Bug 1224528 - Load initial JSON files for blocklist r=mgoodwin
authorMathieu Leplatre <mathieu@mozilla.com>
Sun, 11 Dec 2016 14:37:22 -1000
changeset 373279 735f81d9fd96c9d19d3f2fdfda29a14c1a066d22
parent 373278 3ea121f60697e154bf86775a09a2bf2da0bbd8b4
child 373280 0b55ea90ed2aba6c3bc79bd297a3389d8ed3cfdf
push id10863
push userjlorenzo@mozilla.com
push dateMon, 06 Mar 2017 23:02:23 +0000
treeherdermozilla-aurora@0931190cd725 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersmgoodwin
bugs1224528
milestone54.0a1
Bug 1224528 - Load initial JSON files for blocklist r=mgoodwin MozReview-Commit-ID: D53xoTa0PZu
browser/installer/package-manifest.in
services/blocklists/addons.json
services/blocklists/certificates.json
services/blocklists/gfx.json
services/blocklists/moz.build
services/blocklists/pins.json
services/blocklists/plugins.json
services/blocklists/readme.md
services/common/blocklist-clients.js
services/common/tests/unit/test_blocklist_certificates.js
services/common/tests/unit/test_blocklist_clients.js
services/common/tests/unit/test_blocklist_signatures.js
services/common/tests/unit/xpcshell.ini
services/moz.build
tools/lint/eslint/modules.json
--- a/browser/installer/package-manifest.in
+++ b/browser/installer/package-manifest.in
@@ -631,16 +631,17 @@
 
 ; [Default Preferences]
 ; All the pref files must be part of base to prevent migration bugs
 @RESPATH@/browser/@PREF_DIR@/firefox.js
 @RESPATH@/browser/@PREF_DIR@/firefox-branding.js
 @RESPATH@/greprefs.js
 @RESPATH@/defaults/autoconfig/prefcalls.js
 @RESPATH@/browser/defaults/permissions
+@RESPATH@/browser/defaults/blocklists
 
 ; Warning: changing the path to channel-prefs.js can cause bugs (Bug 756325)
 ; Technically this is an app pref file, but we are keeping it in the original
 ; gre location for now.
 @RESPATH@/defaults/pref/channel-prefs.js
 
 ; Services (gre) prefs
 @RESPATH@/defaults/pref/services-sync.js
new file mode 100644
--- /dev/null
+++ b/services/blocklists/addons.json
@@ -0,0 +1,1 @@
+{"data":[{"guid":"ext@alibonus.com","blockID":"i1524","enabled":true,"last_modified":1485301116629,"details":{"who":"All Firefox users who have these versions installed.","created":"2017-01-24T22:45:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333471","name":"Alibonus 1.20.9 and lower","why":"Versions 1.20.9 and lower of this add-on contain critical security issues."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.20.9","severity":1}],"prefs":[],"id":"a015d5a4-9184-95db-0c74-9262af2332fa","schema":1485297431051},{"guid":"{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}","blockID":"i1523","enabled":true,"last_modified":1485297214072,"details":{"who":"All Firefox users who have these versions of the Web of Trust add-on installed.","created":"2017-01-24T22:01:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314332","name":"Web of Trust 20170120 and lower","why":"Versions 20170120 and lower of the Web of Trust add-on send excessive user data to its service, which has been reportedly shared with third parties without sufficient sanitization. These versions are also affected by a vulnerability that could lead to unwanted remote code execution."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"20170120","severity":1}],"prefs":[],"id":"2224c139-9b98-0900-61c1-04031de11ad3","schema":1485295513652},{"guid":"/^(ciscowebexstart1@cisco\\.com|ciscowebexstart_test@cisco\\.com|ciscowebexstart@cisco\\.com|ciscowebexgpc@cisco\\.com)$/","blockID":"i1522","enabled":true,"last_modified":1485215014902,"details":{"who":"All Firefox users who have any Cisco WebEx add-ons installed.","created":"2017-01-23T22:55:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1333225","name":"Cisco WebEx add-ons","why":"A critical security vulnerability has been discovered in Cisco WebEx add-ons that enable malicious websites to execute code on the user's system."},"versionRange":[{"targetApplication":[],"minVersion":"1.0.0","maxVersion":"1.0.1","severity":1}],"prefs":[],"id":"30368779-1d3b-490a-0a34-253085af7754","schema":1485212610474},{"guid":"{de71f09a-3342-48c5-95c1-4b0f17567554}","blockID":"i1493","enabled":true,"last_modified":1484867614757,"details":{"who":"All users who have this add-on installed.","created":"2017-01-12T22:17:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329654","name":"Search for Firefox Convertor (malware)","why":"This is a malicious add-on that is installed using a fake name. It changes search and homepage settings."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.3.9","severity":3}],"prefs":[],"id":"d6ec9f54-9945-088e-ba68-40117eaba24e","schema":1484335370642},{"guid":"googlotim@gmail.com","blockID":"i1492","enabled":true,"last_modified":1483646608603,"details":{"who":"All users who have Savogram version 1.3.2 installed. Version 1.3.1 doesn't have this problem and can be installed from the <a href=\"https://addons.mozilla.org/addon/savogram/\">add-on page</a>. Note that this is an older version, so affected users won't be automatically updated to it. New versions should correct this problem if they become available.","created":"2017-01-05T19:58:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1328594","name":"Savogram 1.3.2","why":"Version 1.3.2 of this add-on loads remote code and performs DOM injection in an unsafe manner."},"versionRange":[{"targetApplication":[],"minVersion":"1.3.2","maxVersion":"1.3.2","severity":1}],"prefs":[],"id":"0756ed76-7bc7-ec1e-aba5-3a9fac2107ba","schema":1483389810787},{"guid":"support@update-firefox.com","blockID":"i21","enabled":true,"last_modified":1483389809169,"details":{"who":"All users of the add-on in all Mozilla applications.","created":"2011-01-31T16:23:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629717","name":"Browser Update (spyware)","why":"This add-on is adware/spyware masquerading as a Firefox update mechanism."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dfb06be8-3594-28e4-d163-17e27119f15d","schema":1483387107003},{"guid":"{2224e955-00e9-4613-a844-ce69fccaae91}","blockID":"i7","enabled":true,"last_modified":1483389809147,"details":{"who":"All users of Internet Saving Optimizer for all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=512406","name":"Internet Saving Optimizer (extension)","why":"This add-on causes a high volume of Firefox crashes and is considered malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b9efb796-97c2-6434-d28f-acc83436f8e5","schema":1483387107003},{"guid":"supportaccessplugin@gmail.com","blockID":"i43","enabled":true,"last_modified":1483389809124,"details":{"who":"All users with Firefox Access Plugin installed","created":"2011-10-11T11:24:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=693673","name":"Firefox Access Plugin (spyware)","why":"This add-on is spyware that reports all visited websites to a third party with no user value."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ed230a4-e174-262a-55ab-0c33f93a2529","schema":1483387107003},{"guid":"{8CE11043-9A15-4207-A565-0C94C42D590D}","blockID":"i10","enabled":true,"last_modified":1483389809102,"details":{"who":"All users of this add-on in all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=541302","name":"Internal security options editor (malware)","why":"This add-on secretly hijacks all search results in most major search engines and masks as a security add-on."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e2e0ac09-6d68-75f5-2424-140f51904876","schema":1483387107003},{"guid":"youtube@youtube2.com","blockID":"i47","enabled":true,"last_modified":1483389809079,"details":{"who":"All users with any version of Free Cheesecake Factory installed on any Mozilla product.","created":"2011-12-22T13:11:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=713050","name":"Free Cheesecake Factory (malware)","why":"This add-on hijacks your Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"85f5c1db-433b-bee3-2a3b-325165cacc6e","schema":1483387107003},{"guid":"admin@youtubespeedup.com","blockID":"i48","enabled":true,"last_modified":1483389809057,"details":{"who":"All users with any version of Youtube Speed UP! installed on any Mozilla product.","created":"2011-12-29T19:48:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=714221","name":"Youtube Speed UP! (malware)","why":"This add-on hijacks your Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a93922c4-8a8a-5230-8f76-76fecb0653b6","schema":1483387107003},{"guid":"{E8E88AB0-7182-11DF-904E-6045E0D72085}","blockID":"i13","enabled":true,"last_modified":1483389809035,"details":{"who":"All users of this add-on for all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578085","name":"Mozilla Sniffer (malware)","why":"This add-on intercepts website login credentials and is malware. For more information, please <a href=\"http://blog.mozilla.com/addons/2010/07/13/add-on-security-announcement/\">read our security announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"ebbd6de9-fc8a-3e5b-2a07-232bee589c7c","schema":1483387107003},{"guid":"sigma@labs.mozilla","blockID":"i44","enabled":true,"last_modified":1483389809012,"details":{"who":"All users of Lab Kit in all versions of Firefox.","created":"2011-10-11T11:51:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690819","name":"Mozilla Labs: Lab Kit","why":"The Lab Kit add-on has been retired due to compatibility issues with Firefox 7 and future Firefox browser releases. You can still install Mozilla Labs add-ons <a href=\"https://addons.mozilla.org/en-US/firefox/user/5133025/\">individually</a>.\r\n\r\nFor more information, please read <a href=\"http://mozillalabs.com/blog/2011/10/lab-kit-is-retiring/\">this announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d614e9cd-220f-3a19-287b-57e122f8c4b5","schema":1483387107003},{"guid":"/^(jid0-S9kkzfTvEmC985BVmf8ZOzA5nLM@jetpack|jid1-qps14pkDB6UDvA@jetpack|jid1-Tsr09YnAqIWL0Q@jetpack|shole@ats.ext|{38a64ef0-7181-11e3-981f-0800200c9a66}|eochoa@ualberta.ca)$/","blockID":"i1424","enabled":true,"last_modified":1483378113482,"details":{"who":"All users who have any of the affected versions installed.","created":"2016-12-21T17:22:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","name":"Various vulnerable add-on versions","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"0699488d-2a19-6735-809e-f229849fe00b","schema":1483376308298},{"guid":"pink@rosaplugin.info","blockID":"i84","enabled":true,"last_modified":1482945810971,"details":{"who":"All Firefox users who have this add-on installed","created":"2012-04-09T10:13:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743484","name":"Facebook Rosa (malware)","why":"Add-on acts like malware and performs user actions on Facebook without their consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"66ad8de9-311d-076c-7356-87fde6d30d8f","schema":1482945809444},{"guid":"videoplugin@player.com","blockID":"i90","enabled":true,"last_modified":1482945810949,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-07T08:58:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=752483","name":"FlashPlayer 11 (malware)","why":"This add-on is malware disguised as a Flash Player update. It can hijack Google searches and Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d25943f1-39ef-b9ec-ab77-baeef3498365","schema":1482945809444},{"guid":"youtb3@youtb3.com","blockID":"i60","enabled":true,"last_modified":1482945810927,"details":{"who":"All Firefox users who have this extension installed.","created":"2012-02-02T16:38:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723753","name":"Video extension (malware)","why":"Malicious extension installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cae3093f-a7b3-5352-a264-01dbfbf347ce","schema":1482945809444},{"guid":"{8f42fb8b-b6f6-45de-81c0-d6d39f54f971}","blockID":"i82","enabled":true,"last_modified":1482945810904,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-04-09T10:04:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743012","name":"Face Plus (malware)","why":"This add-on maliciously manipulates Facebook and is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"09319ab3-55e7-fec1-44e0-84067d014b9b","schema":1482945809444},{"guid":"cloudmask@cloudmask.com","blockID":"i1233","enabled":true,"last_modified":1482945810881,"details":{"who":"Any user who has version 2.0.788, or earlier, installed.","created":"2016-06-17T14:31:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280431","name":"CloudMask","why":"These versions of the add-on (before 2.0.788) execute code from a website in a privileged local browser context, potentially allowing dangerous, unreviewed, actions to affect the user's computer.  This is fixed in later versions."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.0.788","severity":1}],"prefs":[],"id":"2a8b40c7-a1d2-29f4-b7d7-ccfc5066bae1","schema":1482945809444},{"guid":"{95ff02bc-ffc6-45f0-a5c8-619b8226a9de}","blockID":"i105","enabled":true,"last_modified":1482945810858,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-08T14:34:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","name":"Eklenti D\u00fcnyas\u0131 (malware)","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"afbbc08d-2414-f51e-fdb8-74c0a2d90323","schema":1482945809444},{"guid":"{fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}","blockID":"i77","enabled":true,"last_modified":1482945810835,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-22T14:39:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738419","name":"Adobe Flash (malware)","why":"This add-on is malware that is installed under false pretenses as an Adobe plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"81753a93-382d-5f9d-a4ca-8a21b679ebb1","schema":1482945809444},{"guid":"youtube@youtube3.com","blockID":"i57","enabled":true,"last_modified":1482945810811,"details":{"who":"All Firefox users that have installed this add-on.","created":"2012-01-31T13:54:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722823","name":"Divx 2012 Plugin (malware)","why":"Malware installed on false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4a93a0eb-a513-7272-6199-bc4d6228ff50","schema":1482945809444},{"guid":"{392e123b-b691-4a5e-b52f-c4c1027e749c}","blockID":"i109","enabled":true,"last_modified":1482945810788,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-29T13:20:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=769781","name":"Zaman Tuneline Hay\u0131r! (malware)","why":"This add-on pretends to be developed by Facebook and injects scripts that manipulate users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b9a805aa-cae7-58d6-5a53-2af4442e4cf6","schema":1482945809444},{"guid":"msntoolbar@msn.com","blockID":"i18","enabled":true,"last_modified":1482945810764,"details":{"who":"Users of Bing Bar 6.0 and older for all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","name":"Bing Bar","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see <a href=\"http://support.microsoft.com/kb/2430460\">this article</a>."},"versionRange":[{"targetApplication":[],"minVersion":" 0","maxVersion":"6.*","severity":1}],"prefs":[],"id":"9b2f2039-b997-8993-d6dc-d881bc1ca7a1","schema":1482945809444},{"guid":"yasd@youasdr3.com","blockID":"i104","enabled":true,"last_modified":1482945810740,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-08T14:33:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","name":"Play Now (malware)","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8a352dff-d09d-1e78-7feb-45dec7ace5a5","schema":1482945809444},{"guid":"fdm_ffext@freedownloadmanager.org","blockID":"i2","enabled":true,"last_modified":1482945810393,"details":{"who":"Users of Firefox 3 and later with versions 1.0 through 1.3.1 of Free Download Manager","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=408445","name":"Free Download Manager","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"1.0","maxVersion":"1.3.1","severity":1}],"prefs":[],"id":"fc46f8e7-0489-b90f-a373-d93109479ca5","schema":1482945809444},{"guid":"flash@adobe.com","blockID":"i56","enabled":true,"last_modified":1482945810371,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-01-30T15:41:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","name":"Adobe Flash Update (malware)","why":"This add-on poses as an Adobe Flash update and injects malicious scripts into web pages. It hides itself in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"696db959-fb0b-8aa4-928e-65f157cdd77a","schema":1482945809444},{"guid":"youtubeer@youtuber.com","blockID":"i66","enabled":true,"last_modified":1482945810348,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-13T15:44:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726787","name":"Plug VDS (malware)","why":"Add-on behaves maliciously, and is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0878ce4e-b476-ffa3-0e06-21a65b7917a1","schema":1482945809444},{"guid":"{B13721C7-F507-4982-B2E5-502A71474FED}","blockID":"i8","enabled":true,"last_modified":1482945810326,"details":{"who":"Users of all versions of the original Skype Toolbar in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","name":"Original Skype Toolbar","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please <a href=\"http://www.skype.com/intl/en/get-skype/on-your-computer/click-and-call/\">update to the latest version</a>. For more information, please <a href=\"http://blog.mozilla.com/addons/2011/01/20/blocking-the-skype-toolbar-in-firefox/\">read our announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5a320611-59a3-0eee-bb30-9052be870e00","schema":1482945809444},{"guid":"yslow@yahoo-inc.com","blockID":"i11","enabled":true,"last_modified":1482945810303,"details":{"who":"Users of YSlow version 2.0.5 for Firefox 3.5.7 and later.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542686","name":"YSlow","why":"This add-on causes a high volume of Firefox crashes and other stability issues. Users should <a href=\"https://addons.mozilla.org/firefox/addon/yslow/\">update to the latest version</a>."},"versionRange":[{"targetApplication":[{"minVersion":"3.5.7","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"2.0.5","maxVersion":"2.0.5","severity":1}],"prefs":[],"id":"a9b34e8f-45ce-9217-b791-98e094c26352","schema":1482945809444},{"guid":"youtube@youtuber.com","blockID":"i63","enabled":true,"last_modified":1482945810281,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-06T15:39:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724691","name":"Mozilla Essentials (malware)","why":"Installs under false pretenses and delivers malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"18216e6f-9d70-816f-4d4c-63861f43ff3c","schema":1482945809444},{"guid":"flash@adobee.com","blockID":"i83","enabled":true,"last_modified":1482945810259,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-04-09T10:08:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=743497","name":"FlashPlayer 11 (malware)","why":"This add-on is malware installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"09bb4661-331c-f7ba-865b-9e085dc437af","schema":1482945809444},{"guid":"youtube@2youtube.com","blockID":"i71","enabled":true,"last_modified":1482945810236,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-27T10:23:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730399","name":"YouTube extension (malware)","why":"Extension is malware, installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5d389c1f-b3a0-b06f-6ffb-d1e8aa055e3c","schema":1482945809444},{"guid":"webmaster@buzzzzvideos.info","blockID":"i58","enabled":true,"last_modified":1482945810213,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-01-31T14:51:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722844","name":"Buzz Video (malware)","why":"Malware add-on that is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f7aab105-e2c2-42f5-d9be-280eb9c0c8f7","schema":1482945809444},{"guid":"play5@vide04flash.com","blockID":"i92","enabled":true,"last_modified":1482945810191,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-05-15T13:27:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755443","name":"Lastest Flash PLayer (malware)","why":"This add-on impersonates a Flash Player update (poorly), and inserts malicious scripts into Facebook."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7190860e-fc1f-cd9f-5d25-778e1e9043b2","schema":1482945809444},{"guid":"support3_en@adobe122.com","blockID":"i97","enabled":true,"last_modified":1482945810168,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-28T13:42:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759164","name":"FlashPlayer 11 (malware)","why":"This add-on is malware disguised as the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"decf93a1-2bb0-148c-a1a6-10b3757b554b","schema":1482945809444},{"guid":"a1g0a9g219d@a1.com","blockID":"i73","enabled":true,"last_modified":1482945810146,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-15T15:03:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=736275","name":"Flash Player (malware)","why":"This add-on is malware disguised as Flash Player. It steals user cookies and sends them to a remote location."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6dd66b43-897d-874a-2227-54e240b8520f","schema":1482945809444},{"guid":"ghostviewer@youtube2.com","blockID":"i59","enabled":true,"last_modified":1482945810123,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-02T16:32:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=723683","name":"Ghost Viewer (malware)","why":"Malicious add-on that automatically posts to Facebook."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"06dfe833-8c3d-90ee-3aa8-37c3c28f7c56","schema":1482945809444},{"guid":"{46551EC9-40F0-4e47-8E18-8E5CF550CFB8}","blockID":"i19","enabled":true,"last_modified":1482945810101,"details":{"who":"Users of Stylish version 1.1b1 for Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=621660","name":"Stylish","why":"Version 1.1b1 of this add-on causes compatibility issues with Firefox. Users should update to the latest version."},"versionRange":[{"targetApplication":[],"minVersion":"1.1b1","maxVersion":"1.1b1","severity":1}],"prefs":[],"id":"aaea37e1-ff86-4565-8bd5-55a6bf942791","schema":1482945809444},{"guid":"kdrgun@gmail.com","blockID":"i103","enabled":true,"last_modified":1482945810078,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-06-08T14:32:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=763065","name":"Timeline Kapat (malware)","why":"This is a malicious add-on that inserts scripts into Facebook and hijacks the user's session."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a9a46ab2-2f56-1046-201c-5faa3435e248","schema":1482945809444},{"guid":"youtube2@youtube2.com","blockID":"i67","enabled":true,"last_modified":1482945810055,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-18T09:10:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=728476","name":"Youtube Online (malware)","why":"This add-on is malware, installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"14650ece-295b-a667-f9bc-a3d973e2228c","schema":1482945809444},{"guid":"masterfiler@gmail.com","blockID":"i12","enabled":true,"last_modified":1482945810032,"details":{"who":"All users of this add-on for all Mozilla applications.","created":"2010-02-05T15:01:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=542081","name":"Master File (malware)","why":"This add-on is malware and attempts to install a Trojan on the user's computer."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a256d79d-5af8-92e9-a29d-350adf822efe","schema":1482945809444},{"guid":"{847b3a00-7ab1-11d4-8f02-006008948af5}","blockID":"i9","enabled":true,"last_modified":1482945810003,"details":{"who":"Users of Enigmail versions older than 0.97a for Thunderbird 3 and later.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=531047","name":"Enigmail","why":"This add-on causes a high volume of crashes and other stability issues. Users should <a href=\"https://addons.mozilla.org/en-US/thunderbird/addon/enigmail/\">update Enigmail</a>."},"versionRange":[{"targetApplication":[{"minVersion":"3.0pre","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"}],"minVersion":"0","maxVersion":"0.97a","severity":1}],"prefs":[],"id":"115f46b6-059d-202a-4373-2ca79b096347","schema":1482945809444},{"guid":"mozilla_cc@internetdownloadmanager.com","blockID":"i14","enabled":true,"last_modified":1482945809979,"details":{"who":"Users of Firefox 4 and later with Internet Download Manager version 6.9.8 and older.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=578443","name":"Internet Download Manager","why":"This add-on causes a high volume of crashes and has other stability issues."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1pre","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"6.9.8","severity":1}],"prefs":[],"id":"773ffcfb-75d1-081d-7431-ebe3fa5dbb44","schema":1482945809444},{"guid":"admin@youtubeplayer.com","blockID":"i51","enabled":true,"last_modified":1482945809957,"details":{"who":"All Firefox users with this extension installed.","created":"2012-01-18T14:34:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=717165","name":"Youtube player (malware)","why":"This add-on is malware, doing nothing more than inserting advertisements into websites through iframes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"16b2ce94-88db-0d79-33fc-a93070ceb509","schema":1482945809444},{"guid":"personas@christopher.beard","blockID":"i15","enabled":true,"last_modified":1482945809934,"details":{"who":"All users of Personas Plus 1.6 in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=590978","name":"Personas Plus","why":"This version of Personas Plus is incompatible with certain Firefox functionality and other add-ons. Users should upgrade to the latest version."},"versionRange":[{"targetApplication":[{"minVersion":"3.6","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"3.6.*"}],"minVersion":"1.6","maxVersion":"1.6","severity":1}],"prefs":[],"id":"e36479c6-ca00-48d4-4fd9-ec677fd032da","schema":1482945809444},{"guid":"youtubeee@youtuber3.com","blockID":"i96","enabled":true,"last_modified":1482945809912,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-25T09:26:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=758503","name":"Divx 2012 Plugins (malware)","why":"This is a malicious add-on that is disguised as a DivX plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f01be9cb-5cf2-774a-a4d7-e210a24db5b9","schema":1482945809444},{"guid":"{3252b9ae-c69a-4eaf-9502-dc9c1f6c009e}","blockID":"i17","enabled":true,"last_modified":1482945809886,"details":{"who":"Users of version 2.2 of this add-on in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","name":"Default Manager (Microsoft)","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see <a href=\"http://support.microsoft.com/kb/2430460\">this article</a>."},"versionRange":[{"targetApplication":[],"minVersion":"2.2","maxVersion":"2.2","severity":1}],"prefs":[],"id":"38be28ac-2e30-37fa-4332-852a55fafb43","schema":1482945809444},{"guid":"{68b8676b-99a5-46d1-b390-22411d8bcd61}","blockID":"i93","enabled":true,"last_modified":1482945809863,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-05-16T10:44:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=755635","name":"Zaman T\u00fcnelini Kald\u0131r! (malware)","why":"This is a malicious add-on that post content on Facebook accounts and steals user data."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"733aff15-9b1f-ec04-288f-b78a55165a1c","schema":1482945809444},{"guid":"applebeegifts@mozilla.doslash.org","blockID":"i54","enabled":true,"last_modified":1482945809840,"details":{"who":"All Firefox users that install this add-on.","created":"2012-01-26T16:17:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721562","name":"Applebees Gift Card (malware)","why":"Add-on is malware installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1372c8ab-5452-745a-461a-aa78e3e12c4b","schema":1482945809444},{"guid":"activity@facebook.com","blockID":"i65","enabled":true,"last_modified":1482945809437,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-13T15:41:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=726803","name":"Facebook extension (malware)","why":"Add-on behaves maliciously and poses as an official Facebook add-on."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"79ad1c9b-0828-7823-4574-dd1cdd46c3d6","schema":1482945112982},{"guid":"jid0-EcdqvFOgWLKHNJPuqAnawlykCGZ@jetpack","blockID":"i62","enabled":true,"last_modified":1482945809415,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-06T14:46:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=724650","name":"YouTube extension (malware)","why":"Add-on is installed under false pretenses and delivers malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5ae1e642-b53c-54c0-19e7-5562cfdac3a3","schema":1482945112982},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","blockID":"i25","enabled":true,"last_modified":1482945809393,"details":{"who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","created":"2011-03-14T15:53:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=637542","name":"McAfee SiteAdvisor","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0.1","maxVersion":"3.3.0.*","severity":1}],"prefs":[],"id":"c950501b-1f08-2ab2-d817-7c664c0d16fe","schema":1482945112982},{"guid":"{B7082FAA-CB62-4872-9106-E42DD88EDE45}","blockID":"i38","enabled":true,"last_modified":1482945809371,"details":{"who":"Users of McAfee SiteAdvisor below version 3.3.1 for Firefox 4.\r\n\r\nUsers of McAfee SiteAdvisor 3.3.1 and below for Firefox 5 and higher.","created":"2011-05-27T13:55:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=660111","name":"McAfee SiteAdvisor","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"5.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"3.3.1","maxVersion":"*","severity":1}],"prefs":[],"id":"f11de388-4511-8d06-1414-95d3b2b122c5","schema":1482945112982},{"guid":"{3f963a5b-e555-4543-90e2-c3908898db71}","blockID":"i6","enabled":true,"last_modified":1482945809348,"details":{"who":"Users of AVG SafeSearch version 8.5 and older for all Mozilla applications.","created":"2009-06-17T13:12:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=527135","name":"AVG SafeSearch","why":"This add-on causes a high volume of crashes and causes other stability issues."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"8.5","severity":1}],"prefs":[],"id":"0d6f7d4c-bf5d-538f-1ded-ea4c6b775617","schema":1482945112982},{"guid":"langpack-vi-VN@firefox.mozilla.org","blockID":"i3","enabled":true,"last_modified":1482945809326,"details":{"who":"Users of Vietnamese Language Pack version 2.0 for all Mozilla applications.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=432406","name":"Vietnamese Language Pack","why":"Corrupted files. For more information, please see <a href=\"http://blog.mozilla.com/security/2008/05/07/compromised-file-in-vietnamese-language-pack-for-firefox-2/\">this blog post</a>."},"versionRange":[{"targetApplication":[],"minVersion":"2.0","maxVersion":"2.0","severity":1}],"prefs":[],"id":"51d4b581-d21c-20a1-6147-b17c3adc7867","schema":1482945112982},{"guid":"youtube@youtube7.com","blockID":"i55","enabled":true,"last_modified":1482945809304,"details":{"who":"All Firefox users with this add-on installed.","created":"2012-01-27T09:39:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=721646","name":"Plugin Video (malware)","why":"This is malware posing as video software."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"08ceedf5-c7c1-f54f-db0c-02f01f0e319a","schema":1482945112982},{"guid":"crossriderapp3924@crossrider.com","blockID":"i76","enabled":true,"last_modified":1482945809279,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-22T10:38:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=738282","name":"Fblixx (malware)","why":"This add-on compromises Facebook privacy and security and spams friends lists without user intervention."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"39d0a019-62fb-837b-1f1f-6831e56442b5","schema":1482945112982},{"guid":"{45147e67-4020-47e2-8f7a-55464fb535aa}","blockID":"i86","enabled":true,"last_modified":1482945809255,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-04-25T16:33:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748993","name":"Mukemmel Face+","why":"This add-on injects scripts into Facebook and performs malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"960443f9-cf48-0b71-1ff2-b8c34a3411ea","schema":1482945112982},{"guid":"{4B3803EA-5230-4DC3-A7FC-33638F3D3542}","blockID":"i4","enabled":true,"last_modified":1482945809232,"details":{"who":"Users of Firefox 3 and later with version 1.2 of Crawler Toolbar","created":"2008-07-08T10:23:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=441649","name":"Crawler Toolbar","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"1.2","maxVersion":"1.2","severity":1}],"prefs":[],"id":"a9818d53-3a6a-8673-04dd-2a16f5644215","schema":1482945112982},{"guid":"flashupdate@adobe.com","blockID":"i68","enabled":true,"last_modified":1482945809208,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-02-21T13:55:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=722526","name":"Flash Update (malware)","why":"Add-on is malware, installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ba5b46e-790d-5af2-9580-a5f1e6e65522","schema":1482945112982},{"guid":"plugin@youtubeplayer.com","blockID":"i127","enabled":true,"last_modified":1482945809185,"details":{"who":"All users who have this add-on installed.","created":"2012-08-16T13:03:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=783356","name":"Youtube Facebook Player (malware)","why":"This add-on tries to pass as a YouTube player and runs malicious scripts on webpages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"17a8bece-e2df-a55d-8a72-95faff028b83","schema":1482945112982},{"guid":"GifBlock@facebook.com","blockID":"i79","enabled":true,"last_modified":1482945809162,"details":{"who":"All Firefox users who have installed this extension.","created":"2012-03-27T10:53:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739482","name":"Facebook Essentials (malware)","why":"This extension is malicious and is installed under false pretenses."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"728451e8-1273-d887-37e9-5712b1cc3bff","schema":1482945112982},{"guid":"ff-ext@youtube","blockID":"i52","enabled":true,"last_modified":1482945809138,"details":{"who":"All Firefox users that have this add-on installed.","created":"2012-01-19T08:26:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719296","name":"Youtube player (malware)","why":"This add-on poses as a YouTube player while posting spam into Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cd2dd72a-dd52-6752-a0cd-a4b312fd0b65","schema":1482945112982},{"guid":"ShopperReports@ShopperReports.com","blockID":"i22","enabled":true,"last_modified":1482945809115,"details":{"who":"Users of Shopper Reports version 3.1.22.0 in Firefox 4 and later.","created":"2011-02-09T17:03:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=630191","name":"Shopper Reports","why":"This add-on causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[],"minVersion":"3.1.22.0","maxVersion":"3.1.22.0","severity":1}],"prefs":[],"id":"f26b049c-d856-750f-f050-996e6bec7cbb","schema":1482945112982},{"guid":"{27182e60-b5f3-411c-b545-b44205977502}","blockID":"i16","enabled":true,"last_modified":1482945809092,"details":{"who":"Users of version 1.0 of this add-on in all versions of Firefox.","created":"2011-03-31T16:28:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=599971","name":"Search Helper Extension (Microsoft)","why":"This add-on has security issues and was blocked at Microsoft's request. For more information, please see <a href=\"http://support.microsoft.com/kb/2430460\">this article</a>."},"versionRange":[{"targetApplication":[],"minVersion":"1.0","maxVersion":"1.0","severity":1}],"prefs":[],"id":"2655f230-11f3-fe4c-7c3d-757d37d5f9a5","schema":1482945112982},{"guid":"{841468a1-d7f4-4bd3-84e6-bb0f13a06c64}","blockID":"i46","enabled":true,"last_modified":1482945809069,"details":{"who":"Users of all versions of Nectar Search Toolbar in Firefox 9.","created":"2011-12-20T11:38:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=712369","name":"Nectar Search Toolbar","why":"This add-on causes crashes and other stability issues in Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"9.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.0"}],"minVersion":"0.1","maxVersion":"*","severity":1}],"prefs":[],"id":"b660dabd-0dc0-a55c-4b86-416080b345d9","schema":1482945112982},{"guid":"support@daemon-tools.cc","blockID":"i5","enabled":true,"last_modified":1482945809045,"details":{"who":"Users of Daemon Tools Toolbar version 1.0.0.5 and older for all Mozilla applications.","created":"2009-02-13T18:39:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=459850","name":"Daemon Tools Toolbar","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0.0.5","severity":1}],"prefs":[],"id":"8cabafd3-576a-b487-31c8-ab59e0349a0e","schema":1482945112982},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","blockID":"i53","enabled":true,"last_modified":1482945809021,"details":{"who":"All users of Firefox with this add-on installed.","created":"2012-01-19T15:58:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=719605","name":"Peliculas-FLV (malware)","why":"This add-on is being offered as an online movie viewer, when it reality it only inserts scripts and ads into known sites."},"versionRange":[{"targetApplication":[],"minVersion":"2.0.3","maxVersion":"2.0.3","severity":3}],"prefs":[],"id":"07bc0962-60da-087b-c3ab-f2a6ab84d81c","schema":1482945112982},{"guid":"royal@facebook.com","blockID":"i64","enabled":true,"last_modified":1482945808997,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-09T13:24:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=725777","name":"Facebook ! (malware)","why":"Malicious add-on posing as a Facebook tool."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dd1d2623-0d15-c93e-8fbd-ba07b0299a44","schema":1482945112982},{"guid":"{28bfb930-7620-11e1-b0c4-0800200c9a66}","blockID":"i108","enabled":true,"last_modified":1482945808973,"details":{"who":"All Firefox user who have this add-on installed.","created":"2012-06-21T09:24:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=766852","name":"Aplicativo (malware)","why":"This is malware disguised as an Adobe product. It spams Facebook pages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"908dc4fb-ebc9-cea1-438f-55e4507ba834","schema":1482945112982},{"guid":"socialnetworktools@mozilla.doslash.org","blockID":"i78","enabled":true,"last_modified":1482945808950,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-03-26T16:46:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739441","name":"Social Network Tools (malware)","why":"This add-on hijacks the Facebook UI and adds scripts to track users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1064cd25-3b87-64bb-b0a6-2518ad281574","schema":1482945112982},{"guid":"youtubeeing@youtuberie.com","blockID":"i98","enabled":true,"last_modified":1482945808927,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-30T09:30:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759663","name":"Youtube Video Player (malware)","why":"This add-on is malware disguised as a Youtube add-on."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3484f860-56e1-28e8-5a70-cdcd5ab9d6ee","schema":1482945112982},{"guid":"{3a12052a-66ef-49db-8c39-e5b0bd5c83fa}","blockID":"i101","enabled":true,"last_modified":1482945808904,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-06-05T18:37:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761874","name":"Timeline Remove (malware)","why":"This add-on is malware disguised as a Facebook timeline remover."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b01b321b-6628-7166-bd15-52f21a04d8bd","schema":1482945112982},{"guid":"pfzPXmnzQRXX6@2iABkVe.com","blockID":"i99","enabled":true,"last_modified":1482945808881,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-05-30T17:10:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=759950","name":"Flash Player (malware)","why":"This add-on is malware disguised as a Flash Player update."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"29cc4abc-4f52-01f1-eb0b-cad84ba4db13","schema":1482945112982},{"guid":"/^(@pluginscribens_firefox|extension@vidscrab.com|firefox@jjj.ee|firefox@shop-reward.de|FxExtPasteNGoHtk@github.lostdj|himanshudotrai@gmail.com|jid0-bigoD0uivzAMmt07zrf3OHqa418@jetpack|jid0-iXbAR01tjT2BsbApyS6XWnjDhy8@jetpack)$/","blockID":"i1423","enabled":true,"last_modified":1482343886390,"details":{"who":"All users who have any of the affected versions installed.","created":"2016-12-21T17:21:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","name":"Various vulnerable add-on versions","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a58a2836-e4e7-74b5-c109-fa3d41e9ed56","schema":1482341309012},{"guid":"/^(pdftoword@addingapps.com|jid0-EYTXLS0GyfQME5irGbnD4HksnbQ@jetpack|jid1-ZjJ7t75BAcbGCX@jetpack)$/","blockID":"i1425","enabled":true,"last_modified":1482343886365,"details":{"who":"All users who have any of the affected versions installed.","created":"2016-12-21T17:23:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1325060","name":"Various vulnerable add-on versions","why":"A security vulnerability was discovered in old versions of the Add-ons SDK, which is exposed by certain old versions of add-ons. In the case of some add-ons that haven't been updated for a long time, all versions are being blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"150e639f-c832-63d0-a775-59313b2e1bf9","schema":1482341309012},{"guid":"{cc8f597b-0765-404e-a575-82aefbd81daf}","blockID":"i380","enabled":true,"last_modified":1480349217152,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-06-19T13:03:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866332","name":"Update My Browser (malware)","why":"This is a malicious add-on that hijacks Facebook accounts and performs unwanted actions on behalf of the user."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4950d7aa-c602-15f5-a7a2-d844182d5cbd","schema":1480349193877},{"guid":"extension@FastFreeConverter.com","blockID":"i470","enabled":true,"last_modified":1480349217071,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"649dd933-debf-69b7-020f-496c2c9f99c8","schema":1480349193877},{"guid":"59D317DB041748fdB89B47E6F96058F3@jetpack","blockID":"i694","enabled":true,"last_modified":1480349217005,"details":{"who":"All Firefox users who have this add-ons installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-21T13:46:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053540","name":"JsInjectExtension","why":"This is a suspicious add-on that appears to be installed without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"75692bd4-18e5-a9be-7ec3-9327e159ef68","schema":1480349193877},{"guid":"/^({bfec236d-e122-4102-864f-f5f19d897f5e}|{3f842035-47f4-4f10-846b-6199b07f09b8}|{92ed4bbd-83f2-4c70-bb4e-f8d3716143fe})$/","blockID":"i527","enabled":true,"last_modified":1480349216927,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:13:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","name":"KeyBar add-on","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and uses multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6d68dd97-7965-0a84-8ca7-435aac3c8040","schema":1480349193877},{"guid":"support@vide1flash2.com","blockID":"i246","enabled":true,"last_modified":1480349216871,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-01-14T09:17:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=830159","name":"Lastest Adobe Flash Player (malware)","why":"This is an add-on that poses as the Adobe Flash Player and runs malicious code in the user's system."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2004fba1-74bf-a072-2a59-6e0ba827b541","schema":1480349193877},{"guid":"extension21804@extension21804.com","blockID":"i312","enabled":true,"last_modified":1480349216827,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-06T14:14:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","name":"Coupon Companion","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"b2cf1256-dadd-6501-1f4e-25902d408692","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i602","enabled":true,"last_modified":1480349216765,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:18:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.8","maxVersion":"3.15.8.*","severity":1}],"prefs":[],"id":"b2b4236d-5d4d-82b2-99cd-00ff688badf1","schema":1480349193877},{"guid":"nosquint@urandom.ca","blockID":"i1232","enabled":true,"last_modified":1480349216711,"details":{"who":"Users on Firefox 47, and higher, using version 2.1.9.1, and earlier, of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-06-10T17:12:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1279561","name":"NoSquint","why":"The add-on is breaking the in-built zoom functionality on Firefox 47."},"versionRange":[{"targetApplication":[{"minVersion":"47","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"2.1.9.1-signed.1-signed","severity":1}],"prefs":[],"id":"30e0a35c-056a-054b-04f3-ade68b83985a","schema":1480349193877},{"guid":"{FE1DEEEA-DB6D-44b8-83F0-34FC0F9D1052}","blockID":"i364","enabled":true,"last_modified":1480349216652,"details":{"who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager.","created":"2013-06-10T16:14:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867670","name":"IB Updater","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a59b967c-66ca-7ad9-2dc6-d0ad37ded5fd","schema":1480349193877},{"guid":"vpyekkifgv@vpyekkifgv.org","blockID":"i352","enabled":true,"last_modified":1480349216614,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-14T13:42:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=872211","name":"SQLlite Addon (malware)","why":"Uses a deceptive name and injects ads into pages without user consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8fd981ab-7ee0-e367-d804-0efe29d63178","schema":1480349193877},{"guid":"/^firefox@(albrechto|swiftbrowse|springsmart|storimbo|squirrelweb|betterbrowse|lizardlink|rolimno|browsebeyond|clingclang|weblayers|kasimos|higher-aurum|xaven|bomlabio)\\.(com?|net|org|info|biz)$/","blockID":"i549","enabled":true,"last_modified":1480349216570,"details":{"who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","created":"2014-01-30T15:08:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","name":"Yontoo add-ons","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3a124164-b177-805b-06f7-70a358b37e08","schema":1480349193877},{"guid":"thefoxonlybetter@quicksaver","blockID":"i702","enabled":true,"last_modified":1480349216512,"details":{"who":"All Firefox users who have any of these versions of the add-on installed.","created":"2014-08-27T10:05:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","name":"The Fox, Only Better (malicious versions)","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"1.10","maxVersion":"*","severity":3}],"prefs":[],"id":"60e54f6a-1b10-f889-837f-60a76a98fccc","schema":1480349193877},{"guid":"/@(ft|putlocker|clickmovie|m2k|sharerepo|smarter-?)downloader\\.com$/","blockID":"i396","enabled":true,"last_modified":1480349216487,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T12:48:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881454","name":"PutLockerDownloader and related","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e98ba6e3-f2dd-fdee-b106-3e0d2a03cda4","schema":1480349193877},{"guid":"my7thfakeid@gmail.com","blockID":"i1262","enabled":true,"last_modified":1480349216460,"details":{"who":"Anyone who has this add-on installed.","created":"2016-08-17T10:54:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1295616","name":"Remote Keylogger test 0 addon","why":"This add-on is a keylogger that sends the data to a remote server, and goes under the name Real_player.addon."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"81b380c0-8092-ea5e-11cd-54c7f563ff5a","schema":1480349193877},{"guid":"{f0e59437-6148-4a98-b0a6-60d557ef57f4}","blockID":"i304","enabled":true,"last_modified":1480349216402,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-02-27T13:10:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845975","name":"WhiteSmoke B","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">installation guidelines</a> and is dropped silently into user's profiles."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"0469e643-1a90-f9be-4aad-b347469adcbe","schema":1480349193877},{"guid":"firebug@software.joehewitt.com","blockID":"i75","enabled":true,"last_modified":1480349216375,"details":{"who":"All Firefox 9 users on Mac OS X or Linux who have Firebug 1.9.0 installed.","created":"2012-03-21T16:00:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=718831","name":"Firebug","why":"Firebug 1.9.0 creates stability problems on Firefox 9, on Mac OS X and Linux. Upgrading to Firefox 10 or later, or upgrading to Firebug 1.9.1 or later fixes this problem."},"versionRange":[{"targetApplication":[{"minVersion":"9.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"9.*"}],"minVersion":"1.9.0","maxVersion":"1.9.0","severity":1}],"prefs":[],"os":"Darwin,Linux","id":"a1f9f055-ef34-1412-c39f-35605a70d031","schema":1480349193877},{"guid":"xz123@ya456.com","blockID":"i486","enabled":true,"last_modified":1480349215808,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-15T13:34:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","name":"BetterSurf (malware)","why":"This add-on appears to be malware and is installed silently in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b9825a25-a96c-407e-e656-46a7948e5745","schema":1480349193877},{"guid":"{C7AE725D-FA5C-4027-BB4C-787EF9F8248A}","blockID":"i424","enabled":true,"last_modified":1480349215779,"details":{"who":"Users of Firefox 23 or later who have RelevantKnowledge 1.0.0.2 or lower.","created":"2013-07-01T10:45:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=860641","name":"RelevantKnowledge 1.0.0.2 and lower","why":"Old versions of this add-on are causing startup crashes in Firefox 23, currently on the Beta channel. RelevantKnowledge users on Firefox 23 and above should update to version 1.0.0.3 of the add-on."},"versionRange":[{"targetApplication":[{"minVersion":"23.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"1.0.0.2","severity":1}],"prefs":[],"id":"c888d167-7970-4b3f-240f-2d8e6f14ded4","schema":1480349193877},{"guid":"{5C655500-E712-41e7-9349-CE462F844B19}","blockID":"i966","enabled":true,"last_modified":1480349215743,"details":{"who":"All users who have this add-on installed.","created":"2015-07-17T13:42:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1175425","name":"Quick Translator","why":"This add-on is vulnerable to a cross-site scripting attack, putting users at risk when using it in arbitrary websites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0.1-signed","severity":1}],"prefs":[],"id":"f34b00a6-c783-7851-a441-0d80fb1d1031","schema":1480349193877},{"guid":"superlrcs@svenyor.net","blockID":"i545","enabled":true,"last_modified":1480349215672,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-01-30T11:52:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","name":"SuperLyrics","why":"This add-on is in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, using multiple add-on IDs and potentially doing other unwanted activities."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"002cd4fa-4c2b-e28b-9220-4a520f4d9ec6","schema":1480349193877},{"guid":"mbrsepone@facebook.com","blockID":"i479","enabled":true,"last_modified":1480349215645,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-11T15:42:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937331","name":"Mozilla Lightweight Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0549645e-5f50-5089-1f24-6e7d3bfab8e0","schema":1480349193877},{"guid":"/^brasilescape.*\\@facebook\\.com$/","blockID":"i453","enabled":true,"last_modified":1480349215591,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2013-09-20T09:54:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=918566","name":"Brasil Escape (malware)","why":"This is a group of malicious add-ons that use deceitful names like \"Facebook Video Pack\" or \"Mozilla Service Pack\" and hijack Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8e6b1176-1794-2117-414e-f0821443f27b","schema":1480349193877},{"guid":"foxyproxy-basic@eric.h.jung","blockID":"i952","enabled":true,"last_modified":1480349215536,"details":{"who":"All users who have this add-on installed on Thunderbird 38 and above.","created":"2015-07-15T09:35:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","name":"FoxyProxy Basic for Thunderbird","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above."},"versionRange":[{"targetApplication":[{"minVersion":"38.0a2","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"},{"minVersion":"2.35","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"0","maxVersion":"3.5.5","severity":1}],"prefs":[],"id":"81658491-feda-2ed3-3c6c-8e60c2b73aee","schema":1480349193877},{"guid":"mbroctone@facebook.com","blockID":"i476","enabled":true,"last_modified":1480349215504,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-08T15:32:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936590","name":"Mozilla Storage Service (malware)","why":"This add-on is malware that hijacks the users' Facebook account."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"92198396-8756-8d09-7f18-a68d29894f71","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i616","enabled":true,"last_modified":1480349215479,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:24:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.28","maxVersion":"3.15.28.*","severity":1}],"prefs":[],"id":"f11b485f-320e-233c-958b-a63377024fad","schema":1480349193877},{"guid":"/^({e9df9360-97f8-4690-afe6-996c80790da4}|{687578b9-7132-4a7a-80e4-30ee31099e03}|{46a3135d-3683-48cf-b94c-82655cbc0e8a}|{49c795c2-604a-4d18-aeb1-b3eba27e5ea2}|{7473b6bd-4691-4744-a82b-7854eb3d70b6}|{96f454ea-9d38-474f-b504-56193e00c1a5})$/","blockID":"i494","enabled":true,"last_modified":1480349215454,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-02T14:52:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","name":"uTorrent and related","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. It also uses multiple add-on IDs for no apparent reason. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"485210d0-8e69-3436-536f-5d1deeea4167","schema":1480349193877},{"guid":"{EB7508CA-C7B2-46E0-8C04-3E94A035BD49}","blockID":"i162","enabled":true,"last_modified":1480349215428,"details":{"who":"All Firefox users who have installed any of these add-ons.","created":"2012-10-11T12:25:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=799266","name":"Mozilla Safe Browsing and others (Medfos malware)","why":"This block covers a number of malicious add-ons that deceive users, using names like \"Mozilla Safe Browsing\" and \"Translate This!\", and claiming they are developed by \"Mozilla Corp.\". They hijack searches and redirects users to pages they didn't intend to go to.\r\n\r\nNote: this block won't be active until bug 799266 is fixed."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"07566aa3-4ff9-ac4f-9de9-71c77454b4da","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i614","enabled":true,"last_modified":1480349215399,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:23:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.26","maxVersion":"3.15.26.*","severity":1}],"prefs":[],"id":"ede541f3-1748-7b33-9bd6-80e2f948e14f","schema":1480349193877},{"guid":"/^({976cd962-e0ca-4337-aea7-d93fae63a79c}|{525ba996-1ce4-4677-91c5-9fc4ead2d245}|{91659dab-9117-42d1-a09f-13ec28037717}|{c1211069-1163-4ba8-b8b3-32fc724766be})$/","blockID":"i522","enabled":true,"last_modified":1480349215360,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:15:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","name":"appbario7","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"580aed26-dc3b-eef8-fa66-a0a402447b7b","schema":1480349193877},{"guid":"jid0-O6MIff3eO5dIGf5Tcv8RsJDKxrs@jetpack","blockID":"i552","enabled":true,"last_modified":1480349215327,"details":{"who":"All Firefox users who have this extension installed.","created":"2014-02-19T15:26:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","name":"Extension_Protected (malware)","why":"This extension is malware that attempts to make it impossible for a second extension and itself to be disabled, and also forces the new tab page to have a specific URL."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e53063b4-5702-5b66-c860-d368cba4ccb6","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i604","enabled":true,"last_modified":1480349215302,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:18:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.10","maxVersion":"3.15.11.*","severity":1}],"prefs":[],"id":"b910f779-f36e-70e1-b17a-8afb75988c03","schema":1480349193877},{"guid":"brasilescapefive@facebook.com","blockID":"i483","enabled":true,"last_modified":1480349215276,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T09:37:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938473","name":"Facebook Video Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"85ee7840-f262-ad30-eb91-74b3248fd13d","schema":1480349193877},{"guid":"brasilescapeeight@facebook.com","blockID":"i482","enabled":true,"last_modified":1480349215249,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T09:36:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938476","name":"Mozilla Security Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"457a5722-be90-5a9f-5fa0-4c753e9f324c","schema":1480349193877},{"guid":"happylyrics@hpyproductions.net","blockID":"i370","enabled":true,"last_modified":1480349215225,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-06-11T15:42:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881815","name":"Happy Lyrics","why":"This add-on is silently installed into Firefox without the users' consent, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"730e616d-94a7-df0c-d31a-98b7875d60c2","schema":1480349193877},{"guid":"search-snacks@search-snacks.com","blockID":"i872","enabled":true,"last_modified":1480349215198,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-03-04T14:37:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082733","name":"Search Snacks","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"7567b06f-98fb-9400-8007-5d0357c345d9","schema":1480349193877},{"guid":"{ABDE892B-13A8-4d1b-88E6-365A6E755758}","blockID":"i107","enabled":true,"last_modified":1480349215173,"details":{"who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","created":"2012-06-14T13:54:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=764210","name":"RealPlayer Browser Record Plugin","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our <a href=\"http://support.mozilla.com/\">support site</a> for help."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"15.0.5","severity":1}],"prefs":[],"os":"WINNT","id":"e3b89e55-b35f-8694-6f0e-f856e57a191d","schema":1480349193877},{"guid":"/(\\{7aeae561-714b-45f6-ace3-4a8aed6e227b\\})|(\\{01e86e69-a2f8-48a0-b068-83869bdba3d0\\})|(\\{77f5fe49-12e3-4cf5-abb4-d993a0164d9e\\})/","blockID":"i436","enabled":true,"last_modified":1480349215147,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T15:04:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891606","name":"Visual Bee","why":"This add-on doesn't follow the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, changing Firefox default settings and not reverting them on uninstall. If you want to continue using this add-on, it can be enabled in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ad6dc811-ab95-46fa-4bff-42186c149980","schema":1480349193877},{"guid":"amo-validator-bypass@example.com","blockID":"i1058","enabled":true,"last_modified":1480349214743,"details":{"who":"All users who install this add-on.","created":"2015-11-24T09:03:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1227605","name":" AMO Validator Bypass","why":"This add-on is a proof of concept of a malicious add-on that bypasses the code validator."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"86e38e3e-a729-b5a2-20a8-4738b376eea6","schema":1480349193877},{"guid":"6lIy@T.edu","blockID":"i852","enabled":true,"last_modified":1480349214613,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:30:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","name":"unIsaless","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"39798bc2-9c75-f172-148b-13f3ca1dde9b","schema":1480349193877},{"guid":"{394DCBA4-1F92-4f8e-8EC9-8D2CB90CB69B}","blockID":"i100","enabled":true,"last_modified":1480349214568,"details":{"who":"All Firefox users who have Lightshot 2.5.0 installed.","created":"2012-06-05T09:24:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=761339","name":"Lightshot","why":"The Lightshot add-on, version 2.5.0, is causing widespread and frequent crashes in Firefox. Lightshot users are strongly recommended to update to version 2.6.0 as soon as possible."},"versionRange":[{"targetApplication":[],"minVersion":"2.5.0","maxVersion":"2.5.0","severity":1}],"prefs":[],"id":"57829ea2-5a95-1b6e-953c-7c4a7b3b21ac","schema":1480349193877},{"guid":"{a7f2cb14-0472-42a1-915a-8adca2280a2c}","blockID":"i686","enabled":true,"last_modified":1480349214537,"details":{"who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","created":"2014-08-06T16:35:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033809","name":"HomeTab","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"33a8f403-b2c8-cadf-e1ba-40b39edeaf18","schema":1480349193877},{"guid":"{CA8C84C6-3918-41b1-BE77-049B2BDD887C}","blockID":"i862","enabled":true,"last_modified":1480349214479,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T12:51:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131230","name":"Ebay Shopping Assistant by Spigot","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"9a9d6da2-90a1-5b71-8b24-96492d57dfd1","schema":1480349193877},{"guid":"update@firefox.com","blockID":"i374","enabled":true,"last_modified":1480349214427,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-06-18T13:58:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781088","name":"Premium Update (malware)","why":"This is a malicious extension that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bb388413-60ea-c9d6-9a3b-c90df950c319","schema":1480349193877},{"guid":"sqlmoz@facebook.com","blockID":"i350","enabled":true,"last_modified":1480349214360,"details":{"who":"All Firefox users who have this extension installed.","created":"2013-05-13T09:43:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=871610","name":"Mozilla Service Pack (malware)","why":"This extension is malware posing as Mozilla software. It hijacks Facebook accounts and spams other Facebook users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"715082e8-7a30-b27b-51aa-186c38e078f6","schema":1480349193877},{"guid":"iobitapps@mybrowserbar.com","blockID":"i562","enabled":true,"last_modified":1480349214299,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-02-27T10:00:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=948695","name":"IObit Apps Toolbar","why":"This add-on is installed silently and changes users settings without reverting them, in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"be9a54f6-20c1-7dee-3aea-300b336b2ae5","schema":1480349193877},{"guid":"{9e09ac65-43c0-4b9d-970f-11e2e9616c55}","blockID":"i376","enabled":true,"last_modified":1480349214246,"details":{"who":"All Firefox users who have installed this add-on.","created":"2013-06-18T14:16:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=857847","name":"The Social Networks (malware)","why":"This add-on is malware that hijacks Facebook accounts and posts content on it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"753638b4-65ca-6d71-f1f5-ce32ba2edf3b","schema":1480349193877},{"guid":"mozillahmpg@mozilla.org","blockID":"i140","enabled":true,"last_modified":1480349214216,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-09-17T16:04:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=791867","name":"Google YouTube HD Player (malware)","why":"This is a malicious add-on that tries to monetize on its users by embedding unauthorized affiliate codes on shopping websites, and sometimes redirecting users to alternate sites that could be malicious in nature."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"98150e2e-cb45-1fee-8458-28d3602ec2ec","schema":1480349193877},{"guid":"astrovia@facebook.com","blockID":"i489","enabled":true,"last_modified":1480349214157,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-25T12:40:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942699","name":"Facebook Security Service (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6f365ff4-e48f-8a06-d19d-55e19fba81f4","schema":1480349193877},{"guid":"{bbea93c6-64a3-4a5a-854a-9cc61c8d309e}","blockID":"i1126","enabled":true,"last_modified":1480349214066,"details":{"who":"All users who have this add-on installed.","created":"2016-02-29T21:58:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","name":"Tab Extension (malware)","why":"This is a malicious add-on that disables various security checks in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5acb9dcc-59d4-46d1-2a11-1194c4948239","schema":1480349193877},{"guid":"ffxtlbr@iminent.com","blockID":"i628","enabled":true,"last_modified":1480349214036,"details":{"who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","created":"2014-06-26T15:47:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","name":"Iminent Minibar","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"4387ad94-8500-d74d-68e3-20564a9aac9e","schema":1480349193877},{"guid":"{28387537-e3f9-4ed7-860c-11e69af4a8a0}","blockID":"i40","enabled":true,"last_modified":1480349214002,"details":{"who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","created":"2011-07-19T10:19:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","name":"MediaBar (2)","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"4.3.1.00","severity":1}],"prefs":[],"id":"ff95664b-93e4-aa73-ac20-5ffb7c87d8b7","schema":1480349193877},{"guid":"{41e5ef7a-171d-4ab5-8351-951c65a29908}","blockID":"i784","enabled":true,"last_modified":1480349213962,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-14T14:37:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"HelpSiteExpert","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0c05a0bb-30b4-979e-33a7-9f3955eba17d","schema":1480349193877},{"guid":"/^({2d7886a0-85bb-4bf2-b684-ba92b4b21d23}|{2fab2e94-d6f9-42de-8839-3510cef6424b}|{c02397f7-75b0-446e-a8fa-6ef70cfbf12b}|{8b337819-d1e8-48d3-8178-168ae8c99c36}|firefox@neurowise.info|firefox@allgenius.info)$/","blockID":"i762","enabled":true,"last_modified":1480349213913,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:58:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082599","name":"SaveSense, neurowise, allgenius","why":"These add-ons are silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c5439f55-ace5-ad73-1270-017c0ba7b2ce","schema":1480349193877},{"guid":"{462be121-2b54-4218-bf00-b9bf8135b23f}","blockID":"i226","enabled":true,"last_modified":1480349213879,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:27:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","name":"WhiteSmoke","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"994c6084-e864-0e4e-ac91-455083ee46c7","schema":1480349193877},{"guid":"firefox@browsefox.com","blockID":"i546","enabled":true,"last_modified":1480349213853,"details":{"who":"All Firefox users who have this add-on installed. If you want to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-01-30T12:26:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936244","name":"BrowseFox","why":"This add-on is silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"407d8c84-8939-cd28-b284-9b680e529bf6","schema":1480349193877},{"guid":"{6926c7f7-6006-42d1-b046-eba1b3010315}","blockID":"i382","enabled":true,"last_modified":1480349213825,"details":{"who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it again in the Add-ons Manager.","created":"2013-06-25T12:05:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844956","name":"appbario7","why":"This add-on is silently installed, bypassing the Firefox opt-in screen and violating our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"2367bd94-2bdd-c615-de89-023ba071a443","schema":1480349193877},{"guid":"faststartff@gmail.com","blockID":"i866","enabled":true,"last_modified":1480349213799,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T13:12:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131217","name":"Fast Start","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9e730bca-c7d1-da82-64f6-c74de216cb7d","schema":1480349193877},{"guid":"05dd836e-2cbd-4204-9ff3-2f8a8665967d@a8876730-fb0c-4057-a2fc-f9c09d438e81.com","blockID":"i468","enabled":true,"last_modified":1480349213774,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T14:43:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935135","name":"Trojan.DownLoader9.50268 (malware)","why":"This add-on appears to be part of a <a href=\"https://www.drwebhk.com/en/virus_techinfo/Trojan.DownLoader9.50268.html\">Trojan software</a> package."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2fd53d9b-7096-f1fb-fbcb-2b40a6193894","schema":1480349193877},{"guid":"jid1-0xtMKhXFEs4jIg@jetpack","blockID":"i586","enabled":true,"last_modified":1480349213717,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-03T15:50:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011286","name":"ep (malware)","why":"This add-on appears to be malware installed without user consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"50ca2179-83ab-1817-163d-39ed2a9fbd28","schema":1480349193877},{"guid":"/^({16e193c8-1706-40bf-b6f3-91403a9a22be}|{284fed43-2e13-4afe-8aeb-50827d510e20}|{5e3cc5d8-ed11-4bed-bc47-35b4c4bc1033}|{7429e64a-1fd4-4112-a186-2b5630816b91}|{8c9980d7-0f09-4459-9197-99b3e559660c}|{8f1d9545-0bb9-4583-bb3c-5e1ac1e2920c})$/","blockID":"i517","enabled":true,"last_modified":1480349213344,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:54:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","name":"Re-markit","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing the add-on, and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e88a28ab-5569-f06d-b0e2-15c51bb2a4b7","schema":1480349193877},{"guid":"safebrowse@safebrowse.co","blockID":"i782","enabled":true,"last_modified":1480349213319,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-12T14:20:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1097696","name":"SafeBrowse","why":"This add-on loads scripts with malicious code that appears intended to steal usernames, passwords, and other private information."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"edd81c91-383b-f041-d8f6-d0b9a90230bd","schema":1480349193877},{"guid":"{af95cc15-3b9b-45ae-8d9b-98d08eda3111}","blockID":"i492","enabled":true,"last_modified":1480349213294,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-02T12:45:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945126","name":"Facebook (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7064e9e2-fba4-7b57-86d7-6f4afbf6f560","schema":1480349193877},{"guid":"{84a93d51-b7a9-431e-8ff8-d60e5d7f5df1}","blockID":"i744","enabled":true,"last_modified":1480349213264,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:47:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","name":"Spigot Shopping Assistant","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"dbc7ef8b-2c48-5dae-73a0-f87288c669f0","schema":1480349193877},{"guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","blockID":"i918","enabled":true,"last_modified":1480349213231,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-02T09:58:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7f2a68f3-aa8a-ae41-1e48-d1f8f63d53c7","schema":1480349193877},{"guid":"831778-poidjao88DASfsAnindsd@jetpack","blockID":"i972","enabled":true,"last_modified":1480349213194,"details":{"who":"All users who have this add-on installed.","created":"2015-08-04T15:18:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190962","name":"Video patch (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"39471221-6926-e11b-175a-b28424d49bf6","schema":1480349193877},{"guid":"lbmsrvfvxcblvpane@lpaezhjez.org","blockID":"i342","enabled":true,"last_modified":1480349213128,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-06T16:18:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863385","name":"RapidFinda","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. It also appears to install itself both locally and globally, producing a confusing uninstall experience."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"98fb4536-07a4-d03a-f7c5-945acecc8203","schema":1480349193877},{"guid":"{babb9931-ad56-444c-b935-38bffe18ad26}","blockID":"i499","enabled":true,"last_modified":1480349213100,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:22:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946086","name":"Facebook Credits (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"be1d19fa-1662-322a-13e6-5fa5474f33a7","schema":1480349193877},{"guid":"{18d5a8fe-5428-485b-968f-b97b05a92b54}","blockID":"i802","enabled":true,"last_modified":1480349213074,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-15T10:52:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","name":"Astromenda Search Addon","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"bc846147-cdc1-141f-5846-b705c48bd6ed","schema":1480349193877},{"guid":"{b6ef1336-69bb-45b6-8cba-e578fc0e4433}","blockID":"i780","enabled":true,"last_modified":1480349213024,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-12T14:00:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Power-SW","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3b080157-2900-d071-60fe-52b0aa376cf0","schema":1480349193877},{"guid":"info@wxdownloadmanager.com","blockID":"i196","enabled":true,"last_modified":1480349212999,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-11-05T09:24:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b62597d0-d2cb-d597-7358-5143a1d13658","schema":1480349193877},{"guid":"{C3949AC2-4B17-43ee-B4F1-D26B9D42404D}","blockID":"i111","enabled":true,"last_modified":1480349212971,"details":{"who":"All Firefox users on Windows who have the RealPlayer Browser Record extension installed.","created":"2012-07-10T15:28:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=771802","name":"RealPlayer Browser Record Plugin","why":"The RealPlayer Browser Record extension is causing significant problems on Flash video sites like YouTube. This block automatically disables the add-on, but users can re-enable it from the Add-ons Manager if necessary.\r\n\r\nThis block shouldn't disable any other RealPlayer plugins, so watching RealPlayer content on the web should be unaffected.\r\n\r\nIf you still have problems playing videos on YouTube or elsewhere, please visit our <a href=\"http://support.mozilla.com/\">support site</a> for help."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"15.0.5","severity":1}],"prefs":[],"os":"WINNT","id":"d3f96257-7635-555f-ef48-34d426322992","schema":1480349193877},{"guid":"l@AdLJ7uz.net","blockID":"i728","enabled":true,"last_modified":1480349212911,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-16T16:34:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"GGoSavee","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"e6bfa340-7d8a-1627-5cdf-40c0c4982e9d","schema":1480349193877},{"guid":"{6b2a75c8-6e2e-4267-b955-43e25b54e575}","blockID":"i698","enabled":true,"last_modified":1480349212871,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-08-21T15:46:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052611","name":"BrowserShield","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"492e4e43-f89f-da58-9c09-d99528ee9ca9","schema":1480349193877},{"guid":"/^({65f9f6b7-2dae-46fc-bfaf-f88e4af1beca}|{9ed31f84-c8b3-4926-b950-dff74047ff79}|{0134af61-7a0c-4649-aeca-90d776060cb3}|{02edb56b-9b33-435b-b7df-b2843273a694}|{da51d4f6-3e7e-4ef8-b400-9198e0874606}|{b24577db-155e-4077-bb37-3fdd3c302bb5})$/","blockID":"i525","enabled":true,"last_modified":1480349212839,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:11:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","name":"KeyBar add-on","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and using multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"78562d79-9a64-c259-fb63-ce24e29bb141","schema":1480349193877},{"guid":"adsremoval@adsremoval.net","blockID":"i560","enabled":true,"last_modified":1480349212798,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-02-27T09:57:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=962793","name":"Ad Removal","why":"This add-on is silently installed and changes various user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"4d150ad4-dc22-9790-07a9-36e0a23f857f","schema":1480349193877},{"guid":"firefoxaddon@youtubeenhancer.com","blockID":"i445","enabled":true,"last_modified":1480349212747,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-04T16:53:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=911966","name":"YouTube Enhancer Plus (malware)","why":"This is a malicious add-on that imitates a popular video downloader extension, and attempts to hijack Facebook accounts. The add-on available in the add-ons site is safe to use."},"versionRange":[{"targetApplication":[],"minVersion":"208.7.0","maxVersion":"208.7.0","severity":3}],"prefs":[],"id":"41d75d3f-a57e-d5ad-b95b-22f5fa010b4e","schema":1480349193877},{"guid":"suchpony@suchpony.de","blockID":"i1264","enabled":true,"last_modified":1480349212719,"details":{"who":"All users who have version 1.6.7 or less of this add-on installed.","created":"2016-08-24T10:48:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"Suchpony (pre 1.6.8)","why":"Old versions of this add-on contained code from YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity.  Version 1.6.8 is now okay."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.6.7","severity":3}],"prefs":[],"id":"1bbf00f3-53b5-3777-43c7-0a0b11f9c433","schema":1480349193877},{"guid":"{336D0C35-8A85-403a-B9D2-65C292C39087}","blockID":"i224","enabled":true,"last_modified":1480349212655,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:22:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812292","name":"IB Updater","why":"This add-on is side-installed with other software, and blocks setting reversions attempted by users who want to recover their settings after they are hijacked by other add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c87666e6-ec9a-2f1e-ad03-a722d2fa2a25","schema":1480349193877},{"guid":"G4Ce4@w.net","blockID":"i718","enabled":true,"last_modified":1480349212277,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-02T12:21:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"YoutUbeAdBlaocke","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"3e1e9322-93e9-4ce1-41f5-46ad4ef1471b","schema":1480349193877},{"guid":"extension@Fast_Free_Converter.com","blockID":"i533","enabled":true,"last_modified":1480349212247,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T15:04:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949597","name":"FastFreeConverter","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"726f5645-c0bf-66dc-a97a-d072b46e63e7","schema":1480349193877},{"guid":"@stopad","blockID":"i1266","enabled":true,"last_modified":1480349212214,"details":{"who":"Users who have version 0.0.4 and earlier of the add-on installed.","created":"2016-08-30T12:24:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298780","name":"Stop Ads Addon","why":"Stop Ads sends each visited url to a third party server which is not necessary for the add-on to work or disclosed in a privacy policy or user opt-in.  Versions 0.0.4 and earlier are affected."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.0.4","severity":1}],"prefs":[],"id":"3d1893dd-2092-d1f7-03f3-9629b7d7139e","schema":1480349193877},{"guid":"703db0db-5fe9-44b6-9f53-c6a91a0ad5bd@7314bc82-969e-4d2a-921b-e5edd0b02cf1.com","blockID":"i519","enabled":true,"last_modified":1480349212183,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:57:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","name":"Re-markit","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing the add-on, and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a27d0f9f-7708-3d5f-82e1-e3f29e6098a0","schema":1480349193877},{"guid":"imbaty@taringamp3.com","blockID":"i662","enabled":true,"last_modified":1480349212157,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-07-10T15:39:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Taringa MP3 / Adobe Flash","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f43859d4-46b7-c028-4738-d40a73ddad7b","schema":1480349193877},{"guid":"{13c9f1f9-2322-4d5c-81df-6d4bf8476ba4}","blockID":"i348","enabled":true,"last_modified":1480349212102,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-08T15:55:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867359","name":"mywebsearch","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. It also fails to revert settings changes on removal.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"372cf3df-0810-85d8-b5d7-faffff309a11","schema":1480349193877},{"guid":"{a6e67e6f-8615-4fe0-a599-34a73fc3fba5}","blockID":"i346","enabled":true,"last_modified":1480349212077,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-06T17:06:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867333","name":"Startnow","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. Also, it doesn't reset its settings changes on uninstall.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1caf911c-ff2f-b0f6-0d32-29ef74be81bb","schema":1480349193877},{"guid":"garg_sms@yahoo.in","blockID":"i652","enabled":true,"last_modified":1480349212044,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:17:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Save My YouTube Day!, version 67.9","why":"Certain versions of the Save My YouTube Day! extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"67.9","maxVersion":"67.9","severity":3}],"prefs":[],"id":"e50c0189-a7cd-774d-702b-62eade1bf18e","schema":1480349193877},{"guid":"9518042e-7ad6-4dac-b377-056e28d00c8f@f1cc0a13-4df1-4d66-938f-088db8838882.com","blockID":"i308","enabled":true,"last_modified":1480349212020,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-02-28T13:48:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=846455","name":"Solid Savings","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"df25ee07-74d4-ccd9-dbbe-7eb053015144","schema":1480349193877},{"guid":"jufa098j-LKooapd9jasJ9jliJsd@jetpack","blockID":"i1000","enabled":true,"last_modified":1480349211979,"details":{"who":"All users who have this add-on installed.","created":"2015-09-07T14:00:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201163","name":"Secure Video (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c3a98025-0f4e-3bb4-b475-97329e7b1426","schema":1480349193877},{"guid":"{46eddf51-a4f6-4476-8d6c-31c5187b2a2f}","blockID":"i750","enabled":true,"last_modified":1480349211953,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:17:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","name":"Slick Savings","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9b4ef650-e1ad-d55f-c420-4f26dbb4139c","schema":1480349193877},{"guid":"{DAC3F861-B30D-40dd-9166-F4E75327FAC7}","blockID":"i924","enabled":true,"last_modified":1480349211896,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:28:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"be57998b-9e4d-1040-e6bb-ed9de056338d","schema":1480349193877},{"guid":"JMLv@njMaHh.org","blockID":"i790","enabled":true,"last_modified":1480349211841,"details":{"who":"All users who have this add-on installed.","created":"2014-11-24T14:14:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1103516","name":"YouttubeAdBlocke","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"070d5747-137d-8500-8713-cfc6437558a3","schema":1480349193877},{"guid":"istart_ffnt@gmail.com","blockID":"i888","enabled":true,"last_modified":1480349211785,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","created":"2015-04-10T16:27:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152553","name":"Istart","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"32fad759-38d9-dad9-2295-e44cc6887040","schema":1480349193877},{"guid":"gystqfr@ylgga.com","blockID":"i449","enabled":true,"last_modified":1480349211748,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-13T16:19:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912742","name":"Define Ext","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8fe8f509-c530-777b-dccf-d10d58ae78cf","schema":1480349193877},{"guid":"e9d197d59f2f45f382b1aa5c14d82@8706aaed9b904554b5cb7984e9.com","blockID":"i844","enabled":true,"last_modified":1480349211713,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T15:01:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128324","name":"Sense","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"f8f8695c-a356-a1d6-9291-502b377c63c2","schema":1480349193877},{"guid":"{184AA5E6-741D-464a-820E-94B3ABC2F3B4}","blockID":"i968","enabled":true,"last_modified":1480349211687,"details":{"who":"All users who have this add-on installed.","created":"2015-08-04T09:41:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1164243","name":"Java String Helper (malware)","why":"This is a malicious add-on that poses as a Java extension."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fac1d2cb-eed7-fcef-5d5a-43c556371bd7","schema":1480349193877},{"guid":"7d51fb17-b199-4d8f-894e-decaff4fc36a@a298838b-7f50-4c7c-9277-df6abbd42a0c.com","blockID":"i455","enabled":true,"last_modified":1480349211660,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-25T10:28:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=919792","name":"Video Console (malware)","why":"This is a malicious extension that hijacks Facebook accounts and posts spam to the users' friends."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dd4d2e17-4ce6-36b0-3035-93e9cc5846d4","schema":1480349193877},{"guid":"prositez@prz.com","blockID":"i764","enabled":true,"last_modified":1480349211628,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-29T16:43:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"ProfSitez","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"684ad4fd-2cbd-ce2a-34cd-bc66b20ac8af","schema":1480349193877},{"guid":"/^toolbar[0-9]*@findwide\\.com$/","blockID":"i874","enabled":true,"last_modified":1480349211601,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-03-04T14:54:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1082758","name":"FindWide Toolbars","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"a317ad9f-af4d-e086-4afd-cd5eead1ed62","schema":1480349193877},{"guid":"{25D77636-38B1-1260-887C-2D4AFA92D6A4}","blockID":"i536","enabled":true,"last_modified":1480349211555,"details":{"who":"All Firefox users who have this extension installed.","created":"2014-01-13T10:36:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=959279","name":"Microsoft DirectInput Object (malware)","why":"This is a malicious extension that is installed alongside a trojan. It hijacks searches on selected sites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cd174588-940e-f5b3-12ea-896c957bd4b3","schema":1480349193877},{"guid":"fdm_ffext@freedownloadmanager.org","blockID":"i216","enabled":true,"last_modified":1480349211163,"details":{"who":"All Firefox users who have installed version 1.5.7.5 of the Free Download Manager extension.","created":"2012-11-27T12:47:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=789700","name":"Free Download Manager","why":"Version 1.5.7.5 of the Free Download Manager extension is causing frequent crashes in recent versions of Firefox. Version 1.5.7.6 corrects this problem, but it is currently not available on addons.mozilla.org. We recommend all users to update to the new version once it becomes available."},"versionRange":[{"targetApplication":[],"minVersion":"1.5.7.5","maxVersion":"1.5.7.5","severity":1}],"prefs":[],"id":"736417a2-6161-9973-991a-aff566314733","schema":1480349193877},{"guid":"{badea1ae-72ed-4f6a-8c37-4db9a4ac7bc9}","blockID":"i543","enabled":true,"last_modified":1480349211119,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-01-28T14:28:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963809","name":"Address Bar Search","why":"This add-on is apparently malware that is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8c1dd68e-7df6-0c37-2f41-107745a7be54","schema":1480349193877},{"guid":"addon@gemaoff","blockID":"i1230","enabled":true,"last_modified":1480349211044,"details":{"who":"All users who have this add-on installed.","created":"2016-06-08T16:15:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker (addon@gemaoff)","why":"These add-ons are copies of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6bc49e9f-322f-9952-15a6-0a723a61c2d9","schema":1480349193877},{"guid":"{d87d56b2-1379-49f4-b081-af2850c79d8e}","blockID":"i726","enabled":true,"last_modified":1480349211007,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-13T16:01:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","name":"Website Xplorer Lite","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7b0895b4-dd4f-1c91-f4e3-31afdbdf3178","schema":1480349193877},{"guid":"OKitSpace@OKitSpace.es","blockID":"i469","enabled":true,"last_modified":1480349210982,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:35:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6a11aa68-0dae-5524-cc96-a5053a31c466","schema":1480349193877},{"guid":"{c96d1ae6-c4cf-4984-b110-f5f561b33b5a}","blockID":"i808","enabled":true,"last_modified":1480349210956,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-19T09:36:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Better Web","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0413d46b-8205-d9e0-65df-4caa3e6355c4","schema":1480349193877},{"guid":"lightningnewtab@gmail.com","blockID":"i554","enabled":true,"last_modified":1480349210931,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","created":"2014-02-19T15:28:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974041","name":"Lightning SpeedDial","why":"This add-on is silently installed in Firefox and includes a companion extension that also performs malicious actions."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"875513e1-e6b1-a383-2ec5-eb4deb87eafc","schema":1480349193877},{"guid":"/^ext@bettersurfplus/","blockID":"i506","enabled":true,"last_modified":1480349210905,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-10T15:10:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","name":"BetterSurf (malware)","why":"This add-on appears to be malware and is installed silently in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b4da06d2-a0fd-09b6-aadb-7e3b29c3be3a","schema":1480349193877},{"guid":"thefoxonlybetter@quicksaver","blockID":"i706","enabled":true,"last_modified":1480349210859,"details":{"who":"All Firefox users who have any of these versions of the add-on installed.","created":"2014-08-27T14:50:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","name":"The Fox, Only Better (malicious versions)","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"1.6.160","maxVersion":"1.6.160","severity":3}],"prefs":[],"id":"bb2b2114-f8e7-511d-04dc-abc8366712cc","schema":1480349193877},{"guid":"CortonExt@ext.com","blockID":"i336","enabled":true,"last_modified":1480349210805,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-04-22T16:10:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=864551","name":"CortonExt","why":"This add-on is reported to be installed without user consent, with a non-descriptive name, and ties a number of browser features to Amazon URLs, probably monetizing on affiliate codes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a5bdd05d-eb4c-ce34-9909-a677b4322384","schema":1480349193877},{"guid":"1chtw@facebook.com","blockID":"i430","enabled":true,"last_modified":1480349210773,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-05T16:42:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","name":" Mozilla Service Pack (malware)","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bf1e31c7-ba50-1075-29ae-47368ac1d6de","schema":1480349193877},{"guid":"lrcsTube@hansanddeta.com","blockID":"i344","enabled":true,"last_modified":1480349210718,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-06T16:44:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866944","name":"LyricsTube","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"424b9f39-d028-b1fb-d011-d8ffbbd20fe9","schema":1480349193877},{"guid":"{341f4dac-1966-47ff-aacf-0ce175f1498a}","blockID":"i356","enabled":true,"last_modified":1480349210665,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-23T14:45:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=868129","name":"MyFreeGames","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"560e08b1-3471-ad34-8ca9-463f5ca5328c","schema":1480349193877},{"guid":"/^({d6e79525-4524-4707-9b97-1d70df8e7e59}|{ddb4644d-1a37-4e6d-8b6e-8e35e2a8ea6c}|{e55007f4-80c5-418e-ac33-10c4d60db01e}|{e77d8ca6-3a60-4ae9-8461-53b22fa3125b}|{e89a62b7-248e-492f-9715-43bf8c507a2f}|{5ce3e0cb-aa83-45cb-a7da-a2684f05b8f3})$/","blockID":"i518","enabled":true,"last_modified":1480349210606,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:56:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947509","name":"Re-markit","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing the add-on, and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"145b0f22-501e-39eb-371e-ec8342a5add9","schema":1480349193877},{"guid":"{72b98dbc-939a-4e0e-b5a9-9fdbf75963ef}","blockID":"i772","enabled":true,"last_modified":1480349210536,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-31T16:15:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"SitezExpert","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"386cb2c9-e674-ce2e-345f-d30a785f90c5","schema":1480349193877},{"guid":"hha8771ui3-Fo9j9h7aH98jsdfa8sda@jetpack","blockID":"i970","enabled":true,"last_modified":1480349210477,"details":{"who":"All users who have this add-on installed.","created":"2015-08-04T15:15:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190963","name":"Video fix (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3ca577d8-3685-4ba9-363b-5b2d8d8dd608","schema":1480349193877},{"guid":"{7e8a1050-cf67-4575-92df-dcc60e7d952d}","blockID":"i478","enabled":true,"last_modified":1480349210416,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-08T15:42:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935796","name":"SweetPacks","why":"This add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1519eb45-fcaa-b531-490d-fe366490ed45","schema":1480349193877},{"guid":"/^({66b103a7-d772-4fcd-ace4-16f79a9056e0}|{6926c7f7-6006-42d1-b046-eba1b3010315}|{72cabc40-64b2-46ed-8648-26d831761150}|{73ee2cf2-7b76-4c49-b659-c3d8cf30825d}|{ca6446a5-73d5-4c35-8aa1-c71dc1024a18}|{5373a31d-9410-45e2-b299-4f61428f0be4})$/","blockID":"i521","enabled":true,"last_modified":1480349210351,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:14:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","name":"appbario7","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"983cb7fe-e0b4-6a2e-f174-d2670876b2cd","schema":1480349193877},{"guid":"{dd6b651f-dfb9-4142-b0bd-09912ad22674}","blockID":"i400","enabled":true,"last_modified":1480349210301,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:16:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"975d2126-f727-f5b9-ca01-b83345b80c56","schema":1480349193877},{"guid":"25p@9eAkaLq.net","blockID":"i730","enabled":true,"last_modified":1480349210275,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-16T16:35:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"YYOutoubeAdBlocke","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"5a0c5818-693f-43ae-f85a-c6928d9c2cc4","schema":1480349193877},{"guid":"thunder@xunlei.com","blockID":"i568","enabled":true,"last_modified":1480349210242,"details":{"who":"All Firefox users who have versions 2.0.6 or lower of the Thunder add-on installed on Mac OS.","created":"2014-03-28T15:48:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=988490","name":"Thunder, 2.0.6 and lower","why":"Versions 2.0.6 and lower of the Thunder add-on are causing startup crashes on Mac OS."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.0.6","severity":1}],"prefs":[],"os":"Darwin","id":"cee484f6-2d5d-f708-88be-cd12d825a79a","schema":1480349193877},{"guid":"tmbepff@trendmicro.com","blockID":"i1222","enabled":true,"last_modified":1480349209818,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-24T12:10:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","name":"Trend Micro BEP 9.1.0.1035 and lower","why":"Add-on  is causing a high-frequency crash in Firefox"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"9.1.0.1035","severity":1}],"prefs":[],"id":"8045c799-486a-927c-b972-b9da1c2dab2f","schema":1480349193877},{"guid":"pricepeep@getpricepeep.com","blockID":"i220","enabled":true,"last_modified":1480349209794,"details":{"who":"All Firefox users who have Pricepeed below 2.1.0.20 installed.","created":"2012-11-29T16:18:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811433","name":"PricePeep","why":"Versions older than 2.1.0.20 of the PricePeep add-on were silently side-installed with other software, injecting advertisements in Firefox. Versions 2.1.0.20 and above don't have the install problems are not blocked."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.1.0.19.99","severity":1}],"prefs":[],"id":"227b9a8d-c18d-239c-135e-d79e614fe392","schema":1480349193877},{"guid":"ytd@mybrowserbar.com","blockID":"i360","enabled":true,"last_modified":1480349209770,"details":{"who":"All Firefox users who have this add-on installed. Users who want to enable the add-on again can do so in the Add-ons Manager tab.","created":"2013-06-06T12:29:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845969","name":"YouTube Downloader","why":"The installer that includes this add-on performs Firefox settings changes separately from the add-on install, making it very difficult to opt-out to these changes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"63669524-93fe-4823-95ba-37cf6cbd4914","schema":1480349193877},{"guid":"hoverst@facebook.com","blockID":"i498","enabled":true,"last_modified":1480349209745,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:17:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946029","name":"Adobe Flash Player (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2b25ba3e-45db-0e6c-965a-3acda1a44117","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i606","enabled":true,"last_modified":1480349209713,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:20:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.13","maxVersion":"3.15.13.*","severity":1}],"prefs":[],"id":"c3d88e22-386a-da3b-8aba-3cb526e08053","schema":1480349193877},{"guid":"advance@windowsclient.com","blockID":"i508","enabled":true,"last_modified":1480349209674,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-16T10:15:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950773","name":"Microsoft .NET Framework Assistant (malware)","why":"This is not the <a href=\"https://addons.mozilla.org/addon/microsoft-net-framework-assist/\">Microsoft .NET Framework Assistant</a> created and distributed by Microsoft. It is a malicious extension that is distributed under the same name to trick users into installing it, and turns users into a botnet that conducts SQL injection attacks on visited websites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e5d30a74-732e-c3fa-f13b-097ee28d4b27","schema":1480349193877},{"guid":"{5eeb83d0-96ea-4249-942c-beead6847053}","blockID":"i756","enabled":true,"last_modified":1480349209625,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:30:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080846","name":"SmarterPower","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e101dbc0-190c-f6d8-e168-0c1380581cc9","schema":1480349193877},{"guid":"/^({7e8a1050-cf67-4575-92df-dcc60e7d952d}|{b3420a9c-a397-4409-b90d-bcf22da1a08a}|{eca6641f-2176-42ba-bdbe-f3e327f8e0af}|{707dca12-3f99-4d94-afea-06dcc0ae0108}|{aea20431-87fc-40be-bc5b-18066fe2819c}|{30ee6676-1ba6-455a-a7e8-298fa863a546})$/","blockID":"i523","enabled":true,"last_modified":1480349209559,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:42:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","name":"SweetPacks","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a3a6bc8e-46a1-b3d5-1b20-58b90ba099c3","schema":1480349193877},{"guid":"{e0352044-1439-48ba-99b6-b05ed1a4d2de}","blockID":"i710","enabled":true,"last_modified":1480349209491,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-09-30T15:28:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Site Counselor","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b8fedf07-dcaf-f0e3-b42b-32db75c4c304","schema":1480349193877},{"guid":"{bee6eb20-01e0-ebd1-da83-080329fb9a3a}","blockID":"i642","enabled":true,"last_modified":1480349209443,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:02:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Flash and Video Download, between 40.10.1 and 44.10.1","why":"Certain versions of the Flash and Video Download extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"40.10.1","maxVersion":"44.10.1","severity":3}],"prefs":[],"id":"16db0c85-02ec-4f7c-24a3-a504fbce902d","schema":1480349193877},{"guid":"addlyrics@addlyrics.net","blockID":"i426","enabled":true,"last_modified":1480349209383,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-07-09T15:25:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=891605","name":"Add Lyrics","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"81678e9e-ebf0-47d6-e409-085c25e67c7e","schema":1480349193877},{"guid":"{7b1bf0b6-a1b9-42b0-b75d-252036438bdc}","blockID":"i638","enabled":true,"last_modified":1480349209260,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-08T16:07:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036137","name":"YouTube High Definition 27.8 and 27.9","why":"Versions 27.8 and 27.9 of the YouTube High Definition extension weren't developed by the original developer, and are likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"27.8","maxVersion":"27.9","severity":3}],"prefs":[],"id":"ffdc8ba0-d548-dc5b-d2fd-79a20837124b","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i610","enabled":true,"last_modified":1480349209128,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:21:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.22","maxVersion":"3.15.22.*","severity":1}],"prefs":[],"id":"935dfec3-d017-5660-db5b-94ae7cea6e5f","schema":1480349193877},{"guid":"info@allpremiumplay.info","blockID":"i163","enabled":true,"last_modified":1480349209076,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-10-29T16:40:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec-C (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6afbf9b8-ae3a-6a48-0f6c-7a3e065ec043","schema":1480349193877},{"guid":"now.msn.com@services.mozilla.org","blockID":"i490","enabled":true,"last_modified":1480349209021,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-27T08:06:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=926378","name":"MSNNow (discontinued social provider)","why":"As part of their ongoing work to fine-tune their editorial mix, msnNOW has decided that msnNOW will stop publishing on Dec. 3, 2013. Rather than having a single home for trending content, they will continue integrating that material throughout all MSN channels. A big thank you to everyone who followed msnNOW stories using the Firefox sidebar"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"de7d699d-016d-d973-5e39-52568de6ffde","schema":1480349193877},{"guid":"fftoolbar2014@etech.com","blockID":"i858","enabled":true,"last_modified":1480349208988,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-11T15:32:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131078","name":"FF Toolbar","why":"This add-on is silently installed and changes users' settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"6877bf40-9e45-7017-4dac-14d09e7f0ef6","schema":1480349193877},{"guid":"mbrnovone@facebook.com","blockID":"i477","enabled":true,"last_modified":1480349208962,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-08T15:35:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=936249","name":"Mozilla Security Service (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"758c2503-766d-a2f5-4c58-7cea93acfe05","schema":1480349193877},{"guid":"{739df940-c5ee-4bab-9d7e-270894ae687a}","blockID":"i530","enabled":true,"last_modified":1480349208933,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:49:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949558","name":"WhiteSmoke New","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f8097aa6-3009-6dfc-59df-353ba6b1142b","schema":1480349193877},{"guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","blockID":"i115","enabled":true,"last_modified":1480349208904,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-08-01T13:53:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=779014","name":"Adobe Flash Player (malware)","why":"This extension is malware that is installed under false pretenses, and it conducts attacks against certain video websites."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aef9312d-5f2e-a44d-464d-6113394148e3","schema":1480349193877},{"guid":"g99hiaoekjoasiijdkoleabsy278djasi@jetpack","blockID":"i1022","enabled":true,"last_modified":1480349208877,"details":{"who":"All users who have this add-on installed.","created":"2015-09-28T15:23:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208708","name":"WatchIt (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"25e057ea-f500-67df-d078-ec3f37f99036","schema":1480349193877},{"guid":"firefoxaddon@youtubeenhancer.com","blockID":"i636","enabled":true,"last_modified":1480349208851,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-08T15:58:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033120","name":"YoutubeEnhancer - Firefox","why":"Version 199.7.0 of the YoutubeEnhancer extension isn't developed by the original developer, and is likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"199.7.0","maxVersion":"199.7.0","severity":3}],"prefs":[],"id":"204a074b-da87-2784-f15b-43a9ea9a6b36","schema":1480349193877},{"guid":"extacylife@a.com","blockID":"i505","enabled":true,"last_modified":1480349208823,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-09T15:08:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947741","name":"Facebook Haber (malware)","why":"This is a malicious extension that hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5acadb8d-d3be-e0e0-4656-9107f9de0ea9","schema":1480349193877},{"guid":"{746505DC-0E21-4667-97F8-72EA6BCF5EEF}","blockID":"i842","enabled":true,"last_modified":1480349208766,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:45:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128325","name":"Shopper-Pro","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5f19c5fb-1c78-cbd6-8a03-1678efb54cbc","schema":1480349193877},{"guid":"{51c77233-c0ad-4220-8388-47c11c18b355}","blockID":"i580","enabled":true,"last_modified":1480349208691,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","created":"2014-04-30T13:55:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004132","name":"Browser Utility","why":"This add-on is silently installed into Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.1.9999999","severity":1}],"prefs":[],"id":"daa2c60a-5009-2c65-a432-161d50bef481","schema":1480349193877},{"guid":"{a2bfe612-4cf5-48ea-907c-f3fb25bc9d6b}","blockID":"i712","enabled":true,"last_modified":1480349208027,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-09-30T15:28:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Website Xplorer","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"13450534-93d7-f2a2-7f0a-e4e3948c4dc1","schema":1480349193877},{"guid":"ScorpionSaver@jetpack","blockID":"i539","enabled":true,"last_modified":1480349207972,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enable it in the Add-ons Manager.","created":"2014-01-28T14:00:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963826","name":"ScorpionSaver","why":"This add-on is being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3499c968-6e8b-37f1-5f6e-2384807c2a6d","schema":1480349193877},{"guid":"unblocker20@unblocker.yt","blockID":"i1212","enabled":true,"last_modified":1480349207912,"details":{"who":"All users who have this add-on installed.","created":"2016-05-05T18:13:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker 2.0","why":"This add-on is a copy of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.0.0","severity":3}],"prefs":[],"id":"57785030-909f-e985-2a82-8bd057781227","schema":1480349193877},{"guid":"{D19CA586-DD6C-4a0a-96F8-14644F340D60}","blockID":"i42","enabled":true,"last_modified":1480349207877,"details":{"who":"Users of McAfee ScriptScan versions 14.4.0 and below for all versions of Firefox and SeaMonkey.","created":"2011-10-03T09:38:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=690184","name":"McAfee ScriptScan","why":"This add-on causes a high volume of crashes."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"14.4.0","severity":1}],"prefs":[],"id":"1d35ac9d-49df-23cf-51f5-f3c228ad0dc9","schema":1480349193877},{"guid":"gjhrjenrengoe@jfdnkwelfwkm.com","blockID":"i1042","enabled":true,"last_modified":1480349207840,"details":{"who":"All users who have this add-on installed.","created":"2015-10-07T13:12:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212174","name":"Avant Player (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d6453893-becc-7617-2050-0db284e0e0db","schema":1480349193877},{"guid":"/^(@9338379C-DD5C-4A45-9A36-9733DC806FAE|9338379C-DD5C-4A45-9A36-9733DC806FAE|@EBC7B466-8A28-4061-81B5-10ACC05FFE53|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4222|@bd6a97c0-4b18-40ed-bce7-3b7d3309e3c4|@b2d6a97c0-4b18-40ed-bce7-3b7d3309e3c4222)$/","blockID":"i1079","enabled":true,"last_modified":1480349207815,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2016-01-18T12:32:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240597","name":"Default SearchProtected (malware)","why":"These add-ons are malicious, manipulating registry and search settings for users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"ddc5237e-42e4-1bf1-54d3-a5e5799dd828","schema":1480349193877},{"guid":"{33e0daa6-3af3-d8b5-6752-10e949c61516}","blockID":"i282","enabled":true,"last_modified":1480349207789,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-02-15T12:19:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835683","name":"Complitly","why":"This add-on violates our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">add-on guidelines</a>, bypassing the third party opt-in screen."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.1.999","severity":1}],"prefs":[],"id":"1f94bc8d-9d5f-c8f5-45c0-ad1f6e147c71","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i608","enabled":true,"last_modified":1480349207761,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:20:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.18","maxVersion":"3.15.20.*","severity":1}],"prefs":[],"id":"e7d50ff2-5948-d571-6711-37908ccb863f","schema":1480349193877},{"guid":"chiang@programmer.net","blockID":"i340","enabled":true,"last_modified":1480349207736,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-04-30T07:44:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=867156","name":"Cache Manager (malware)","why":"This is a malicious add-on that logs keyboard input and sends it to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d50d0434-78e4-faa7-ce2a-9b0a8bb5120e","schema":1480349193877},{"guid":"{63eb5ed4-e1b3-47ec-a253-f8462f205350}","blockID":"i786","enabled":true,"last_modified":1480349207705,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-18T12:33:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"FF-Plugin","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"ca4558a2-8ce4-3ca0-3d29-63019f680c8c","schema":1480349193877},{"guid":"jid1-4vUehhSALFNqCw@jetpack","blockID":"i634","enabled":true,"last_modified":1480349207680,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-04T14:13:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","name":"YouTube Plus Plus 99.7","why":"Version 99.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"99.7","maxVersion":"99.7","severity":3}],"prefs":[],"id":"a6d017cb-e33f-2239-4e42-ab4e7cfb19fe","schema":1480349193877},{"guid":"{aab02ab1-33cf-4dfa-8a9f-f4e60e976d27}","blockID":"i820","enabled":true,"last_modified":1480349207654,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-13T09:27:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Incredible Web","why":"This add-on is silently installed into users' systems without their consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"847ecc6e-1bc1-f7ff-e1d5-a76e6b8447d2","schema":1480349193877},{"guid":"torntv@torntv.com","blockID":"i320","enabled":true,"last_modified":1480349207608,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-20T16:35:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","name":"TornTV","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"cdd492b8-8101-74a9-5760-52ff709fd445","schema":1480349193877},{"guid":"crossriderapp12555@crossrider.com","blockID":"i674","enabled":true,"last_modified":1480349207561,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-07-22T16:26:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=877836","name":"JollyWallet","why":"The add-on is silently installed, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d4467e20-0f71-f0e0-8cd6-40c82b6c7379","schema":1480349193877},{"guid":"pluggets@gmail.com","blockID":"i435","enabled":true,"last_modified":1480349207535,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T13:12:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903544","name":"Facebook Pluggets Plugin (malware)","why":"This add-on is malware that hijacks users' Facebook accounts and posts spam on their behalf. "},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3a63fd92-9290-02fb-a2e8-bc1b4424201a","schema":1480349193877},{"guid":"344141-fasf9jas08hasoiesj9ia8ws@jetpack","blockID":"i1038","enabled":true,"last_modified":1480349207485,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:42:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211169","name":"Video Plugin (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f7986b7b-9b5a-d372-8147-8b4bd6f5a29b","schema":1480349193877},{"guid":"/^brasilescape.*\\@facebook\\.com$//","blockID":"i485","enabled":true,"last_modified":1480349207424,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T15:57:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938835","name":"Facebook Video Pack (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"17a2bf85-b44a-4745-1b48-8be0c151d697","schema":1480349193877},{"guid":"meOYKQEbBBjH5Ml91z0p9Aosgus8P55bjTa4KPfl@jetpack","blockID":"i998","enabled":true,"last_modified":1480349207370,"details":{"who":"All users who have this add-on installed.","created":"2015-09-07T13:54:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201164","name":"Smooth Player (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"30c3e511-9e8d-15ee-0867-d61047e56515","schema":1480349193877},{"guid":"{8dc5c42e-9204-2a64-8b97-fa94ff8a241f}","blockID":"i770","enabled":true,"last_modified":1480349207320,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-30T14:52:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","name":"Astrmenda Search","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"8a9c7702-0349-70d6-e64e-3a666ab084c6","schema":1480349193877},{"guid":"savingsslider@mybrowserbar.com","blockID":"i752","enabled":true,"last_modified":1480349207290,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:18:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963788","name":"Slick Savings","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9b1faf30-5725-7847-d993-b5cdaabc9829","schema":1480349193877},{"guid":"youtubeunblocker__web@unblocker.yt","blockID":"i1129","enabled":true,"last_modified":1480349207262,"details":{"who":"All users who have this add-on installed.","created":"2016-03-01T21:20:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aa246b36-0a80-81e3-2129-4847e872d5fe","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i612","enabled":true,"last_modified":1480349206818,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:23:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.24","maxVersion":"3.15.24.*","severity":1}],"prefs":[],"id":"e0ff9df4-60e4-dbd0-8018-57f395e6610a","schema":1480349193877},{"guid":"{1e4ea5fc-09e5-4f45-a43b-c048304899fc}","blockID":"i812","enabled":true,"last_modified":1480349206784,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-06T13:22:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Great Finder","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ea40b9f-2423-a2fd-a5e9-4ec1df2715f4","schema":1480349193877},{"guid":"psid-vhvxQHMZBOzUZA@jetpack","blockID":"i70","enabled":true,"last_modified":1480349206758,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-02-23T13:44:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=730059","name":"PublishSync (malware)","why":"Add-on spams Facebook accounts and blocks Facebook warnings."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f1528b02-7cef-0e80-f747-8bbf1f0f2f06","schema":1480349193877},{"guid":"{B18B1E5C-4D81-11E1-9C00-AFEB4824019B}","blockID":"i447","enabled":true,"last_modified":1480349206733,"details":{"who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","created":"2013-09-06T16:00:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","name":"My Smart Tabs","why":"This add-on is installed silently, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"40332fae-0444-a141-ade9-8d9e50370f56","schema":1480349193877},{"guid":"crossriderapp8812@crossrider.com","blockID":"i314","enabled":true,"last_modified":1480349206708,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-06T14:14:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835665","name":"Coupon Companion","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"06c07e28-0a34-e5ee-e724-491a2f6ce586","schema":1480349193877},{"guid":"/^(ffxtlbr@mixidj\\.com|{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}|{67097627-fd8e-4f6b-af4b-ecb65e50112e}|{f6f0f973-a4a3-48cf-9a7a-b7a69c30d71a}|{a3d0e35f-f1da-4ccb-ae77-e9d27777e68d}|{1122b43d-30ee-403f-9bfa-3cc99b0caddd})$/","blockID":"i540","enabled":true,"last_modified":1480349206678,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-01-28T14:07:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","name":"MixiDJ (malware)","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4c03ddda-bb3f-f097-0a7b-b7b77b050584","schema":1480349193877},{"guid":"hansin@topvest.id","blockID":"i836","enabled":true,"last_modified":1480349206628,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:17:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130406","name":"Inside News (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0945a657-f28d-a02c-01b2-5115b3f90d7a","schema":1480349193877},{"guid":"lfind@nijadsoft.net","blockID":"i358","enabled":true,"last_modified":1480349206603,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-24T14:09:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=874131","name":"Lyrics Finder","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"2307f11c-6216-0dbf-a464-b2921055ce2b","schema":1480349193877},{"guid":"plugin@getwebcake.com","blockID":"i484","enabled":true,"last_modified":1480349206578,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-14T09:55:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=938264","name":"WebCake","why":"This add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> and is broadly considered to be malware. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"2865addd-da1c-20c4-742f-6a2270da2e78","schema":1480349193877},{"guid":"{c0c2693d-2ee8-47b4-9df7-b67a0ee31988}","blockID":"i354","enabled":true,"last_modified":1480349206525,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-05-23T14:31:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=837838","name":"Mixi DJ","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n\r\nUsers who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"03a745c3-0ee7-e262-ba31-62d4f78ddb62","schema":1480349193877},{"guid":"/^({7316e43a-3ebd-4bb4-95c1-9caf6756c97f}|{0cc09160-108c-4759-bab1-5c12c216e005}|{ef03e721-f564-4333-a331-d4062cee6f2b}|{465fcfbb-47a4-4866-a5d5-d12f9a77da00}|{7557724b-30a9-42a4-98eb-77fcb0fd1be3}|{b7c7d4b0-7a84-4b73-a7ef-48ef59a52c3b})$/","blockID":"i520","enabled":true,"last_modified":1480349206491,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:11:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947485","name":"appbario7","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed and using multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e3901c48-9c06-fecb-87d3-efffd9940c22","schema":1480349193877},{"guid":"{354dbb0a-71d5-4e9f-9c02-6c88b9d387ba}","blockID":"i538","enabled":true,"last_modified":1480349206465,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-01-27T10:13:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964081","name":"Show Mask ON (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aad90253-8921-b5df-3658-45a70d75f3d7","schema":1480349193877},{"guid":"{8E9E3331-D360-4f87-8803-52DE43566502}","blockID":"i461","enabled":true,"last_modified":1480349206437,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-10-17T16:10:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=906071","name":"Updater By SweetPacks","why":"This is a companion add-on for the SweetPacks Toolbar which is <a href=\"https://addons.mozilla.org/firefox/blocked/i392\">blocked</a> due to guideline violations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ae8cca6e-4258-545f-9a69-3d908264a701","schema":1480349193877},{"guid":"info@bflix.info","blockID":"i172","enabled":true,"last_modified":1480349206384,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-10-30T13:39:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","name":"Bflix (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7a9062f4-218d-51d2-9b8c-b282e6eada4f","schema":1480349193877},{"guid":"{dff137ae-1ffd-11e3-8277-b8ac6f996f26}","blockID":"i450","enabled":true,"last_modified":1480349206312,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-18T16:19:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=917861","name":"Addons Engine (malware)","why":"This is add-on is malware that silently redirects popular search queries to a third party."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8e583fe4-1c09-9bea-2473-faecf3260685","schema":1480349193877},{"guid":"12x3q@3244516.com","blockID":"i493","enabled":true,"last_modified":1480349206286,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-02T12:49:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=939254","name":"BetterSurf (malware)","why":"This add-on appears to be malware and is installed silently in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"af2a9e74-3753-9ff1-d899-5d1e79ed3dce","schema":1480349193877},{"guid":"{20AD702C-661E-4534-8CE9-BA4EC9AD6ECC}","blockID":"i626","enabled":true,"last_modified":1480349206261,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-19T15:16:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1027886","name":"V-Bates","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"9b9ccabe-8f9a-e3d1-a689-1aefba1f33b6","schema":1480349193877},{"guid":"{c5e48979-bd7f-4cf7-9b73-2482a67a4f37}","blockID":"i736","enabled":true,"last_modified":1480349206231,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:22:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080842","name":"ClearThink","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6e8b3e4f-2f59-cde3-e6d2-5bc6e216c506","schema":1480349193877},{"guid":"{41339ee8-61ed-489d-b049-01e41fd5d7e0}","blockID":"i810","enabled":true,"last_modified":1480349206165,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-23T10:32:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"FireWeb","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a35f2ca6-aec4-c01d-170e-650258ebcd2c","schema":1480349193877},{"guid":"jid0-l9BxpNUhx1UUgRfKigWzSfrZqAc@jetpack","blockID":"i640","enabled":true,"last_modified":1480349206133,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-07-09T14:35:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036640","name":"Bitcoin Mining Software","why":"This add-on attempts to gather private user data and send it to a remote location. It doesn't appear to be very effective at it, but its malicious nature is undeniable."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8fe3c35e-1a6f-a89a-fa96-81bda3b71db1","schema":1480349193877},{"guid":"{845cab51-d8d2-472f-8bd9-2b44642d97c2}","blockID":"i460","enabled":true,"last_modified":1480349205746,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-10-17T15:50:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=927456","name":"Vafmusic9","why":"This add-on is silently installed and handles users' settings, violating some of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8538ccb4-3b71-9858-3f6d-c0fff7af58b0","schema":1480349193877},{"guid":"SpecialSavings@SpecialSavings.com","blockID":"i676","enabled":true,"last_modified":1480349205688,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-07-22T16:31:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881511","name":"SpecialSavings","why":"This is add-on is generally considered to be unwanted and is probably silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5e921810-fc3a-0729-6749-47e38ad10a22","schema":1480349193877},{"guid":"afurladvisor@anchorfree.com","blockID":"i434","enabled":true,"last_modified":1480349205645,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T11:26:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","name":"Hotspot Shield Helper","why":"This add-on bypasses the external install opt in screen in Firefox, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"083585eb-d7e7-e228-5fbf-bf35c52044e4","schema":1480349193877},{"guid":"addonhack@mozilla.kewis.ch","blockID":"i994","enabled":true,"last_modified":1480349205584,"details":{"who":"All users who have this add-on installed.","created":"2015-09-01T15:32:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1200848","name":"Addon Hack","why":"This add-on is a proof of concept of malicious behavior in an add-on. In itself it doesn't cause any harm, but it still needs to be blocked for security reasons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"81f75571-ca2a-0e50-a925-daf2037ce63c","schema":1480349193877},{"guid":"info@thebflix.com","blockID":"i174","enabled":true,"last_modified":1480349205526,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-10-30T13:40:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806802","name":"Bflix (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"811a61d4-9435-133e-6262-fb72486c36b0","schema":1480349193877},{"guid":"{EEE6C361-6118-11DC-9C72-001320C79847}","blockID":"i392","enabled":true,"last_modified":1480349205455,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T12:38:45Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","name":"SweetPacks Toolbar","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c1dc6607-4c0a-4031-9f14-70ef1ae1edcb","schema":1480349193877},{"guid":"/^(4cb61367-efbf-4aa1-8e3a-7f776c9d5763@cdece6e9-b2ef-40a9-b178-291da9870c59\\.com|0efc9c38-1ec7-49ed-8915-53a48b6b7600@e7f17679-2a42-4659-83c5-7ba961fdf75a\\.com|6be3335b-ef79-4b0b-a0ba-b87afbc6f4ad@6bbb4d2e-e33e-4fa5-9b37-934f4fb50182\\.com)$/","blockID":"i531","enabled":true,"last_modified":1480349205287,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T15:01:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","name":"Feven","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and using multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"46aa79a9-d329-f713-d4f2-07d31fe7071e","schema":1480349193877},{"guid":"afext@anchorfree.com","blockID":"i466","enabled":true,"last_modified":1480349205108,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T13:32:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=933988","name":"Hotspot Shield Extension","why":"This add-on doesn't respect user choice, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8176f879-bd73-5468-e908-2d7cfc115ac2","schema":1480349193877},{"guid":"{FCE04E1F-9378-4f39-96F6-5689A9159E45}","blockID":"i920","enabled":true,"last_modified":1480349204978,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:26:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"eb191ff0-20f4-6e04-4344-d880af4faf51","schema":1480349193877},{"guid":"{9CE11043-9A15-4207-A565-0C94C42D590D}","blockID":"i503","enabled":true,"last_modified":1480349204951,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-06T11:58:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947384","name":"XUL Cache (malware)","why":"This is a malicious extension that uses a deceptive name to stay in users' systems."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dcdae267-8d3a-5671-dff2-f960febbbb20","schema":1480349193877},{"guid":"/^[a-z0-9]+@foxysecure[a-z0-9]*\\.com$/","blockID":"i766","enabled":true,"last_modified":1480349204925,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-10-30T14:22:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088615","name":"Fox Sec 7","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"503fbd7c-04cd-65f3-9d0e-3ecf427b4a8f","schema":1480349193877},{"guid":"/^(jid1-W4CLFIRExukJIFW@jetpack|jid1-W4CLFIRExukJIFW@jetpack_1|jid1-W3CLwrP[a-z]+@jetpack)$/","blockID":"i1078","enabled":true,"last_modified":1480349204899,"details":{"who":"All Firefox users who have this add-on installed.","created":"2016-01-18T10:31:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1240561","name":"Adobe Flash Player (malware)","why":"This is a malicious extension that tries to pass itself for the Adobe Flash Player and hides itself in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b026fe67-ec77-a240-2fa1-e78f581a6fe4","schema":1480349193877},{"guid":"{0153E448-190B-4987-BDE1-F256CADA672F}","blockID":"i914","enabled":true,"last_modified":1480349204871,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.","created":"2015-06-02T09:56:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above."},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2bfe0d89-e458-9d0e-f944-ddeaf8c4db6c","schema":1480349193877},{"guid":"{77beece6-3997-403a-92fa-0055bfcf88e5}","blockID":"i452","enabled":true,"last_modified":1480349204844,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-18T16:34:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","name":"Entrusted11","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d348f91f-caeb-a803-dfd9-fd5d285aa0fa","schema":1480349193877},{"guid":"dealcabby@jetpack","blockID":"i222","enabled":true,"last_modified":1480349204818,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:20:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=811435","name":"DealCabby","why":"This add-on is silently side-installed with other software, injecting advertisements in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6585f0bd-4f66-71e8-c565-d9762c5c084a","schema":1480349193877},{"guid":"{3c9a72a0-b849-40f3-8c84-219109c27554}","blockID":"i510","enabled":true,"last_modified":1480349204778,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-17T14:27:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=951301","name":"Facebook Haber (malware)","why":"This add-on is malware that hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7cfa3d0b-0ab2-5e3a-8143-1031c180e32f","schema":1480349193877},{"guid":"{4ED1F68A-5463-4931-9384-8FFF5ED91D92}","blockID":"i1245","enabled":true,"last_modified":1480349204748,"details":{"who":"All users who have McAfee SiteAdvisor lower than 4.0. \r\n\r\nTo resolve this issue, users will need to uninstall McAfee SiteAdvisor/WebAdvisor, reboot the computer, and then reinstall McAfee SiteAdvisor/WebAdvisor. \r\n\r\nFor detailed instructions, please refer to the <a href=\"https://service.mcafee.com/webcenter/portal/cp/home/articleview?locale=en-CA&articleId=TS102554\">McAfee support knowledge base</a>.","created":"2016-07-14T21:24:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286368","name":"McAfee SiteAdvisor lower than 4.0","why":"Old versions of McAfee SiteAdvisor cause startup crashes starting with Firefox 48.0 beta."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.9.9","severity":1}],"prefs":[],"id":"d727d8c5-3329-c98a-7c7e-38b0813ca516","schema":1480349193877},{"guid":"{2aab351c-ad56-444c-b935-38bffe18ad26}","blockID":"i500","enabled":true,"last_modified":1480349204716,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:29:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946087","name":"Adobe Photo (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f7a76d34-ddcd-155e-9fae-5967bd796041","schema":1480349193877},{"guid":"jid1-4P0kohSJxU1qGg@jetpack","blockID":"i488","enabled":true,"last_modified":1480349204668,"details":{"who":"All Firefox users who have version 1.2.50 of the Hola extension. Updating to the latest version should remove the block.","created":"2013-11-25T12:14:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=942935","name":"Hola, version 1.2.50","why":"Version 1.2.50 of the Hola extension is causing frequent crashes in Firefox. All users are strongly recommended to update to the latest version, which shouldn't have this problem."},"versionRange":[{"targetApplication":[],"minVersion":"1.2.50","maxVersion":"1.2.50","severity":1}],"prefs":[],"id":"5c7f1635-b39d-4278-5f95-9042399c776e","schema":1480349193877},{"guid":"{0A92F062-6AC6-8180-5881-B6E0C0DC2CC5}","blockID":"i864","enabled":true,"last_modified":1480349204612,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T12:56:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131220","name":"BlockAndSurf","why":"This add-on is silently installed into users' systems and makes unwanted settings changes, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"acb16d1c-6274-93a3-7c1c-7ed36ede64a9","schema":1480349193877},{"guid":"jid0-Y6TVIzs0r7r4xkOogmJPNAGFGBw@jetpack","blockID":"i322","enabled":true,"last_modified":1480349204532,"details":{"who":"All users who have this add-on installed.","created":"2013-03-22T14:39:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=847018","name":"Flash Player (malware)","why":"This extension is malware, installed pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"54df22cd-19ce-a7f0-63cc-ffe3113748b9","schema":1480349193877},{"guid":"trackerbird@bustany.org","blockID":"i986","enabled":true,"last_modified":1480349204041,"details":{"who":"All Thunderbird users who have this version of the add-on installed on Thunderbird 38.0a2 and above.","created":"2015-08-17T15:56:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1189264","name":"trackerbird 1.2.6","why":"This add-on is causing consistent crashes on Thunderbird 38.0a2 and above."},"versionRange":[{"targetApplication":[{"minVersion":"38.0a2","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"}],"minVersion":"1.2.6","maxVersion":"1.2.6","severity":1}],"prefs":[],"id":"bb1c699e-8790-4528-0b6d-4f83b7a3152d","schema":1480349193877},{"guid":"{0134af61-7a0c-4649-aeca-90d776060cb3}","blockID":"i448","enabled":true,"last_modified":1480349203968,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-13T16:15:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=912746","name":"KeyBar add-on","why":"This add-on doesn't follow our Add-on Guidelines. It manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"cf428416-4974-8bb4-7928-c0cb2cfe7957","schema":1480349193877},{"guid":"/^(firefox@vebergreat\\.net|EFGLQA@78ETGYN-0W7FN789T87\\.COM)$/","blockID":"i564","enabled":true,"last_modified":1480349203902,"details":{"who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","created":"2014-03-05T13:02:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","name":"veberGreat and vis (Free Driver Scout bundle)","why":"These add-ons are silently installed by the Free Driver Scout installer, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"487538f1-698e-147e-6395-986759ceed7e","schema":1480349193877},{"guid":"69ffxtbr@PackageTracer_69.com","blockID":"i882","enabled":true,"last_modified":1480349203836,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2015-04-10T16:18:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1153001","name":"PackageTracer","why":"This add-on appears to be malware, hijacking user's settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"0d37b4e0-3c60-fdad-dd8c-59baff6eae87","schema":1480349193877},{"guid":"{ACAA314B-EEBA-48e4-AD47-84E31C44796C}","blockID":"i496","enabled":true,"last_modified":1480349203779,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-03T16:07:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","name":"DVDVideoSoft Menu","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making settings changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"70d2c912-8d04-8065-56d6-d793b13d5f67","schema":1480349193877},{"guid":"jid1-4vUehhSALFNqCw@jetpack","blockID":"i632","enabled":true,"last_modified":1480349203658,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-01T13:16:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033002","name":"YouTube Plus Plus 100.7","why":"Version 100.7 of the YouTube Plus Plus extension isn't developed by the original developer, and is likely malicious in nature. It violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"100.7","maxVersion":"100.7","severity":3}],"prefs":[],"id":"8bef6026-6697-99cd-7c1f-812877c4211d","schema":1480349193877},{"guid":"{a9bb9fa0-4122-4c75-bd9a-bc27db3f9155}","blockID":"i404","enabled":true,"last_modified":1480349203633,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:16:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"fb7a1dc7-16a0-4f70-8289-4df494e0d0fa","schema":1480349193877},{"guid":"P2@D.edu","blockID":"i850","enabled":true,"last_modified":1480349203605,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:29:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128269","name":"unIsaless","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"49536a29-fc7e-9fd0-f415-e15ac090fa56","schema":1480349193877},{"guid":"linksicle@linksicle.com","blockID":"i472","enabled":true,"last_modified":1480349203581,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"9b5b15b3-6da7-cb7c-3c44-30b4fe079d52","schema":1480349193877},{"guid":"{377e5d4d-77e5-476a-8716-7e70a9272da0}","blockID":"i398","enabled":true,"last_modified":1480349203519,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:15:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ea94df32-2a85-23da-43f7-3fc5714530ec","schema":1480349193877},{"guid":"{4933189D-C7F7-4C6E-834B-A29F087BFD23}","blockID":"i437","enabled":true,"last_modified":1480349203486,"details":{"who":"All Firefox users.","created":"2013-08-09T15:14:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=900695","name":"Win32.SMSWebalta (malware)","why":"This add-on is widely reported to be malware."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cbef1357-d6bc-c8d3-7a82-44af6b1c390f","schema":1480349193877},{"guid":"{ADFA33FD-16F5-4355-8504-DF4D664CFE10}","blockID":"i306","enabled":true,"last_modified":1480349203460,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2013-02-28T12:56:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844972","name":"Nation Toolbar","why":"This add-on is silently installed, bypassing our third-party opt-in screen, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>. It's also possible that it changes user settings without their consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"017fd151-37ca-4646-4763-1d303fb918fa","schema":1480349193877},{"guid":"detgdp@gmail.com","blockID":"i884","enabled":true,"last_modified":1480349203433,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-04-10T16:21:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152614","name":"Security Protection (malware)","why":"This add-on appears to be malware, hijacking user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"1b5cc88e-499d-2a47-d793-982d4c05e6ee","schema":1480349193877},{"guid":"/^(67314b39-24e6-4f05-99f3-3f88c7cddd17@6c5fa560-13a3-4d42-8e90-53d9930111f9\\.com|ffxtlbr@visualbee\\.com|{7aeae561-714b-45f6-ace3-4a8aed6e227b}|{7093ee04-f2e4-4637-a667-0f730797b3a0}|{53c4024f-5a2e-4f2a-b33e-e8784d730938})$/","blockID":"i514","enabled":true,"last_modified":1480349203408,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:25:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","name":"VisualBee Toolbar","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by using multiple add-on IDs and making unwanted settings changes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5f91eee1-7303-3f97-dfe6-1e897a156c7f","schema":1480349193877},{"guid":"FXqG@xeeR.net","blockID":"i720","enabled":true,"last_modified":1480349203341,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-02T12:23:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"GoSSave","why":"This add-on is silently installed into users' systems and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage"],"id":"8ebbc061-a4ff-b75b-ec42-eb17c42a2956","schema":1480349193877},{"guid":"{87934c42-161d-45bc-8cef-ef18abe2a30c}","blockID":"i547","enabled":true,"last_modified":1480349203310,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-01-30T12:42:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=798621","name":"Ad-Aware Security Toolbar","why":"This add-on is silently installed and makes various unwanted changes, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.7.9999999999","severity":1}],"prefs":[],"id":"bcfbc502-24c2-4699-7435-e4837118f05a","schema":1480349193877},{"guid":"kallow@facebook.com","blockID":"i495","enabled":true,"last_modified":1480349203247,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-02T15:09:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945426","name":"Facebook Security Service (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1a2c37a9-e7cc-2d03-2043-098d36b8aca2","schema":1480349193877},{"guid":"support@lastpass.com","blockID":"i1261","enabled":true,"last_modified":1480349203208,"details":{"who":"All users who install affected versions of this add-on - beta versions 4.0 to 4.1.20a from addons.mozilla.org or lastpass.com.","created":"2016-07-29T14:17:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289907","name":"LastPass addon","why":"LastPass have announced there are security issues that would allow a malicious website to perform some actions (e.g. deleting passwords) without the user's knowledge.  Beta versions 4.0 to 4.1.20a of their add-on that were available from addons.mozilla.org are affected and Lastpass also distributed these versions direct from their website."},"versionRange":[{"targetApplication":[],"minVersion":"4.0.0a","maxVersion":"4.1.20a","severity":1}],"prefs":[],"id":"ffe94023-b4aa-87ac-962c-5beabe34b1a0","schema":1480349193877},{"guid":"008abed2-b43a-46c9-9a5b-a771c87b82da@1ad61d53-2bdc-4484-a26b-b888ecae1906.com","blockID":"i528","enabled":true,"last_modified":1480349203131,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:40:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949565","name":"weDownload Manager Pro","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"da46065f-1c68-78f7-80fc-8ae07b5df68d","schema":1480349193877},{"guid":"{25dd52dc-89a8-469d-9e8f-8d483095d1e8}","blockID":"i714","enabled":true,"last_modified":1480349203066,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-01T15:36:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Web Counselor","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e46c31ad-0ab3-e48a-47aa-9fa91b675fda","schema":1480349193877},{"guid":"{B1FC07E1-E05B-4567-8891-E63FBE545BA8}","blockID":"i926","enabled":true,"last_modified":1480349202708,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:28:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"09868783-261a-ac24-059d-fc772218c1ba","schema":1480349193877},{"guid":"/^(torntv@torntv\\.com|trtv3@trtv\\.com|torntv2@torntv\\.com|e2fd07a6-e282-4f2e-8965-85565fcb6384@b69158e6-3c3b-476c-9d98-ae5838c5b707\\.com)$/","blockID":"i529","enabled":true,"last_modified":1480349202677,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:46:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949559","name":"TornTV","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by being silently installed."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"040e5ec2-ea34-816a-f99f-93296ce845e8","schema":1480349193877},{"guid":"249911bc-d1bd-4d66-8c17-df533609e6d8@c76f3de9-939e-4922-b73c-5d7a3139375d.com","blockID":"i532","enabled":true,"last_modified":1480349202631,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T15:02:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949672","name":"Feven","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and using multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d32b850d-82d5-b63d-087c-fb2041b2c232","schema":1480349193877},{"guid":"thefoxonlybetter@quicksaver","blockID":"i704","enabled":true,"last_modified":1480349202588,"details":{"who":"All Firefox users who have any of these versions of the add-on installed.","created":"2014-08-27T14:49:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1053469","name":"The Fox, Only Better (malicious versions)","why":"Certain versions of The Fox, Only Better weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.*","severity":3}],"prefs":[],"id":"79ea6621-b414-17a4-4872-bfc4af7fd428","schema":1480349193877},{"guid":"{B40794A0-7477-4335-95C5-8CB9BBC5C4A5}","blockID":"i429","enabled":true,"last_modified":1480349202541,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-07-30T14:31:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=899178","name":"Video Player 1.3 (malware)","why":"This add-on is malware that spreads spam through Facebook."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d98b2b76-4082-3387-ae33-971d973fa278","schema":1480349193877},{"guid":"firefoxaddon@youtubeenhancer.com","blockID":"i648","enabled":true,"last_modified":1480349202462,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:12:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"YouTube Enhancer Plus, versions between 199.7.0 and 208.7.0","why":"Certain versions of the YouTube Enhancer Plus extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"199.7.0","maxVersion":"208.7.0","severity":3}],"prefs":[],"id":"7e64d7fc-ff16-8687-dbd1-bc4c7dfc5097","schema":1480349193877},{"guid":"addon@defaulttab.com","blockID":"i362","enabled":true,"last_modified":1480349202429,"details":{"who":"All users who have this add-on installed. Users who wish to enable it again can do so in the Add-ons Manager tab.","created":"2013-06-06T12:57:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=863387","name":"Default Tab","why":"Old versions of this add-on had been silently installed into users' systems, without showing the opt-in install page that is built into Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.4.4","severity":1}],"prefs":[],"id":"df3fe753-5bae-bfb4-022b-6b6bfc534937","schema":1480349193877},{"guid":"{7D4F1959-3F72-49d5-8E59-F02F8AA6815D}","blockID":"i394","enabled":true,"last_modified":1480349202341,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T12:40:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=881447","name":"Updater By SweetPacks","why":"This is a companion add-on for the SweetPacks Toolbar which <a href=\"https://addons.mozilla.org/en-US/firefox/blocked/i392\">is blocked</a> due to guideline violations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"851c2b8e-ea19-3a63-eac5-f931a8da5d6e","schema":1480349193877},{"guid":"g@uzcERQ6ko.net","blockID":"i776","enabled":true,"last_modified":1480349202307,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-31T16:23:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"GoSave","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"ee1e1a44-b51b-9f12-819d-64c3e515a147","schema":1480349193877},{"guid":"ffxtlbr@incredibar.com","blockID":"i318","enabled":true,"last_modified":1480349202280,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-03-20T14:40:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812264","name":"IncrediBar","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9e84b07c-84d5-c932-85f2-589713d7e380","schema":1480349193877},{"guid":"M1uwW0@47z8gRpK8sULXXLivB.com","blockID":"i870","enabled":true,"last_modified":1480349202252,"details":{"who":"All users who have this add-on installed.","created":"2015-03-04T14:34:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1131159","name":"Flash Player 11 (malware)","why":"This is a malicious add-on that goes by the the name \"Flash Player 11\"."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"71d961b2-37d1-d393-76f5-3afeef57e749","schema":1480349193877},{"guid":"jid1-qj0w91o64N7Eeg@jetpack","blockID":"i650","enabled":true,"last_modified":1480349202186,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:14:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"YouTube ALL HTML5, versions between 39.5.1 and 47.0.4","why":"Certain versions of the YouTube ALL HTML5 extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"39.5.1","maxVersion":"47.0.4","severity":3}],"prefs":[],"id":"b30b1f7a-2a30-a6cd-fc20-6c9cb23c7198","schema":1480349193877},{"guid":"4zffxtbr-bs@VideoDownloadConverter_4z.com","blockID":"i507","enabled":true,"last_modified":1480349202156,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-12T15:37:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949266","name":"VideoDownloadConverter","why":"Certain versions of this add-on contains an executable that is flagged by multiple tools as malware. Newer versions no longer use it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"5.75.3.25126","severity":1}],"prefs":[],"id":"0a0f106a-ecc6-c537-1818-b36934943e91","schema":1480349193877},{"guid":"hdv@vovcacik.addons.mozilla.org","blockID":"i656","enabled":true,"last_modified":1480349202125,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:22:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"High Definition Video, version 102.0","why":"Certain versions of the High Definition Video extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"102.0","maxVersion":"102.0","severity":3}],"prefs":[],"id":"972249b2-bba8-b508-2ead-c336631135ac","schema":1480349193877},{"guid":"@video_downloader_pro","blockID":"i1265","enabled":true,"last_modified":1480349202099,"details":{"who":"Users of versions of 1.2.1 to 1.2.5 inclusive.","created":"2016-08-26T18:26:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1298335","name":"Video Downloader Pro","why":"Versions 1.2.1 to 1.2.5 of Video Downloader Pro included code that violated our polices - affected versions send every visited url to a remote server without the user's consent.  Versions older than 1.2.1 and more recent than 1.2.5 are okay."},"versionRange":[{"targetApplication":[],"minVersion":"1.2.1","maxVersion":"1.2.5","severity":1}],"prefs":[],"id":"ff9c8def-7d50-66b4-d42a-f9a4b04bd224","schema":1480349193877},{"guid":"contato@facefollow.net","blockID":"i509","enabled":true,"last_modified":1480349202067,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-16T16:15:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950846","name":"Face follow","why":"This add-on spams users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"56f15747-af8c-342c-6877-a41eeacded84","schema":1480349193877},{"guid":"wecarereminder@bryan","blockID":"i666","enabled":true,"last_modified":1480349202039,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-07-10T16:18:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=818614","name":"We-Care Reminder","why":"This add-on is being silently installed by various software packages, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"51e0ead7-144c-c1f4-32f2-25fc5fcde870","schema":1480349193877},{"guid":"/^({83a8ce1b-683c-4784-b86d-9eb601b59f38}|{ef1feedd-d8da-4930-96f1-0a1a598375c6}|{79ff1aae-701f-4ca5-aea3-74b3eac6f01b}|{8a184644-a171-4b05-bc9a-28d75ffc9505}|{bc09c55d-0375-4dcc-836e-0e3c8addfbda}|{cef81415-2059-4dd5-9829-1aef3cf27f4f})$/","blockID":"i526","enabled":true,"last_modified":1480349202010,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T14:12:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949566","name":"KeyBar add-on","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and uses multiple IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"9dfa4e92-bbf2-66d1-59a9-51402d1d226c","schema":1480349193877},{"guid":"{d9284e50-81fc-11da-a72b-0800200c9a66}","blockID":"i806","enabled":true,"last_modified":1480349201976,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable the add-on in the Add-on Manager.","created":"2014-12-16T08:35:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1106948","name":"Yoono","why":"Starting with Firefox 34, current versions of the Yoono add-on cause all tabs to appear blank."},"versionRange":[{"targetApplication":[{"minVersion":"34.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"7.7.34","severity":1}],"prefs":[],"id":"ccdceb04-3083-012f-9d9f-aac85f10b494","schema":1480349193877},{"guid":"{f2548724-373f-45fe-be6a-3a85e87b7711}","blockID":"i768","enabled":true,"last_modified":1480349201854,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-30T14:52:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1088726","name":"Astro New Tab","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"8510e9e2-c7d8-90d0-a2ff-eb09293acc6e","schema":1480349193877},{"guid":"KSqOiTeSJEDZtTGuvc18PdPmYodROmYzfpoyiCr2@jetpack","blockID":"i1032","enabled":true,"last_modified":1480349201504,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:22:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211172","name":"Video Player (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3d9188ac-235f-773a-52a2-261b3ea9c03c","schema":1480349193877},{"guid":"{849ded12-59e9-4dae-8f86-918b70d213dc}","blockID":"i708","enabled":true,"last_modified":1480349201453,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-09-02T16:29:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1047102","name":"Astromenda New Tab","why":"This add-on is silently installed and changes homepage and search settings without the user's consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"a319bfee-464f-1c33-61ad-738c52842fbd","schema":1480349193877},{"guid":"grjkntbhr@hgergerherg.com","blockID":"i1018","enabled":true,"last_modified":1480349201425,"details":{"who":"All users who have this add-on installed.","created":"2015-09-24T16:04:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208196","name":"GreenPlayer (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"9c47d940-bdd9-729f-e32e-1774d87f24b5","schema":1480349193877},{"guid":"quick_start@gmail.com","blockID":"i588","enabled":true,"last_modified":1480349201398,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-03T15:53:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011316","name":"Quick Start (malware)","why":"This add-on appears to be malware that is installed without user consent."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2affbebe-8776-3edb-28b9-237cb8b85f97","schema":1480349193877},{"guid":"/^(matchersite(pro(srcs?)?)?\\@matchersite(pro(srcs?)?)?\\.com)|((pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\@(pro)?sitematcher(_srcs?|pro|site|sitesrc|-generic)?\\.com)$/","blockID":"i668","enabled":true,"last_modified":1480349201372,"details":{"who":"All Firefox users who have any of these add-ons installed. User who wish to continue using these add-ons can enable them in the Add-ons Manager.","created":"2014-07-17T14:35:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1039892","name":"Site Matcher","why":"This is a group of add-ons that are being distributed under multiple different IDs and likely being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"52e1a2de-ab35-be27-4810-334f681ccc4a","schema":1480349193877},{"guid":"{EEF73632-A085-4fd3-A778-ECD82C8CB297}","blockID":"i165","enabled":true,"last_modified":1480349201262,"details":{"who":"All Firefox users who have these add-ons installed.","created":"2012-10-29T16:41:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec-M (malware)","why":"These are malicious add-ons that are distributed with a trojan and negatively affect web browsing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e5ecd02a-20ee-749b-d5cf-3d74d1173a1f","schema":1480349193877},{"guid":"firefox-extension@mozilla.org","blockID":"i688","enabled":true,"last_modified":1480349201235,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-08-06T17:13:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1049533","name":"FinFisher (malware)","why":"This is a malicious add-on that hides itself under the name Java_plugin, among others."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"98aca74a-69c7-9960-cccc-096a4a4adc6c","schema":1480349193877},{"guid":"jid1-vW9nopuIAJiRHw@jetpack","blockID":"i570","enabled":true,"last_modified":1480349201204,"details":{"who":"All Firefox users who have this add-on installed. Those who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-03-31T16:17:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=990291","name":"SmileysWeLove","why":"This add-on is silently installed, reverts settings changes to enforce its own, and is also causing stability problems in Firefox, all in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"bf2abd66-f910-650e-89aa-cd1d5c2f8a89","schema":1480349193877},{"guid":"87aukfkausiopoawjsuifhasefgased278djasi@jetpack","blockID":"i1050","enabled":true,"last_modified":1480349201157,"details":{"who":"All users who have this add-on installed.","created":"2015-11-02T14:53:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1220461","name":"Trace Video (malware)","why":"This is a malicious add-on that poses as a video update and hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cb4cfac0-79c2-0fbf-206a-324aa3abbea5","schema":1480349193877},{"guid":"{e44a1809-4d10-4ab8-b343-3326b64c7cdd}","blockID":"i451","enabled":true,"last_modified":1480349201128,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-09-18T16:33:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=916966","name":"Entrusted","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, manipulating settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ad5f53ed-7a43-cb1f-cbd7-41808fac1791","schema":1480349193877},{"guid":"{21EAF666-26B3-4A3C-ABD0-CA2F5A326744}","blockID":"i620","enabled":true,"last_modified":1480349201096,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-06-12T15:27:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024752","name":"V-Bates","why":"This add-on is probably silently installed, and is causing significant stability issues for users, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2d8833db-01a7-a758-080f-19e47abc54cb","schema":1480349193877},{"guid":"{1FD91A9C-410C-4090-BBCC-55D3450EF433}","blockID":"i338","enabled":true,"last_modified":1480349201059,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-04-24T11:30:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844979","name":"DataMngr (malware)","why":"This extension overrides search settings, and monitors any further changes done to them so that they can be reverted. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">add-on guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2e35995f-bec6-aa2b-3372-346d3325f72e","schema":1480349193877},{"guid":"9598582LLKmjasieijkaslesae@jetpack","blockID":"i996","enabled":true,"last_modified":1480349201029,"details":{"who":"All users who have this add-on installed.","created":"2015-09-07T13:50:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1201165","name":"Secure Player (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"52f9c6e7-f7d5-f52e-cc35-eb99ef8b4b6a","schema":1480349193877},{"guid":"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}","blockID":"i406","enabled":true,"last_modified":1480349201000,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-27T10:46:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=776404","name":"uTorrentBar","why":"This add-on changes search settings without user interaction, and fails to reset them after it is removed. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3bcefc4b-110c-f3b8-17ad-f9fc97c1120a","schema":1480349193877},{"guid":"{ce7e73df-6a44-4028-8079-5927a588c948}","blockID":"i117","enabled":true,"last_modified":1480349200972,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-08-10T08:50:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=781269","name":"Search By Image (by Google)","why":"The Search By Image (by Google) extension causes very high CPU utilization during regular browsing, often damaging user experience significantly, in a way that is very difficult to associate with the extension.\r\n\r\nUsers who want to continue using the add-on regardless of its performance impact can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0.8","severity":1}],"prefs":[],"id":"fb1f9aed-2f1f-3e2c-705d-3b34ca9168b6","schema":1480349193877},{"guid":"{424b0d11-e7fe-4a04-b7df-8f2c77f58aaf}","blockID":"i800","enabled":true,"last_modified":1480349200939,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-15T10:51:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","name":"Astromenda NT","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"07bdf6aa-cfc8-ed21-6b36-6f90af02b169","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i618","enabled":true,"last_modified":1480349200911,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.\r\n","created":"2014-06-12T14:25:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"3.15.31","maxVersion":"3.15.31.*","severity":1}],"prefs":[],"id":"825feb43-d6c2-7911-4189-6f589f612c34","schema":1480349193877},{"guid":"{167d9323-f7cc-48f5-948a-6f012831a69f}","blockID":"i262","enabled":true,"last_modified":1480349200885,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-01-29T13:33:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812303","name":"WhiteSmoke (malware)","why":"This add-on is silently side-installed by other software, and doesn't do much more than changing the users' settings, without reverting them on removal."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a8f249fe-3db8-64b8-da89-7b584337a7af","schema":1480349193877},{"guid":"/^({988919ff-0cd8-4d0c-bc7e-60d55a49eb64}|{494b9726-9084-415c-a499-68c07e187244}|{55b95864-3251-45e9-bb30-1a82589aaff1}|{eef3855c-fc2d-41e6-8d91-d368f51b3055}|{90a1b331-c2b4-4933-9f63-ba7b84d60d58}|{d2cf9842-af95-48cd-b873-bfbb48cd7f5e})$/","blockID":"i541","enabled":true,"last_modified":1480349200819,"details":{"who":"All Firefox users who have this add-on installed","created":"2014-01-28T14:09:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","name":"MixiDJ (malware)","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"36196aed-9d0d-ebee-adf1-d1f7fadbc48f","schema":1480349193877},{"guid":"{29b136c9-938d-4d3d-8df8-d649d9b74d02}","blockID":"i598","enabled":true,"last_modified":1480349200775,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-06-12T13:21:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011322","name":"Mega Browse","why":"This add-on is silently installed, in violation with our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"63b1c965-27c3-cd06-1b76-8721add39edf","schema":1480349193877},{"guid":"{6e7f6f9f-8ce6-4611-add2-05f0f7049ee6}","blockID":"i868","enabled":true,"last_modified":1480349200690,"details":{"who":"All users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2015-02-26T14:58:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1086574","name":"Word Proser","why":"This add-on is silently installed into users' systems, in violation of our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f54797da-cdcd-351a-c95e-874b64b0d226","schema":1480349193877},{"guid":"{02edb56b-9b33-435b-b7df-b2843273a694}","blockID":"i438","enabled":true,"last_modified":1480349200338,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T15:27:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=896581","name":"KeyBar Toolbar","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. It is installed bypassing the Firefox opt-in screen, and manipulates settings without reverting them on removal. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"896710d2-5a65-e9b0-845b-05aa72c2bd51","schema":1480349193877},{"guid":"{e1aaa9f8-4500-47f1-9a0a-b02bd60e4076}","blockID":"i646","enabled":true,"last_modified":1480349200312,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:10:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Youtube Video Replay, version 178.7.0","why":"Certain versions of the Youtube Video Replay extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"178.7.0","maxVersion":"178.7.0","severity":3}],"prefs":[],"id":"ac5d1083-6753-bbc1-a83d-c63c35371b22","schema":1480349193877},{"guid":"{1cdbda58-45f8-4d91-b566-8edce18f8d0a}","blockID":"i724","enabled":true,"last_modified":1480349200288,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-13T16:00:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080835","name":"Website Counselor Pro","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"7b70bd36-d2f7-26fa-9038-8b8dd132cd81","schema":1480349193877},{"guid":"{b12785f5-d8d0-4530-a3ea-5c4263b85bef}","blockID":"i988","enabled":true,"last_modified":1480349200171,"details":{"who":"All users who have this add-on installed. Those who wish continue using this add-on can enable it in the Add-ons Manager.","created":"2015-08-17T16:04:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1161573","name":"Hero Fighter Community Toolbar","why":"This add-on overrides user's preferences without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3e6d73f2-e8e3-af69-866e-30d3977b09e4","schema":1480349193877},{"guid":"{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}","blockID":"i39","enabled":true,"last_modified":1480349200047,"details":{"who":"Users of MediaBar versions 4.3.1.00 and below in all versions of Firefox.","created":"2011-07-19T10:18:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=665775","name":"MediaBar","why":"This add-on causes a high volume of crashes and is incompatible with certain versions of Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"4.3.1.00","severity":1}],"prefs":[],"id":"e928a115-9d8e-86a4-e2c7-de39627bd9bf","schema":1480349193877},{"guid":"{9edd0ea8-2819-47c2-8320-b007d5996f8a}","blockID":"i684","enabled":true,"last_modified":1480349199962,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-06T13:33:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1033857","name":"webget","why":"This add-on is believed to be silently installed in Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.search.defaultenginename"],"id":"d38561f5-370f-14be-1443-a74dad29b1f3","schema":1480349193877},{"guid":"/^({ad9a41d2-9a49-4fa6-a79e-71a0785364c8})|(ffxtlbr@mysearchdial\\.com)$/","blockID":"i670","enabled":true,"last_modified":1480349199927,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-07-18T15:47:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036740","name":"MySearchDial","why":"This add-on has been repeatedly been silently installed into users' systems, and is known for changing the default search without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.search.defaultenginename"],"id":"a04075e6-5df2-2e1f-85a6-3a0171247349","schema":1480349193877},{"guid":"odtffplugin@ibm.com","blockID":"i982","enabled":true,"last_modified":1480349199886,"details":{"who":"All users who have these versions installed. The latest versions of this add-on aren't blocked, so updating to them should be sufficient to fix this problem.","created":"2015-08-11T11:25:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1190630","name":"IBM Endpoint Manager for Remote Control 9.0.1.1 to 9.0.1.100","why":"Certain versions of the IBM Remote Control add-on could leave a machine vulnerable to run untrusted code."},"versionRange":[{"targetApplication":[],"minVersion":"9.0.1.1","maxVersion":"9.0.1.100","severity":1}],"prefs":[],"id":"f6e3e5d2-9331-1097-ba4b-cf2e484b7187","schema":1480349193877},{"guid":"support@todoist.com","blockID":"i1030","enabled":true,"last_modified":1480349199850,"details":{"who":"All users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2015-10-01T16:53:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205479","name":"Todoist","why":"This add-on is sending all sites visited by the user to a remote server, additionally doing so in an unsafe way."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.9","severity":1}],"prefs":[],"id":"d0a84aab-0661-b3c5-c184-a2fd3f9dfb9c","schema":1480349193877},{"guid":"/^({1f43c8af-e9e4-4e5a-b77a-f51c7a916324}|{3a3bd700-322e-440a-8a6a-37243d5c7f92}|{6a5b9fc2-733a-4964-a96a-958dd3f3878e}|{7b5d6334-8bc7-4bca-a13e-ff218d5a3f17}|{b87bca5b-2b5d-4ae8-ad53-997aa2e238d4}|{bf8e032b-150f-4656-8f2d-6b5c4a646e0d})$/","blockID":"i1136","enabled":true,"last_modified":1480349199818,"details":{"who":"All users who have this add-on installed.","created":"2016-03-04T17:56:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","name":"Watcher (malware)","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"a2d0378f-ebe4-678c-62d8-2e4c6a613c17","schema":1480349193877},{"guid":"liiros@facebook.com","blockID":"i814","enabled":true,"last_modified":1480349199791,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-09T12:49:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119657","name":"One Tab (malware)","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"387c054d-cc9f-7ebd-c814-b4c1fbcb2880","schema":1480349193877},{"guid":"youtubeunblocker@unblocker.yt","blockID":"i1128","enabled":true,"last_modified":1480349199768,"details":{"who":"All users who have this add-on installed.","created":"2016-03-01T21:18:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that is being exploited through this website (unblocker.yt) to change security settings in Firefox and install malicious add-ons."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3395fce1-42dd-e31a-1466-2da3f32456a0","schema":1480349193877},{"guid":"{97E22097-9A2F-45b1-8DAF-36AD648C7EF4}","blockID":"i916","enabled":true,"last_modified":1480349199738,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-02T09:57:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170633","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"94fba774-c4e6-046a-bc7d-ede787a9d0fe","schema":1480349193877},{"guid":"{b64982b1-d112-42b5-b1e4-d3867c4533f8}","blockID":"i167","enabled":true,"last_modified":1480349199673,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-10-29T17:17:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=805973","name":"Browser Manager","why":"This add-on is a frequent cause for browser crashes and other problems."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"00bbe501-2d27-7a1c-c344-6eea1c707473","schema":1480349193877},{"guid":"{58bd07eb-0ee0-4df0-8121-dc9b693373df}","blockID":"i286","enabled":true,"last_modified":1480349199619,"details":{"who":"All Firefox users who have this extension installed.","created":"2013-02-18T10:54:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=842206","name":"Browser Protect / bProtector (malware)","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same <a href=\"https://addons.mozilla.org/firefox/addon/browserprotect/\">BrowserProtect extension</a> that is listed on our add-ons site. That one is safe to use."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b40a60d3-b9eb-09eb-bb02-d50b27aaac9f","schema":1480349193877},{"guid":"trtv3@trtv.com","blockID":"i465","enabled":true,"last_modified":1480349199560,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-01T15:21:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=845610","name":"TornTV","why":"This add-on doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, bypassing our third party install opt-in screen. Users who wish to continue using this extension can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3d4d8a33-2eff-2556-c699-9be0841a8cd4","schema":1480349193877},{"guid":"youtube@downloader.yt","blockID":"i1231","enabled":true,"last_modified":1480349199528,"details":{"who":"All users who have this add-on installed.","created":"2016-06-09T14:50:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1278932","name":"YouTube downloader","why":"The add-on has a mechanism that updates certain configuration files from the developer\u2019s website. This mechanism has a vulnerability that can being exploited through this website (downloader.yt) to change security settings in Firefox and/or install malicious add-ons. \r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"8514eaee-850c-e27a-a058-8badeeafc26e","schema":1480349193877},{"guid":"low_quality_flash@pie2k.com","blockID":"i658","enabled":true,"last_modified":1480349199504,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:27:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Low Quality Flash, versions between 46.2 and 47.1","why":"Certain versions of the Low Quality Flash extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"46.2","maxVersion":"47.1","severity":3}],"prefs":[],"id":"b869fae6-c18c-0d39-59a2-603814656404","schema":1480349193877},{"guid":"{d2cf9842-af95-48cd-b873-bfbb48cd7f5e}","blockID":"i439","enabled":true,"last_modified":1480349199478,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T16:08:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902569","name":"Mixi DJ V45","why":"This is another instance of the <a href=\"https://addons.mozilla.org/en-US/firefox/blocked/i354\">previously blocked</a> Mixi DJ add-on, which doesn't follow our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. If you wish to continue using it, it can be enabled in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e81c31fc-265e-61b9-d4c1-0e2f31f1652e","schema":1480349193877},{"guid":"/^({b95faac1-a3d7-4d69-8943-ddd5a487d966}|{ecce0073-a837-45a2-95b9-600420505f7e}|{2713b394-286f-4d7c-89ea-4174eeab9f5a}|{da7a20cf-bef4-4342-ad78-0240fdf87055})$/","blockID":"i624","enabled":true,"last_modified":1480349199446,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-06-18T13:50:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","name":"WiseConvert","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ed57d7a6-5996-c7da-8e07-1ad125183e84","schema":1480349193877},{"guid":"{f894a29a-f065-40c3-bb19-da6057778493}","blockID":"i742","enabled":true,"last_modified":1480349199083,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:46:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080817","name":"Spigot Shopping Assistant","why":"This add-on appears to be silently installed into users' systems, and changes settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"39d8334e-4b7c-4336-2d90-e6aa2d783967","schema":1480349193877},{"guid":"plugin@analytic-s.com","blockID":"i467","enabled":true,"last_modified":1480349199026,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T14:08:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935797","name":"Analytics","why":"This add-on bypasses the external install opt in screen in Firefox, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ffbed3f3-e5c9-bc6c-7530-f68f47b7efd6","schema":1480349193877},{"guid":"{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}","blockID":"i678","enabled":true,"last_modified":1480349198947,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2014-07-23T14:12:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=895668","name":"DataMngr","why":"This add-on is generally silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"151021fc-ce4e-a734-e075-4ece19610f64","schema":1480349193877},{"guid":"HxLVJK1ioigz9WEWo8QgCs3evE7uW6LEExAniBGG@jetpack","blockID":"i1036","enabled":true,"last_modified":1480349198894,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:37:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211170","name":"Mega Player (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"32e34b41-a73c-72d4-c96c-136917ad1d4d","schema":1480349193877},{"guid":"{6af08a71-380e-42dd-9312-0111d2bc0630}","blockID":"i822","enabled":true,"last_modified":1480349198826,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-27T09:50:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1126353","name":"{6af08a71-380e-42dd-9312-0111d2bc0630} (malware)","why":"This add-on appears to be malware, hiding itself in the Add-ons Manager, and keeping track of certain user actions."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"96d0c12b-a6cf-4539-c1cf-a1c75c14ff24","schema":1480349193877},{"guid":"colmer@yopmail.com","blockID":"i550","enabled":true,"last_modified":1480349198744,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-02-06T15:49:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=968445","name":"Video Plugin Facebook (malware)","why":"This add-on is malware that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c394d10b-384e-cbd0-f357-9c521715c373","schema":1480349193877},{"guid":"fplayer@adobe.flash","blockID":"i444","enabled":true,"last_modified":1480349198667,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-26T14:49:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=909433","name":"Flash Player (malware)","why":"This add-on is malware disguised as the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c6557989-1b59-72a9-da25-b816c4a4c723","schema":1480349193877},{"guid":"ascsurfingprotection@iobit.com","blockID":"i740","enabled":true,"last_modified":1480349198637,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T15:39:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963776","name":"Advanced SystemCare Surfing Protection","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"4405f99d-c9b7-c496-1b45-268163ce29b7","schema":1480349193877},{"guid":"{6E19037A-12E3-4295-8915-ED48BC341614}","blockID":"i24","enabled":true,"last_modified":1480349198606,"details":{"who":"Users of RelevantKnowledge version 1.3.328.4 and older in Firefox 4 and later.","created":"2011-03-02T17:42:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=615518","name":"comScore RelevantKnowledge","why":"This add-on causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1pre","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0.1","maxVersion":"1.3.328.4","severity":1}],"prefs":[],"id":"7c189c5e-f95b-0aef-e9e3-8e879336503b","schema":1480349193877},{"guid":"crossriderapp4926@crossrider.com","blockID":"i91","enabled":true,"last_modified":1480349198547,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-05-14T14:16:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=754648","name":"Remove My Timeline (malware)","why":"Versions of this add-on prior to 0.81.44 automatically post message to users' walls and hide them from their view. Version 0.81.44 corrects this."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.81.43","severity":1}],"prefs":[],"id":"5ee3e72e-96fb-c150-fc50-dd581e960963","schema":1480349193877},{"guid":"/^(93abedcf-8e3a-4d02-b761-d1441e437c09@243f129d-aee2-42c2-bcd1-48858e1c22fd\\.com|9acfc440-ac2d-417a-a64c-f6f14653b712@09f9a966-9258-4b12-af32-da29bdcc28c5\\.com|58ad0086-1cfb-48bb-8ad2-33a8905572bc@5715d2be-69b9-4930-8f7e-64bdeb961cfd\\.com)$/","blockID":"i544","enabled":true,"last_modified":1480349198510,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using it, it can be enabled in the Add-ons Manager.","created":"2014-01-30T11:51:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=949596","name":"SuperLyrics","why":"This add-on is in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>, using multiple add-on IDs and potentially doing other unwanted activities."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"d8d25967-9814-3b65-0787-a0525c16e11e","schema":1480349193877},{"guid":"wHO@W9.net","blockID":"i980","enabled":true,"last_modified":1480349198483,"details":{"who":"All users who have this add-on installed.","created":"2015-08-11T11:20:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1192468","name":"BestSavEFOrYoU (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"4beb917f-68f2-1f91-beed-dff6d83006f8","schema":1480349193877},{"guid":"frhegnejkgner@grhjgewfewf.com","blockID":"i1040","enabled":true,"last_modified":1480349198458,"details":{"who":"All users who have this add-on installed.","created":"2015-10-07T13:03:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1212451","name":"Async Codec (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fb6ab4ce-5517-bd68-2cf7-a93a109a528a","schema":1480349193877},{"guid":"firefox@luckyleap.net","blockID":"i471","enabled":true,"last_modified":1480349198433,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3a9e04c7-5e64-6297-8442-2816915aad77","schema":1480349193877},{"guid":"auto-plugin-checker@jetpack","blockID":"i1210","enabled":true,"last_modified":1480349198401,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-04T16:25:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","name":"auto-plugin-checker","why":"This add-on reports every visited URL to a third party without disclosing it to the user."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"3e202419-5318-2025-b579-c828af24a06e","schema":1480349193877},{"guid":"lugcla21@gmail.com","blockID":"i432","enabled":true,"last_modified":1480349198372,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-06T13:16:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=902072","name":"FB Color Changer (malware)","why":"This add-on includes malicious code that spams users' Facebook accounts with unwanted messages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b6943f35-9429-1f8e-bf8e-fe37979fe183","schema":1480349193877},{"guid":"{99079a25-328f-4bd4-be04-00955acaa0a7}","blockID":"i402","enabled":true,"last_modified":1480349198341,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-06-25T15:16:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=835678","name":"Searchqu","why":"This group of add-ons is silently installed, bypassing our install opt-in screen. This violates our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"16008331-8b47-57c8-a6f7-989914d1cb8a","schema":1480349193877},{"guid":"{81b13b5d-fba1-49fd-9a6b-189483ac548a}","blockID":"i473","enabled":true,"last_modified":1480349198317,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"76debc7b-b875-6da4-4342-1243cbe437f6","schema":1480349193877},{"guid":"{e935dd68-f90d-46a6-b89e-c4657534b353}","blockID":"i732","enabled":true,"last_modified":1480349198260,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-16T16:38:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Sites Pro","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"97fdc235-ac1a-9f20-1b4a-17c2f0d89ad1","schema":1480349193877},{"guid":"{32da2f20-827d-40aa-a3b4-2fc4a294352e}","blockID":"i748","enabled":true,"last_modified":1480349198223,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:02:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","name":"Start Page","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6c980c8e-4a3c-7912-4a3a-80add457575a","schema":1480349193877},{"guid":"chinaescapeone@facebook.com","blockID":"i431","enabled":true,"last_modified":1480349198192,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-05T16:43:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=901770","name":"F-Secure Security Pack (malware)","why":"This is a malicious add-on that uses a deceptive name and hijacks social networks."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fbd89a9d-9c98-8481-e4cf-93e327ca8be1","schema":1480349193877},{"guid":"{cc6cc772-f121-49e0-b1f0-c26583cb0c5e}","blockID":"i716","enabled":true,"last_modified":1480349198148,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-02T12:12:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Website Counselor","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"debcd28c-884b-ca42-d983-6fabf91034dd","schema":1480349193877},{"guid":"{906000a4-88d9-4d52-b209-7a772970d91f}","blockID":"i474","enabled":true,"last_modified":1480349197744,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-07T15:38:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=935779","name":"Installer bundle (malware)","why":"This add-on is part of a malicious Firefox installer bundle."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"326d05b9-ace7-67c6-b094-aad926c185a5","schema":1480349193877},{"guid":"{A34CAF42-A3E3-11E5-945F-18C31D5D46B0}","blockID":"i1227","enabled":true,"last_modified":1480349197699,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-31T15:45:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1274995","name":"Mococheck WAP browser","why":"This add-on downgrades the security of all iframes from https to http and changes important Firefox security preferences."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["security.csp.enable","security.fileuri.strict_origin_policy","security.mixed_content.block_active_content"],"id":"2230a5ce-a8f8-a20a-7974-3b960a03aba9","schema":1480349193877},{"guid":"{AB2CE124-6272-4b12-94A9-7303C7397BD1}","blockID":"i20","enabled":true,"last_modified":1480349197667,"details":{"who":"Users of Skype extension versions below 5.2.0.7165 for all versions of Firefox.","created":"2011-01-20T18:39:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=627278","name":"Skype extension","why":"This add-on causes a high volume of Firefox crashes and introduces severe performance issues. Please <a href=\"http://www.skype.com/intl/en/get-skype/on-your-computer/click-and-call/\">update to the latest version</a>. For more information, please <a href=\"http://blog.mozilla.com/addons/2011/01/20/blocking-the-skype-toolbar-in-firefox/\">read our announcement</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0.1","maxVersion":"5.2.0.7164","severity":1}],"prefs":[],"id":"60e16015-1803-197a-3241-484aa961d18f","schema":1480349193877},{"guid":"f6682b47-e12f-400b-9bc0-43b3ccae69d1@39d6f481-b198-4349-9ebe-9a93a86f9267.com","blockID":"i682","enabled":true,"last_modified":1480349197636,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-04T16:07:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1043017","name":"enformation","why":"This add-on is being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a7ae65cd-0869-67e8-02f8-6d22c56a83d4","schema":1480349193877},{"guid":"rally_toolbar_ff@bulletmedia.com","blockID":"i537","enabled":true,"last_modified":1480349197604,"details":{"who":"All Firefox users who have this extension installed. If you want to continue using it, you can enable it in the Add-ons Manager.","created":"2014-01-23T15:51:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=950267","name":"Rally Toolbar","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by silently installing it."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"4ac6eb63-b51a-3296-5b02-bae77f424032","schema":1480349193877},{"guid":"x77IjS@xU.net","blockID":"i774","enabled":true,"last_modified":1480349197578,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-31T16:22:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076771","name":"YoutubeAdBlocke","why":"This add-on is silently installed and changes user settings without consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"4771da14-bcf2-19b1-3d71-bc61a1c7d457","schema":1480349193877},{"guid":"{49c53dce-afa0-49a1-a08b-2eb8e8444128}","blockID":"i441","enabled":true,"last_modified":1480349197550,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T16:58:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844985","name":"ytbyclick","why":"This add-on is silently installed, violating our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"5f08d720-58c2-6acb-78ad-7af45c82c90b","schema":1480349193877},{"guid":"searchengine@gmail.com","blockID":"i886","enabled":true,"last_modified":1480349197525,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-on Manager.","created":"2015-04-10T16:25:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1152555","name":"Search Enginer","why":"This add-on appears to be malware, being silently installed and hijacking user settings, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"46de4f6e-2b29-7334-ebbb-e0048f114f7b","schema":1480349193877},{"guid":"{bb7b7a60-f574-47c2-8a0b-4c56f2da9802}","blockID":"i754","enabled":true,"last_modified":1480349197500,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:27:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080850","name":"AdvanceElite","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f222ceb2-9b69-89d1-8dce-042d8131a12e","schema":1480349193877},{"guid":"/^(test3@test.org|test2@test.org|test@test.org|support@mozilla.org)$/","blockID":"i1119","enabled":true,"last_modified":1480349197468,"details":{"who":"All users who have these add-ons installed.","created":"2016-01-25T13:31:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1242721","name":"test.org add-ons (malware)","why":"These add-ons are malicious, or at least attempts at being malicious, using misleading names and including risky code."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"afd2a0d7-b050-44c9-4e45-b63696d9b22f","schema":1480349193877},{"guid":"/^((34qEOefiyYtRJT@IM5Munavn\\.com)|(Mro5Fm1Qgrmq7B@ByrE69VQfZvZdeg\\.com)|(KtoY3KGxrCe5ie@yITPUzbBtsHWeCdPmGe\\.com)|(9NgIdLK5Dq4ZMwmRo6zk@FNt2GCCLGyUuOD\\.com)|(NNux7bWWW@RBWyXdnl6VGls3WAwi\\.com)|(E3wI2n@PEHTuuNVu\\.com)|(2d3VuWrG6JHBXbQdbr@3BmSnQL\\.com))$/","blockID":"i324","enabled":true,"last_modified":1480349197432,"details":{"who":"All users who have this add-on installed.","created":"2013-03-22T14:48:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","name":"Flash Player (malware)","why":"This extension is malware, installed pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5be3a399-af3e-644e-369d-628273b3fdc2","schema":1480349193877},{"guid":"axtara__web@axtara.com","blockID":"i1263","enabled":true,"last_modified":1480349197404,"details":{"who":"All users who have version 1.1.1 or less of this add-on installed.","created":"2016-08-17T16:47:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"AXTARA Search (pre 1.1.2)","why":"Old versions of this add-on contained code from YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity.  Version 1.1.2 is now okay."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.1.1","severity":3}],"prefs":[],"id":"c58be1c9-3d63-a948-219f-e3225e1eec8e","schema":1480349193877},{"guid":"{8f894ed3-0bf2-498e-a103-27ef6e88899f}","blockID":"i792","enabled":true,"last_modified":1480349197368,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-26T13:49:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"ExtraW","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bebc9e15-59a1-581d-0163-329d7414edff","schema":1480349193877},{"guid":"profsites@pr.com","blockID":"i734","enabled":true,"last_modified":1480349197341,"details":{"who":"All Firefox users who have this add-on installed.\r\n","created":"2014-10-16T16:39:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"ProfSites","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0d6d84d7-0b3f-c5ab-57cc-6b66b0775a23","schema":1480349193877},{"guid":"{872b5b88-9db5-4310-bdd0-ac189557e5f5}","blockID":"i497","enabled":true,"last_modified":1480349197240,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-03T16:08:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=945530","name":"DVDVideoSoft Menu","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making settings changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e8da89c4-c585-77e4-9872-591d20723a7e","schema":1480349193877},{"guid":"123456789@offeringmedia.com","blockID":"i664","enabled":true,"last_modified":1480349197208,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-07-10T15:41:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"Taringa MP3 / Adobe Flash","why":"This is a malicious add-on that attempts to hide itself by impersonating the Adobe Flash plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"6d0a7dda-d92a-c8e2-21be-c92b0a88ac8d","schema":1480349193877},{"guid":"firefoxdav@icloud.com","blockID":"i1214","enabled":true,"last_modified":1480349197172,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-17T16:55:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1271358","name":"iCloud Bookmarks","why":"This add-on is causing frequent and persistent crashing."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.4.22","severity":1}],"prefs":[],"id":"2dddd7a7-b081-45e2-3eeb-2a7f76a1465f","schema":1480349193877},{"guid":"youplayer@addons.mozilla.org","blockID":"i660","enabled":true,"last_modified":1480349197136,"details":{"who":"All Firefox users who have this version of the add-on installed.","created":"2014-07-10T15:31:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1036757","name":"YouPlayer, versions between 79.9.8 and 208.0.1","why":"Certain versions of the YouPlayer extension weren't developed by the original developer, and are likely malicious in nature. This violates the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> for reusing an already existent ID."},"versionRange":[{"targetApplication":[],"minVersion":"79.9.8","maxVersion":"208.0.1","severity":3}],"prefs":[],"id":"82dca22b-b889-5d9d-3fc9-b2184851f2d1","schema":1480349193877},{"guid":"{df6bb2ec-333b-4267-8c4f-3f27dc8c6e07}","blockID":"i487","enabled":true,"last_modified":1480349197109,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-11-19T14:59:45Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940681","name":"Facebook 2013 (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5867c409-b342-121e-3c3b-426e2f0ba1d4","schema":1480349193877},{"guid":"/^({4e988b08-8c51-45c1-8d74-73e0c8724579}|{93ec97bf-fe43-4bca-a735-5c5d6a0a40c4}|{aed63b38-7428-4003-a052-ca6834d8bad3}|{0b5130a9-cc50-4ced-99d5-cda8cc12ae48}|{C4CFC0DE-134F-4466-B2A2-FF7C59A8BFAD})$/","blockID":"i524","enabled":true,"last_modified":1480349197082,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T13:43:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947481","name":"SweetPacks","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1a3a26a2-cdaa-e5ba-f6ac-47b98ae2cc26","schema":1480349193877},{"guid":"foxyproxy@eric.h.jung","blockID":"i950","enabled":true,"last_modified":1480349197056,"details":{"who":"All users who have this add-on installed on Thunderbird 38 and above.","created":"2015-07-15T09:34:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183890","name":"FoxyProxy Standard for Thunderbird","why":"This add-on is causing consistent startup crashes on Thunderbird 38 and above."},"versionRange":[{"targetApplication":[{"minVersion":"38.0a2","guid":"{3550f703-e582-4d05-9a08-453d09bdfdc6}","maxVersion":"*"},{"minVersion":"2.35","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"0","maxVersion":"4.5.5","severity":1}],"prefs":[],"id":"5ee8203d-bea2-6cd5-9ba0-d1922ffb3d21","schema":1480349193877},{"guid":"{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}","blockID":"i1056","enabled":true,"last_modified":1480349197027,"details":{"who":"All users who have this add-on installed in Firefox 43 and above. User who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2015-11-17T14:03:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1225639","name":"Skype Click to Call","why":"This add-on is associated with frequent shutdown crashes in Firefox."},"versionRange":[{"targetApplication":[{"minVersion":"43.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"7.5.0.9082","severity":1}],"prefs":[],"id":"484f8386-c415-7499-a8a0-f4e16f5a142f","schema":1480349193877},{"guid":"{22119944-ED35-4ab1-910B-E619EA06A115}","blockID":"i45","enabled":true,"last_modified":1480349196995,"details":{"who":"Users of version 7.9.20.6 of RoboForm Toolbar and earlier on Firefox 48 and above.","created":"2011-11-19T06:14:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=699134","name":"Roboform","why":"Older versions of the RoboForm Toolbar add-on are causing crashes in Firefox 48 and above.  The developer has released a fix, available in versions 7.9.21+."},"versionRange":[{"targetApplication":[{"minVersion":"8.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0.1","maxVersion":"7.9.20.6","severity":1}],"prefs":[],"id":"5f7f9e13-d3e8-ea74-8341-b83e36d67d94","schema":1480349193877},{"guid":"{87b5a11e-3b54-42d2-9102-0a7cb1f79ebf}","blockID":"i838","enabled":true,"last_modified":1480349196965,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:29:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","name":"Cyti Web (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1ba0e57c-4c0c-4eb6-26e7-c2016769c343","schema":1480349193877},{"guid":"/^({bf67a47c-ea97-4caf-a5e3-feeba5331231}|{24a0cfe1-f479-4b19-b627-a96bf1ea3a56})$/","blockID":"i542","enabled":true,"last_modified":1480349196622,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-01-28T14:10:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963819","name":"MixiDJ (malware)","why":"This add-on has been repeatedly blocked before and keeps showing up with new add-on IDs, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fc442b64-1b5d-bebb-c486-f431b154f3db","schema":1480349193877},{"guid":"/^({ebd898f8-fcf6-4694-bc3b-eabc7271eeb1}|{46008e0d-47ac-4daa-a02a-5eb69044431a}|{213c8ed6-1d78-4d8f-8729-25006aa86a76}|{fa23121f-ee7c-4bd8-8c06-123d087282c5}|{19803860-b306-423c-bbb5-f60a7d82cde5})$/","blockID":"i622","enabled":true,"last_modified":1480349196597,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-06-18T13:48:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947482","name":"WiseConvert","why":"This add-on is known to change user settings without their consent, is distributed under multiple add-on IDs, and is also correlated with reports of tab functions being broken in Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"ffd184fa-aa8f-8a75-ff00-ce285dec5b22","schema":1480349193877},{"guid":"/^({fa95f577-07cb-4470-ac90-e843f5f83c52}|ffxtlbr@speedial\\.com)$/","blockID":"i696","enabled":true,"last_modified":1480349196565,"details":{"who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using these add-ons can enable them in the Add-ons Manager.","created":"2014-08-21T13:55:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1031115","name":"Speedial","why":"These add-ons are silently installed and change homepage and search defaults without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. They are also distributed under more than one add-on ID."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"130c7419-f727-a2fb-3891-627bc69a43bb","schema":1480349193877},{"guid":"pennerdu@faceobooks.ws","blockID":"i442","enabled":true,"last_modified":1480349196541,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-13T14:00:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=904050","name":"Console Video (malware)","why":"This is a malicious add-on that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"fb83e48e-a780-9d06-132c-9ecc65b43674","schema":1480349193877},{"guid":"anttoolbar@ant.com","blockID":"i88","enabled":true,"last_modified":1480349196509,"details":{"who":"All Firefox users who have installed version 2.4.6.4 of the Ant Video Downloader and Player add-on.","created":"2012-05-01T10:32:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=748269","name":"Ant Video Downloader and Player","why":"Version 2.4.6.4 of the Ant Video Downloader and Player add-on is causing a very high number of crashes in Firefox. There's an updated version 2.4.6.5 that doesn't have this problem. All users are recommended to update as soon as possible."},"versionRange":[{"targetApplication":[],"minVersion":"2.4.6.4","maxVersion":"2.4.6.4","severity":1}],"prefs":[],"id":"9eef435b-39d4-2b73-0810-44b0d3ff52ad","schema":1480349193877},{"guid":"{E90FA778-C2B7-41D0-9FA9-3FEC1CA54D66}","blockID":"i446","enabled":true,"last_modified":1480349196471,"details":{"who":"All Firefox users who have this add-on installed. The add-on can be enabled again in the Add-ons Manager.","created":"2013-09-06T15:59:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=788838","name":"YouTube to MP3 Converter","why":"This add-on is installed silently, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"83eb6337-a3b6-84e4-e76c-ee9200b80796","schema":1480349193877},{"guid":"{ad7ce998-a77b-4062-9ffb-1d0b7cb23183}","blockID":"i804","enabled":true,"last_modified":1480349196438,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-12-15T10:53:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1080839","name":"Astromenda Search Addon","why":"This add-on is silently installed and is considered malware, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"633f9999-c81e-bd7a-e756-de7d34feb39d","schema":1480349193877},{"guid":"{52b0f3db-f988-4788-b9dc-861d016f4487}","blockID":"i584","enabled":true,"last_modified":1480349196363,"details":{"who":"All Firefox users who have these add-ons installed. If you wish to continue using these add-ons, you can enable them in the Add-ons Manager.","created":"2014-05-22T11:07:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974104","name":"Web Check (Free Driver Scout bundle)","why":"Versions of this add-on are silently installed by the Free Driver Scout installer, in violation of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"0.1.9999999","severity":1}],"prefs":[],"id":"cba0ac44-90f9-eabb-60b0-8da2b645e067","schema":1480349193877},{"guid":"dodatek@flash2.pl","blockID":"i1279","enabled":true,"last_modified":1480349196331,"details":{"who":"Any user with version 1.3 or newer of this add-on installed.","created":"2016-10-27T15:52:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","name":"Aktualizacja Flash WORK addon","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"1.3","maxVersion":"*","severity":3}],"prefs":[],"id":"2dab5211-f9ec-a1bf-c617-6f94f28b5ee1","schema":1480349193877},{"guid":"{2d069a16-fca1-4e81-81ea-5d5086dcbd0c}","blockID":"i440","enabled":true,"last_modified":1480349196294,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T16:26:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=903647","name":"GlitterFun","why":"This add-on is installed silently and doesn't follow many other of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. If you want to continue using this add-on, you can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e3f77f3c-b1d6-3b29-730a-846007b9cb16","schema":1480349193877},{"guid":"xivars@aol.com","blockID":"i501","enabled":true,"last_modified":1480349196247,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-04T15:34:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=946420","name":"Video Plugin Facebook (malware)","why":"This is a malicious Firefox extension that uses a deceptive name and hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3303d201-7006-3c0d-5fd5-45503e2e690c","schema":1480349193877},{"guid":"2bbadf1f-a5af-499f-9642-9942fcdb7c76@f05a14cc-8842-4eee-be17-744677a917ed.com","blockID":"i700","enabled":true,"last_modified":1480349196212,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-21T16:15:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1052599","name":"PIX Image Viewer","why":"This add-on is widely considered malware and is apparently installed silently into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"1b72889b-90e6-ea58-4fe8-d48257df7d8b","schema":1480349193877},{"guid":"/^[0-9a-f]+@[0-9a-f]+\\.info/","blockID":"i256","enabled":true,"last_modified":1480349196184,"details":{"who":"All Firefox users who have installed any of these add-ons.","created":"2013-01-22T12:16:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806451","name":"Codec extensions (malware)","why":"The set of extensions labeled as Codec, Codec-M, Codec-C and other names are malware being distributed as genuine add-ons.\r\n\r\nIf you think an add-on you installed was incorrectly blocked and the block dialog pointed you to this page, please comment on <a href=\"https://blog.mozilla.org/addons/2013/01/22/blocklisting-malicious-codec-add-ons/\">this blog post</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0c654540-00f2-0ad4-c9be-7ca2ace5341e","schema":1480349193877},{"guid":"toolbar@ask.com","blockID":"i600","enabled":true,"last_modified":1480349196158,"details":{"who":"All Firefox users who have these versions of the Ask Toolbar installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-06-12T14:16:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1024719","name":"Ask Toolbar (old Avira Security Toolbar bundle)","why":"Certain old versions of the Ask Toolbar are causing problems to users when trying to open new tabs. Using more recent versions of the Ask Toolbar should also fix this problem."},"versionRange":[{"targetApplication":[],"minVersion":"3.15.5","maxVersion":"3.15.5.*","severity":1}],"prefs":[],"id":"51c4ab3b-9ad3-c5c3-98c8-a220025fc5a3","schema":1480349193877},{"guid":"{729c9605-0626-4792-9584-4cbe65b243e6}","blockID":"i788","enabled":true,"last_modified":1480349196123,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-20T10:07:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Browser Ext Assistance","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3c588238-2501-6a53-65ea-5c8ff0f3e51d","schema":1480349193877},{"guid":"unblocker20__web@unblocker.yt","blockID":"i1213","enabled":true,"last_modified":1480349196088,"details":{"who":"All users who have this add-on installed.","created":"2016-05-09T17:28:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker 2.0","why":"This add-on is a copy of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"de305335-e9f3-f410-cf5c-f88b7ad4b088","schema":1480349193877},{"guid":"webbooster@iminent.com","blockID":"i630","enabled":true,"last_modified":1480349196032,"details":{"who":"All Firefox users who have any of these add-ons installed. Users who wish to continue using them can enable them in the Add-ons Manager.","created":"2014-06-26T15:49:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=866943","name":"Iminent Minibar","why":"These add-ons have been silently installed repeatedly, and change settings without user consent, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"d894ea79-8215-7a0c-b0e9-be328c3afceb","schema":1480349193877},{"guid":"jid1-uabu5A9hduqzCw@jetpack","blockID":"i1016","enabled":true,"last_modified":1480349196001,"details":{"who":"All users who have this add-on installed.","created":"2015-09-24T09:49:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1208051","name":"SpeedFox (malware)","why":"This add-on is injecting unwanted and unexpected advertisements into all web pages, and masking this behavior as ad-blocking in its code."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"31397419-3dfa-9db3-f1aa-e812d4220669","schema":1480349193877},{"guid":"/^firefox@(jumpflip|webconnect|browsesmart|mybuzzsearch|outobox|greygray|lemurleap|divapton|secretsauce|batbrowse|whilokii|linkswift|qualitink|browsefox|kozaka|diamondata|glindorus|saltarsmart|bizzybolt|websparkle)\\.(com?|net|org|info|biz)$/","blockID":"i548","enabled":true,"last_modified":1480349195955,"details":{"who":"All Firefox users who have one or more of these add-ons installed. If you wish to continue using any of these add-ons, they can be enabled in the Add-ons Manager.","created":"2014-01-30T15:06:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=937405","name":"Yontoo add-ons","why":"A large amount of add-ons developed by Yontoo are known to be silently installed and otherwise violate the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"bfaf3510-397e-48e6-cc4f-74202aaaed54","schema":1480349193877},{"guid":"firefox@bandoo.com","blockID":"i23","enabled":true,"last_modified":1480349195915,"details":{"who":"Users of Bandoo version 5.0 for Firefox 3.6 and later.","created":"2011-03-01T23:30:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=629634","name":"Bandoo","why":"This add-on causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.7a1pre","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"5.0","maxVersion":"5.0","severity":1}],"prefs":[],"id":"bd487cf4-3f6a-f956-a6e9-842ac8deeac5","schema":1480349193877},{"guid":"5nc3QHFgcb@r06Ws9gvNNVRfH.com","blockID":"i372","enabled":true,"last_modified":1480349195887,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-06-18T13:23:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=875752","name":"Flash Player 11 (malware)","why":"This add-on is malware pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dc71fcf5-fae4-5a5f-6455-ca7bbe4202db","schema":1480349193877},{"guid":"/^(7tG@zEb\\.net|ru@gfK0J\\.edu)$/","blockID":"i854","enabled":true,"last_modified":1480349195851,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:41:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952255","name":"youtubeadblocker (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"cfe42207-67a9-9b88-f80c-994e6bdd0c55","schema":1480349193877},{"guid":"{a7aae4f0-bc2e-a0dd-fb8d-68ce32c9261f}","blockID":"i378","enabled":true,"last_modified":1480349195823,"details":{"who":"All Firefox users who have installed this add-on.","created":"2013-06-18T15:58:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=865090","name":"Myanmar Extension for Facebook (malware)","why":"This extension is malware that hijacks Facebook accounts for malicious purposes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"30ecd9b9-4023-d9ef-812d-f1a75bb189b0","schema":1480349193877},{"guid":"a88a77ahjjfjakckmmabsy278djasi@jetpack","blockID":"i1034","enabled":true,"last_modified":1480349195798,"details":{"who":"All users who have this add-on installed.","created":"2015-10-05T16:28:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1211171","name":"Fast Unlock (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"f801f112-3e8f-770f-10db-384349a36026","schema":1480349193877},{"guid":"crossriderapp5060@crossrider.com","blockID":"i228","enabled":true,"last_modified":1480349195769,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-11-29T16:31:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=810016","name":"Savings Sidekick","why":"This add-on is silently side-installed by other software, and it overrides user preferences and inserts advertisements in web content."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a37f76ac-7b77-b5a3-bac8-addaacf34bae","schema":1480349193877},{"guid":"/^(saamazon@mybrowserbar\\.com)|(saebay@mybrowserbar\\.com)$/","blockID":"i672","enabled":true,"last_modified":1480349195347,"details":{"who":"All Firefox users who have these add-ons installed. Users wishing to continue using these add-ons can enable them in the Add-ons Manager.","created":"2014-07-22T15:13:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011337","name":"Spigot Shopping Assistant","why":"These add-ons are being silently installed, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e072a461-ee5a-c83d-8d4e-5686eb585a15","schema":1480349193877},{"guid":"{b99c8534-7800-48fa-bd71-519a46cdc7e1}","blockID":"i596","enabled":true,"last_modified":1480349195319,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-06-12T13:19:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1011325","name":"BrowseMark","why":"This add-on is silently installed, in violation with our <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f411bb0f-7c82-9061-4a80-cabc8ff45beb","schema":1480349193877},{"guid":"/^({94d62e35-4b43-494c-bf52-ba5935df36ef}|firefox@advanceelite\\.com|{bb7b7a60-f574-47c2-8a0b-4c56f2da9802})$/","blockID":"i856","enabled":true,"last_modified":1480349195286,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:51:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1130323","name":"AdvanceElite (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"e3d52650-d3e2-4cef-71f7-e6188f56fe4d","schema":1480349193877},{"guid":"{458fb825-2370-4973-bf66-9d7142141847}","blockID":"i1024","enabled":true,"last_modified":1480349195258,"details":{"who":"All users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2015-09-29T09:25:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1209588","name":"Web Shield","why":"This add-on hides itself in the Add-ons Manager, interrupts the Firefox update process, and reportedly causes other problems to users, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["app.update.auto","app.update.enabled","app.update.interval","app.update.url"],"id":"32c5baa7-d547-eaab-302d-b873c83bfe2d","schema":1480349193877},{"guid":"{f2456568-e603-43db-8838-ffa7c4a685c7}","blockID":"i778","enabled":true,"last_modified":1480349195215,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-11-07T13:53:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Sup-SW","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"93568fa2-0cb7-4e1d-e893-d7261e81547c","schema":1480349193877},{"guid":"{77BEC163-D389-42c1-91A4-C758846296A5}","blockID":"i566","enabled":true,"last_modified":1480349195185,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-on Manager.","created":"2014-03-05T13:20:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=964594","name":"V-Bates","why":"This add-on is silently installed into Firefox, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"080edbac-25d6-e608-abdd-feb1ce7a9a77","schema":1480349193877},{"guid":"helper@vidscrab.com","blockID":"i1077","enabled":true,"last_modified":1480349195157,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using the add-on can enable it in the Add-ons Manager.","created":"2016-01-14T14:32:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1231010","name":"YouTube Video Downloader (from AddonCrop)","why":"This add-on injects remote scripts and injects unwanted content into web pages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"36b2e1e0-5fda-bde3-db55-dfcbe24dfd04","schema":1480349193877},{"guid":"/^ext@WebexpEnhancedV1alpha[0-9]+\\.net$/","blockID":"i535","enabled":true,"last_modified":1480349195123,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, it can be enabled in the Add-ons Manager.","created":"2014-01-09T11:22:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=952717","name":"Webexp Enhanced","why":"This add-on is generally unwanted by users and uses multiple random IDs in violation of the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"c7d6a30d-f3ee-40fb-5256-138dd4593a61","schema":1480349193877},{"guid":"jid1-XLjasWL55iEE1Q@jetpack","blockID":"i578","enabled":true,"last_modified":1480349195058,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-04-28T16:25:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1002037","name":"Flash Player (malware)","why":"This is a malicious add-on that presents itself as \"Flash Player\" but is really injecting unwanted content into Facebook pages."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"1e75b2f0-02fc-77a4-ad2f-52a4caff1a71","schema":1480349193877},{"guid":"{a3a5c777-f583-4fef-9380-ab4add1bc2a8}","blockID":"i142","enabled":true,"last_modified":1480349195007,"details":{"who":"Todos los usuarios de Firefox que instalaron la versi\u00f3n 4.2 del complemento Cuevana Stream.\r\n\r\nAll Firefox users who have installed version 4.2 of the Cuevana Stream add-on.","created":"2012-09-18T13:37:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=792132","name":"Cuevana Stream (malicious version)","why":"<strong>Espa\u00f1ol</strong>\r\nUna versi\u00f3n maliciosa del complemento Cuevana Stream (4.2) fue colocada en el sitio Cuevana y distribuida a muchos usuarios del sitio. Esta versi\u00f3n recopila informaci\u00f3n de formularios web y los env\u00eda a una direcci\u00f3n remota con fines maliciosos. Se le recomienda a todos los usuarios que instalaron esta versi\u00f3n que cambien sus contrase\u00f1as inmediatamente, y que se actualicen a la nueva versi\u00f3n segura, que es la 4.3.\r\n\r\n<strong>English</strong>\r\nA malicious version of the Cuevana Stream add-on (4.2) was uploaded to the Cuevana website and distributed to many of its users. This version takes form data and sends it to a remote location with malicious intent. It is recommended that all users who installed this version to update their passwords immediately, and update to the new safe version, version 4.3.\r\n\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"4.2","maxVersion":"4.2","severity":3}],"prefs":[],"id":"91e551b9-7e94-60e2-f1bd-52f25844ab16","schema":1480349193877},{"guid":"{34712C68-7391-4c47-94F3-8F88D49AD632}","blockID":"i922","enabled":true,"last_modified":1480349194976,"details":{"who":"All Firefox users who have this add-on installed in Firefox 39 and above.\r\n","created":"2015-06-09T15:27:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1173154","name":"RealPlayer Browser Record Plugin","why":"Certain versions of this extension are causing startup crashes in Firefox 39 and above.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"39.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"dd350efb-34ac-2bb5-5afd-eed722dbb916","schema":1480349193877},{"guid":"PDVDZDW52397720@XDDWJXW57740856.com","blockID":"i846","enabled":true,"last_modified":1480349194949,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T15:03:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128320","name":"Ge-Force","why":"This add-on is silently installed and attempts to change user settings like the home page and default search, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":["browser.startup.homepage","browser.search.defaultenginename"],"id":"c33e950c-c977-ed89-c86a-3be8c4be1967","schema":1480349193877},{"guid":"{977f3b97-5461-4346-92c8-a14c749b77c9}","blockID":"i69","enabled":true,"last_modified":1480349194919,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-02-22T16:41:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=729356","name":"Zuperface+","why":"This add-on adds apps to users' accounts, with full access permissions, and sends spam posts using these apps, all without any consent from users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f105bdc7-7ebd-587c-6344-1533249f50b3","schema":1480349193877},{"guid":"discoverypro@discoverypro.com","blockID":"i582","enabled":true,"last_modified":1480349194878,"details":{"who":"All Firefox users who have this add-on installed. If you wish to continue using this add-on, you can enabled it in the Add-ons Manager.","created":"2014-04-30T16:10:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1004231","name":"Website Discovery Pro","why":"This add-on is silently installed by the CNET installer for MP3 Rocket and probably other software packages. This is in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"34eab242-6fbc-a459-a89e-0dc1a0b8355d","schema":1480349193877},{"guid":"jid1-bKSXgRwy1UQeRA@jetpack","blockID":"i680","enabled":true,"last_modified":1480349194851,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-01T16:34:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=979856","name":"Trusted Shopper","why":"This add-on is silently installed into user's systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f701b790-b266-c69d-0fba-f2d189cb0f34","schema":1480349193877},{"guid":"bcVX5@nQm9l.org","blockID":"i848","enabled":true,"last_modified":1480349194799,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-09T15:21:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128266","name":"boomdeal","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"f8d6d4e1-b9e6-07f5-2b49-192106a45d82","schema":1480349193877},{"guid":"aytac@abc.com","blockID":"i504","enabled":true,"last_modified":1480349194724,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-12-06T12:07:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947341","name":"Facebook Haber (malware)","why":"This is a malicious extension that hijacks users' Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"bfaf8298-dd69-165c-e1ed-ad55584abd18","schema":1480349193877},{"guid":"Adobe@flash.com","blockID":"i136","enabled":true,"last_modified":1480349194647,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-09-10T16:09:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=790100","name":"Adobe Flash (malware)","why":"This add-on is malware posing as a legitimate Adobe product."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"47ac744e-3176-5cb6-1d02-b460e0c7ada0","schema":1480349193877},{"guid":"{515b2424-5911-40bd-8a2c-bdb20286d8f5}","blockID":"i491","enabled":true,"last_modified":1480349194580,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-11-29T14:52:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=940753","name":"Connect DLC","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"6d658443-b34a-67ad-934e-cbf7cd407460","schema":1480349193877},{"guid":"/^({3f3cddf8-f74d-430c-bd19-d2c9147aed3d}|{515b2424-5911-40bd-8a2c-bdb20286d8f5}|{17464f93-137e-4646-a0c6-0dc13faf0113}|{d1b5aad5-d1ae-4b20-88b1-feeaeb4c1ebc}|{aad50c91-b136-49d9-8b30-0e8d3ead63d0})$/","blockID":"i516","enabled":true,"last_modified":1480349194521,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:38:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947478","name":"Connect DLC","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by making changes that can't be easily reverted and being distributed under multiple add-on IDs."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"96f8e157-8b8b-8e2e-76cd-6850599b4370","schema":1480349193877},{"guid":"wxtui502n2xce9j@no14","blockID":"i1012","enabled":true,"last_modified":1480349194463,"details":{"who":"All users who have this add-on installed.","created":"2015-09-21T13:04:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206157","name":"Video fix (malware)","why":"This is a malicious add-on that takes over Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"246798ac-25fa-f4a4-258c-a71f9f6ae091","schema":1480349193877},{"guid":"flashX@adobe.com","blockID":"i168","enabled":true,"last_modified":1480349194428,"details":{"who":"All Firefox users who have this add-on installed.","created":"2012-10-30T12:07:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=807052","name":"Zombie Browser Pack","why":"This is an exploit proof-of-concept created for a conference presentation, which will probably be copied and modified for malicious purposes. \r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d7c69812-801c-8d8e-12cb-c5171bdc48a1","schema":1480349193877},{"guid":"/^(ff\\-)?dodate(kKKK|XkKKK|k|kk|kkx|kR)@(firefox|flash(1)?)\\.pl|dode(ee)?k@firefoxnet\\.pl|(addon|1)@upsolutions\\.pl$/","blockID":"i1278","enabled":true,"last_modified":1480349194386,"details":{"who":"Any user with a version of this add-on installed.","created":"2016-10-27T10:52:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","name":"Aktualizacja dodatku Flash Add-on","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"389aec65-a15d-8276-c7a8-691ac283c9f1","schema":1480349193877},{"guid":"tmbepff@trendmicro.com","blockID":"i1223","enabled":true,"last_modified":1480349194331,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-30T17:07:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275245","name":"Trend Micro BEP 9.2 to 9.2.0.1023","why":"Add-on  is causing a high-frequency crash in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"9.2","maxVersion":"9.2.0.1023","severity":1}],"prefs":[],"id":"46f75b67-2675-bdde-be93-7ea03475d405","schema":1480349193877},{"guid":"{4889ddce-7a83-45e6-afc9-1e4f1149fff4}","blockID":"i840","enabled":true,"last_modified":1480349193867,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-02-06T14:30:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128327","name":"Cyti Web (malware)","why":"This add-on is silently installed and performs unwanted actions, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"be600f35-0633-29f3-c571-819e19d85db9","schema":1480343836083},{"guid":"{55dce8ba-9dec-4013-937e-adbf9317d990","blockID":"i690","enabled":true,"last_modified":1480349193833,"details":{"who":"All Firefox users. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-12T16:23:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048647","name":"Deal Keeper","why":"This add-on is being silently installed in users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"512b0d40-a10a-5ddc-963b-b9c487eb1422","schema":1480343836083},{"guid":"/^new@kuot\\.pro|{13ec6687-0b15-4f01-a5a0-7a891c18e4ee}|rebeccahoppkins(ty(tr)?)?@gmail\\.com|{501815af-725e-45be-b0f2-8f36f5617afc}|{9bdb5f1f-b1e1-4a75-be31-bdcaace20a99}|{e9d93e1d-792f-4f95-b738-7adb0e853b7b}|dojadewaskurwa@gmail\\.com$/","blockID":"i1414","enabled":true,"last_modified":1480349193798,"details":{"who":"All users who have this add-on installed.","created":"2016-10-28T18:06:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312748","name":"Aktualizacja dodatku Flash (malware)","why":"This add-on claims to be a flash plugin and it does some work on youtube, but it also steals your facebook and adfly credentials and sends them to a remote server."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"5cebc983-bc88-d5f8-6807-bd1cbfcd82fd","schema":1480343836083},{"guid":"/^pink@.*\\.info$/","blockID":"i238","enabled":true,"last_modified":1480349193764,"details":{"who":"All Firefox users (Firefox 19 and above) who have any of these add-ons installed.","created":"2012-12-07T13:46:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806543","name":"Pink add-ons (malware)","why":"This is a set of malicious add-ons that affect many users and are installed without their consent."},"versionRange":[{"targetApplication":[{"minVersion":"18.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"0d964264-8bd6-b78d-3c6c-92046c7dc8d0","schema":1480343836083},{"guid":"{58d2a791-6199-482f-a9aa-9b725ec61362}","blockID":"i746","enabled":true,"last_modified":1480349193730,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2014-10-17T16:01:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=963787","name":"Start Page","why":"This add-on is silently installed into users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"8ebbc7d0-635c-b74a-de9f-16eb5837b36a","schema":1480343836083},{"guid":"{94cd2cc3-083f-49ba-a218-4cda4b4829fd}","blockID":"i590","enabled":true,"last_modified":1480349193649,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-06-03T16:12:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1013678","name":"Value Apps","why":"This add-on is silently installed into users' profiles, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"556b8d4d-d6c2-199d-9f33-8eccca07e8e7","schema":1480343836083},{"guid":"contentarget@maildrop.cc","blockID":"i818","enabled":true,"last_modified":1480349193622,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-12T09:29:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119971","name":"Astro Play (malware)","why":"This is a malicious extension that hijacks Facebook accounts."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"440e9923-027a-6089-e036-2f78937dc193","schema":1480343836083},{"guid":"unblocker30__web@unblocker.yt","blockID":"i1228","enabled":true,"last_modified":1480349193595,"details":{"who":"All users who have this add-on installed.","created":"2016-06-01T15:17:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker 3.0","why":"This add-on is a copy of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"2d83e640-ef9d-f260-f5a3-a1a5c8390bfc","schema":1480343836083},{"guid":"noOpus@outlook.com","blockID":"i816","enabled":true,"last_modified":1480349193537,"details":{"who":"All Firefox users who have this add-on installed.","created":"2015-01-09T12:52:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1119659","name":"Full Screen (malware)","why":"This add-on is silently installed into users' systems without their consent and performs unwanted operations."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"b64d7cef-8b6c-2575-16bc-732fca7db377","schema":1480343836083},{"guid":"{c95a4e8e-816d-4655-8c79-d736da1adb6d}","blockID":"i433","enabled":true,"last_modified":1480349193510,"details":{"who":"All Firefox users who have this add-on installed.","created":"2013-08-09T11:25:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=844945","name":"Hotspot Shield","why":"This add-on bypasses the external install opt in screen in Firefox, violating the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>. Users who wish to continue using this add-on can enable it in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"b3168278-a8ae-4882-7f26-355bc362bed0","schema":1480343836083},{"guid":"{9802047e-5a84-4da3-b103-c55995d147d1}","blockID":"i722","enabled":true,"last_modified":1480349193482,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-10-07T12:58:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1073810","name":"Web Finder Pro","why":"This add-on is silently installed into users' systems. It uses very unsafe practices to load its code, and leaks information of all web browsing activity. These are all violations of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"50097c29-26b1-bf45-ffe1-83da217eb127","schema":1480343836083},{"guid":"/^({bf9194c2-b86d-4ebc-9b53-1c08b6ff779e}|{61a83e16-7198-49c6-8874-3e4e8faeb4f3}|{f0af464e-5167-45cf-9cf0-66b396d1918c}|{5d9968c3-101c-4944-ba71-72d77393322d}|{01e86e69-a2f8-48a0-b068-83869bdba3d0})$/","blockID":"i515","enabled":true,"last_modified":1480349193449,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using it can enable it in the Add-ons Manager.","created":"2013-12-20T12:26:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=947473","name":"VisualBee Toolbar","why":"The installer that includes this add-on violates the <a href=\"https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Add-on_guidelines\">Add-on Guidelines</a> by using multiple add-on IDs and making unwanted settings changes."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"029fa6f9-2351-40b7-5443-9a66e057f199","schema":1480343836083},{"guid":"/^({d50bfa5f-291d-48a8-909c-5f1a77b31948}|{d54bc985-6e7b-46cd-ad72-a4a266ad879e}|{d89e5de3-5543-4363-b320-a98cf150f86a}|{f3465017-6f51-4980-84a5-7bee2f961eba}|{fae25f38-ff55-46ea-888f-03b49aaf8812})$/","blockID":"i1137","enabled":true,"last_modified":1480349193419,"details":{"who":"All users who have this add-on installed.","created":"2016-03-04T17:56:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251940","name":"Watcher (malware)","why":"This is a malicious add-on that hides itself from view and disables various security features in Firefox."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"252e18d0-85bc-7bb3-6197-5f126424c9b3","schema":1480343836083},{"guid":"ffxtlbr@claro.com","blockID":"i218","enabled":true,"last_modified":1480349193385,"details":{"who":"All Firefox users who have installed this add-on.","created":"2012-11-29T16:07:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=816762","name":"Claro Toolbar","why":"The Claro Toolbar is side-installed with other software, unexpectedly changing users' settings and then making it impossible for these settings to be reverted by users."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"e017a3b2-9b37-b8a0-21b0-bc412ae8a7f4","schema":1480343836083},{"guid":"/^(.*@(unblocker\\.yt|sparpilot\\.com))|(axtara@axtara\\.com)$/","blockID":"i1229","enabled":true,"last_modified":1480349193344,"details":{"who":"All users who have this add-on installed.","created":"2016-06-03T15:28:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1251911","name":"YouTube Unblocker (various)","why":"These add-ons are copies of YouTube Unblocker, which was <a href=\"https://addons.mozilla.org/firefox/blocked/i1129\">originally blocked</a> due to malicious activity."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"c677cc5d-5b1e-8aa2-5cea-5a8dddce2ecf","schema":1480343836083},{"guid":"/^(j003-lqgrmgpcekslhg|SupraSavings|j003-dkqonnnthqjnkq|j003-kaggrpmirxjpzh)@jetpack$/","blockID":"i692","enabled":true,"last_modified":1480349193295,"details":{"who":"All Firefox users who have this add-on installed. Users who wish to continue using this add-on can enable it in the Add-ons Manager.","created":"2014-08-12T16:27:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1048656","name":"SupraSavings","why":"This add-on is being silently installed in users' systems, in violation of the <a href=\"https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines\">Add-on Guidelines</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"b0d30256-4581-1489-c241-d2e85b6c38f4","schema":1480343836083},{"guid":"helperbar@helperbar.com","blockID":"i258","enabled":true,"last_modified":1480349193254,"details":{"who":"All Firefox users who have this add-on installed. This only applies to version 1.0 of Snap.do. Version 1.1 fixed all the issues for which this block was created.","created":"2013-01-28T13:52:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=817786","name":"Snap.do","why":"This extension violates a number of our <a href=\"https://developer.mozilla.org/en-US/docs/Addons/Add-on_guidelines\">Add-on Guidelines</a>, particularly on installation and settings handling. It also causes some stability problems in Firefox due to the way the toolbar is handled.\r\n\r\nUsers who wish to keep the add-on enabled can enable it again in the Add-ons Manager."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0","severity":1}],"prefs":[],"id":"f1ede5b8-7757-5ec5-d8ed-1a01889154aa","schema":1480343836083},{"guid":"/^((support2_en@adobe14\\.com)|(XN4Xgjw7n4@yUWgc\\.com)|(C7yFVpIP@WeolS3acxgS\\.com)|(Kbeu4h0z@yNb7QAz7jrYKiiTQ3\\.com)|(aWQzX@a6z4gWdPu8FF\\.com)|(CBSoqAJLYpCbjTP90@JoV0VMywCjsm75Y0toAd\\.com)|(zZ2jWZ1H22Jb5NdELHS@o0jQVWZkY1gx1\\.com))$/","blockID":"i326","enabled":true,"last_modified":1480349193166,"details":{"who":"All users who have this add-on installed.","created":"2013-03-22T14:49:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=841791","name":"Flash Player (malware)","why":"This extension is malware, installed pretending to be the Flash Player plugin."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"3142020b-8af9-1bac-60c5-ce5ad0ff3d42","schema":1480343836083},{"guid":"newmoz@facebook.com","blockID":"i576","enabled":true,"last_modified":1480349193114,"details":{"who":"All Firefox users who have this add-on installed.","created":"2014-04-22T14:34:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=997986","name":"Facebook Service Pack (malware)","why":"This add-on is malware that hijacks Facebook user accounts and sends spam on the user's behalf."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"d85798d3-9b87-5dd9-ace2-64914b93df77","schema":1480343836083},{"guid":"flvto@hotger.com","blockID":"i1211","enabled":true,"last_modified":1480349193088,"details":{"who":"All users of this add-on. If you wish to continue using it, you can enable it in the Add-ons Manager.","created":"2016-05-04T16:26:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1270175","name":"YouTube to MP3 Button","why":"This add-on reports every visited URL to a third party without disclosing it to the user."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":1}],"prefs":[],"id":"a14d355f-719f-3b97-506c-083cc97cebaa","schema":1480343836083},{"guid":"{0F827075-B026-42F3-885D-98981EE7B1AE}","blockID":"i334","enabled":true,"last_modified":1480349192987,"details":{"who":"All Firefox users who have this extension installed.","created":"2013-04-16T13:25:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=862272","name":"Browser Protect / bProtector (malware)","why":"This extension is malicious and is installed under false pretenses, causing problems for many Firefox users. Note that this is not the same <a href=\"https://addons.mozilla.org/firefox/addon/browserprotect/\">BrowserProtect extension</a> that is listed on our add-ons site. That one is safe to use."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":3}],"prefs":[],"id":"aad4545f-8f9d-dd53-2aa8-e8945cad6185","schema":1480343836083}]}
\ No newline at end of file
new file mode 100644
--- /dev/null
+++ b/services/blocklists/certificates.json
@@ -0,0 +1,1 @@
+{"data":[{"serialNumber":"TA5iEg==","enabled":true,"last_modified":1485907697001,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","id":"16319df7-453c-d980-4624-d73d9cf43143","schema":1485795317518},{"serialNumber":"BydSYg==","enabled":true,"last_modified":1485907696954,"details":{"who":".","created":"2017-01-31T23:06:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"ec171905-2990-30e0-74bb-9fc327c1c4bd","schema":1485795317518},{"serialNumber":"Iqpyf/YoGgvHc8HiDAxAI8o=","enabled":true,"last_modified":1485907696908,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"6fa017d2-461c-8de0-f8a1-ab0531097d8e","schema":1485795317518},{"serialNumber":"Hwexgn/ZCJicZPcsIyI8zxQ=","enabled":true,"last_modified":1485907696863,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","id":"4df86909-6b1c-f7cd-c71b-bb4b895d441f","schema":1485795317518},{"serialNumber":"RnQ3dg5KdDZs0nyFZk4=","enabled":true,"last_modified":1485907696819,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","id":"0971a89d-b11f-97c9-2ac2-f706757b75fb","schema":1485795317518},{"serialNumber":"RnQ3dYovwvB0D5q2YGY=","enabled":true,"last_modified":1485907696773,"details":{"who":".","created":"2017-01-31T23:06:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1334069","name":"Revoked intermediates","why":"."},"issuerName":"MFAxJDAiBgNVBAsTG0dsb2JhbFNpZ24gRUNDIFJvb3QgQ0EgLSBSNDETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbg==","id":"d739cdcd-0078-92a9-2c46-6a5231f3d888","schema":1485795317518},{"serialNumber":"ALxyZmb/WL/wAuUiPK5oK/g=","enabled":true,"last_modified":1484704581273,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","id":"d6bedca3-c2b7-0402-337e-7788b9c97b85","schema":1484704580928},{"serialNumber":"AKrMYlJmUUin8FOM/0TJrmk=","enabled":true,"last_modified":1484704580920,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MIGFMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDErMCkGA1UEAxMiQ09NT0RPIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"42e2ce60-f40f-97a6-dd47-3ea2e2dd72d8","schema":1483471396473},{"serialNumber":"e7wSpVxmgAS5/ioLi2iBIA==","enabled":true,"last_modified":1484704580894,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD4xCzAJBgNVBAYTAlBMMRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBDQQ==","id":"59b02ba9-97ec-924b-d797-2c61c2be0d87","schema":1483471396473},{"serialNumber":"Bydrxg==","enabled":true,"last_modified":1484704580868,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"224d1360-5aed-b81f-f24c-3d34e2ca3ec4","schema":1483471396473},{"serialNumber":"Byc85g==","enabled":true,"last_modified":1484704580840,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"25a0eefb-aa44-23df-4dda-bb166836d4c1","schema":1483471396473},{"serialNumber":"CdYL9vSQCEKzBwjO10ud2w==","enabled":true,"last_modified":1484704580815,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"479ac2a4-7b6a-8db3-c5a2-be10eb5dec57","schema":1483471396473},{"serialNumber":"fbsHfUkagQtznc3rtY1uDg==","enabled":true,"last_modified":1484704580787,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"b1b1a5db-3c68-21be-8264-7146b0ee9e6b","schema":1483471396473},{"serialNumber":"AJiU+bpWh2Uc4xFRf8GM9yA=","enabled":true,"last_modified":1484704580760,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","id":"60daf8a1-a929-0177-e7ba-76fff95fd20b","schema":1483471396473},{"serialNumber":"Hnms0W0OxHSYE2F0XE97sw==","enabled":true,"last_modified":1484704580734,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"55b72394-f4c1-3001-cf84-10f2068f2768","schema":1483471396473},{"serialNumber":"Bye2Cg==","enabled":true,"last_modified":1484704580708,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"e2277fc3-1aac-7c20-0cb7-f4fd6c79eedb","schema":1483471396473},{"serialNumber":"CMNfzETd7XxesS9FOUj9Mg==","enabled":true,"last_modified":1484704580680,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","id":"49251465-af0d-3e93-cb1a-9d0b2ac356b2","schema":1483471396473},{"serialNumber":"XJ8pGvGNM9RIcLUG9YQjLQ==","enabled":true,"last_modified":1484704580653,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MDwxGzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjELMAkGA1UEBhMCSUw=","id":"c83b4498-ea23-7723-1c2c-b673115792d8","schema":1483471396473},{"serialNumber":"e9JTGBe45yw=","enabled":true,"last_modified":1484704580623,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MGoxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xOzA5BgNVBAMMMlN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBTZXJ2aWNlcyBDQSAtIEcz","id":"20d69a85-62b2-72c7-1107-110b43d2aeb2","schema":1483471396473},{"serialNumber":"YR0zGQAAAAAAAw==","enabled":true,"last_modified":1484704580597,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MGcxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpGcmF1bmhvZmVyMSEwHwYDVQQLExhGcmF1bmhvZmVyIENvcnBvcmF0ZSBQS0kxIDAeBgNVBAMTF0ZyYXVuaG9mZXIgUm9vdCBDQSAyMDA3","id":"4204c7d6-1838-5925-2461-1bc0e03515d4","schema":1483471396473},{"serialNumber":"AQw=","enabled":true,"last_modified":1484704580571,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","id":"f8c41076-a3f0-439a-9d5e-41e27e019a77","schema":1483471396473},{"serialNumber":"ESDDtMgFFiaUfKo7HD9qImM7","enabled":true,"last_modified":1484704580544,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","id":"ec0960f7-7ae1-23e7-5006-6652da817daa","schema":1483471396473},{"serialNumber":"RFlmmjulj6Ve7PfBi44nnw==","enabled":true,"last_modified":1484704580517,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"0e7b9a2c-3604-5b89-4dff-796122174bdc","schema":1483471396473},{"serialNumber":"ESBrHE7sFC7CQ8EM681xA3CY","enabled":true,"last_modified":1484704580491,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5UcnVzdCBSb290IENBIEcx","id":"0595dc75-9356-ba32-a15e-05e3072b7f54","schema":1483471396473},{"serialNumber":"AjpW","enabled":true,"last_modified":1484704580465,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"b7e26b4d-bbe1-1c4e-ef9b-12471bcb9bf8","schema":1483471396473},{"serialNumber":"a9rf7/BmG9JkKvRuy7J5QA==","enabled":true,"last_modified":1484704580438,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","id":"fcfc3b3c-0a59-d143-f5fd-7600dd8efa87","schema":1483471396473},{"serialNumber":"ZECgRdZEsns=","enabled":true,"last_modified":1484704580412,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"4652f392-127d-a5bf-4ed6-b07b9fa72247","schema":1483471396473},{"serialNumber":"AJBQSPqrEvDE2Hz8xH39Low=","enabled":true,"last_modified":1484704580385,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","id":"c279dd67-2ce1-e090-1e04-0c11fe3ddf8e","schema":1483471396473},{"serialNumber":"frj5jTuqBnQ4fljPvVU3KA==","enabled":true,"last_modified":1484704580358,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"85acb18c-16b6-12c7-83ae-1e0d94251362","schema":1483471396473},{"serialNumber":"ByfFnw==","enabled":true,"last_modified":1484704580332,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"d0da2ea3-1cad-5c9e-4c75-c83acfeabc8d","schema":1483471396473},{"serialNumber":"ByembA==","enabled":true,"last_modified":1484704580305,"details":{"who":".","created":"2017-01-18T01:12:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"fcd51190-7eaf-291e-b6e5-45e447de7291","schema":1483471396473},{"serialNumber":"RH7WhshwXRK6f0VfOfjXgQ==","enabled":true,"last_modified":1484704580277,"details":{"who":".","created":"2017-01-18T01:12:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1329981","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"003234b2-f425-eae6-9596-040747dab2b9","schema":1483471396473},{"serialNumber":"SurdtfsuPcXXDpY2LkBpYO6BT7o=","enabled":true,"last_modified":1483471394790,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"034627e4-44c6-fbf2-275a-4ed3431a4094","schema":1483471393228},{"serialNumber":"Er0moq4zwH8ke2pYafIKdg==","enabled":true,"last_modified":1483471394768,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"85c81ed8-787f-ffcf-2a63-1be622db8d04","schema":1483471393228},{"serialNumber":"BydiAg==","enabled":true,"last_modified":1483471394746,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"9194c97e-3baa-0446-9642-0d6211c3f019","schema":1483471393228},{"serialNumber":"eLumDUO40KwnecZLJxFM2A==","enabled":true,"last_modified":1483471394725,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"c2cc63c7-5274-9901-5f67-0a13355a8aa8","schema":1483471393228},{"serialNumber":"Bw==","enabled":true,"last_modified":1483471394702,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"92e2494f-f3cd-7638-7fe1-a3cb8d8939fa","schema":1483471393228},{"serialNumber":"GpO48aJ8GngtwECqZhm/xA==","enabled":true,"last_modified":1483471394681,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","id":"bdfdc34f-ba9a-7b25-6cb6-24c547eb8a10","schema":1483471393228},{"serialNumber":"Cw==","enabled":true,"last_modified":1483471394658,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"7574eb9e-6978-dcb7-5a6f-d4c3dd855254","schema":1483471393228},{"serialNumber":"IA==","enabled":true,"last_modified":1483471394635,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"d82f446f-181a-5ac3-0ced-854e3cde100c","schema":1483471393228},{"serialNumber":"OfJBIhFwAdQ=","enabled":true,"last_modified":1483471394613,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","id":"b8fdddf1-27c1-5f6e-58a1-295e2c8c0ea5","schema":1483471393228},{"serialNumber":"MABJTA==","enabled":true,"last_modified":1483471394591,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"71e08617-c00a-8b62-53c2-2a61e21e6155","schema":1483471393228},{"serialNumber":"HA==","enabled":true,"last_modified":1483471394569,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"6a6d36e6-8939-0a83-3fd5-c38652b165ed","schema":1483471393228},{"serialNumber":"DA==","enabled":true,"last_modified":1483471394547,"details":{"who":".","created":"2017-01-03T18:41:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"ME0xCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSMwIQYDVQQDDBpEaWdpZGVudGl0eSBCdXJnZXIgQ0EgLSBHMg==","id":"460643a1-23f3-1beb-0f14-ecb4b6e26cc9","schema":1483471393228},{"serialNumber":"CLc=","enabled":true,"last_modified":1483471394524,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"49eb43cf-91d4-66ce-1a86-b8674ff83d4d","schema":1483471393228},{"serialNumber":"QAAnEQ==","enabled":true,"last_modified":1483471394501,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEoxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEZMBcGA1UEAxMQU2VjdXJlIEdsb2JhbCBDQQ==","id":"bb5c827f-3458-93fe-f80f-2982f0d19d34","schema":1483471393228},{"serialNumber":"AjqK","enabled":true,"last_modified":1483471394478,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"d6f9a6d9-d936-dfaf-d396-8ae96769ef10","schema":1483471393228},{"serialNumber":"ByfNeA==","enabled":true,"last_modified":1483471394453,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"02ec8a09-2ae4-cd2a-4fa1-5037fa945391","schema":1483471393228},{"serialNumber":"JLiDzgpL7oFNgJN+jIjt7w==","enabled":true,"last_modified":1483471394090,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"5631f49c-a1fb-803e-ecf2-3ba82ca79f2e","schema":1483471393228},{"serialNumber":"BwImeaRkSZQLYwFREwKo3R1Jn+8=","enabled":true,"last_modified":1483471394067,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"c2de8edd-fd89-36dd-63d0-d3a1df92274a","schema":1483471393228},{"serialNumber":"HxT1XSjIpzjMprp9Qu1gYQ==","enabled":true,"last_modified":1483471394046,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","id":"46d4712b-6db2-ce7e-0efd-675f3be896cf","schema":1483471393228},{"serialNumber":"QDi5sA==","enabled":true,"last_modified":1483471394023,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"8acc0cad-dee8-7e2e-1799-e1a7b8b989c3","schema":1483471393228},{"serialNumber":"BA==","enabled":true,"last_modified":1483471394000,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"b9ac21bb-8c1e-e562-5418-bbf6f6323c45","schema":1483471393228},{"serialNumber":"KuzHPJLdK5hNgJRo3R47Ag==","enabled":true,"last_modified":1483471393978,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"91b7f544-9de1-efea-08d4-4ebafc9a3608","schema":1483471393228},{"serialNumber":"B+U=","enabled":true,"last_modified":1483471393956,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"86fe91df-ebb8-f20d-2031-2bc815b14a25","schema":1483471393228},{"serialNumber":"Byeaqw==","enabled":true,"last_modified":1483471393933,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"b97a8dce-04d9-7dba-6463-ae95d61524f4","schema":1483471393228},{"serialNumber":"LU4d0t7PAsZNgJGZcb+o/w==","enabled":true,"last_modified":1483471393911,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"efdf0a12-4ba1-f84d-a88d-fc384251583c","schema":1483471393228},{"serialNumber":"BAAAAAABIg08FMU=","enabled":true,"last_modified":1483471393889,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"6c0561bc-fea3-ba35-bbdb-2b2672b67d36","schema":1483471393228},{"serialNumber":"AjqL","enabled":true,"last_modified":1483471393867,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"4be7b89c-27a6-e95e-c6f9-bf652d4a0b97","schema":1483471393228},{"serialNumber":"FQ==","enabled":true,"last_modified":1483471393845,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"89946691-d008-fd14-bd7a-443206d647c6","schema":1483471393228},{"serialNumber":"BydInw==","enabled":true,"last_modified":1483471393823,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"e1a83fb0-93df-deb8-68cd-17f4997ea58b","schema":1483471393228},{"serialNumber":"JD1wxDd8IgmiqX7MyPPg1g==","enabled":true,"last_modified":1483471393801,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","id":"f5ad7ea6-4ac9-b9cd-776f-d2afb53fb91b","schema":1483471393228},{"serialNumber":"Qh/SqA==","enabled":true,"last_modified":1483471393779,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"ad8a2f72-7124-3e33-3060-414ce2bd8be3","schema":1483471393228},{"serialNumber":"J8mznxvTvOR5p4Br3a3sm5j5iM0=","enabled":true,"last_modified":1483471393750,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkZSMRMwEQYDVQQKEwpDZXJ0aW5vbWlzMRcwFQYDVQQLEw4wMDAyIDQzMzk5ODkwMzEdMBsGA1UEAxMUQ2VydGlub21pcyAtIFJvb3QgQ0E=","id":"d3f6b499-297d-e9c8-081c-44e2331bcf29","schema":1483471393228},{"serialNumber":"AIChpbGNqu4XKp9J70syKEs=","enabled":true,"last_modified":1483471393727,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","id":"f184ba74-06de-9247-104e-160b6d210962","schema":1483471393228},{"serialNumber":"Cj0=","enabled":true,"last_modified":1483471393705,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"c5fdcbc2-71d8-0a58-3375-0c7d92526cf1","schema":1483471393228},{"serialNumber":"Aw==","enabled":true,"last_modified":1483471393683,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"0e8a05ee-feae-fc46-15b9-eaa2d11f4a60","schema":1483471393228},{"serialNumber":"BAAAAAABRE7wRk4=","enabled":true,"last_modified":1483471393659,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"ac8d3825-3fef-6d3e-2690-7360d1ef57a4","schema":1483471393228},{"serialNumber":"QDi5sQ==","enabled":true,"last_modified":1483471393637,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"4b03d4c1-705b-458e-5bdc-f729f67eeb91","schema":1483471393228},{"serialNumber":"WJ2qHzWUqTk=","enabled":true,"last_modified":1483471393615,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGsxCzAJBgNVBAYTAklUMQ4wDAYDVQQHDAVNaWxhbjEjMCEGA1UECgwaQWN0YWxpcyBTLnAuQS4vMDMzNTg1MjA5NjcxJzAlBgNVBAMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBDQQ==","id":"f93061a9-8afa-1d74-e063-4134d318f00b","schema":1483471393228},{"serialNumber":"VUtahOwvvmJFwlvmGDZP5w==","enabled":true,"last_modified":1483471393592,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"9c88bc12-466d-fcdd-cc53-349d4e041332","schema":1483471393228},{"serialNumber":"L1fHogsVxmfMBka5q4uzaQ==","enabled":true,"last_modified":1483471393569,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"d3c14505-c104-150c-0a2d-e5f9e92b6152","schema":1483471393228},{"serialNumber":"cJ+vg4742XhNgJW2ot9eIg==","enabled":true,"last_modified":1483471393547,"details":{"who":".","created":"2017-01-03T18:41:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"58bf9d8a-9a68-b41f-453c-8af8844bc07c","schema":1483471393228},{"serialNumber":"LizeWXFWP5pZPI/dLc+PVQ==","enabled":true,"last_modified":1483471393221,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"cb1a1172-56d6-4150-1f50-eb2131f442f5","schema":1480617578654},{"serialNumber":"Ew==","enabled":true,"last_modified":1483471393199,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"a0ff8e3f-e68d-5ee2-21e3-26cd0f46673b","schema":1480617578654},{"serialNumber":"BAAAAAABElatX7I=","enabled":true,"last_modified":1483471393177,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"00ac492e-04f7-ee6d-5fd2-bb12b97a4b7f","schema":1480617578654},{"serialNumber":"ANX8SnNRxCmsE/GCl5hw+8A=","enabled":true,"last_modified":1483471393155,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAy","id":"a09db9b3-2faa-73ab-67ff-61dcbf700ec7","schema":1480617578654},{"serialNumber":"VBSf+IncsTB3RZS4KFCJPQ==","enabled":true,"last_modified":1483471393133,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"7e816865-7c1d-2519-f114-e69a280768f4","schema":1480617578654},{"serialNumber":"DA==","enabled":true,"last_modified":1483471393111,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFIxCzAJBgNVBAYTAk5MMRkwFwYDVQQKDBBEaWdpZGVudGl0eSBCLlYuMSgwJgYDVQQDDB9EaWdpZGVudGl0eSBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"5b760d02-fdd7-d6be-cb6f-4d30bf97746e","schema":1480617578654},{"serialNumber":"QDi5rw==","enabled":true,"last_modified":1483471393088,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"7de029af-ddf3-02be-ca26-5bb95b080d14","schema":1480617578654},{"serialNumber":"MABJSw==","enabled":true,"last_modified":1483471393066,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"411b4e82-2ddd-20c2-20b3-8d77145f6901","schema":1480617578654},{"serialNumber":"Ermwtg==","enabled":true,"last_modified":1483471393043,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","id":"9d8a83d8-d651-42a0-ac1c-0ee414f3e31a","schema":1480617578654},{"serialNumber":"Nbc68Q8EHza72P/hSWcddw==","enabled":true,"last_modified":1483471393021,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MCgxCzAJBgNVBAYTAkJFMRkwFwYDVQQDExBCZWxnaXVtIFJvb3QgQ0Ey","id":"d0513de2-6da9-d68d-78cc-a2292a9d18fb","schema":1480617578654},{"serialNumber":"Ig==","enabled":true,"last_modified":1483471392998,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"872ba8c8-a236-9ac0-85ea-08630f5b17e2","schema":1480617578654},{"serialNumber":"APdCebq8ZyZr/T0luxlicNw=","enabled":true,"last_modified":1483471392976,"details":{"who":".","created":"2017-01-03T18:41:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","id":"7a24e461-9fd0-b17f-01e0-f44866b800f1","schema":1480617578654},{"serialNumber":"Ermw0Q==","enabled":true,"last_modified":1483471392954,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","id":"fff46511-7357-4559-3d36-75fc74034299","schema":1480617578654},{"serialNumber":"Ajp/","enabled":true,"last_modified":1483471392932,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"272f2a95-6aec-f333-22ad-709d6118a87b","schema":1480617578654},{"serialNumber":"Fw==","enabled":true,"last_modified":1483471392911,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"4f0dfd30-9278-4f20-25c3-436798595b84","schema":1480617578654},{"serialNumber":"K1ftto7Xcb0YKwQ6uMvOIA==","enabled":true,"last_modified":1483471392889,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk=","id":"29eab149-524e-b1da-e2b9-dc4a784ab64b","schema":1480617578654},{"serialNumber":"STMAFQ==","enabled":true,"last_modified":1483471392867,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","id":"91609507-ef23-7672-3a5d-06dfb9b0dac4","schema":1480617578654},{"serialNumber":"U+1Y1QpJc0FOR5JdCJ01gQ==","enabled":true,"last_modified":1483471392845,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MGQxCzAJBgNVBAYTAmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAx","id":"79f39790-1151-6bb2-0a50-fc596b82bedd","schema":1480617578654},{"serialNumber":"TAA2G+UIK6mqznQKBT77NA==","enabled":true,"last_modified":1483471392823,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"d51879d6-0a85-8311-5b14-ad993cec17e6","schema":1480617578654},{"serialNumber":"Iw==","enabled":true,"last_modified":1483471392801,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"532dd854-cdef-6452-2793-1e36d091d9ec","schema":1480617578654},{"serialNumber":"Qh/O5w==","enabled":true,"last_modified":1483471392779,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"756ab100-8a14-daf7-bf06-9fe423863208","schema":1480617578654},{"serialNumber":"Ajp+","enabled":true,"last_modified":1483471392757,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MEIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9iYWwgQ0E=","id":"41f2401b-5c31-724f-ad6c-28f3f6f47634","schema":1480617578654},{"serialNumber":"AUa47POQ1dN5","enabled":true,"last_modified":1483471392735,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MFExCzAJBgNVBAYTAkpQMRMwEQYDVQQKEwpGdWppIFhlcm94MS0wKwYDVQQDEyRGdWppIFhlcm94IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDI=","id":"0956d064-8750-eee2-b0c7-7e1c2d1d6f25","schema":1480617578654},{"serialNumber":"Pgyeh2mqlVzqI9hFntRbUQ==","enabled":true,"last_modified":1483471392712,"details":{"who":".","created":"2017-01-03T18:41:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"134969c5-0bf4-4054-eaa1-b24feaa76aef","schema":1480617578654},{"serialNumber":"Gg==","enabled":true,"last_modified":1483471392689,"details":{"who":".","created":"2017-01-03T18:41:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1315199","name":"Revoked intermediates","why":"."},"issuerName":"MDQxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25h","id":"141d8e99-193b-d108-382b-7d97e6912d8c","schema":1480617578654},{"serialNumber":"ESDYXNBhF+dePFjojs7u2vj1","enabled":true,"last_modified":1480349168043,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"f7f193ca-c34e-866a-8abf-d44188a78cb0","schema":1480349159276},{"serialNumber":"TA6BjA==","enabled":true,"last_modified":1480349168021,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","id":"2a9d41c8-d3e7-a40a-a79a-899902aa73cb","schema":1480349159276},{"serialNumber":"XhcFm2g619rt8Sro+a4rHA==","enabled":true,"last_modified":1480349167999,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","id":"a01f2d94-e1ee-2139-5652-c216331e357a","schema":1480349159276},{"serialNumber":"F6QlB/yX+A==","enabled":true,"last_modified":1480349167976,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"a7fa8b99-3e2a-2c03-dffd-ab341eae59af","schema":1480349159276},{"serialNumber":"Bydxog==","enabled":true,"last_modified":1480349167954,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"35f6f9f8-eb17-39d2-50a7-2b40f01e2584","schema":1480349159276},{"serialNumber":"CqnbFQ==","enabled":true,"last_modified":1480349167931,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"3b60bc42-674b-7822-113f-c8dc6d1b015e","schema":1480349159276},{"serialNumber":"Xrr31RF0DoIzMKXS6XtD+g==","enabled":true,"last_modified":1480349167904,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGXMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEfMB0GA1UEAxMWVVROLVVTRVJGaXJzdC1IYXJkd2FyZQ==","id":"c0d2651b-f567-0f6d-ce3c-16e7d19390d0","schema":1480349159276},{"serialNumber":"Qh/SnQ==","enabled":true,"last_modified":1480349167882,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"7326aa15-9b3e-44ca-c1c5-0ed1ff29521f","schema":1480349159276},{"serialNumber":"H08=","enabled":true,"last_modified":1480349167861,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzQ=","id":"2ac02b19-f616-0dc3-6d01-28e1bea3dd93","schema":1480349159276},{"serialNumber":"NMpMcEnex3eXx4ohk9glcQ==","enabled":true,"last_modified":1480349167827,"details":{"who":".","created":"2016-03-01T21:22:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"8e453b5c-3f81-2694-2f10-73ec8c406c49","schema":1480349159276},{"serialNumber":"AQAAAAA=","enabled":true,"last_modified":1480349167797,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"a3b400ad-0b4d-aa11-e8b5-82019fbc84d5","schema":1480349159276},{"serialNumber":"Ikdj3zYXXGsC/Afm9Tvx+g==","enabled":true,"last_modified":1480349167774,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGpMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhhd3RlLCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9uMTgwNgYDVQQLEy8oYykgMjAwNiB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTEfMB0GA1UEAxMWdGhhd3RlIFByaW1hcnkgUm9vdCBDQQ==","id":"e8b2d24e-5aaf-86dd-441e-b4781d5370db","schema":1480349159276},{"serialNumber":"acI1CFIgmwSFBoU5+ahDgg==","enabled":true,"last_modified":1480349167744,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMw==","id":"938358e4-4c70-beb4-0fbe-02009feee6b6","schema":1480349159276},{"serialNumber":"BAAAAAABA/A35EU=","enabled":true,"last_modified":1480349167722,"details":{"who":".","created":"2016-01-18T14:43:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"97fbf7c4-3ef2-f54f-0029-1ba6540c63ea","schema":1480349159276},{"serialNumber":"UVKsEezpGWOVQ4W9esstng==","enabled":true,"last_modified":1480349167701,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MHcxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEoMCYGA1UEAxMfU3ltYW50ZWMgQ2xhc3MgMyBFViBTU0wgQ0EgLSBHMg==","id":"c4c22010-0cb9-e9af-005d-2483612d864e","schema":1480349159276},{"serialNumber":"F5Bg/C8eXg==","enabled":true,"last_modified":1480349167343,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"4295bb93-6e34-a58a-4d1c-238615b57cb0","schema":1480349159276},{"serialNumber":"AImQERVYPoeb","enabled":true,"last_modified":1480349167322,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","id":"4ca8f1a1-0dc0-881f-b497-cc5574f2494d","schema":1480349159276},{"serialNumber":"J2La+q+JOURNWkX60OP2lQ==","enabled":true,"last_modified":1480349167291,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"8662e9a7-fe16-d1fc-0993-d16dd2f01012","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl5ao=","enabled":true,"last_modified":1480349167269,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDEgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAxIENB","id":"7cfc5a53-f950-c15b-4dbb-8124fadcf871","schema":1480349159276},{"serialNumber":"RUT1Gehd1KKYPfqOlgspoQ==","enabled":true,"last_modified":1480349167246,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","id":"8855fafd-e48b-680d-ff15-a022057d9b9e","schema":1480349159276},{"serialNumber":"BAAAAAABKUXDqxw=","enabled":true,"last_modified":1480349167224,"details":{"who":".","created":"2016-01-18T14:41:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"0a92faa8-b870-3a38-036e-9b95185fcb6a","schema":1480349159276},{"serialNumber":"CqZgEvHAsnzkT//QV9KjXw==","enabled":true,"last_modified":1480349167202,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"39008976-298e-f664-50c0-56f8ae6c4df5","schema":1480349159276},{"serialNumber":"OUvvVscW0/NltofkmV9qmg==","enabled":true,"last_modified":1480349167179,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR8wHQYDVQQDExZHZW9UcnVzdCBTSEEyNTYgU1NMIENB","id":"a5eb3877-5e7d-200a-cee3-f63b8004d58e","schema":1480349159276},{"serialNumber":"ORFgmCj072NjcJnrxOMfQA==","enabled":true,"last_modified":1480349167156,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"995df7f2-6bd4-12c6-b1aa-fcfe7618b193","schema":1480349159276},{"serialNumber":"GN2Hrh9Ltms=","enabled":true,"last_modified":1480349167125,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"460ae779-c915-9daf-9a13-e0bf953322cb","schema":1480349159276},{"serialNumber":"ARQ=","enabled":true,"last_modified":1480349167102,"details":{"who":".","created":"2015-05-05T11:10:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155119","name":"T-Systems intermediate certificate","why":"."},"issuerName":"MHExCzAJBgNVBAYTAkRFMRwwGgYDVQQKExNEZXV0c2NoZSBUZWxla29tIEFHMR8wHQYDVQQLExZULVRlbGVTZWMgVHJ1c3QgQ2VudGVyMSMwIQYDVQQDExpEZXV0c2NoZSBUZWxla29tIFJvb3QgQ0EgMg==","id":"2826cef9-e4b4-53f9-e3cf-c5870fc778dd","schema":1480349159276},{"serialNumber":"DAk9hy8DhHSo+aQetvPB/fY=","enabled":true,"last_modified":1480349167079,"details":{"who":".","created":"2016-01-18T14:46:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"b42066e0-0c88-e02b-620f-c41c2118c4e7","schema":1480349159276},{"serialNumber":"BHk=","enabled":true,"last_modified":1480349167057,"details":{"who":".","created":"2016-11-03T12:48:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","name":"Hongkong Post e-Cert CA 1-10 certificates","why":"."},"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","id":"5048a7c5-79c8-68d7-06a3-19e8ba32e5fc","schema":1480349159276},{"serialNumber":"OnvXX72mvUI2Id/NMzegmg==","enabled":true,"last_modified":1480349167035,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"92d843e8-4e72-2832-b56f-6e488e677d0f","schema":1480349159276},{"serialNumber":"ZgwfEqZnBsUNvNuZ77FbQA==","enabled":true,"last_modified":1480349167012,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEiMCAGA1UEAxMZR2VvVHJ1c3QgRFYgU1NMIFNIQTI1NiBDQQ==","id":"73ae5fed-730d-94db-04ef-2aafd5ff75b8","schema":1480349159276},{"serialNumber":"Qh/QbQ==","enabled":true,"last_modified":1480349166989,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"6e4739fe-1aed-2320-4dc3-832043a31fc8","schema":1480349159276},{"serialNumber":"L79XLVO2ZmtAu7FAG8Wmzw==","enabled":true,"last_modified":1480349166968,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"7d2a48b3-0b2e-59ae-2002-8edb4da20bd2","schema":1480349159276},{"serialNumber":"BUrYjru5px1ym4QUN33TOQ==","enabled":true,"last_modified":1480349166946,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"e95bb238-6d35-2cce-9744-d6a672b0a874","schema":1480349159276},{"serialNumber":"ESByNJZ5TPjg9iZyL6a/h5Zx","enabled":true,"last_modified":1480349166921,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"51935a37-2964-18cf-b34c-a20c2c2250ea","schema":1480349159276},{"serialNumber":"Aw==","enabled":true,"last_modified":1480349166898,"details":{"who":".","created":"2016-11-03T12:46:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1314673","name":"SecureSign Public CA11 intermediate CA cert","why":"."},"issuerName":"MFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZpY2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RDQTEx","id":"ec4f91dd-7560-920a-f178-e8ae460dd595","schema":1480349159276},{"serialNumber":"BAAAAAABFUtaxac=","enabled":true,"last_modified":1480349166876,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"8d87b3cd-b954-f4f1-bfb2-a0e60645301c","schema":1480349159276},{"serialNumber":"ATE3ew==","enabled":true,"last_modified":1480349166855,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xLTArBgNVBAMMJFN0YWF0IGRlciBOZWRlcmxhbmRlbiBCdXJnZXIgQ0EgLSBHMg==","id":"83ac91ce-0f5e-ae4e-2010-b0da5616cd59","schema":1480349159276},{"serialNumber":"LnfcUaXG/pxV2CpXM5+YSg==","enabled":true,"last_modified":1480349166833,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"4c743a6f-af95-49a6-bd4a-d1ee8160c537","schema":1480349159276},{"serialNumber":"BGU=","enabled":true,"last_modified":1480349166811,"details":{"who":".","created":"2016-11-03T12:49:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1309305","name":"Hongkong Post e-Cert CA 1-10 certificates","why":"."},"issuerName":"MEcxCzAJBgNVBAYTAkhLMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25na29uZyBQb3N0IFJvb3QgQ0EgMQ==","id":"4de7908c-45e7-3b7f-a91a-8cefb1ecf830","schema":1480349159276},{"serialNumber":"BAAAAAABJZbEU4I=","enabled":true,"last_modified":1480349166787,"details":{"who":".","created":"2016-01-18T14:42:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"19c9a896-fbf0-8ad0-92cd-4aca2577c006","schema":1480349159276},{"serialNumber":"BAAAAAABIg08D3U=","enabled":true,"last_modified":1480349166478,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"4aec7420-aa59-53b8-1373-d3c0a7ebc837","schema":1480349159276},{"serialNumber":"CgFBQgAAAUFcf/EVAAAAAg==","enabled":true,"last_modified":1480349166455,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD8xJDAiBgNVBAoTG0RpZ2l0YWwgU2lnbmF0dXJlIFRydXN0IENvLjEXMBUGA1UEAxMORFNUIFJvb3QgQ0EgWDM=","id":"d60a94e9-3f7f-a20f-1dcc-c87ccc78fb99","schema":1480349159276},{"serialNumber":"dItWlz2V62Philqj9m6Pbg==","enabled":true,"last_modified":1480349166433,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"abb0df0d-6716-9a25-ae33-806e93276cd4","schema":1480349159276},{"serialNumber":"CcL+EA==","enabled":true,"last_modified":1480349166405,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"3cef2b9e-ddcd-cc40-8d59-49408409a3bb","schema":1480349159276},{"serialNumber":"TA6EVg==","enabled":true,"last_modified":1480349166381,"details":{"who":".","created":"2016-04-12T12:50:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263733","name":"Disney CA intermediate CA certificate","why":"."},"issuerName":"MIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp","id":"7b09e4fc-2261-e7c6-e926-5a7b5e74fc5e","schema":1480349159276},{"serialNumber":"GdXz4L1b6FKNCMG9Jz2tjA==","enabled":true,"last_modified":1480349166358,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"35f81fe8-9fa4-760b-9fd0-2de1b0191721","schema":1480349159276},{"serialNumber":"COwoDFvz7GD8R2K7Lo0rYQ==","enabled":true,"last_modified":1480349166330,"details":{"who":".","created":"2016-03-01T21:23:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"cc56260c-5f3a-3f4b-c712-78a8e7facd27","schema":1480349159276},{"serialNumber":"WD1AyQAAAAAAJQ==","enabled":true,"last_modified":1480349166308,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGKMQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEmMCQGA1UECxMdQ29weXJpZ2h0IChjKSAyMDA1IFdJU2VLZXkgU0ExFjAUBgNVBAsTDUludGVybmF0aW9uYWwxKTAnBgNVBAMTIFdJU2VLZXkgQ2VydGlmeUlEIEFkdmFuY2VkIEcxIENB","id":"8c984ecd-c61c-426a-97aa-3a808e4da482","schema":1480349159276},{"serialNumber":"GN2Hrh9LtnI=","enabled":true,"last_modified":1480349166286,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"333f6eb2-cefe-1a3b-3726-a8320b047847","schema":1480349159276},{"serialNumber":"BAAAAAABJQcQRNU=","enabled":true,"last_modified":1480349166264,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"2258e9bc-1c39-9db3-4fdb-c7eb12d0609c","schema":1480349159276},{"serialNumber":"Bg==","enabled":true,"last_modified":1480349166240,"details":{"who":".","created":"2016-07-28T12:15:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"b7fb6842-6407-8ae4-5e0f-e6daf112ed4f","schema":1480349159276},{"serialNumber":"IIxFSyNM6mWtCgTG0IL3Og==","enabled":true,"last_modified":1480349166215,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"6457eeb8-d83a-3818-c416-0dce6d71d471","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl5AQ=","enabled":true,"last_modified":1480349166191,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"de8e6484-fc97-6889-a1f9-dafd45786606","schema":1480349159276},{"serialNumber":"ByeQ9g==","enabled":true,"last_modified":1480349166170,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"bb5a82a6-8da0-5390-a7d6-843bdb0c02c2","schema":1480349159276},{"serialNumber":"EQ==","enabled":true,"last_modified":1480349166148,"details":{"who":".","created":"2016-07-28T12:17:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"dcce309f-aa60-6484-eaed-aa8310440a5c","schema":1480349159276},{"serialNumber":"R4af5A==","enabled":true,"last_modified":1480349166126,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"e60eeeb2-612e-ef08-d0b8-5e9f8e1a23a9","schema":1480349159276},{"serialNumber":"BAAAAAAA+X/GIyk=","enabled":true,"last_modified":1480349166102,"details":{"who":".","created":"2016-01-18T14:40:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"528cd047-ef3b-fc23-e37f-5d67fd3117e4","schema":1480349159276},{"serialNumber":"BYyEX2b5+K+myAIR7eXaRQ==","enabled":true,"last_modified":1480349166080,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"9be08dd3-1922-fb30-77dc-5cfcf00164a0","schema":1480349159276},{"serialNumber":"RurwlgVMxeP6Zepun0LGZA==","enabled":true,"last_modified":1480349166058,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","id":"22a74468-602c-f4ac-0003-be4ce0167258","schema":1480349159276},{"serialNumber":"AJiWmg==","enabled":true,"last_modified":1480349166036,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFgxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKTAnBgNVBAMMIFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBSb290IENB","id":"1525b265-22d6-3253-079c-c4ffca58458f","schema":1480349159276},{"serialNumber":"ESCLRVuhcUZaluIgIVlRJx+O","enabled":true,"last_modified":1480349166012,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"a6299e39-84a4-2dce-ffbb-751107660f4f","schema":1480349159276},{"serialNumber":"BAAAAAABCUVQ9No=","enabled":true,"last_modified":1480349165990,"details":{"who":".","created":"2016-01-18T14:43:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"a1d34c2f-4a03-0e35-ba5f-bc14138bcff5","schema":1480349159276},{"serialNumber":"BAAAAAABF2Tb8Bc=","enabled":true,"last_modified":1480349165968,"details":{"who":".","created":"2016-01-18T14:38:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","id":"7e19f742-420e-dbe9-f691-2d19430d75b2","schema":1480349159276},{"serialNumber":"GN2Hrh9Ltm4=","enabled":true,"last_modified":1480349165947,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"20732fc6-dd20-fe76-b6b5-b78388b64bdd","schema":1480349159276},{"serialNumber":"fMTRbGCp280pnyE/u53zbA==","enabled":true,"last_modified":1480349165925,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"44aa21e7-a92c-a0cc-6f6c-85b7ee52a87d","schema":1480349159276},{"serialNumber":"d8AtKymQwkOPDBj+hjPzFg==","enabled":true,"last_modified":1480349165591,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"014a5b67-d566-0767-c9d7-48e54115a69a","schema":1480349159276},{"serialNumber":"Os2rnHWYhryvdOXfgan06A==","enabled":true,"last_modified":1480349165569,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","id":"dc94f688-044b-f8a0-79f9-5dc2d42e3edb","schema":1480349159276},{"serialNumber":"e/fIfg2Dj2tkYIWVu2r82Cc=","enabled":true,"last_modified":1480349165547,"details":{"who":".","created":"2016-01-18T14:46:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"9e8ec7bc-0f79-42c2-c9bc-32bfbbd3b591","schema":1480349159276},{"serialNumber":"EA==","enabled":true,"last_modified":1480349165523,"details":{"who":".","created":"2016-07-28T12:16:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"362a0532-ea75-9bc6-2e50-35d9566a6ad2","schema":1480349159276},{"serialNumber":"UU3AP1SMxmyhBFq7MRFZmf0=","enabled":true,"last_modified":1480349165501,"details":{"who":".","created":"2016-01-18T14:45:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"4f2e59ff-cdf1-48ee-1122-961833187e49","schema":1480349159276},{"serialNumber":"ESBqoILo90ntDW7OTK43MS2F","enabled":true,"last_modified":1480349165479,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"0702b706-86e5-6a48-49fa-6c53b99009f3","schema":1480349159276},{"serialNumber":"GtXUVojhwOTkaQ4bTKblEQ==","enabled":true,"last_modified":1480349165453,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"9475e2f6-7247-cbe1-5055-8af86f39a149","schema":1480349159276},{"serialNumber":"KjoVfZ3by6+pL8fssyfM6A==","enabled":true,"last_modified":1480349165429,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"f4c8162a-d49b-1cbd-adb9-5e6223793aa4","schema":1480349159276},{"serialNumber":"Bydr0Q==","enabled":true,"last_modified":1480349165407,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"a85aef34-3bfe-2135-845d-466adadc414b","schema":1480349159276},{"serialNumber":"Xbevr3ut3Z9m1GuXC9SonA==","enabled":true,"last_modified":1480349165384,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"549710cf-bcaa-843c-df9d-5962bad88a9a","schema":1480349159276},{"serialNumber":"CeagHQ==","enabled":true,"last_modified":1480349165355,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"d69db231-b7b5-4d79-147b-49198f93fc10","schema":1480349159276},{"serialNumber":"EAdmaA==","enabled":true,"last_modified":1480349165329,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"618009ee-0ef1-af4b-8841-349e6f82eacc","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl7L4=","enabled":true,"last_modified":1480349165306,"details":{"who":".","created":"2016-01-18T14:47:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTElMCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMnR2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENB","id":"636c65b9-2d52-8689-023f-7a23a0baec5b","schema":1480349159276},{"serialNumber":"BAAAAAABFqoAZoI=","enabled":true,"last_modified":1480349165285,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"2b0d58aa-9c96-748f-4fc0-b1f413ca8e20","schema":1480349159276},{"serialNumber":"fwAAAQAAAUrz/HmrAAAAAg==","enabled":true,"last_modified":1480349165264,"details":{"who":".","created":"2016-02-24T20:04:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1250907","name":"IdenTrust cross certificate","why":"."},"issuerName":"MGExCzAJBgNVBAYTAlVTMRIwEAYDVQQKEwlJZGVuVHJ1c3QxIDAeBgNVBAsTF0lkZW5UcnVzdCBQdWJsaWMgU2VjdG9yMRwwGgYDVQQDExNJZGVuVHJ1c3QgQUNFUyBDQSAx","id":"352c78aa-997c-bdbe-66ba-930d66fde011","schema":1480349159276},{"serialNumber":"CeFU2w==","enabled":true,"last_modified":1480349165242,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"e8e298f0-efa2-0d08-458f-c085ee9df8f9","schema":1480349159276},{"serialNumber":"STMAjg==","enabled":true,"last_modified":1480349165209,"details":{"who":".","created":"2015-03-31T14:53:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1149603","name":"MCSHOLDING intermediate certificate","why":"."},"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","id":"c9897d2c-c68e-3c02-2f39-678954b0cf3e","schema":1480349159276},{"serialNumber":"bAOrKSMsmA0MLJyAJ5BRsUM=","enabled":true,"last_modified":1480349165175,"details":{"who":".","created":"2016-01-18T14:46:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"7d44cb3e-28a5-16dd-024c-796312f780bc","schema":1480349159276},{"serialNumber":"F5BhE0zbgQ==","enabled":true,"last_modified":1480349165145,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"29925947-91ab-16a8-a5af-65558cdb27c2","schema":1480349159276},{"serialNumber":"BAAAAAABL07hUBg=","enabled":true,"last_modified":1480349165119,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","id":"1240480e-2ef8-8ac3-4314-4e8e494741b9","schema":1480349159276},{"serialNumber":"ESCyHU+xOECnh9Rf2IvgR8zS","enabled":true,"last_modified":1480349165097,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"3980401b-c0e2-0533-f0fb-0cc04685d248","schema":1480349159276},{"serialNumber":"CdWFNw==","enabled":true,"last_modified":1480349165075,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"f06ff510-954e-b917-fda1-2c3153788d7d","schema":1480349159276},{"serialNumber":"TrKEMhb2PKktH8lHg0AV5A==","enabled":true,"last_modified":1480349165048,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"8b7985ab-ab8b-fcd2-cf88-cf8dad0f7a97","schema":1480349159276},{"serialNumber":"BAAAAAABJQdAjik=","enabled":true,"last_modified":1480349165026,"details":{"who":".","created":"2016-01-18T14:41:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"a75f5980-9149-fff9-70d5-b24121c3eaff","schema":1480349159276},{"serialNumber":"Cfk9lw==","enabled":true,"last_modified":1480349165002,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"59b587cb-401b-a5d0-8128-86c3691c4be1","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl6mw=","enabled":true,"last_modified":1480349164725,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDMgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAzIENB","id":"3cc60c06-a870-951e-1d12-4b29ee13989e","schema":1480349159276},{"serialNumber":"SdegFrLaFTCsoMAW5ED+zA==","enabled":true,"last_modified":1480349164704,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","id":"9fbfe267-c715-8f7b-d9ad-166aad9f91af","schema":1480349159276},{"serialNumber":"BAAAAAABMxvC9bk=","enabled":true,"last_modified":1480349164681,"details":{"who":".","created":"2016-01-18T14:42:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"923a5e98-11f7-cdae-b073-45b525fb2294","schema":1480349159276},{"serialNumber":"Bydp0g==","enabled":true,"last_modified":1480349164658,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"10e51569-072a-611a-c397-3050fdf22649","schema":1480349159276},{"serialNumber":"QZCrvQ==","enabled":true,"last_modified":1480349164636,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"6d791114-68b4-8c3c-ee3c-29ed83eced2e","schema":1480349159276},{"serialNumber":"AQAAAAI=","enabled":true,"last_modified":1480349164614,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"bff9c953-6690-f618-cfea-7b936f3691a6","schema":1480349159276},{"serialNumber":"Aw1SPC56593ZCZ9vCNHKwQ==","enabled":true,"last_modified":1480349164590,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"c395381f-fe34-7b6c-f56a-f20b20bf0d0d","schema":1480349159276},{"serialNumber":"BAAAAAABAJmPjfQ=","enabled":true,"last_modified":1480349164559,"details":{"who":".","created":"2016-01-18T14:44:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"24b096b4-987f-a21a-04d3-aedc9eaafc1e","schema":1480349159276},{"serialNumber":"BAAAAAABK84yjs8=","enabled":true,"last_modified":1480349164533,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","id":"8078d5ff-c93b-15d1-ebcf-607bdbfc159f","schema":1480349159276},{"serialNumber":"FJl6tXgNpSk=","enabled":true,"last_modified":1480349164510,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"7ab0a200-7ecf-576f-bff9-652fb14c3af6","schema":1480349159276},{"serialNumber":"M0VSOewW3WI=","enabled":true,"last_modified":1480349164486,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","id":"f3688c95-3934-e80a-e32f-0d5dcb2f0c4c","schema":1480349159276},{"serialNumber":"VN2yeFexyXjPf34fHGmbhg==","enabled":true,"last_modified":1480349164463,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"bbcfc451-2fcc-b380-e579-bb6d11fc7d34","schema":1480349159276},{"serialNumber":"STMAeg==","enabled":true,"last_modified":1480349164433,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDIxCzAJBgNVBAYTAkNOMQ4wDAYDVQQKEwVDTk5JQzETMBEGA1UEAxMKQ05OSUMgUk9PVA==","id":"a46be506-1dbc-41a9-2775-95d67708fb5f","schema":1480349159276},{"serialNumber":"Aa8e+91erglSMgsk/mtVaA==","enabled":true,"last_modified":1480349164410,"details":{"who":".","created":"2016-09-09T16:26:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1300977","name":"revoked.badssl.com certificate","why":"."},"issuerName":"ME0xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxJzAlBgNVBAMTHkRpZ2lDZXJ0IFNIQTIgU2VjdXJlIFNlcnZlciBDQQ==","id":"4b778ec2-ef45-c5b2-dc44-b00c87b11741","schema":1480349159276},{"serialNumber":"TurPPI6eivtNeGYdM0ZWXQ==","enabled":true,"last_modified":1480349164388,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"8192a2fa-165d-3759-fd20-4b7d8e2a0e84","schema":1480349159276},{"serialNumber":"UKKK5ol/rKBZchAAOnZjaA==","enabled":true,"last_modified":1480349164365,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAMTFHRoYXd0ZSBTSEEyNTYgU1NMIENB","id":"ca0c5f15-2808-8c94-3f77-6a277d6738b2","schema":1480349159276},{"serialNumber":"UMUwXwT1Z4juyQ/CNTf4mw==","enabled":true,"last_modified":1480349164342,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"c623e511-79c8-cbe6-6a6e-0d9896f07e71","schema":1480349159276},{"serialNumber":"Ew1ee9Jq7Q/Dig3ACF4V6Q==","enabled":true,"last_modified":1480349164320,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGTMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEbMBkGA1UEAxMSVVROIC0gREFUQUNvcnAgU0dD","id":"c011d2b4-73bc-27e5-3d3a-ab00be2a4d05","schema":1480349159276},{"serialNumber":"XLhHIg7vP+tWfRqvuKeAxw==","enabled":true,"last_modified":1480349164297,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"520c26f8-9a60-5949-0372-c9d93f9e95dd","schema":1480349159276},{"serialNumber":"E5I2y6sIonl4a+TmlXc7fw==","enabled":true,"last_modified":1480349164275,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"ee842f50-9d56-8fdf-fa55-8b55b8519b81","schema":1480349159276},{"serialNumber":"Jq6jgeApiT9O4W2Tx/NTRQ==","enabled":true,"last_modified":1480349164253,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEdMBsGA1UEAxMUVVROLVVTRVJGaXJzdC1PYmplY3Q=","id":"3b658f17-11f9-7550-d991-3e9a1397402d","schema":1480349159276},{"serialNumber":"BAAAAAABHkSl6Co=","enabled":true,"last_modified":1480349164232,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG0xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRswGQYDVQQLExJQcmltYXJ5IENsYXNzIDIgQ0ExJjAkBgNVBAMTHUdsb2JhbFNpZ24gUHJpbWFyeSBDbGFzcyAyIENB","id":"6eb0fa3b-c226-f411-0fab-df88962a5769","schema":1480349159276},{"serialNumber":"ESD9YhzIEOwiOT7Nwip+E1KI","enabled":true,"last_modified":1480349164209,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"d6172148-c2ee-a904-db40-079b10436cca","schema":1480349159276},{"serialNumber":"Eg==","enabled":true,"last_modified":1480349164187,"details":{"who":".","created":"2016-07-28T12:17:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"34561e12-916b-083e-6fa6-181b5b89ec80","schema":1480349159276},{"serialNumber":"NvEJoRYL2yvAZrAjbDIipQ==","enabled":true,"last_modified":1480349164164,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","id":"b1119d43-b3b8-1f41-6fbb-9cf2f67a521d","schema":1480349159276},{"serialNumber":"ESCC9oPNcRdPOox+SjWm9dTX","enabled":true,"last_modified":1480349163834,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"8858e9fc-cc55-54ea-fe45-c4e533c2e410","schema":1480349159276},{"serialNumber":"D9UltDPl4XVfSSqQOvdiwQ==","enabled":true,"last_modified":1480349163810,"details":{"who":".","created":"2015-03-31T11:14:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1145157","name":"live.fi certificate","why":"."},"issuerName":"MIGQMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UEAxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","id":"0a9323dd-982f-c62d-a9b4-b9d04617fc62","schema":1480349159276},{"serialNumber":"OYBKgxEHpW/8XGAGAlvJyMA=","enabled":true,"last_modified":1480349163788,"details":{"who":".","created":"2016-01-18T14:45:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"d6dfdc76-52ae-2843-3484-7fbff46f0100","schema":1480349159276},{"serialNumber":"EM8bDLBnnoYe4LnWpLIhS4esr3I=","enabled":true,"last_modified":1480349163764,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","id":"be09b295-68d1-9c01-97ee-10df36acd3ea","schema":1480349159276},{"serialNumber":"BAAAAAABJ/ufRdg=","enabled":true,"last_modified":1480349163739,"details":{"who":".","created":"2016-01-18T14:39:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"5d64f82e-9ad8-fde1-a8c9-2d94552a8ad4","schema":1480349159276},{"serialNumber":"BAAAAAABHJRKMpA=","enabled":true,"last_modified":1480349163715,"details":{"who":".","created":"2016-01-18T14:43:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"f5b2da3a-5176-b4e4-240a-181f39f6756b","schema":1480349159276},{"serialNumber":"BAAAAAABBHYoIFs=","enabled":true,"last_modified":1480349163691,"details":{"who":".","created":"2016-01-18T14:40:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"f59ed73e-f3c5-eef3-4481-3ca8af0b0688","schema":1480349159276},{"serialNumber":"BAAAAAABHhw1vwc=","enabled":true,"last_modified":1480349163668,"details":{"who":".","created":"2016-01-18T14:37:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","id":"1b1856c1-f4f5-82ca-ba57-d94739e74576","schema":1480349159276},{"serialNumber":"TqfXw+FkhxfVgE9GVMgjWQ==","enabled":true,"last_modified":1480349163645,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"60f6a3be-ad83-a868-d645-7aad77914bc8","schema":1480349159276},{"serialNumber":"LdbnCbsA9sOgI4mkUpWXPw==","enabled":true,"last_modified":1480349163622,"details":{"who":".","created":"2016-03-01T21:21:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"d839b1ed-7d39-5e57-687c-2f4d6f0514e5","schema":1480349159276},{"serialNumber":"ANygrItIJ2rcKlyS3Lue07U=","enabled":true,"last_modified":1480349163595,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEgxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEXMBUGA1UEAxMOU2VjdXJlVHJ1c3QgQ0E=","id":"d55572d9-be60-5967-948a-7dae793ab30f","schema":1480349159276},{"serialNumber":"BydeGg==","enabled":true,"last_modified":1480349163572,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"b7d8b0e0-9747-6a09-ab6b-051c57579fe9","schema":1480349159276},{"serialNumber":"ESCVop+Q4/OBgtf4WJkr01Gh","enabled":true,"last_modified":1480349163548,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"7602529c-c2ea-d18b-9b2a-fdb70ca936f9","schema":1480349159276},{"serialNumber":"BAAAAAABGMG0Gmw=","enabled":true,"last_modified":1480349163514,"details":{"who":".","created":"2016-01-18T14:42:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"317aeda4-6de7-7b11-76cb-3b0afa9aaf86","schema":1480349159276},{"serialNumber":"O2S99lVUxErLSk56GvWRv+E=","enabled":true,"last_modified":1480349163492,"details":{"who":".","created":"2016-01-18T14:47:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"27847bcc-dbaf-196f-ed5e-c1c022798717","schema":1480349159276},{"serialNumber":"By7fBTreouRwX/qrpgSUsg==","enabled":true,"last_modified":1480349163470,"details":{"who":".","created":"2016-03-01T21:16:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"322de470-76d3-a45d-740f-342a6a8eb863","schema":1480349159276},{"serialNumber":"ezdAeCxKH7BFs7vn3byYaw==","enabled":true,"last_modified":1480349163448,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"fc5bde6b-45b9-c141-7171-0a6f37e7938a","schema":1480349159276},{"serialNumber":"VLm3Xe60+1YgPpXCGtXLng==","enabled":true,"last_modified":1480349163426,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"055d66b6-8fbd-93df-f2c4-dcdb41943212","schema":1480349159276},{"serialNumber":"cDggUYfwJ3A1YcdoeT6s4A==","enabled":true,"last_modified":1480349163403,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxUaGF3dGUsIEluYy4xGzAZBgNVBAMTElRoYXd0ZSBTR0MgQ0EgLSBHMg==","id":"093f20b4-93b8-a171-cbe7-3e24a543c7e9","schema":1480349159276},{"serialNumber":"a9/VeyVWrzFD7rM2PEHwQA==","enabled":true,"last_modified":1480349163377,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"c02a9772-b351-59dc-8633-1293ac9addee","schema":1480349159276},{"serialNumber":"ESCis569omrbb20yySF39+aE","enabled":true,"last_modified":1480349163350,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"aaa19866-32ce-e842-6431-6d357fafe8d8","schema":1480349159276},{"serialNumber":"F5Bg6C237Q==","enabled":true,"last_modified":1480349163327,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"57ddfa31-3f08-298a-d7bd-712e3aaea567","schema":1480349159276},{"serialNumber":"HZyLf+K70FKc+jomm8DiDw==","enabled":true,"last_modified":1480349163302,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"452f4798-87d4-8df1-b275-177456d2f1c8","schema":1480349159276},{"serialNumber":"CskruA==","enabled":true,"last_modified":1480349163280,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"e92cad12-4098-0817-e317-3674d4242ba9","schema":1480349159276},{"serialNumber":"a12RvBNhznU=","enabled":true,"last_modified":1480349163257,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDwxHjAcBgNVBAMMFUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMCREU=","id":"33154d98-0f20-7e7d-d2d0-3244a7d1f971","schema":1480349159276},{"serialNumber":"CjM=","enabled":true,"last_modified":1480349162955,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"283b292b-1212-a713-c8be-c976c0222410","schema":1480349159276},{"serialNumber":"NTgf4iwIfeyJPIomw2dwSXEwtxQ=","enabled":true,"last_modified":1480349162930,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"542dbfc0-0faa-2398-9670-cd249525fd2c","schema":1480349159276},{"serialNumber":"Cd/dug==","enabled":true,"last_modified":1480349162902,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"3cf54b7b-336d-7c80-4596-d5a7762329d9","schema":1480349159276},{"serialNumber":"M64Z5ufZzDRVTHkJR1uXzw==","enabled":true,"last_modified":1480349162880,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNlZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBSb290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWU=","id":"5d6d86a0-7e3e-b832-83e5-afc1eb2e294f","schema":1480349159276},{"serialNumber":"BAAAAAABIBnBjWg=","enabled":true,"last_modified":1480349162857,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"0713fba9-386c-888f-cbe5-5188ff2696a4","schema":1480349159276},{"serialNumber":"fWK0j/Vi8vNWg3VAGjc02w==","enabled":true,"last_modified":1480349162835,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"a4428979-4be6-3ba2-f435-aa8e4574ffe0","schema":1480349159276},{"serialNumber":"JpUvYJyWjdGmeoH7YcYunw==","enabled":true,"last_modified":1480349162803,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","id":"929de7d6-0669-5601-0b8f-9a192bf1cb17","schema":1480349159276},{"serialNumber":"45KI4WIxyXfNrdtdj7C6","enabled":true,"last_modified":1480349162781,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"7cb25ddb-9f7e-7297-e8b4-c50d019f0cf7","schema":1480349159276},{"serialNumber":"BQ==","enabled":true,"last_modified":1480349162758,"details":{"who":".","created":"2016-07-28T12:15:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"7c28e9e7-b9ce-f4ed-8d5a-e7b9e534fba5","schema":1480349159276},{"serialNumber":"F7PAjw2k0dTX5escPnyVOBo=","enabled":true,"last_modified":1480349162734,"details":{"who":".","created":"2016-01-18T14:45:19Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"3c7e3e8e-5c25-8fbf-0006-2c92256e0a4b","schema":1480349159276},{"serialNumber":"Sx51x7V8pYe8rp7PMP/3qg==","enabled":true,"last_modified":1480349162710,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"4006917e-3260-59cd-eb3f-f4d1167cf888","schema":1480349159276},{"serialNumber":"DHmmaw==","enabled":true,"last_modified":1480349162686,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"0abfb8ad-d1b7-5f0e-cbea-630f2424171d","schema":1480349159276},{"serialNumber":"CcHC/g==","enabled":true,"last_modified":1480349162661,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"cba8acd8-a291-1ad6-9581-ed647dd5d56d","schema":1480349159276},{"serialNumber":"ATE0vw==","enabled":true,"last_modified":1480349162632,"details":{"who":".","created":"2015-05-08T10:53:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","name":"Intermediate CA's under Staat der Nederlanden Root CA","why":"."},"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"fc71cbb8-4e2a-2835-d5be-4c48cd3650bb","schema":1480349159276},{"serialNumber":"BAAAAAABLF5/HXY=","enabled":true,"last_modified":1480349162610,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"ca59600c-e90a-e85a-43b8-22bc76bb0e1f","schema":1480349159276},{"serialNumber":"BXA=","enabled":true,"last_modified":1480349162580,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDI=","id":"a44b5bf8-8158-1924-7626-e1ba2d2031f7","schema":1480349159276},{"serialNumber":"VOcIuNbTqkpOMUyI108FOg==","enabled":true,"last_modified":1480349162557,"details":{"who":".","created":"2016-03-01T21:24:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"43e72628-c1a5-2091-2dcd-41bbde768c73","schema":1480349159276},{"serialNumber":"ATFpsA==","enabled":true,"last_modified":1480349162533,"details":{"who":".","created":"2015-05-08T10:53:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","name":"Intermediate CA's under Staat der Nederlanden Root CA","why":"."},"issuerName":"MFkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKjAoBgNVBAMTIVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPdmVyaGVpZCBDQQ==","id":"325bb598-839b-f7aa-8a22-08ab8c09e803","schema":1480349159276},{"serialNumber":"UV9aaDeNRNtQuXjRYk4Skhg=","enabled":true,"last_modified":1480349162506,"details":{"who":".","created":"2016-01-18T14:45:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"c11dd0af-83d5-61ec-63af-5b816a3ae557","schema":1480349159276},{"serialNumber":"bzTw0uq05TUYEGS98bh0Ww==","enabled":true,"last_modified":1480349162483,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"6b743fc3-1ce6-8dfe-52f1-9f3e6a31f15a","schema":1480349159276},{"serialNumber":"Gd/pPu+qLnXUdvP9sW73CQ==","enabled":true,"last_modified":1480349162460,"details":{"who":".","created":"2016-03-01T21:21:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"2da11236-c2d8-7804-7de3-ffd711406b04","schema":1480349159276},{"serialNumber":"BAAAAAABJ/v3ZwA=","enabled":true,"last_modified":1480349162438,"details":{"who":".","created":"2016-10-27T17:52:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"9f6615be-a0b9-519a-1e26-2bd7aaf5953b","schema":1480349159276},{"serialNumber":"BAAAAAABGMGjftY=","enabled":true,"last_modified":1480349162415,"details":{"who":".","created":"2016-01-18T14:39:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"5f1ab732-8d48-0102-fb50-46ce74fc1a90","schema":1480349159276},{"serialNumber":"Rvm2CEw2IC2Mu/ax0A46QQ==","enabled":true,"last_modified":1480349162392,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"82f97501-85ba-bb19-f68f-ca7ce68ca7b3","schema":1480349159276},{"serialNumber":"BAAAAAABJpQ0AbA=","enabled":true,"last_modified":1480349162369,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MDsxGDAWBgNVBAoTD0N5YmVydHJ1c3QsIEluYzEfMB0GA1UEAxMWQ3liZXJ0cnVzdCBHbG9iYWwgUm9vdA==","id":"520cee2c-e36a-936e-d551-a51ee9c659c8","schema":1480349159276},{"serialNumber":"ByfHkw==","enabled":true,"last_modified":1480349161997,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"74d82589-0fde-91da-20cc-22fbd84cd0aa","schema":1480349159276},{"serialNumber":"ESC8DawWRiAyEMd38UXbfgPR","enabled":true,"last_modified":1480349161969,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"6147b64f-da46-ba30-2b9e-30b515e8f6b9","schema":1480349159276},{"serialNumber":"BAAAAAABK84ykc0=","enabled":true,"last_modified":1480349161946,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","id":"0a42070f-3149-2b91-1bbe-c54de4ed1be8","schema":1480349159276},{"serialNumber":"GN2Hrh9LtnM=","enabled":true,"last_modified":1480349161925,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"dc28966b-d7db-b55f-1606-c5bff610bf99","schema":1480349159276},{"serialNumber":"FJl6tXgNpSg=","enabled":true,"last_modified":1480349161902,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"bab58b65-8ef7-f3c2-fc13-88f72a0840f7","schema":1480349159276},{"serialNumber":"ESDItX4ruWiLnrlz0rk4/bmz","enabled":true,"last_modified":1480349161872,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"c12d5f3c-b722-948f-b367-857845ed5e8e","schema":1480349159276},{"serialNumber":"bx/XHJqcwxDOptxJ2lh5vw==","enabled":true,"last_modified":1480349161850,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","id":"a0da0bd1-8bec-4c82-fb9b-636ddcde057d","schema":1480349159276},{"serialNumber":"Mq0P6o03FDk0B2bnJ+mYPGo=","enabled":true,"last_modified":1480349161828,"details":{"who":".","created":"2016-01-18T14:47:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"54f096a5-3608-9b68-ddca-a200e799ba06","schema":1480349159276},{"serialNumber":"BAAAAAABJ/ufQg8=","enabled":true,"last_modified":1480349161807,"details":{"who":".","created":"2016-01-18T14:43:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"61db13cb-74d9-e675-a1e8-db5f78eb3f4e","schema":1480349159276},{"serialNumber":"BAAAAAABM6d3Z0s=","enabled":true,"last_modified":1480349161785,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"b9c439ef-fcf3-2263-c14e-80727cbef898","schema":1480349159276},{"serialNumber":"FNISyWWTGi5Yco6fGh58/A==","enabled":true,"last_modified":1480349161763,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xGzAZBgNVBAMTEnRoYXd0ZSBTU0wgQ0EgLSBHMg==","id":"bab0ff94-c98e-7843-97b3-a4d1e044715b","schema":1480349159276},{"serialNumber":"VfTSum25nb65YPlpuhJAvg==","enabled":true,"last_modified":1480349161740,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","id":"91149dc9-6cc4-a670-1799-7bd05c159858","schema":1480349159276},{"serialNumber":"OhrtngFwotLcm4i+z00SjA==","enabled":true,"last_modified":1480349161718,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH8xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEwMC4GA1UEAxMnU3ltYW50ZWMgQ2xhc3MgMyBFQ0MgMjU2IGJpdCBFViBDQSAtIEcy","id":"337e2f4b-02c4-c70d-55be-09c8ea41731c","schema":1480349159276},{"serialNumber":"AN9bfYOvlR1t","enabled":true,"last_modified":1480349161696,"details":{"who":".","created":"2015-07-13T09:05:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181126","name":"RCS Certification Authority","why":"."},"issuerName":"MDcxJDAiBgNVBAMTG1JDUyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEPMA0GA1UEChMGSFQgc3Js","id":"18c0d37b-739d-04c6-04f2-a615be5b9948","schema":1480349159276},{"serialNumber":"F5BhENPfVw==","enabled":true,"last_modified":1480349161666,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"72a65abf-9828-365f-4d4a-78457d7bdec4","schema":1480349159276},{"serialNumber":"ESISuBo/wdW2tBztKmHdFCFz","enabled":true,"last_modified":1480349161641,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"2ad44cbf-32ca-5245-c881-6d6f290ac2c1","schema":1480349159276},{"serialNumber":"CrTHPEE6AZSfI3jysin2bA==","enabled":true,"last_modified":1480349161619,"details":{"who":".","created":"2015-09-21T13:21:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1205651","name":"Misused certificate","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHjAcBgNVBAMTFXRoYXd0ZSBFViBTU0wgQ0EgLSBHMw==","id":"13987e52-821e-1fe3-3743-393136b17167","schema":1480349159276},{"serialNumber":"WX89jn8yGZVvoKTD9jDfRQ==","enabled":true,"last_modified":1480349161596,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMg==","id":"a15c9fa5-cd6e-362d-1341-1e95c11c38fb","schema":1480349159276},{"serialNumber":"JV/LVzSKI/wsDgg3UuZHlA==","enabled":true,"last_modified":1480349161575,"details":{"who":".","created":"2016-03-01T21:22:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1252142","name":"exceptional SHA-1 Certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"ba7935ef-b624-3eef-5ae8-a78044ec3af0","schema":1480349159276},{"serialNumber":"sPNcCSE9Nkg3jy5IN1xe2Q==","enabled":true,"last_modified":1480349161553,"details":{"who":".","created":"2016-01-18T14:44:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"edc761c4-8b47-5314-0cd1-c894612ebfc3","schema":1480349159276},{"serialNumber":"buROL/l2GuXISv+/JVLkdA==","enabled":true,"last_modified":1480349161531,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA2IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNQ==","id":"963548ca-bde2-1843-f140-1c26e8e40def","schema":1480349159276},{"serialNumber":"Cfk9oA==","enabled":true,"last_modified":1480349161510,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"e85980d5-12f0-f624-7904-2d6cedeacd55","schema":1480349159276},{"serialNumber":"IyIVazG4RE9AERkb+ekH8w==","enabled":true,"last_modified":1480349161489,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"be3014a7-3d3b-08c7-02d9-5a74f601a1b1","schema":1480349159276},{"serialNumber":"HNo1DR4XCe4mS1iUMsY6Wg==","enabled":true,"last_modified":1480349161466,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"fd51f7d8-2006-663f-4779-3cf559ee5e74","schema":1480349159276},{"serialNumber":"Ai7cBJYqBE0I9NdyoZfRrw==","enabled":true,"last_modified":1480349161443,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"f7582bc8-dbdb-37dd-b24c-418242bbc4e0","schema":1480349159276},{"serialNumber":"UUFV3S2cUidOOv7ESN65Ng==","enabled":true,"last_modified":1480349161103,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"24ccf065-b88b-0fc9-1d1f-6c7722ca4faa","schema":1480349159276},{"serialNumber":"EDQMI0tR4kSntv1O37N10g==","enabled":true,"last_modified":1480349161077,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","id":"e7509e16-1cd3-599e-2630-495ab52d3b71","schema":1480349159276},{"serialNumber":"BAAAAAABI54PryQ=","enabled":true,"last_modified":1480349161051,"details":{"who":".","created":"2016-01-18T14:48:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MIGBMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTElMCMGA1UECxMcUHJpbWFyeSBPYmplY3QgUHVibGlzaGluZyBDQTEwMC4GA1UEAxMnR2xvYmFsU2lnbiBQcmltYXJ5IE9iamVjdCBQdWJsaXNoaW5nIENB","id":"e3bd531e-1ee4-7407-27ce-6fdc9cecbbdc","schema":1480349159276},{"serialNumber":"Byc68g==","enabled":true,"last_modified":1480349161021,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"308f27b5-fc0e-da9a-2b7f-e65a1cb5cd47","schema":1480349159276},{"serialNumber":"AuhvPsYZfVP6UDsuyjeZ4Q==","enabled":true,"last_modified":1480349160991,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MHMxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEkMCIGA1UEAxMbU3ltYW50ZWMgQ2xhc3MgMyBEU0EgU1NMIENB","id":"a0482eed-1e3f-7b9f-a433-94e4a4da49a1","schema":1480349159276},{"serialNumber":"BAAAAAABMrS7t2g=","enabled":true,"last_modified":1480349160963,"details":{"who":".","created":"2016-01-18T14:39:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"41a888b9-2e84-9782-69dc-d9153a3bd3aa","schema":1480349159276},{"serialNumber":"Ermwxw==","enabled":true,"last_modified":1480349160941,"details":{"who":".","created":"2016-07-21T16:52:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1197885","name":"SECOM intermediate certificate","why":"."},"issuerName":"MFAxCzAJBgNVBAYTAkpQMRgwFgYDVQQKEw9TRUNPTSBUcnVzdC5uZXQxJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMQ==","id":"1220feb9-9e66-0b24-3409-c5d1a1f8d24f","schema":1480349159276},{"serialNumber":"BAAAAAABCfhiO+s=","enabled":true,"last_modified":1480349160914,"details":{"who":".","created":"2016-01-18T14:36:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","id":"e17ded97-6669-eecc-54fa-81f9a81ed281","schema":1480349159276},{"serialNumber":"cXXMzbWDHMIdCotb3h64yw==","enabled":true,"last_modified":1480349160892,"details":{"who":".","created":"2016-07-21T16:58:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1288354","name":"Symantec AATL ECC Intermediate CA cert","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA3IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHNA==","id":"a9970f7e-bac4-3b91-eae3-b0335ce0d1c2","schema":1480349159276},{"serialNumber":"OqQ2rV0ISTc308Z/oQgzFw==","enabled":true,"last_modified":1480349160870,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","id":"781f8787-6508-d6aa-c508-13ac2bb0d930","schema":1480349159276},{"serialNumber":"Cyr1PA==","enabled":true,"last_modified":1480349160848,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"ec93f86d-fea2-7eea-42d4-7cf7a397e097","schema":1480349159276},{"serialNumber":"F5Bg+EziQQ==","enabled":true,"last_modified":1480349160826,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"64229466-b4da-c63f-e088-ab1b5ba37930","schema":1480349159276},{"serialNumber":"BAAAAAABEAuMoRs=","enabled":true,"last_modified":1480349160804,"details":{"who":".","created":"2016-10-27T17:52:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"fe2dd507-9fc4-a6db-7ee0-255452bea28a","schema":1480349159276},{"serialNumber":"BAAAAAABHkSHlSo=","enabled":true,"last_modified":1480349160782,"details":{"who":".","created":"2016-01-18T14:39:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"04460239-09d9-2a76-191e-f344a8e5d0bd","schema":1480349159276},{"serialNumber":"BAAAAAABKB/OGqI=","enabled":true,"last_modified":1480349160759,"details":{"who":".","created":"2016-01-18T14:41:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"6b5475ec-8181-e7b8-4245-c7e2ffed213c","schema":1480349159276},{"serialNumber":"ESDu2nhlLPzfx+LYgjlYFP/k","enabled":true,"last_modified":1480349160736,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"dc98c4eb-836f-6ca0-6673-6678fc45516a","schema":1480349159276},{"serialNumber":"BA==","enabled":true,"last_modified":1480349160714,"details":{"who":".","created":"2016-07-28T12:14:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1289808","name":"FNMT revoked intermediate certificates","why":"."},"issuerName":"MDsxCzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBGTk1ULVJDTQ==","id":"765f426d-748a-5f3d-e409-35eac9be8240","schema":1480349159276},{"serialNumber":"Aw==","enabled":true,"last_modified":1480349160684,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGFMQswCQYDVQQGEwJVUzEgMB4GA1UECgwXV2VsbHMgRmFyZ28gV2VsbHNTZWN1cmUxHDAaBgNVBAsME1dlbGxzIEZhcmdvIEJhbmsgTkExNjA0BgNVBAMMLVdlbGxzU2VjdXJlIFB1YmxpYyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ==","id":"644e3fde-7ab5-556a-85ef-c5fac8b8c7de","schema":1480349159276},{"serialNumber":"BAAAAAABMYnGRuw=","enabled":true,"last_modified":1480349160660,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"0a9335d8-3fa3-5d0b-7b27-72ddd14b5f74","schema":1480349159276},{"serialNumber":"Byd5cg==","enabled":true,"last_modified":1480349160638,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"f046b001-5aa9-09b4-995d-23ad9f15db30","schema":1480349159276},{"serialNumber":"ESJJweWBPhoXAaB9c8SHwI4O","enabled":true,"last_modified":1480349160614,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"1bdc6228-2f9d-ad26-30b2-408959ede857","schema":1480349159276},{"serialNumber":"LTRcDHabRHU=","enabled":true,"last_modified":1480349160593,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MGExCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xMjAwBgNVBAMMKVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPcmdhbmlzYXRpZSBDQSAtIEcy","id":"86e95439-a9f5-e04e-5241-268cf0186425","schema":1480349159276},{"serialNumber":"YNOos6YJoPC77qwSGCpb7w==","enabled":true,"last_modified":1480349160571,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"3c4f4898-da76-0a38-a765-18d9436285f2","schema":1480349159276},{"serialNumber":"BAAAAAABHkSHki0=","enabled":true,"last_modified":1480349160547,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"e057bdab-4ad6-7e50-83ce-1099b84cce04","schema":1480349159276},{"serialNumber":"A9GPKQ8jv9oIxfwiOy7qxQ==","enabled":true,"last_modified":1480349160524,"details":{"who":".","created":"2016-07-14T14:40:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286752","name":"Symantec erroneous SHA-1 certificates","why":"."},"issuerName":"MIG8MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMTYwNAYDVQQDEy1WZXJpU2lnbiBDbGFzcyAzIEludGVybmF0aW9uYWwgU2VydmVyIENBIC0gRzM=","id":"4bb8966b-1db9-844d-4904-d823539cdf7e","schema":1480349159276},{"serialNumber":"Cbssdw==","enabled":true,"last_modified":1480349160216,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"661e65a5-ee0b-7a82-12c3-731cb560e112","schema":1480349159276},{"serialNumber":"CcHC1w==","enabled":true,"last_modified":1480349160190,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"26890617-93ad-e85f-550a-afb414cd110c","schema":1480349159276},{"serialNumber":"DjIvBkX+ECVbB/C3i6w2Gg==","enabled":true,"last_modified":1480349160165,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"657b91b1-9447-8c4a-db57-e0f0e2b10439","schema":1480349159276},{"serialNumber":"UoRGnb96CUDTxIqVry6LBg==","enabled":true,"last_modified":1480349160143,"details":{"who":".","created":"2015-04-07T11:04:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1150585","name":"XS4ALL certificate","why":"."},"issuerName":"MIGQMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UEAxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB","id":"9084bc79-01cf-2ddc-b077-cd6c6251dd2b","schema":1480349159276},{"serialNumber":"PAdKZPiaac2CvPxbOrsHOw==","enabled":true,"last_modified":1480349160119,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"b79e2eb5-754d-4c21-1d8a-8c363f70dadc","schema":1480349159276},{"serialNumber":"EqthLKdUgwI=","enabled":true,"last_modified":1480349160086,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGQMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxOzA5BgNVBAMTMkFyaXN0b3RsZSBVbml2ZXJzaXR5IG9mIFRoZXNzYWxvbmlraSBDZW50cmFsIENBIFI0","id":"5b9744a8-bd65-b926-2920-8d8e5e1acd7d","schema":1480349159276},{"serialNumber":"OE4/d+p3YRzzcSl+kmZ8Mw==","enabled":true,"last_modified":1480349160058,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGgxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEiMCAGA1UEAxMZR2VvVHJ1c3QgRFYgU1NMIFNIQTI1NiBDQQ==","id":"fd2fe6f3-d095-5c3d-3c6b-afe00cb665c0","schema":1480349159276},{"serialNumber":"QZCrvA==","enabled":true,"last_modified":1480349160028,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGCMQswCQYDVQQGEwJVUzEeMBwGA1UECxMVd3d3LnhyYW1wc2VjdXJpdHkuY29tMSQwIgYDVQQKExtYUmFtcCBTZWN1cml0eSBTZXJ2aWNlcyBJbmMxLTArBgNVBAMTJFhSYW1wIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ==","id":"32f968f5-4426-66ad-d1ab-9dda7b6f0c85","schema":1480349159276},{"serialNumber":"AygWP2Fgd2T+iLbmAlKT6g==","enabled":true,"last_modified":1480349159993,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"e23bcca2-1fb1-abd2-5ed7-892c5f08c4ff","schema":1480349159276},{"serialNumber":"CqL7CA==","enabled":true,"last_modified":1480349159963,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"1a0c71ac-7f34-eeb0-2f71-1c14ee8e6552","schema":1480349159276},{"serialNumber":"E77H6yvyFQjO0PcN3x0H+Q==","enabled":true,"last_modified":1480349159939,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MH4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEvMC0GA1UEAxMmU3ltYW50ZWMgQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBIC0gRzQ=","id":"be9e31eb-6a06-7699-708a-732a081a10c7","schema":1480349159276},{"serialNumber":"YRJNfMoc12IpmW+Enpv3Pdo=","enabled":true,"last_modified":1480349159914,"details":{"who":".","created":"2016-01-18T14:46:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MFwxCzAJBgNVBAYTAkJFMRUwEwYDVQQLEwxUcnVzdGVkIFJvb3QxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExGzAZBgNVBAMTElRydXN0ZWQgUm9vdCBDQSBHMg==","id":"3bb8f2d9-511b-121d-da29-23041d3c15c1","schema":1480349159276},{"serialNumber":"ATFEdg==","enabled":true,"last_modified":1480349159890,"details":{"who":".","created":"2015-05-08T10:54:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155114","name":"Intermediate CA's under Staat der Nederlanden Root CA","why":"."},"issuerName":"MFkxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVkZXJsYW5kZW4xKjAoBgNVBAMTIVN0YWF0IGRlciBOZWRlcmxhbmRlbiBPdmVyaGVpZCBDQQ==","id":"4a17f132-602c-2d30-a781-145087794075","schema":1480349159276},{"serialNumber":"e0bEFhI16xx9U1yvlI56rA==","enabled":true,"last_modified":1480349159869,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEExCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxUaGF3dGUsIEluYy4xGzAZBgNVBAMTElRoYXd0ZSBTR0MgQ0EgLSBHMg==","id":"07b97387-d755-0bbb-6e4c-616a7cb69cb4","schema":1480349159276},{"serialNumber":"GN2Hrh9LtnA=","enabled":true,"last_modified":1480349159846,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"b3fb394d-f951-b49e-d856-f93028850feb","schema":1480349159276},{"serialNumber":"AQAAAAU=","enabled":true,"last_modified":1480349159825,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"2448ada0-833d-0d4d-3bcd-2c73cff02fb4","schema":1480349159276},{"serialNumber":"BAAAAAABCFiEp9s=","enabled":true,"last_modified":1480349159804,"details":{"who":".","created":"2016-01-18T14:38:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MF8xCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRQwEgYDVQQLEwtQYXJ0bmVycyBDQTEfMB0GA1UEAxMWR2xvYmFsU2lnbiBQYXJ0bmVycyBDQQ==","id":"5cef5dc2-95f2-0ac8-3273-153a09d3d227","schema":1480349159276},{"serialNumber":"CSY=","enabled":true,"last_modified":1480349159782,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"b4c9041b-f5a5-dec1-b221-7286a32a6309","schema":1480349159276},{"serialNumber":"BAAAAAABHJRKNmk=","enabled":true,"last_modified":1480349159760,"details":{"who":".","created":"2016-01-18T14:44:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"824e9b09-808e-e8cb-f2dd-ba669df011bc","schema":1480349159276},{"serialNumber":"DYifRdP6aQQ8MLbXZY2f5g==","enabled":true,"last_modified":1480349159739,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHTAbBgNVBAsTFERvbWFpbiBWYWxpZGF0ZWQgU1NMMR4wHAYDVQQDExV0aGF3dGUgRFYgU1NMIENBIC0gRzI=","id":"59a292db-d567-6485-167f-1cb5af33f437","schema":1480349159276},{"serialNumber":"BAAAAAABL07hTcY=","enabled":true,"last_modified":1480349159716,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFYxCzAJBgNVBAYTAkpQMQ8wDQYDVQQKEwZKSVBERUMxGjAYBgNVBAsTEUpDQU4gU3ViIFJvb3QgQ0EwMRowGAYDVQQDExFKQ0FOIFN1YiBSb290IENBMA==","id":"0a5a0233-bb8a-e4cc-5bb6-03cee44a07c2","schema":1480349159276},{"serialNumber":"L7tgs/W85vnhV7I7qJ6N/g==","enabled":true,"last_modified":1480349159694,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MF4xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBLSSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"e38e4e46-413a-eac8-9e85-1b9ee06f535d","schema":1480349159276},{"serialNumber":"BAAAAAABLM/7qjk=","enabled":true,"last_modified":1480349159673,"details":{"who":".","created":"2016-01-18T14:40:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"62dfeb32-e132-09a3-e4ba-e48c21d027de","schema":1480349159276},{"serialNumber":"BAAAAAABHkSHjz8=","enabled":true,"last_modified":1480349159649,"details":{"who":".","created":"2016-01-18T14:41:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"880134d0-617c-ec1b-3568-4c74af31bcc1","schema":1480349159276},{"serialNumber":"Cfk9qg==","enabled":true,"last_modified":1480349159625,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpERk4tVmVyZWluMRAwDgYDVQQLEwdERk4tUEtJMSQwIgYDVQQDExtERk4tVmVyZWluIFBDQSBHbG9iYWwgLSBHMDE=","id":"9debdd66-d615-073f-26f7-011a8c54b484","schema":1480349159276},{"serialNumber":"AQAAAAM=","enabled":true,"last_modified":1480349159267,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"e4d16e1f-ac86-e9c0-2122-8a7d7d2dcdc0","schema":1480343774567},{"serialNumber":"ESAyW/JX3+hZIp44EAMlXU2b","enabled":true,"last_modified":1480349159244,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"6b135741-bfc6-1b3f-eb4b-4569aae2ab34","schema":1480343774567},{"serialNumber":"AQAAAAQ=","enabled":true,"last_modified":1480349159206,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGVMQswCQYDVQQGEwJHUjFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE=","id":"263f03a7-53f0-2140-89a5-46e7740d755a","schema":1480343774567},{"serialNumber":"ESByYNtAIfizf2L3NMzCH8zZ","enabled":true,"last_modified":1480349159183,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"853889e5-ad93-77ea-f9c0-a0907c9a3576","schema":1480343774567},{"serialNumber":"BYOGvG32ukb1Yxj2oKoFyw==","enabled":true,"last_modified":1480349159159,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"b049208e-5f4c-60a6-ac91-45f093defc33","schema":1480343774567},{"serialNumber":"P6G7IYSL2RZxtzTh8I6qPA==","enabled":true,"last_modified":1480349159136,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzI=","id":"222a4201-120e-64f4-5f6f-b2314470365c","schema":1480343774567},{"serialNumber":"D/wZ7+m1Mv8SONSEFcs73w==","enabled":true,"last_modified":1480349159113,"details":{"who":".","created":"2016-10-27T17:52:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGuMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTE2MDQGA1UEAxMtVVROLVVTRVJGaXJzdC1DbGllbnQgQXV0aGVudGljYXRpb24gYW5kIEVtYWls","id":"d7fdf5b8-f8a5-b105-297d-d0e3617e59fc","schema":1480343774567},{"serialNumber":"eR1nUEz8k+nDSBD+bb5uIQ==","enabled":true,"last_modified":1480349159091,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIG9MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNhbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5","id":"f6fb7b44-64cd-37b9-b9f6-fbe1210cb160","schema":1480343774567},{"serialNumber":"QZBvapTZFvmYktEPsBYLQQ==","enabled":true,"last_modified":1480349159069,"details":{"who":".","created":"2016-04-28T21:08:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MIG1MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhIChjKTEwMS8wLQYDVQQDEyZWZXJpU2lnbiBDbGFzcyAzIFNlY3VyZSBTZXJ2ZXIgQ0EgLSBHMw==","id":"b6f5b3ee-6cac-57a7-b4e9-83e84f1020b8","schema":1480343774567},{"serialNumber":"BAAAAAABKUXDqA8=","enabled":true,"last_modified":1480349159034,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"e48f4383-6df1-0a9b-8063-a2add391a879","schema":1480343774567},{"serialNumber":"BAAAAAABLF5/Gog=","enabled":true,"last_modified":1480349159011,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0E=","id":"bc0be7d5-b8d3-1ac2-8a63-f5bf8b00ba3c","schema":1480343774567},{"serialNumber":"UW3oKZKTDsrPy/rfwmGNaQ==","enabled":true,"last_modified":1480349158980,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEgMB4GA1UEAxMXR2VvVHJ1c3QgRFYgU1NMIENBIC0gRzM=","id":"2a14bce1-47bb-e067-74a6-46be30e576a7","schema":1480343774567},{"serialNumber":"CSU=","enabled":true,"last_modified":1480349158957,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEUxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9WYWRpcyBSb290IENBIDM=","id":"77e152ae-89a4-53b1-62d4-fb7c2cd5037b","schema":1480343774567},{"serialNumber":"U3t2Vk8pfxTcaUPpIq0seQ==","enabled":true,"last_modified":1480349158934,"details":{"who":".","created":"2016-10-27T17:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3Q=","id":"2c8f7191-fc5f-c2e0-af8d-852faefcdadf","schema":1480343774567},{"serialNumber":"BAAAAAABAPpuVh0=","enabled":true,"last_modified":1480349158899,"details":{"who":".","created":"2016-01-18T14:38:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1155145","name":"GlobalSign certs","why":"."},"issuerName":"MHExKDAmBgNVBAMTH0dsb2JhbFNpZ24gUm9vdFNpZ24gUGFydG5lcnMgQ0ExHTAbBgNVBAsTFFJvb3RTaWduIFBhcnRuZXJzIENBMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMQswCQYDVQQGEwJCRQ==","id":"fce6cca1-707c-c4f2-6de2-26c4663cda01","schema":1480343774567},{"serialNumber":"U4P1tUoxl/XkztlVHdtdgw==","enabled":true,"last_modified":1480349158876,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw==","id":"ed4d2530-eb3e-800f-41b2-e70023185673","schema":1480343774567},{"serialNumber":"U3SgRR3J+D6575WuCxuXeQ==","enabled":true,"last_modified":1480349158854,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MHsxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEsMCoGA1UEAxMjU3ltYW50ZWMgQ2xhc3MgMyBFQ0MgMjU2IGJpdCBTU0wgQ0E=","id":"72e44e74-fb5d-fc97-abdd-02050d3ab727","schema":1480343774567},{"serialNumber":"EEpERSryZFMagbsNw/WoWQ==","enabled":true,"last_modified":1480349158820,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MIGXMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVVQxFzAVBgNVBAcTDlNhbHQgTGFrZSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxITAfBgNVBAsTGGh0dHA6Ly93d3cudXNlcnRydXN0LmNvbTEfMB0GA1UEAxMWVVROLVVTRVJGaXJzdC1IYXJkd2FyZQ==","id":"a4f11626-67e9-24e5-81a5-aca8126934c3","schema":1480343774567},{"serialNumber":"BAAAAAABJQcQQN0=","enabled":true,"last_modified":1480349158794,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBDQSAtIFIzMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu","id":"e7328f54-0f56-48a2-3bab-d4c9b41a2b13","schema":1480343774567},{"serialNumber":"BydKkg==","enabled":true,"last_modified":1480349158772,"details":{"who":".","created":"2016-10-27T17:52:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MFoxCzAJBgNVBAYTAklFMRIwEAYDVQQKEwlCYWx0aW1vcmUxEzARBgNVBAsTCkN5YmVyVHJ1c3QxIjAgBgNVBAMTGUJhbHRpbW9yZSBDeWJlclRydXN0IFJvb3Q=","id":"6b9bc0cc-c1fa-50eb-5ece-812ee9bac5b6","schema":1480343774567},{"serialNumber":"cpqpXVWPk5AXzGw+zNIcBw==","enabled":true,"last_modified":1480349158750,"details":{"who":".","created":"2016-04-28T21:08:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MEQxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQDExRHZW9UcnVzdCBTU0wgQ0EgLSBHMw==","id":"ac8d05cd-d85d-8caa-ed13-261b83c183c2","schema":1480343774567},{"serialNumber":"CWhp","enabled":true,"last_modified":1480349158726,"details":{"who":".","created":"2016-04-28T21:08:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267648","name":"Symantec test certificates","why":"."},"issuerName":"MGExCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRhdGVkIFNTTDEbMBkGA1UEAxMSR2VvVHJ1c3QgRFYgU1NMIENB","id":"ff01b36d-3bcc-2157-1f89-b1841120c97e","schema":1480343774567},{"serialNumber":"ESCEUbthDurBjJw0/h/FfuNY","enabled":true,"last_modified":1480349158695,"details":{"who":".","created":"2016-10-27T17:52:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MD0xCzAJBgNVBAYTAkZSMREwDwYDVQQKEwhDZXJ0cGx1czEbMBkGA1UEAxMSQ2xhc3MgMiBQcmltYXJ5IENB","id":"2c047b2c-43aa-d0be-e2c9-2acac789bd55","schema":1480343774567},{"serialNumber":"TXxtAQ==","enabled":true,"last_modified":1480349158671,"details":{"who":".","created":"2016-10-27T17:52:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1312150","name":"Revoked intermediates","why":"."},"issuerName":"MEoxCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdTZWN1cmVUcnVzdCBDb3Jwb3JhdGlvbjEZMBcGA1UEAxMQU2VjdXJlIEdsb2JhbCBDQQ==","id":"ea4847df-ca17-c476-11df-b14c1d6658a0","schema":1480343774567},{"serialNumber":"YR3YYQAAAAAABA==","enabled":true,"last_modified":1480349158647,"details":{"who":".","created":"2015-05-08T10:51:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1142137","name":"T-Systems intermediate cert","why":"."},"issuerName":"MGcxCzAJBgNVBAYTAkRFMRMwEQYDVQQKEwpGcmF1bmhvZmVyMSEwHwYDVQQLExhGcmF1bmhvZmVyIENvcnBvcmF0ZSBQS0kxIDAeBgNVBAMTF0ZyYXVuaG9mZXIgUm9vdCBDQSAyMDA3","id":"ae8bec3c-3b92-822e-53f1-68394cbb1758","schema":1480343774567}]}
\ No newline at end of file
new file mode 100644
--- /dev/null
+++ b/services/blocklists/gfx.json
@@ -0,0 +1,1 @@
+{"data":[{"vendor":"0x10de","blockID":"g200","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"ae36a32e-5f4f-2f98-804f-22b0de5e7bfa","last_modified":1480349135384,"details":{"who":"All Firefox users.","created":"2012-11-12T10:35:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=809550","name":"Mac OS X WebGL anti-aliasing","why":"Security problems."},"os":"Darwin 11","featureStatus":"BLOCKED_DEVICE","schema":1480349134676},{"driverVersionComparator":"EQUAL","driverVersion":"10.18.10.3947","vendor":"0x8086","blockID":"g1217","enabled":true,"feature":"HARDWARE_VIDEO_DECODING","devices":[],"id":"a3fe9700-b9e6-1c31-f94b-030f72f4aa07","last_modified":1480349135360,"details":{"who":".","created":"2016-05-23T15:43:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266220","name":"10.18.10.3947 winnt 6.0","why":"."},"os":"WINNT 6.0","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"driverVersionComparator":"EQUAL","driverVersion":"8.15.10.2086","vendor":"0x8086","blockID":"g1124","enabled":true,"devices":["0x2a42","0x2e22","0x2e12","0x2e32","0x0046"],"id":"851c8fcb-5763-bf89-813d-0f98cdd6f8c1","last_modified":1480349135337,"details":{"who":".","created":"2016-02-22T23:40:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1170143","name":"Intel Driver 8.15.10.2086","why":"."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"vendor":"0x10de","blockID":"g202","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"a825cb5d-36f6-54b0-31b3-6668aae49cdd","last_modified":1480349135314,"details":{"who":"All Firefox users.","created":"2012-11-12T10:37:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=809550","name":"Mac OS X WebGL anti-aliasing","why":"Security problems."},"os":"Darwin 12","featureStatus":"BLOCKED_DEVICE","schema":1480349134676},{"vendor":"0x8086","blockID":"g208","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"a8e8aa1a-8e70-af51-065d-81ed31d23221","last_modified":1480349135291,"details":{"who":"All Firefox users.","created":"2012-11-12T10:42:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=809550","name":"Mac OS X WebGL anti-aliasing","why":"Security problems"},"os":"Darwin 12","featureStatus":"BLOCKED_DEVICE","schema":1480349134676},{"driverVersionComparator":"EQUAL","driverVersion":"8.15.10.1994","vendor":"0x8086","blockID":"g1073","enabled":true,"devices":["0x2a42","0x2e22","0x2e12","0x2e32","0x0046"],"id":"13f75dff-c65f-eab1-4be5-864a79503ad5","last_modified":1480349135267,"details":{"who":".","created":"2015-12-21T16:01:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1207993","name":"Crash in igd10umd32.dll@0x18f35","why":"."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"driverVersionComparator":"EQUAL","driverVersion":"10.18.10.3947","vendor":"0x8086","blockID":"g1221","enabled":true,"feature":"HARDWARE_VIDEO_DECODING","devices":[],"id":"65ad7851-4af6-2a10-1d47-72943e63dcf0","last_modified":1480349135245,"details":{"who":".","created":"2016-05-23T15:47:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266220","name":"10.18.10.3947 winnt 10.0","why":"."},"os":"WINNT 10.0","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"driverVersionComparator":"EQUAL","driverVersion":"10.18.10.3947","vendor":"0x8086","blockID":"g1216","enabled":true,"feature":"HARDWARE_VIDEO_DECODING","devices":[],"id":"18968a19-7317-cc56-f9fc-f568f40abca4","last_modified":1480349135215,"details":{"who":".","created":"2016-05-23T15:32:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266220","name":"10.18.10.3947 winnt 5.2","why":"."},"os":"WINNT 5.2","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"driverVersionComparator":"EQUAL","driverVersion":"10.18.10.3947","vendor":"0x8086","blockID":"g1215","enabled":true,"feature":"HARDWARE_VIDEO_DECODING","devices":[],"id":"5c141970-5076-0af4-152f-efb3642a7b14","last_modified":1480349135171,"details":{"who":".","created":"2016-05-23T15:31:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266220","name":"10.18.10.3947 winnt 5.1","why":"."},"os":"WINNT 5.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"vendor":"0x1002","blockID":"g234","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"3310f8b8-1789-1b13-9326-5531943514ae","last_modified":1480349135145,"details":{"who":"All Firefox users.","created":"2012-11-30T12:50:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=815437","name":"Mac OS X WebGL anti-aliasing (AMD)","why":"Security problems."},"os":"Darwin 12","featureStatus":"BLOCKED_DEVICE","schema":1480349134676},{"vendor":"0x1002","blockID":"g230","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"4769433c-51e9-a0f9-eef5-45829ac54243","last_modified":1480349135120,"details":{"who":"All Firefox users.","created":"2012-11-30T12:48:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=815437","name":"Mac OS X WebGL anti-aliasing (AMD)","why":"Security problems."},"os":"Darwin 10","featureStatus":"BLOCKED_DEVICE","schema":1480349134676},{"driverVersionComparator":"EQUAL","driverVersion":"10.18.10.3947","vendor":"0x8086","blockID":"g1218","enabled":true,"feature":"HARDWARE_VIDEO_DECODING","devices":[],"id":"7a3ea538-8519-2845-53bf-6a4be0ff9e6b","last_modified":1480349135096,"details":{"who":".","created":"2016-05-23T15:44:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266220","name":"10.18.10.3947 winnt 6.1","why":"."},"os":"WINNT 6.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"vendor":"0x10de","blockID":"g198","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"c9551a39-62fb-f652-8032-cbe9d2ce419c","last_modified":1480349135072,"details":{"who":"All Firefox users.","created":"2012-11-12T10:34:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=809550","name":"Mac OS X WebGL anti-aliasing","why":"Security problems."},"os":"Darwin 10","featureStatus":"BLOCKED_DEVICE","schema":1480349134676},{"driverVersionComparator":"LESS_THAN","driverVersion":"6.14.10.5218","vendor":"0x8086","blockID":"g511","enabled":true,"feature":"DIRECT3D_9_LAYERS","devices":[],"id":"37ffcc44-0d03-681e-69bf-89c38111fcdd","last_modified":1480349135048,"details":{"who":"All Firefox users.","created":"2013-12-18T14:29:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=951422","name":"Intel driver < 6.14.10.5216 for DIRECT3D_9_LAYERS on XP","why":"Stability."},"os":"WINNT 5.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480349134676},{"driverVersionComparator":"LESS_THAN_OR_EQUAL","driverVersion":"8.17.12.5896","vendor":"0x10de","blockID":"g36","enabled":true,"feature":"DIRECT3D_9_LAYERS","devices":["0x0a6c"],"id":"6ac4f440-9661-ee18-248f-f3b7b6eb8deb","last_modified":1480349134662,"details":{"who":"","created":"2011-03-01T12:13:42Z","bug":"","name":"<BlocklistGfx: None: WINNT 6.1 : 0x10de : 0x0a6c>","why":""},"os":"WINNT 6.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.15.10.1855","vendor":"0x8086","blockID":"g1069","enabled":true,"devices":["0x2a42","0x2e22","0x2e12","0x2e32","0x0046"],"id":"9928c898-4941-555d-e502-54a90e9e5371","last_modified":1480349134638,"details":{"who":".","created":"2015-12-21T15:58:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1207993","name":"Crash in igd10umd32.dll@0x18f35","why":"."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"LESS_THAN","driverVersion":"15.201.1151.0","vendor":"0x1002","blockID":"g974","enabled":true,"feature":"DIRECT2D","devices":["0x6920","0x6921","0x6928","0x6929","0x692b","0x692f","0x6930","0x6938","0x6939","0x6900","0x6901","0x6902","0x6903","0x6907","0x7300","0x9870","0x9874","0x9875","0x9876","0x9877"],"id":"ec9cf554-49de-e5ea-bbdc-54f84d290605","last_modified":1480349134615,"details":{"who":"All users who have these cards on Windows 10.","created":"2015-08-11T10:30:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1189266","name":"ATI cards on Windows 10","why":"Crashes on Windows 10."},"os":"WINNT 10.0","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"vendor":"0x1002","blockID":"g280","enabled":true,"feature":"DIRECT3D_9_LAYERS","devices":["0x9802","0x9803","0x9803","0x9804","0x9805","0x9806","0x9807"],"id":"9b7a25d9-075e-e5e9-678e-af1292db7463","last_modified":1480349134582,"details":{"who":"All Firefox user who use this driver.","created":"2013-02-13T14:52:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=840161","name":"AMD Radeon HD 6290/6300/6310/6320 for Direct3D 9","why":"Crashes."},"os":"WINNT 6.1","featureStatus":"BLOCKED_DEVICE","schema":1480343737148},{"driverVersionComparator":"LESS_THAN_OR_EQUAL","driverVersion":"8.15.10.2413","vendor":"0x8086","blockID":"g984","enabled":true,"feature":"DIRECT2D","devices":[],"id":"f1830d7b-c807-afda-1b97-f41474157165","last_modified":1480349134550,"details":{"who":"All users using these driver versions.","created":"2015-08-14T16:21:45Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1193802","name":"Intel graphics block","why":"Major graphics artifacts."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.15.10.1872","vendor":"0x8086","blockID":"g1070","enabled":true,"devices":["0x2a42","0x2e22","0x2e12","0x2e32","0x0046"],"id":"0f7b2114-976c-db1c-2d9a-02d47d1968e1","last_modified":1480349134528,"details":{"who":".","created":"2015-12-21T15:59:29Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1207993","name":"Crash in igd10umd32.dll@0x18f35","why":"."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.982.0.0","vendor":"0x1022","blockID":"g148","enabled":true,"feature":"DIRECT3D_9_LAYERS","devices":[],"id":"85925d60-d04e-2cbd-cdee-de70ea6be4f4","last_modified":1480349134505,"details":{"who":"All Firefox users who have these drivers installed.","created":"2012-09-25T14:31:35Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=793869","name":"ATI/AMD driver 8.982.0.0 (Direct3D)","why":"Some features in these drivers are causing frequent crashes in Firefox."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"LESS_THAN_OR_EQUAL","driverVersion":"9.10.8.0","vendor":"0x1002","blockID":"g192","enabled":true,"feature":"DIRECT2D","devices":[],"id":"5e34680b-5279-4ffc-7382-b1bc661b3094","last_modified":1480349134483,"details":{"who":"All Firefox users.","created":"2012-11-02T16:33:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806991","name":"AMD DIRECT2D on Windows 8, [0x1002]","why":"Crashes."},"os":"WINNT 6.2","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"LESS_THAN_OR_EQUAL","driverVersion":"8.17.12.5896","vendor":"0x10de","blockID":"g35","enabled":true,"feature":"DIRECT2D","devices":["0x0a6c"],"id":"00a6b9d2-285f-83f0-0a1f-ef0205a60067","last_modified":1480349134459,"details":{"who":"","created":"2011-03-01T12:13:40Z","bug":"","name":"<BlocklistGfx: None: WINNT 6.1 : 0x10de : 0x0a6c>","why":""},"os":"WINNT 6.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.15.10.1883","vendor":"0x8086","blockID":"g1071","enabled":true,"devices":["0x2a42","0x2e22","0x2e12","0x2e32","0x0046"],"id":"d4297784-dbac-906c-16b7-1a8792e868de","last_modified":1480349134436,"details":{"who":".","created":"2015-12-21T16:00:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1207993","name":"Crash in igd10umd32.dll@0x18f35","why":"."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.982.0.0","vendor":"0x1002","blockID":"g150","enabled":true,"feature":"DIRECT3D_9_LAYERS","devices":[],"id":"6a3c05bb-f971-d3d4-2a02-184e6970ba87","last_modified":1480349134413,"details":{"who":"All Firefox users who have these drivers installed.","created":"2012-09-25T14:33:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=793869","name":"ATI/AMD driver 8.982.0.0 (Direct3D)","why":"Some features in these drivers are causing frequent crashes in Firefox."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.982.0.0","vendor":"0x1002","blockID":"g144","enabled":true,"feature":"DIRECT2D","devices":[],"id":"35e25a7c-d77d-6b43-fa5e-39b7e9c8a481","last_modified":1480349134391,"details":{"who":"All Firefox users who have these drivers installed.","created":"2012-09-24T08:23:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=792480","name":"ATI/AMD driver 8.982.0.0","why":"Some features in these drivers are causing frequent crashes in Firefox."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"LESS_THAN","driverVersion":"6.14.10.5218","vendor":"0x8086","blockID":"g1251","enabled":true,"feature":"WEBGL_ANGLE","devices":[],"id":"ea27a4d2-ed88-0190-db12-473820b340b2","last_modified":1480349134369,"details":{"who":".","created":"2016-07-22T12:30:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1283601","name":"Intel driver < 6.14.10.5216 for DIRECT3D_9_LAYERS on XP","why":"."},"versionRange":{"maxVersion":"49.9"},"os":"WINNT 5.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"vendor":"0x8086","blockID":"g206","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"91cc2cec-11dd-0f77-ffad-f57e69b3f441","last_modified":1480349134345,"details":{"who":"All Firefox users.","created":"2012-11-12T10:39:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=809550","name":"Mac OS X WebGL anti-aliasing","why":"Security problems"},"os":"Darwin 11","featureStatus":"BLOCKED_DEVICE","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.15.10.1851","vendor":"0x8086","blockID":"g1068","enabled":true,"devices":["0x2a42","0x2e22","0x2e12","0x2e32","0x0046"],"id":"b7452893-25cc-497a-626c-aacee78683c6","last_modified":1480349134323,"details":{"who":".","created":"2015-12-21T15:58:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1207993","name":"Crash in igd10umd32.dll@0x18f35","why":"."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"10.18.10.3947","vendor":"0x8086","blockID":"g1219","enabled":true,"feature":"HARDWARE_VIDEO_DECODING","devices":[],"id":"73e4e12d-f27a-1113-b0e9-c05cb4dd78d2","last_modified":1480349134301,"details":{"who":".","created":"2016-05-23T15:45:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266220","name":"10.18.10.3947 winnt 6.2","why":"."},"os":"WINNT 6.2","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"GREATER_THAN_OR_EQUAL","driverVersion":"7.0.0.0","vendor":"0x10de","blockID":"g37","enabled":true,"feature":"DIRECT3D_9_LAYERS","devices":[],"id":"fb507393-460e-685e-91de-1ce3b18ddbc0","last_modified":1480349134278,"details":{"who":"","created":"2011-03-14T14:11:51Z","bug":"","name":"<BlocklistGfx: None: WINNT 5.1 : 0x10de : >","why":""},"os":"WINNT 5.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.982.0.0","vendor":"0x1022","blockID":"g146","enabled":true,"feature":"DIRECT2D","devices":[],"id":"e6984930-7969-3cbc-fbaa-0f350afe6f14","last_modified":1480349134255,"details":{"who":"All Firefox users who have these drivers installed.","created":"2012-09-24T08:23:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=792480","name":"ATI/AMD driver 8.982.0.0","why":"Some features in these drivers are causing frequent crashes in Firefox."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"LESS_THAN","driverVersion":"15.201.1151.0","vendor":"0x1002","blockID":"g992","enabled":true,"feature":"DIRECT2D","devices":["0x6920","0x6921","0x6928","0x6929","0x692b","0x692f","0x6930","0x6938","0x6939","0x6900","0x6901","0x6902","0x6903","0x6907","0x7300","0x9870","0x9874","0x9875","0x9876","0x9877"],"id":"77b27d80-1ebe-04de-2db9-bb197acbac32","last_modified":1480349134232,"details":{"who":"Users who have these cards installed.","created":"2015-08-20T09:56:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1189266","name":"ATI cards on Windows 10","why":"Crashing."},"os":"WINNT 8.1","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"vendor":"0x1002","blockID":"g232","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"8f8e9025-a9ec-5f1e-ae9f-aee28176bdf7","last_modified":1480349134210,"details":{"who":"All Firefox users.","created":"2012-11-30T12:49:56Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=809550","name":"Mac OS X WebGL anti-aliasing (AMD)","why":"Security problems."},"os":"Darwin 11","featureStatus":"BLOCKED_DEVICE","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"10.18.10.3947","vendor":"0x8086","blockID":"g1220","enabled":true,"feature":"HARDWARE_VIDEO_DECODING","devices":[],"id":"1f91fdd6-8b89-d948-d05a-86491c705ce2","last_modified":1480349134187,"details":{"who":".","created":"2016-05-23T15:46:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1266220","name":"10.18.10.3947 winnt 6.3","why":"."},"os":"WINNT 6.3","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"vendor":"0x8086","blockID":"g204","enabled":true,"feature":"WEBGL_MSAA","devices":[],"id":"33866148-1d41-2d4c-27b8-5f147467686b","last_modified":1480349134160,"details":{"who":"All Firefox users.","created":"2012-11-12T10:38:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=809550","name":"Mac OS X WebGL anti-aliasing","why":"Security problems."},"os":"Darwin 10","featureStatus":"BLOCKED_DEVICE","schema":1480343737148},{"vendor":"0x1002","blockID":"g278","enabled":true,"feature":"DIRECT2D","devices":["0x9802","0x9803","0x9803","0x9804","0x9805","0x9806","0x9807"],"id":"bccdbab1-c335-6f2e-6d0a-d563ccb2f1f4","last_modified":1480349134138,"details":{"who":"All Firefox users using these drivers.","created":"2013-02-13T14:50:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=840161","name":"AMD Radeon HD 6290/6300/6310/6320 for Direct2D","why":"Crashes"},"os":"WINNT 6.1","featureStatus":"BLOCKED_DEVICE","schema":1480343737148},{"driverVersionComparator":"EQUAL","driverVersion":"8.15.10.1892","vendor":"0x8086","blockID":"g1072","enabled":true,"devices":["0x2a42","0x2e22","0x2e12","0x2e32","0x0046"],"id":"d780a857-b80d-0049-981e-1a8d3ebe485e","last_modified":1480349134115,"details":{"who":".","created":"2015-12-21T16:00:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1207993","name":"Crash in igd10umd32.dll@0x18f35","why":"."},"os":"All","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148},{"driverVersionComparator":"LESS_THAN_OR_EQUAL","driverVersion":"9.10.8.0","vendor":"0x1022","blockID":"g194","enabled":true,"feature":"DIRECT2D","devices":[],"id":"0afc5fe9-1f81-7fde-2424-0cb4d933c173","last_modified":1480349134090,"details":{"who":"All Firefox users.","created":"2012-11-02T16:35:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=806991","name":"AMD DIRECT2D on Windows 8, [0x1022]","why":"Crashes."},"os":"WINNT 6.2","featureStatus":"BLOCKED_DRIVER_VERSION","schema":1480343737148}]}
\ No newline at end of file
new file mode 100644
--- /dev/null
+++ b/services/blocklists/moz.build
@@ -0,0 +1,15 @@
+# -*- Mode: python; c-basic-offset: 4; indent-tabs-mode: nil; tab-width: 40 -*-
+# vim: set filetype=python:
+# This Source Code Form is subject to the terms of the Mozilla Public
+# License, v. 2.0. If a copy of the MPL was not distributed with this
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
+
+FINAL_TARGET_FILES.defaults.blocklists += ['addons.json',
+                                           'certificates.json',
+                                           'gfx.json',
+                                           'plugins.json']
+
+FINAL_TARGET_FILES.defaults.pinning += ['pins.json']
+
+if CONFIG['MOZ_BUILD_APP'] == 'browser':
+    DIST_SUBDIR = 'browser'
new file mode 100644
--- /dev/null
+++ b/services/blocklists/pins.json
@@ -0,0 +1,1 @@
+{"data":[]}
\ No newline at end of file
new file mode 100644
--- /dev/null
+++ b/services/blocklists/plugins.json
@@ -0,0 +1,1 @@
+{"data":[{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p1419","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1486576001966,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-11-16T18:40:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1316179","name":"Flash Player Plugin on Linux 11.2.202.637 to 11.2.202.643 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.637","maxVersion":"11.2.202.643","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"Linux","id":"32d5edbf-0547-fa2d-8cc2-138676a17bc0","schema":1486575789918},{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p1420","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1486575979474,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-11-16T18:42:06Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1316179","name":"Flash Player Plugin 23.0.0.185 to 23.0.0.205 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"23.0.0.185","maxVersion":"23.0.0.205","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"","id":"24ac1e2b-8e0a-a084-5123-cb87d4ceb898","schema":1486575789918},{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p1274","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1486575908463,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-09-23T15:32:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286380","name":"Flash Player Plugin 22.0.0.192 to 22.0.0.211 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"22.0.0.192","maxVersion":"22.0.0.211","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"","id":"6ef87143-6593-e234-a77c-6af69ad1567b","schema":1486575789918},{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p160","enabled":true,"matchFilename":"NPSWF32\\.dll","last_modified":1486575890885,"details":{"who":"All Firefox users who have this plugin installed.","created":"2012-10-05T12:34:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=797378","name":"Adobe Flash 10.2.* and lower","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"4.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"16.*"}],"minVersion":"0","maxVersion":"10.2.9999","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"","id":"a61c906e-fe1f-b569-1807-96ffa59b2b6c","schema":1486575789918},{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p1422","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1486575869178,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-12-20T17:54:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1323300","name":"Flash Player Plugin 23.0.0.205 to 23.0.0.207 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"23.0.0.205","maxVersion":"23.0.0.207","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"","id":"ee3019e9-2572-ecb2-3de3-abc4842d7e0a","schema":1486575789918},{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p1421","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1486575857101,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-12-20T17:52:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1323300","name":"Flash Player Plugin on Linux 11.2.202.643 to 23.0.0.207 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.643","maxVersion":"23.0.0.207","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"Linux","id":"c867bfd8-ec29-0800-8689-4b90b89fa870","schema":1486575789918},{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p1494","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1486575835268,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2017-01-17T20:58:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1330086","name":"Flash Player Plugin 23.0.0.207 to 24.0.0.186 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"23.0.0.207","maxVersion":"24.0.0.186","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"","id":"9234afc8-8f7f-602a-9c84-7d7f2685802a","schema":1486575789918},{"infoURL":"https://get.adobe.com/flashplayer/","matchName":"","blockID":"p1495","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1486575789909,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2017-01-17T20:59:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1330086","name":"Flash Player Plugin on Linux 23.0.0.207 to 24.0.0.186 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates <a href=\"https://get.adobe.com/flashplayer/\">on Adobe's Flash page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"23.0.0.207","maxVersion":"24.0.0.186","severity":0,"vulnerabilityStatus":1}],"matchDescription":"","os":"Linux","id":"22b0fa08-8712-69cd-4ba4-9fb5ab9398d1","schema":1485795310261},{"blockID":"p152","enabled":true,"matchFilename":"npctrl\\.dll","last_modified":1480349149757,"details":{"who":"All Firefox users who have this plugin installed.","created":"2012-10-05T10:34:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=797378","name":"Silverlight 4.1.10328.0 and lower","why":"This plugin is outdated and is potentially insecure. Affected users should go to  <a href=\"http://www.mozilla.com/plugincheck/\">the plugin check page</a> and update to the latest version."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"4.1.10328.0","severity":0,"vulnerabilityStatus":1}],"id":"abdcbe90-5575-6b4b-12de-bbabd93ecf57","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p904","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349149710,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-05-19T09:01:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1159917","name":"Java Plugin 8 update 44 and lower (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 8","maxVersion":"Java 8 Update 44","severity":0,"vulnerabilityStatus":1}],"id":"47f6217d-0aa6-1e39-a9c9-cc64d57bb91f","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 7 U(8[1-9]|90)(\\s[^\\d\\._U]|$)","blockID":"p1061","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349149684,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-12-02T12:39:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1217932","name":"Java Plugin 7 update 81 to 90 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"69196ada-69bd-6454-eea8-6f8b2037368c","schema":1480349144394},{"infoURL":"https://www.microsoft.com/getsilverlight","blockID":"p1120","enabled":true,"matchFilename":"(Silverlight\\.plugin|npctrl\\.dll)","last_modified":1480349149661,"details":{"who":"All users who have these versions of the Silverlight plugin installed.","created":"2016-02-03T09:42:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1241237","name":"Silverlight plugin 5.1.41105.0 and lower (click to play)","why":"Old versions of the Silverlight plugin are known to have critical security vulnerabilities. You can get the latest version of Silverlight <a href=\"http://www.microsoft.com/getsilverlight/get-started/install/default.aspx\">here</a>."},"versionRange":[{"targetApplication":[],"minVersion":"5.1.20125","maxVersion":"5.1.41105.0","severity":0,"vulnerabilityStatus":1}],"id":"f0bfeb8c-04ee-d5ef-6670-b28c0e0d0f58","schema":1480349144394},{"blockID":"p102","enabled":true,"matchFilename":"npmozax\\.dll","last_modified":1480349149636,"details":{"who":"All Firefox users who have this plugin installed.","created":"2012-06-07T17:43:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=695927","name":"Mozilla ActiveX Plug-in","why":"This plugin was discontinued years ago and only worked up to Firefox version 1.5. Because plugins aren't marked as incompatible, there are still many users who have it installed and have recently been experiencing crashes related to it."},"versionRange":[{"minVersion":"0","maxVersion":"*","targetApplication":[]}],"id":"2e001e2f-483b-7595-8810-3672e0346950","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1020","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349149604,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-09-25T14:51:38Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1193001","name":"Flash Player Plugin 13.* (click-to-play)","why":"The 13.* branch of the Flash Player plugin has been discontinued by Adobe and has known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"13.0","maxVersion":"13.*","severity":0,"vulnerabilityStatus":1}],"id":"2c53180f-e759-b36e-0c58-acee77a8087a","schema":1480349144394},{"blockID":"p252","enabled":true,"matchFilename":"AdobePDFViewerNPAPI\\.plugin","last_modified":1480349149567,"details":{"who":"All Firefox users on Mac OS X who have installed the Adobe Reader XI plugin. Users are recommended to update when a new version of Adobe Reader becomes available, or to downgrade to the latest version of Adobe Reader 10.","created":"2013-01-15T10:56:30Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=826002","name":"Adobe Reader XI for Mac OS X","why":"The Adobe Reader XI plugin is causing frequent crashes on Firefox for Mac OS X. The impact and this block are currently limited to versions 11.0.0 and 11.0.01."},"versionRange":[{"targetApplication":[],"minVersion":"11.0.0","maxVersion":"11.0.01","severity":1}],"os":"Darwin","id":"821ddb3d-bba4-6479-28b6-9974383fa8c9","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1122","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349149544,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-02-17T16:26:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1247032","name":"Flash Player Plugin 18.0.0.268 to 18.0.0.326 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.268","maxVersion":"18.0.0.326","severity":0,"vulnerabilityStatus":1}],"id":"1c48b368-b291-62ef-c4b1-057cb63d54d8","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 6 U(39|40|41)(\\s[^\\d\\._U]|$)","blockID":"p300","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349149520,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-02-25T12:36:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=843373","name":"Java Plugin 6 updates 39 to 41 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"d64e08b6-66b2-f534-53d8-1cbcbb139f2a","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p826","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349149496,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-01-28T14:36:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1124654","name":"Flash Player Plugin on Linux 11.2.202.425 to 11.2.202.439 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.425","maxVersion":"11.2.202.439","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"6738a409-5904-1031-56d4-6ce1b4eaccde","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p94","enabled":true,"matchFilename":"Flash\\ Player\\.plugin","last_modified":1480349149472,"details":{"who":"All Firefox users who have a version of the Flash Player Plugin older than 10.2.159.1.","created":"2012-05-23T09:15:23Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=754723","name":"Flash Player Plugin","why":"Old versions of the Flash Player plugin are targeted by known security vulnerabilities, and cause frequent Firefox crashes. We strongly recommend all users to visit <a href=\"http://get.adobe.com/flashplayer/\">the Flash Player homepage</a> to download and install the latest available version of this plugin.\r\n\r\nThis is not an ordinary block. It's just an upgrade notification that will be shown to all users who have these old versions installed, asking them to download the latest version. If they choose to ignore the notification, the plugin will continue to work normally."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.1"},{"minVersion":"0","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.13.*"}],"minVersion":"0","maxVersion":"10.2.159.1","severity":0}],"id":"2a741cac-32d7-a67e-0bf7-b5b53a0ff22b","schema":1480349144394},{"blockID":"p32","enabled":true,"matchFilename":"npViewpoint.dll","last_modified":1480349149141,"details":{"who":"All users of the Viewpoint plugin for Firefox 3 and later.","created":"2011-03-31T16:28:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=539282","name":"Viewpoint","why":"This plugin causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}]}],"id":"1206e79a-4817-16e9-0f5e-7762a8d19216","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1066","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349149112,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-12-21T13:43:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1231191","name":"Flash Player Plugin 18.0.0.255 to 18.0.0.261 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.255","maxVersion":"18.0.0.261","severity":0,"vulnerabilityStatus":1}],"id":"f05bf2c1-7b19-c7bc-5a67-7976f29311d6","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p180","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349149087,"details":{"who":"All users who have these versions of the plugin installed in Firefox 17 and above.","created":"2012-10-30T14:29:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829111","name":"Java Plugin 7 update 10 and lower (click-to-play), Mac OS X","why":"The Java plugin is causing significant security problems. All users are strongly recommended to keep the plugin disabled unless necessary."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"Java 7 Update 0","maxVersion":"Java 7 Update 10","severity":0,"vulnerabilityStatus":1}],"id":"12f38c07-c1e1-2464-2eab-d454cf471eab","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p830","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349149064,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-02-05T15:38:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128534","name":"Flash Player Plugin on Linux 11.2.202.439 to 11.2.202.441 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.439","maxVersion":"11.2.202.441","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"17a664fb-d871-84e0-7418-dab7ecbd5f4b","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p828","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349149041,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-01-28T14:39:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1124654","name":"Flash Player Plugin 15.0.0.243 to 16.0.0.287 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"15.0.0.243","maxVersion":"16.0.0.287","severity":0,"vulnerabilityStatus":1}],"id":"e84ceee7-9202-1321-eb49-c068806128a3","schema":1480349144394},{"matchDescription":"^($|Unity Web Player version 5.0(\\.([0-2]|3f1))?[^0-9.])","blockID":"p1004","enabled":true,"matchFilename":"Unity Web Player\\.plugin","last_modified":1480349149017,"details":{"who":"All users who have these versions of the plugin installed","created":"2015-09-09T14:11:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974012","name":"Unity Web Player 5.0 to 5.0.3f1 (click-to-play), Mac OS","why":"These versions of the Unity Web Player plugin have known vulnerabilities that can put users at risk."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"5a0b69cb-a516-e7a2-ea3b-b4fafcc13c6b","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1415","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148994,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-10-28T21:47:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1313435","name":"Flash Player Plugin 18.0.0.366 to 18.0.0.382 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.366","maxVersion":"18.0.0.382","severity":0,"vulnerabilityStatus":1}],"id":"36a133ef-3465-d7e4-6394-7b57e5f82dd8","schema":1480349144394},{"blockID":"p34","enabled":true,"matchFilename":"[Nn][Pp][Jj][Pp][Ii]1[56]0_[0-9]+\\.[Dd][Ll][Ll]","last_modified":1480349148971,"details":{"who":"Users of Java 2 Plugin versions 1.5_00 to 1.6_99 in Firefox 3.6 and later.","created":"2011-02-17T17:20:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=634639","name":"Java Plugin","why":"These versions of the Java plugin are no longer supported by Oracle and cause a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.6a1pre","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}]}],"id":"91618232-c650-5dc6-00fe-293c0baedc34","schema":1480349144394},{"blockID":"p248","enabled":true,"matchFilename":"Scorch\\.plugin","last_modified":1480349148945,"details":{"who":"All users who have Firefox 18 or above installed, and the Sibelius Scorch plugin.","created":"2013-01-14T09:26:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829054","name":"Sibelius Scorch plugin","why":"The Sibelius Scorch plugin is not compatible with Firefox 18 and above, and is crashing whenever loaded on affected versions of Firefox. "},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"6.2.0b88","severity":1}],"id":"28b5baa1-6490-38e2-395f-53fc84aa12df","schema":1480349144394},{"blockID":"p254","enabled":true,"matchFilename":"PDF Browser Plugin\\.plugin","last_modified":1480349148920,"details":{"who":"All Firefox users on Mac OS X who are using the affected versions of the PDF Browser Plugin.","created":"2013-01-15T11:54:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=830410","name":"PDF Browser Plugin 2.4.2 and below","why":"The PDF Browser Plugin is causing frequent crashes on Firefox 18 and above. All users are recommended to keep the plugin disabled and update it if a new version becomes available."},"versionRange":[{"targetApplication":[{"minVersion":"18.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"2.4.2","severity":1}],"id":"2dd1b53a-52db-2d0f-392a-410d5aade9d6","schema":1480349144394},{"infoURL":"https://get.adobe.com/shockwave/","blockID":"p1055","enabled":true,"matchFilename":"DirectorShockwave\\.plugin","last_modified":1480349148897,"details":{"who":"All users who have these versions of this plugin installed.","created":"2015-11-13T14:17:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1218880","name":"Shockwave for Director 12.2.0.162 and earlier, Mac OS X (click-to-play)","why":"Versions 12.2.0.162 and earlier of this plugin are affected by a critical security vulnerability that puts users at risk."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"12.2.0.162","severity":0,"vulnerabilityStatus":1}],"id":"da3808c0-b460-e177-1c78-0496b3671480","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p928","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148874,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-06-30T14:09:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1177214","name":"Flash Player Plugin 13.0.0.269 to 13.0.0.295 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"13.0.0.269","maxVersion":"13.0.0.295","severity":0,"vulnerabilityStatus":1}],"id":"9ea82484-43fe-f039-bc0a-b254ca502357","schema":1480349144394},{"infoURL":"https://support.apple.com/en-us/HT205771","blockID":"p1151","enabled":true,"matchFilename":"npqtplugin\\.dll","last_modified":1480349148852,"details":{"who":"All users who have the QuickTime Plugin for Windows installed.","created":"2016-04-18T17:41:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1264874","name":"QuickTime Plugin for Windows","why":"The QuickTime Plugin for Windows has been <a href=\"https://support.apple.com/en-us/HT205771\">discontinued by Apple</a> and has known critical security vulnerabilities. All users are strongly encouraged to remove it or keep it disabled."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"*","severity":0,"vulnerabilityStatus":2}],"id":"bb8db302-9579-42d2-ff75-c61500f6a020","schema":1480349144394},{"blockID":"p28","enabled":true,"matchFilename":"NPFFAddOn.dll","last_modified":1480349148829,"details":{"who":"All users of Internet Saving Optimizer for all Mozilla applications.","created":"2011-03-31T16:28:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=512406","name":"Internet Saving Optimizer (plugin)","why":"This plugin causes a high volume of Firefox crashes and is considered malware."},"versionRange":[{"targetApplication":[],"maxVersion":"*"}],"id":"c85a4a9c-d61c-130f-d525-ea36becac235","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1048","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148806,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-10-21T14:13:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1214459","name":"Flash Player Plugin 19.0 to 19.0.0.225 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"19.0","maxVersion":"19.0.0.225","severity":0,"vulnerabilityStatus":1}],"id":"d57e46e8-2fca-f631-db45-99c5808ed4c0","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p832","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148782,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-02-05T15:41:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128534","name":"Flash Player Plugin 16.0.0.295 to 16.0.0.304 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"16.0.0.295","maxVersion":"16.0.0.304","severity":0,"vulnerabilityStatus":1}],"id":"6105ecd0-5999-3754-8edb-6a00cef9d130","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1046","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148759,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-10-21T14:12:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1214459","name":"Flash Player Plugin 18.0.0.233 to 18.0.0.254 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.233","maxVersion":"18.0.0.254","severity":0,"vulnerabilityStatus":1}],"id":"e5ec5094-7dfc-4dc8-1e6a-93a3f94b32f8","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 7 U(1[6-9]|2[0-4])(\\s[^\\d\\._U]|$)","blockID":"p420","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349148736,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-06-28T12:47:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=885362","name":"Java Plugin 7 update 16 to 24 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"5942b7ae-bcdc-e329-9f17-f7a795c9ec83","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 7 U(2[5-9]|3\\d|4[0-4])(\\s[^\\d\\._U]|$)","blockID":"p458","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349148711,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-10-16T16:29:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=927273","name":"Java Plugin 7 update 25 to 44 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"d199d513-3c49-b53c-9447-33c8021c0df2","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1252","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349148687,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-07-25T13:22:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286380","name":"Flash Player Plugin on Linux 11.2.202.621 to 11.2.202.626 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.621","maxVersion":"11.2.202.626","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"7a8fdd50-4059-556f-5c6c-cb486d9239ba","schema":1480349144394},{"infoURL":"https://get.adobe.com/shockwave/","blockID":"p1054","enabled":true,"matchFilename":"np32dsw_[0-9]+\\.dll","last_modified":1480349148638,"details":{"who":"All users who have these versions of this plugin installed.","created":"2015-11-13T14:15:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1218880","name":"Shockwave for Director 12.2.0.162 and earlier, Windows (click-to-play)","why":"Versions 12.2.0.162 and earlier of this plugin are affected by a critical security vulnerability that puts users at risk."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"12.2.0.162","severity":0,"vulnerabilityStatus":1}],"id":"5cc4739b-ba83-7a19-4d85-c5362f5e0ccd","schema":1480349144394},{"blockID":"p298","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349148613,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-02-25T12:35:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=843373","name":"Java Plugin 6 updates 39 to 41 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"Java 6 Update 39","maxVersion":"Java 6 Update 41","severity":0,"vulnerabilityStatus":1}],"id":"cfd76877-e79d-8e8c-c6a7-6b596fd344e8","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1074","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148566,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-01-07T12:52:22Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1235435","name":"Flash Player Plugin 19.0.0.246 to 20.0.0.235 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"19.0.0.246","maxVersion":"20.0.0.235","severity":0,"vulnerabilityStatus":1}],"id":"f47e2396-5eac-9458-dad1-2e8e91ccf0b5","schema":1480349144394},{"blockID":"p456","enabled":true,"matchFilename":"npvlc\\.dll","last_modified":1480349148527,"details":{"who":"All Firefox users who are using old versions of the VLC player plugin.","created":"2013-09-30T14:35:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=470936","name":"VLC Player plugin 2.0.5 and lower (click-to-play)","why":"Old versions of the VLC player are known to cause stability problems in Firefox. All users are recommended to update to the latest version of their VLC software."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.0.5","severity":0,"vulnerabilityStatus":1}],"id":"0cfaaefe-88a4-dda4-96bc-110e402ca9d5","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1149","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148205,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-04-13T14:26:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263476","name":"Flash Player Plugin 18.0.0.329 to 18.0.0.333 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.329","maxVersion":"18.0.0.333","severity":0,"vulnerabilityStatus":1}],"id":"7c1cefd7-67ac-9ab5-90e9-1eb8d4b4275a","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1224","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349148157,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-05-31T15:18:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275307","name":"Flash Player Plugin on Linux 11.2.202.577 to 11.2.202.616 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.577","maxVersion":"11.2.202.616","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"fa1aab48-6b35-8e43-61ff-2902eeff4e86","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 8 U(6[4-9]|7[0-6])(\\s[^\\d\\._U]|$)","blockID":"p1144","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349148133,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2016-03-31T16:18:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1259458","name":"Java Plugin 8 update 64 to 76 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"b3c55844-79d2-66dd-0d44-82fb4533307e","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1140","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148109,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-03-18T15:35:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255519","name":"Flash Player Plugin 20.0.0.286 to 20.0.0.306 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"20.0.0.286","maxVersion":"20.0.0.306","severity":0,"vulnerabilityStatus":1}],"id":"17697ff4-a8d9-db56-240f-704921c23b4b","schema":1480349144394},{"matchName":"Java\\(TM\\) Plug-in 1\\.7\\.0_1[2-5]([^\\d\\._]|$)","blockID":"p296","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349148080,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-02-25T12:34:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=843373","name":"Java Plugin 7 update 12 to 15 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"5b7aaf34-48a3-dfa5-1db8-550faef41501","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p178","enabled":true,"matchFilename":"(NPSWF[0-9_]*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349148055,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2012-10-30T14:24:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=885517","name":"Flash Player Plugin between 11.0 and 11.7.700.169 (click-to-play)","why":"Old versions of the Flash Player plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"19.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.16a1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"},{"minVersion":"17.0.4","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.*"}],"minVersion":"11.0","maxVersion":"11.7.700.169","severity":0,"vulnerabilityStatus":1}],"id":"e4c7ad3c-6b35-2eb7-0c19-35be376c71dc","schema":1480349144394},{"blockID":"p408","enabled":true,"matchFilename":"QuickTime Plugin\\.plugin","last_modified":1480349148032,"details":{"who":"All Firefox users who have affected versions of the QuickTime plugin installed.","created":"2013-06-28T09:52:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=837377","name":"QuickTime Plugin 7.6.5 and lower (click-to-play), Mac OS X","why":"Old versions of the QuickTime plugin are known to be insecure and cause stability problems. All users are recommended to update to the latest version available. You can check for updates in the <a href=\"http://www.mozilla.org/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"7.6.5","severity":0,"vulnerabilityStatus":1}],"id":"4f39cd0f-976c-1f71-2d9c-2abe1b4706d9","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p1059","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349148009,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-12-02T12:37:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1217932","name":"Java Plugin 7 update 81 to 90 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 7 Update 81","maxVersion":"Java 7 Update 90","severity":0,"vulnerabilityStatus":1}],"id":"799c4f10-d75d-30a0-5570-56df6be628e0","schema":1480349144394},{"matchDescription":"^($|Unity Web Player version ([0-3]|(4\\.([0-5]|6(\\.([0-5]|6f1)))?[^0-9.])))","blockID":"p558","enabled":true,"matchFilename":"Unity Web Player\\.plugin","last_modified":1480349147963,"details":{"who":"All Firefox users who have these versions of the plugin installed.","created":"2014-02-25T08:29:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974012","name":"Unity Web Player 4.6.6f1 and lower (click-to-play), Mac OS","why":"Current versions of the Unity Web Player plugin have known vulnerabilities that can put users at risk."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"bbf83e70-65f5-75af-b841-7cebcf3e38c1","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 10\\.(9[1-7])(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p1145","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349147940,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2016-03-31T16:18:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1259458","name":"Java Plugin 7 update 91 to 97 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"d4e75c8c-9c32-6093-12cc-1de0fd8f9e87","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1234","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349147915,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-06-23T12:52:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280125","name":"Flash Player Plugin on Linux 11.2.202.616 to 11.2.202.621 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.616","maxVersion":"11.2.202.621","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"a02005bf-ad55-ba8f-265a-532e874142d0","schema":1480349144394},{"matchName":"[0-6]\\.0\\.[01]\\d{2}\\.\\d+","blockID":"p33","enabled":true,"matchFilename":"npdeploytk.dll","last_modified":1480349147892,"details":{"who":"Users of Java Deployment Toolkit versions 6.0.200.0 and older in all versions of Firefox.","created":"2010-04-16T17:52:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=558584","name":"Java Deployment Toolkit","why":"This plugin has publicly-known security vulnerabilities. For more information, please <a href=\"http://java.com/en/download/help/firefox_addons.xml\">visit the vendor page</a>."},"versionRange":[{"targetApplication":[],"maxVersion":"","severity":1}],"id":"b12b4282-d327-06d6-6e62-4788ba2c4b2f","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p1060","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349147868,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-12-02T12:38:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1217932","name":"Java Plugin 8 update 46 to 64 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 8 Update 46","maxVersion":"Java 8 Update 64","severity":0,"vulnerabilityStatus":1}],"id":"aee0ad26-018f-392b-91f7-6a8aaf332774","schema":1480349144394},{"blockID":"p89","enabled":true,"matchFilename":"AdobePDFViewerNPAPI\\.plugin","last_modified":1480349147844,"details":{"who":"Firefox users on Mac OS X who have installed the Adobe Acrobat plugin.","created":"2012-05-04T11:29:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=750387","name":"Adobe Acrobat NPAPI Plug-in","why":"The Adobe Acrobat plugin doesn't work on Mac OS X in default (64-bit) mode, showing a blank page when users click on links to PDF files in Firefox. It also causes a significant number of crashes in 32-bit mode.\r\n\r\nThere's more information on <a href=\"http://blog.mozilla.org/addons/2012/05/04/adobe-reader-blocked-mac/\">this blog post</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"10.1.3","severity":1}],"os":"Darwin","id":"473f4d9c-e38e-a348-26d1-de7b842893d9","schema":1480349144394},{"matchName":"Java\\(TM\\) Plug-in 1\\.7\\.0(_0?([5-6]))?([^\\d\\._]|$)","blockID":"p132","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349147820,"details":{"who":"All Firefox users who have the Java 7 plugin, updates 6 and below.","created":"2012-08-31T15:21:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=794247","name":"Java Plugin","why":"The Java 7 Runtime Environment, update versions 6 and below, has a <a href=\"https://blog.mozilla.org/security/2012/08/28/protecting-users-against-java-security-vulnerability/\">serious security vulnerability</a> that is fixed in the latest update. All Firefox users are strongly encouraged to update as soon as possible. This can be done on the <a href=\"http://www.mozilla.com/plugincheck/\">Plugin Check</a> page."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"severity":1}],"id":"572d0485-3388-7c2a-a062-b062e42c8710","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","matchDescription":"^Shockwave Flash (([1-9]\\.[0-9]+)|(10\\.([0-2]|(3 r(([0-9][0-9]?)|1(([0-7][0-9])|8[0-2]))))))( |$)","blockID":"p330","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349147797,"details":{"who":"All Firefox users who have these versions on the Abode Flash plugin installed.","created":"2013-03-26T09:43:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=854550","name":"Adobe Flash for Linux 10.3.182.* and lower (click-to-play)","why":"Old versions of the Adobe Flash plugin are potentially insecure and unstable. All users are recommended to visit our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check</a> page and check for updates."},"versionRange":[{"targetApplication":[{"minVersion":"19.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.16a1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"},{"minVersion":"17.0.4","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.*"}],"severity":0,"vulnerabilityStatus":1}],"id":"abaff0eb-314f-e882-b96c-5c5a4755688f","schema":1480349144394},{"matchName":"Java\\(TM\\) Plug-in 1\\.6\\.0_(39|40|41)([^\\d\\._]|$)","blockID":"p302","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349147773,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-02-25T12:37:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=843373","name":"Java Plugin 6 updates 39 to 41 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>.\r\n"},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"caec8103-dec9-8018-eb3d-9cf21cbf68a6","schema":1480349144394},{"blockID":"p129","enabled":true,"matchFilename":"Silverlight\\.plugin","last_modified":1480349147746,"details":{"who":"All Firefox users on Mac OS X who have old versions of the Silverlight plugin.","created":"2012-08-22T10:37:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=782672","name":"Silverlight for Mac OS X","why":"Old versions of the Silverlight plugin for Mac OS X are causing serious stability problems in Firefox.  Affected users can visit <a href=\"https://www.microsoft.com/getsilverlight/Get-Started/Install/Default.aspx\">the official Silverlight page</a> and get the latest version of the Silverlight plugin to correct this problem."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"5.0.99999","severity":1}],"id":"ab861311-9c24-5f55-0d3a-f0072868357c","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p930","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349147722,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-06-30T14:10:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1177214","name":"Flash Player Plugin 16.0.0.305 to 18.0.0.193 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"16.0.0.305","maxVersion":"18.0.0.193","severity":0,"vulnerabilityStatus":1}],"id":"f461aaf7-128b-ad5a-07a9-aba1ddde8a5c","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p1142","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349147694,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2016-03-31T16:16:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1259458","name":"Java Plugin 8 update 64 to 76 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 8 Update 64","maxVersion":"Java 8 Update 76","severity":0,"vulnerabilityStatus":1}],"id":"646ebafe-dd54-e45f-9569-c245ef72259d","schema":1480349144394},{"blockID":"p212","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349147671,"details":{"who":"All Firefox users who have the Java 7 plugin, updates 7 and below.","created":"2012-11-22T09:33:07Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812896","name":"Java Plugin 1.7u7 (Mac OS X)","why":"The Java 7 Runtime Environment, update version 7, has a <a href=\"http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html\">serious security vulnerability</a> that is fixed in the latest update. All Firefox users are strongly encouraged to update as soon as possible. This can be done on the <a href=\"http://www.mozilla.com/plugincheck/\">Plugin Check</a> page."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"minVersion":"Java 7 Update 07","maxVersion":"Java 7 Update 07","severity":1}],"id":"5ec1cd0f-d478-e6e0-989e-c91694b2a411","schema":1480349144394},{"blockID":"p250","enabled":true,"matchFilename":"npFoxitReaderPlugin\\.dll","last_modified":1480349147648,"details":{"who":"All Firefox users on Windows who have installed the Foxit Reader Plugin, versions 2.2.1.530 and below.","created":"2013-01-14T13:07:03Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=828982","name":"Foxit Reader Plugin 2.2.1.530 and below","why":"The Foxit Reader plugin is vulnerable to a <a href=\"http://secunia.com/advisories/51733/\">critical security bug</a> that can compromise a user's system by visiting a malicious site."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"2.2.1.530","severity":0,"vulnerabilityStatus":2}],"id":"c6299be0-ab77-8bbd-bcaf-c886cec4e799","schema":1480349144394},{"blockID":"p85","enabled":true,"matchFilename":"JavaPlugin2_NPAPI\\.plugin","last_modified":1480349147625,"details":{"who":"All Firefox users who have installed the Java plugin, JRE versions below 1.6.0_31 or between 1.7.0 and 1.7.0_2.","created":"2012-04-16T13:58:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=741592","name":"Java Plugin","why":"Outdated versions of the Java plugin are vulnerable to an actively exploited security issue. All Mac OS X users are strongly encouraged to update their Java plugin through Software Update, or disable it if no alternatives are available. For more information, please <a href=\"http://blog.mozilla.org/addons/2012/04/30/java-block-complete-for-mac-os-x\">read our blog post</a> or <a href=\"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html\">Oracle's Advisory</a>.\r\n\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"13.6.0","severity":1}],"id":"4df1324d-8236-b7ae-db55-4fb1b7db2754","schema":1480349144394},{"infoURL":"https://get.adobe.com/reader","blockID":"p1250","enabled":true,"matchFilename":"(nppdf32\\.dll)|(AdobePDFViewerNPAPI\\.plugin)","last_modified":1480349147602,"details":{"who":"All users who have this plugin installed.","created":"2016-07-21T22:22:11Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286972","name":"Adobe Reader (Continuous) 15.016.20045","why":"Old versions of the Adobe Reader plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"15.016.20045","maxVersion":"15.016.20045","severity":0,"vulnerabilityStatus":1}],"id":"b9f6998a-7a45-7d83-7ee6-897e6b193e42","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1225","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349147283,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-05-31T15:19:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275307","name":"Flash Player Plugin 18.0.0.333 to 18.0.0.343 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.333","maxVersion":"18.0.0.343","severity":0,"vulnerabilityStatus":1}],"id":"e512821f-6174-f3c0-8369-2f3148cc586c","schema":1480349144394},{"infoURL":"https://real.com/","blockID":"p1053","enabled":true,"matchFilename":"nprpplugin\\.dll","last_modified":1480349147260,"details":{"who":"All users who have these versions of the Real Player plugin. Affected users can visit our <a href=\"http://www.mozilla.org/plugincheck/\">plugin check page</a> and check for updates.","created":"2015-11-12T09:07:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1222130","name":"Real Player for Windows, 17.0.10.7 and lower, click-to-play","why":"Old versions of the Real Player plugin have serious security problems that could lead to system compromise."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"17.0.10.7","severity":0,"vulnerabilityStatus":1}],"id":"2a6a7300-fac0-6518-c44a-35b3c4c714c3","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p1141","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349147237,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2016-03-31T16:16:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1259458","name":"Java Plugin 7 update 91 to 97 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 7 Update 91","maxVersion":"Java 7 Update 97","severity":0,"vulnerabilityStatus":1}],"id":"2a432d6e-9545-66be-9f93-aefe9793f450","schema":1480349144394},{"blockID":"p422","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349147214,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-06-28T12:48:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=885362","name":"Java Plugin 7 update 16 to 24 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"Java 7 Update 16","maxVersion":"Java 7 Update 24","severity":0,"vulnerabilityStatus":1}],"id":"709960a7-d268-0c70-d6ad-17bbed0cd1c4","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 7 U([0-9]|(1[0-1]))(\\s[^\\d\\._U]|$)","blockID":"p182","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349147191,"details":{"who":"All users who have these versions of the plugin installed in Firefox 17 and above.","created":"2012-10-30T14:33:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829111","name":"Java Plugin 7 update 11 and lower (click-to-play), Windows","why":"The Java plugin is causing significant security problems. All users are strongly recommended to keep the plugin disabled unless necessary."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"385d9911-f8bc-83e0-8cd2-94c98087938c","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p796","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349147169,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2014-12-11T12:17:01Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1109795","name":"Flash Player Plugin on Linux 11.2.202.424 and lower (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities (CVE-2014-9163). All users are strongly recommended to <a href=\"https://get.adobe.com/flashplayer/\">update their Flash plugin</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"11.2.202.424","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"db6eaad4-d391-8ef3-a5df-e7219a758682","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1075","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349147146,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-01-07T12:53:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1235435","name":"Flash Player Plugin 18.0.0.262 to 18.0.0.268 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.262","maxVersion":"18.0.0.268","severity":0,"vulnerabilityStatus":1}],"id":"c420fbcd-1a58-e6ba-5c85-f4a189cf7d90","schema":1480349144394},{"matchName":"Java\\(TM\\) Plug-in 1\\.7\\.0_(1[6-9]|2[0-4])([^\\d\\._]|$)","blockID":"p418","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349147123,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-06-28T12:46:18Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=885362","name":"Java Plugin 7 update 16 to 24 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"ee5c1584-0170-8702-5f99-e0325b4a91a8","schema":1480349144394},{"blockID":"p158","enabled":true,"matchFilename":"nppdf32\\.dll","last_modified":1480349147100,"details":{"who":"All Firefox users who have this plugin installed.","created":"2012-10-05T10:40:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=850745","name":"Adobe Reader 10.0 to 10.1.5.*","why":"This plugin is outdated and is potentially insecure. Affected users should go to  <a href=\"http://www.mozilla.com/plugincheck/\">the plugin check page</a> and update to the latest version."},"versionRange":[{"targetApplication":[],"minVersion":"10.0","maxVersion":"10.1.5.9999","severity":0,"vulnerabilityStatus":1}],"id":"107c9a8c-2ef8-da26-75c3-bc26f8ae90fa","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1026","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349147077,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-10-01T09:48:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206889","name":"Flash Player Plugin 18.0.0.204 to 18.0.0.232 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.204","maxVersion":"18.0.0.232","severity":0,"vulnerabilityStatus":1}],"id":"6c349faf-109f-4456-4d45-b793e3b7e20e","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 8 U45(\\s[^\\d\\._U]|$)","blockID":"p960","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349147055,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-07-15T10:50:25Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183369","name":"Java Plugin 8 update 45 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"990fa997-1d4a-98ee-32de-a7471e81db42","schema":1480349144394},{"blockID":"p113","enabled":true,"matchFilename":"npuplaypc\\.dll","last_modified":1480349147031,"details":{"who":"All Firefox users who have this plugin installed.","created":"2012-07-30T12:11:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=778686","name":"Ubisoft Uplay","why":"Version 1.0.0.0 of the Ubisoft Uplay plugin has a security vulnerability that can be exploited by malicious websites to gain control of the user's system."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.0.0.0","severity":1}],"id":"ea3b767d-933b-3f54-f447-09bd2bfbc6e0","schema":1480349144394},{"blockID":"p366","enabled":true,"matchFilename":"Scorch\\.plugin","last_modified":1480349147009,"details":{"who":"All users who have Firefox 18 or above installed, and the Sibelius Scorch plugin.","created":"2013-06-11T13:20:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=879128","name":"Sibelius Scorch plugin","why":"The Sibelius Scorch plugin is not compatible with Firefox 18 and above, and is crashing whenever loaded on affected versions of Firefox. "},"versionRange":[{"targetApplication":[],"minVersion":"6.2.0","maxVersion":"6.2.0","severity":1}],"id":"43ec430a-75ec-6853-f62b-1a54489fea5f","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1067","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349146986,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-12-21T13:44:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1231191","name":"Flash Player Plugin 19.0.0.226 to 19.0.0.245 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"19.0.0.226","maxVersion":"19.0.0.245","severity":0,"vulnerabilityStatus":1}],"id":"ae2e1608-eaa4-68de-521e-9ffe22a9e3a4","schema":1480349144394},{"matchName":"Java\\(TM\\) Plug-in 1\\.6\\.0_3[1-8]([^\\d\\._]|$)","blockID":"p190","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349146961,"details":{"who":"All users who have these versions of the plugin installed in Firefox 17 and above.","created":"2012-10-30T14:55:37Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829111","name":"Java Plugin 6 updates 31 through 38 (click-to-play), Linux","why":"The Java plugin is causing significant security problems. All users are strongly recommended to keep the plugin disabled unless necessary."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"9f9eb0ae-6495-aaa6-041a-d802cdb8e134","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1076","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349146938,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-01-07T12:54:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1235435","name":"Flash Player Plugin on Linux 11.2.202.549 to 11.2.202.554 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.549","maxVersion":"11.2.202.554","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"0beab50c-0ded-c200-557a-f759db85d8a1","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1253","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349146913,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-07-25T13:22:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286380","name":"Flash Player Plugin 18.0.0.352 to 18.0.0.360 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.352","maxVersion":"18.0.0.360","severity":0,"vulnerabilityStatus":1}],"id":"84338b2a-bdee-c124-713e-5b5df3407882","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 11\\.45(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p964","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349146890,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-07-15T10:51:57Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183369","name":"Java Plugin 8 update 45 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"c2431673-3478-f1e1-5555-28e2d5377adc","schema":1480349144394},{"blockID":"p1002","enabled":true,"matchFilename":"npUnity3D32\\.dll","last_modified":1480349146867,"details":{"who":"All users who have these versions of the plugin installed.","created":"2015-09-09T14:07:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974012","name":"Unity Web Player 5.0 to 5.0.3f1 (click-to-play), Windows","why":"These versions of the Unity Web Player plugin have known vulnerabilities that can put users at risk."},"versionRange":[{"targetApplication":[],"minVersion":"5.0","maxVersion":"5.0.3f1","severity":0,"vulnerabilityStatus":1}],"id":"48e45eea-fd32-2304-2776-fe75211a69e5","schema":1480349144394},{"blockID":"p123","enabled":true,"matchFilename":"JavaPlugin2_NPAPI\\.plugin","last_modified":1480349146842,"details":{"who":"All Firefox users who have installed the Java plugin, JRE versions below 1.6.0_33 or between 1.7.0 and 1.7.0_4.","created":"2012-08-14T09:29:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=780717","name":"Java Plugin","why":"Outdated versions of the Java plugin are vulnerable to an actively exploited security issue. All users are strongly encouraged to <a href=\"http://java.com/inc/BrowserRedirect1.jsp\">update their Java plugin</a>. For more information, please <a href=\"http://blog.mozilla.org/addons/2012/08/14/new-java-blocklist/\">read our blog post</a> or <a href=\"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\">Oracle's Advisory</a>."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"minVersion":"0","maxVersion":"14.2.0","severity":1}],"id":"46bf36a7-1934-38f8-1fcc-c9c4bcc8343e","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1148","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349146818,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-04-13T14:25:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263476","name":"Flash Player Plugin 20.0.0.306 to 21.0.0.197 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"20.0.0.306","maxVersion":"21.0.0.197","severity":0,"vulnerabilityStatus":1}],"id":"a3470c77-4449-48e3-f234-eeb93f702821","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1235","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349146794,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-06-23T12:54:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280125","name":"Flash Player Plugin 18.0.0.343 to 18.0.0.352 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.343","maxVersion":"18.0.0.352","severity":0,"vulnerabilityStatus":1}],"id":"a435cc3b-9363-c7c3-e856-a0128966c809","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1150","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349146772,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-04-13T14:28:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263476","name":"Flash Player Plugin on Linux 11.2.202.569 to 11.2.202.577 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.569","maxVersion":"11.2.202.577","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"f52d9f17-7676-2aad-48b8-af97f281fcb2","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 7 U[5-6](\\s[^\\d\\._U]|$)","blockID":"p134","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349146749,"details":{"who":"All Firefox users who have the Java 7 plugin, update 6 and below.","created":"2012-08-31T15:22:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=794247","name":"Java Plugin","why":"The Java 7 Runtime Environment, update versions 6 and below, has a <a href=\"https://blog.mozilla.org/security/2012/08/28/protecting-users-against-java-security-vulnerability/\">serious security vulnerability</a> that is fixed in the latest update. All Firefox users are strongly encouraged to update as soon as possible. This can be done on the <a href=\"http://www.mozilla.com/plugincheck/\">Plugin Check</a> page."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"severity":1}],"id":"1f519b98-a4b6-2a98-b1ff-b642f7b4d2bb","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p948","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349146726,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-07-13T16:02:09Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1182751","name":"Flash Player Plugin on Linux 11.2.202.481 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.481","maxVersion":"11.2.202.481","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"bcfe2592-6154-fcc7-cf0f-574eda317900","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p944","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349146378,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-07-13T16:00:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1182751","name":"Flash Player Plugin 13.0.0.302 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"13.0.0.302","maxVersion":"13.0.0.302","severity":0,"vulnerabilityStatus":1}],"id":"1fc0a5c5-fcfb-dfb4-9950-9e2f0b064010","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE ((6( U(\\d|([0-2]\\d)|3[0-2]))?)|(7(\\sU[0-4])?))(\\s[^\\d\\._U]|$)","blockID":"p125","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349146351,"details":{"who":"All Firefox users who have installed the Java plugin, JRE versions below 1.6.0_33 or between 1.7.0 and 1.7.0_4.","created":"2012-08-14T09:31:17Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=780717","name":"Java Plugin","why":"Outdated versions of the Java plugin are vulnerable to an actively exploited security issue. All users are strongly encouraged to <a href=\"http://java.com/inc/BrowserRedirect1.jsp\">update their Java plugin</a>. For more information, please <a href=\"http://blog.mozilla.org/addons/2012/08/14/new-java-blocklist/\">read our blog post</a> or <a href=\"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\">Oracle's Advisory</a>."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"severity":1}],"id":"7538347d-ca2e-09b8-c5d8-0a9d140f8c87","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p290","enabled":true,"matchFilename":"(NPSWF32\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349146327,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-02-25T10:15:59Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=807258","name":"Flash Player Plugin 10.3.183.19 to 10.3.183.66 (click-to-play)","why":"Old versions of the Flash Player plugin are potentially insecure and unstable. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"19.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.16a1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"},{"minVersion":"17.0.4","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.*"}],"minVersion":"10.3.183.19","maxVersion":"10.3.183.66","severity":0,"vulnerabilityStatus":1}],"id":"b1177bd1-a518-b86a-8825-e4c91d2362de","schema":1480349144394},{"blockID":"p292","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349146304,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-02-25T12:32:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=843373","name":"Java Plugin 7 update 12 to 15 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"Java 7 Update 12","maxVersion":"Java 7 Update 15","severity":0,"vulnerabilityStatus":1}],"id":"9a09fe22-c3d8-57e6-4e99-ecd06fb03081","schema":1480349144394},{"blockID":"p188","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349146280,"details":{"who":"All users who have these versions of the plugin installed in Firefox 17 and above.","created":"2012-10-30T14:48:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829111","name":"Java Plugin 6 updates 38 and lower (click-to-play), Mac OS X","why":"The Java plugin is causing significant security problems. All users are strongly recommended to keep the plugin disabled unless necessary."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"Java 6 Update 0","maxVersion":"Java 6 Update 38","severity":0,"vulnerabilityStatus":1}],"id":"61944828-8178-71ab-e9c6-d846b5f45d96","schema":1480349144394},{"blockID":"p459","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349146253,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-10-16T16:29:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=927273","name":"Java Plugin 7 update 25 to 44 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"Java 7 Update 25","maxVersion":"Java 7 Update 44","severity":0,"vulnerabilityStatus":1}],"id":"5b0bbf0e-dbae-7896-3c31-c6cb7a74e6fa","schema":1480349144394},{"matchName":"^Yahoo Application State Plugin$","blockID":"p26","enabled":true,"matchFilename":"npYState.dll","last_modified":1480349146230,"details":{"who":"Users of all versions of Yahoo Application State Plugin for Firefox 3 and later.\r\n\r\nUsers of all versions of Yahoo Application State Plugin for SeaMonkey 1.0.0.5 and later.","created":"2011-03-31T16:28:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=421993","name":"Yahoo Application State Plugin","why":"This plugin causes a high volume of Firefox and SeaMonkey crashes."},"versionRange":[{"targetApplication":[{"minVersion":"3.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"3.*"}]}],"matchDescription":"^Yahoo Application State Plugin$","id":"6a1b6dfe-f463-3061-e8f8-6e896ccf2a8a","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p902","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349146207,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-05-19T09:00:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1159917","name":"Java Plugin 7 update 45 to 78 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 7 Update 45","maxVersion":"Java 7 Update 78","severity":0,"vulnerabilityStatus":1}],"id":"72de1aa2-6afe-2f5b-a93e-baa4c8c4578d","schema":1480349144394},{"blockID":"p154","enabled":true,"matchFilename":"npctrl\\.dll","last_modified":1480349146182,"details":{"who":"All Firefox users who have this plugin installed.","created":"2012-10-05T10:35:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=850744","name":"Silverlight 5.0 to 5.1.20124.*","why":"This plugin is outdated and is potentially insecure. Affected users should go to  <a href=\"http://www.mozilla.com/plugincheck/\">the plugin check page</a> and update to the latest version."},"versionRange":[{"targetApplication":[],"minVersion":"5.0","maxVersion":"5.1.20124.9999","severity":0,"vulnerabilityStatus":1}],"id":"64b50946-53f8-182d-a239-bd585b0e0b0e","schema":1480349144394},{"matchDescription":"Flip4Mac","blockID":"p242","enabled":true,"last_modified":1480349146153,"details":{"who":"All Firefox (18 and above) users on Mac OS X who have installed a version of Flip4Mac older than 2.4.4.","created":"2012-12-21T13:32:36Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=821422","name":"Flip4Mac WMV Plugin","why":"Old versions of the Flip4Mac WMV plugin are causing significant stability problems in Firefox 18 and above. Users are encouraged update to the latest version of the plugin, available at <a href=\"http://www.telestream.net/flip4mac/overview.htm\">the Flip4Mac site</a>."},"versionRange":[{"targetApplication":[{"minVersion":"18.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"}],"minVersion":"0","maxVersion":"2.4.3.999","severity":1}],"os":"Darwin","id":"cef6f402-bdf8-0ba6-66d8-8ac42c72d4be","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p834","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349146129,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-02-05T15:42:51Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1128534","name":"Flash Player Plugin 13.0.0.263 to 13.0.0.268 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"13.0.0.263","maxVersion":"13.0.0.268","severity":0,"vulnerabilityStatus":1}],"id":"5e42d3a0-dfc5-4edb-8a30-4d6eed694b01","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 6 U3[1-8](\\s[^\\d\\._U]|$)","blockID":"p186","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349146106,"details":{"who":"All users who have these versions of the plugin installed in Firefox 17  and above.","created":"2012-10-30T14:45:39Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829111","name":"Java Plugin 6 updates 31 through 38 (click-to-play), Windows","why":"The Java plugin is causing significant security problems. All users are strongly recommended to keep the plugin disabled unless necessary."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"8488cdb0-1f00-1349-abfc-f50e85c9163b","schema":1480349144394},{"infoURL":"https://get.adobe.com/reader","blockID":"p1247","enabled":true,"matchFilename":"(nppdf32\\.dll)|(AdobePDFViewerNPAPI\\.plugin)","last_modified":1480349146079,"details":{"who":"All users who have this plugin installed.","created":"2016-07-21T16:21:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286972","name":"Adobe Reader (Classic) 15.006.30174","why":"Old versions of the Adