276},{"serialNumber":"BAAAAAABHhw1vwc=","enabled":true,"last_modified":1480349163668,"details":{"who":".","created":"2016-01-18T14:37:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","id":"1b1856c1-f4f5-82ca-ba57-d94739e74576","schema":1480349159276},{"serialNumber":"TqfXw+FkhxfVgE9GVMgjWQ==","enabled":true,"last_modified":1480349163645,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"60f6a3be-ad83-a868-d645-7aad77914bc8","schema":1480349159276},{"serialNumber":"LdbnCbsA9sOgI4mkUpWXPw==","enabled":true,"last_modified":1480349163622,"details":{"who":".","created":"2016-03-01T21:21:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"d839b1ed-7d39-5e57-687c-2f4d6f0514e5","schema":1480349159276},{"serialNumber":"ANygrItIJ2rcKlyS3Lue07U=","enabled":true,"last_modified":1480349163595,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"d55572d9-be60-5967-948a-7dae793ab30f","schema":1480349159276},{"serialNumber":"BydeGg==","enabled":true,"last_modified":1480349163572,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"b7d8b0e0-9747-6a09-ab6b-051c57579fe9","schema":1480349159276},{"serialNumber":"ESCVop+Q4/OBgtf4WJkr01Gh","enabled":true,"last_modified":1480349163548,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"7602529c-c2ea-d18b-9b2a-fdb70ca936f9","schema":1480349159276},{"serialNumber":"BAAAAAABGMG0Gmw=","enabled":true,"last_modified":1480349163514,"details":{"who":".","created":"2016-01-18T14:42:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"317aeda4-6de7-7b11-76cb-3b0afa9aaf86","schema":1480349159276},{"serialNumber":"O2S99lVUxErLSk56GvWRv+E=","enabled":true,"last_modified":1480349163492,"details":{"who":".","created":"2016-01-18T14:47:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"27847bcc-dbaf-196f-ed5e-c1c022798717","schema":1480349159276},{"serialNumber":"By7fBTreouRwX/qrpgSUsg==","enabled":true,"last_modified":1480349163470,"details":{"who":".","created":"2016-03-01T21:16:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"322de470-76d3-a45d-740f-342a6a8eb863","schema":1480349159276},{"serialNumber":"ezdAeCxKH7BFs7vn3byYaw==","enabled":true,"last_modified":1480349163448,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"fc5bde6b-45b9-c141-7171-0a6f37e7938a","schema":1480349159276},{"serialNumber":"VLm3Xe60+1YgPpXCGtXLng==","enabled":true,"last_modified":1480349163426,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"055d66b6-8fbd-93df-f2c4-dcdb41943212","schema":1480349159276},{"serialNumber":"cDggUYfwJ3A1YcdoeT6s4A==","enabled":true,"last_modified":1480349163403,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxUaGF3dGUsIEluYy4xGzAZBgNVBAMTElRoYXd0ZSBTR0MgQ0EgLSBHMg==","id":"093f20b4-93b8-a171-cbe7-3e24a543c7e9","schema":1480349159276},{"serialNumber":"a9/VeyVWrzFD7rM2PEHwQA==","enabled":true,"last_modified":1480349163377,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"c02a9772-b351-59dc-8633-1293ac9addee","schema":1480349159276},{"serialNumber":"ESCis569omrbb20yySF39+aE","enabled":true,"last_modified":1480349163350,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"aaa19866-32ce-e842-6431-6d357fafe8d8","schema":1480349159276},{"serialNumber":"F5Bg6C237Q==","enabled":true,"last_modified":1480349163327,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"57ddfa31-3f08-298a-d7bd-712e3aaea567","schema":1480349159276},{"serialNumber":"HZyLf+K70FKc+jomm8DiDw==","enabled":true,"last_modified":1480349163302,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"452f4798-87d4-8df1-b275-177456d2f1c8","schema":1480349159276},{"serialNumber":"CskruA==","enabled":true,"last_modified":1480349163280,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"e92cad12-4098-0817-e317-3674d4242ba9","schema":1480349159276},{"serialNumber":"a12RvBNhznU=","enabled":true,"last_modified":1480349163257,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","id":"33154d98-0f20-7e7d-d2d0-3244a7d1f971","schema":1480349159276},{"serialNumber":"CjM=","enabled":true,"last_modified":1480349162955,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"283b292b-1212-a713-c8be-c976c0222410","schema":1480349159276},{"serialNumber":"NTgf4iwIfeyJPIomw2dwSXEwtxQ=","enabled":true,"last_modified":1480349162930,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"542dbfc0-0faa-2398-9670-cd249525fd2c","schema":1480349159276},{"serialNumber":"Cd/dug==","enabled":true,"last_modified":1480349162902,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"3cf54b7b-336d-7c80-4596-d5a7762329d9","schema":1480349159276},{"serialNumber":"M64Z5ufZzDRVTHkJR1uXzw==","enabled":true,"last_modified":1480349162880,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"5d6d86a0-7e3e-b832-83e5-afc1eb2e294f","schema":1480349159276},{"serialNumber":"BAAAAAABIBnBjWg=","enabled":true,"last_modified":1480349162857,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"0713fba9-386c-888f-cbe5-5188ff2696a4","schema":1480349159276},{"serialNumber":"fWK0j/Vi8vNWg3VAGjc02w==","enabled":true,"last_modified":1480349162835,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"a4428979-4be6-3ba2-f435-aa8e4574ffe0","schema":1480349159276},{"serialNumber":"JpUvYJyWjdGmeoH7YcYunw==","enabled":true,"last_modified":1480349162803,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","id":"929de7d6-0669-5601-0b8f-9a192bf1cb17","schema":1480349159276},{"serialNumber":"45KI4WIxyXfNrdtdj7C6","enabled":true,"last_modified":1480349162781,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"7cb25ddb-9f7e-7297-e8b4-c50d019f0cf7","schema":1480349159276},{"serialNumber":"BQ==","enabled":true,"last_modified":1480349162758,"details":{"who":".","created":"2016-07-28T12:15:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"7c28e9e7-b9ce-f4ed-8d5a-e7b9e534fba5","schema":1480349159276},{"serialNumber":"F7PAjw2k0dTX5escPnyVOBo=","enabled":true,"last_modified":1480349162734,"details":{"who":".","created":"2016-01-18T14:45:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"3c7e3e8e-5c25-8fbf-0006-2c92256e0a4b","schema":1480349159276},{"serialNumber":"Sx51x7V8pYe8rp7PMP/3qg==","enabled":true,"last_modified":1480349162710,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"4006917e-3260-59cd-eb3f-f4d1167cf888","schema":1480349159276},{"serialNumber":"DHmmaw==","enabled":true,"last_modified":1480349162686,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"0abfb8ad-d1b7-5f0e-cbea-630f2424171d","schema":1480349159276},{"serialNumber":"CcHC/g==","enabled":true,"last_modified":1480349162661,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"cba8acd8-a291-1ad6-9581-ed647dd5d56d","schema":1480349159276},{"serialNumber":"ATE0vw==","enabled":true,"last_modified":1480349162632,"details":{"who":".","created":"2015-05-08T10:53:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","name":"Intermediate CA's under Staat der Nederlanden Root CA","why":"."},"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"fc71cbb8-4e2a-2835-d5be-4c48cd3650bb","schema":1480349159276},{"serialNumber":"BAAAAAABLF5/HXY=","enabled":true,"last_modified":1480349162610,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"ca59600c-e90a-e85a-43b8-22bc76bb0e1f","schema":1480349159276},{"serialNumber":"BXA=","enabled":true,"last_modified":1480349162580,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","id":"a44b5bf8-8158-1924-7626-e1ba2d2031f7","schema":1480349159276},{"serialNumber":"VOcIuNbTqkpOMUyI108FOg==","enabled":true,"last_modified":1480349162557,"details":{"who":".","created":"2016-03-01T21:24:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"43e72628-c1a5-2091-2dcd-41bbde768c73","schema":1480349159276},{"serialNumber":"ATFpsA==","enabled":true,"last_modified":1480349162533,"details":{"who":".","created":"2015-05-08T10:53:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","name":"Intermediate CA's under Staat der Nederlanden Root CA","why":"."},"issuerName":"MFkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKjAoBgNVBAMTIVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPdmVyaGVpZCBDQQ==","id":"325bb598-839b-f7aa-8a22-08ab8c09e803","schema":1480349159276},{"serialNumber":"UV9aaDeNRNtQuXjRYk4Skhg=","enabled":true,"last_modified":1480349162506,"details":{"who":".","created":"2016-01-18T14:45:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"c11dd0af-83d5-61ec-63af-5b816a3ae557","schema":1480349159276},{"serialNumber":"bzTw0uq05TUYEGS98bh0Ww==","enabled":true,"last_modified":1480349162483,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"6b743fc3-1ce6-8dfe-52f1-9f3e6a31f15a","schema":1480349159276},{"serialNumber":"Gd/pPu+qLnXUdvP9sW73CQ==","enabled":true,"last_modified":1480349162460,"details":{"who":".","created":"2016-03-01T21:21:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"2da11236-c2d8-7804-7de3-ffd711406b04","schema":1480349159276},{"serialNumber":"BAAAAAABJ/v3ZwA=","enabled":true,"last_modified":1480349162438,"details":{"who":".","created":"2016-10-27T17:52:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"9f6615be-a0b9-519a-1e26-2bd7aaf5953b","schema":1480349159276},{"serialNumber":"BAAAAAABGMGjftY=","enabled":true,"last_modified":1480349162415,"details":{"who":".","created":"2016-01-18T14:39:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"5f1ab732-8d48-0102-fb50-46ce74fc1a90","schema":1480349159276},{"serialNumber":"Rvm2CEw2IC2Mu/ax0A46QQ==","enabled":true,"last_modified":1480349162392,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"82f97501-85ba-bb19-f68f-ca7ce68ca7b3","schema":1480349159276},{"serialNumber":"BAAAAAABJpQ0AbA=","enabled":true,"last_modified":1480349162369,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","id":"520cee2c-e36a-936e-d551-a51ee9c659c8","schema":1480349159276},{"serialNumber":"ByfHkw==","enabled":true,"last_modified":1480349161997,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"74d82589-0fde-91da-20cc-22fbd84cd0aa","schema":1480349159276},{"serialNumber":"ESC8DawWRiAyEMd38UXbfgPR","enabled":true,"last_modified":1480349161969,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"6147b64f-da46-ba30-2b9e-30b515e8f6b9","schema":1480349159276},{"serialNumber":"BAAAAAABK84ykc0=","enabled":true,"last_modified":1480349161946,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","id":"0a42070f-3149-2b91-1bbe-c54de4ed1be8","schema":1480349159276},{"serialNumber":"GN2Hrh9LtnM=","enabled":true,"last_modified":1480349161925,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"dc28966b-d7db-b55f-1606-c5bff610bf99","schema":1480349159276},{"serialNumber":"FJl6tXgNpSg=","enabled":true,"last_modified":1480349161902,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"bab58b65-8ef7-f3c2-fc13-88f72a0840f7","schema":1480349159276},{"serialNumber":"ESDItX4ruWiLnrlz0rk4/bmz","enabled":true,"last_modified":1480349161872,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"c12d5f3c-b722-948f-b367-857845ed5e8e","schema":1480349159276},{"serialNumber":"bx/XHJqcwxDOptxJ2lh5vw==","enabled":true,"last_modified":1480349161850,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","id":"a0da0bd1-8bec-4c82-fb9b-636ddcde057d","schema":1480349159276},{"serialNumber":"Mq0P6o03FDk0B2bnJ+mYPGo=","enabled":true,"last_modified":1480349161828,"details":{"who":".","created":"2016-01-18T14:47:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"54f096a5-3608-9b68-ddca-a200e799ba06","schema":1480349159276},{"serialNumber":"BAAAAAABJ/ufQg8=","enabled":true,"last_modified":1480349161807,"details":{"who":".","created":"2016-01-18T14:43:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"61db13cb-74d9-e675-a1e8-db5f78eb3f4e","schema":1480349159276},{"serialNumber":"BAAAAAABM6d3Z0s=","enabled":true,"last_modified":1480349161785,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"b9c439ef-fcf3-2263-c14e-80727cbef898","schema":1480349159276},{"serialNumber":"FNISyWWTGi5Yco6fGh58/A==","enabled":true,"last_modified":1480349161763,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","id":"bab0ff94-c98e-7843-97b3-a4d1e044715b","schema":1480349159276},{"serialNumber":"VfTSum25nb65YPlpuhJAvg==","enabled":true,"last_modified":1480349161740,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","id":"91149dc9-6cc4-a670-1799-7bd05c159858","schema":1480349159276},{"serialNumber":"OhrtngFwotLcm4i+z00SjA==","enabled":true,"last_modified":1480349161718,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEwMC4GA1UEAxMnU3ltYW50ZWMgQ2xhc3MgMyBFQ0MgMjU2IGJpdCBFViBDQSAtIEcy","id":"337e2f4b-02c4-c70d-55be-09c8ea41731c","schema":1480349159276},{"serialNumber":"AN9bfYOvlR1t","enabled":true,"last_modified":1480349161696,"details":{"who":".","created":"2015-07-13T09:05:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181126","name":"RCS Certification Authority","why":"."},"issuerName":"MDcxJDAiBgNVBAMTG1JDUyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEPMA0GA1UEChMGSFQgc3Js","id":"18c0d37b-739d-04c6-04f2-a615be5b9948","schema":1480349159276},{"serialNumber":"F5BhENPfVw==","enabled":true,"last_modified":1480349161666,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"72a65abf-9828-365f-4d4a-78457d7bdec4","schema":1480349159276},{"serialNumber":"ESISuBo/wdW2tBztKmHdFCFz","enabled":true,"last_modified":1480349161641,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"2ad44cbf-32ca-5245-c881-6d6f290ac2c1","schema":1480349159276},{"serialNumber":"CrTHPEE6AZSfI3jysin2bA==","enabled":true,"last_modified":1480349161619,"details":{"who":".","created":"2015-09-21T13:21:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205651","name":"Misused certificate","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHjAcBgNVBAMTFXRoYXd0ZSBFViBTU0wgQ0EgLSBHMw==","id":"13987e52-821e-1fe3-3743-393136b17167","schema":1480349159276},{"serialNumber":"WX89jn8yGZVvoKTD9jDfRQ==","enabled":true,"last_modified":1480349161596,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","id":"a15c9fa5-cd6e-362d-1341-1e95c11c38fb","schema":1480349159276},{"serialNumber":"JV/LVzSKI/wsDgg3UuZHlA==","enabled":true,"last_modified":1480349161575,"details":{"who":".","created":"2016-03-01T21:22:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"ba7935ef-b624-3eef-5ae8-a78044ec3af0","schema":1480349159276},{"serialNumber":"sPNcCSE9Nkg3jy5IN1xe2Q==","enabled":true,"last_modified":1480349161553,"details":{"who":".","created":"2016-01-18T14:44:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"edc761c4-8b47-5314-0cd1-c894612ebfc3","schema":1480349159276},{"serialNumber":"buROL/l2GuXISv+/JVLkdA==","enabled":true,"last_modified":1480349161531,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","id":"963548ca-bde2-1843-f140-1c26e8e40def","schema":1480349159276},{"serialNumber":"Cfk9oA==","enabled":true,"last_modified":1480349161510,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"e85980d5-12f0-f624-7904-2d6cedeacd55","schema":1480349159276},{"serialNumber":"IyIVazG4RE9AERkb+ekH8w==","enabled":true,"last_modified":1480349161489,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"be3014a7-3d3b-08c7-02d9-5a74f601a1b1","schema":1480349159276},{"serialNumber":"HNo1DR4XCe4mS1iUMsY6Wg==","enabled":true,"last_modified":1480349161466,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"fd51f7d8-2006-663f-4779-3cf559ee5e74","schema":1480349159276},{"serialNumber":"Ai7cBJYqBE0I9NdyoZfRrw==","enabled":true,"last_modified":1480349161443,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"f7582bc8-dbdb-37dd-b24c-418242bbc4e0","schema":1480349159276},{"serialNumber":"UUFV3S2cUidOOv7ESN65Ng==","enabled":true,"last_modified":1480349161103,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"24ccf065-b88b-0fc9-1d1f-6c7722ca4faa","schema":1480349159276},{"serialNumber":"EDQMI0tR4kSntv1O37N10g==","enabled":true,"last_modified":1480349161077,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTT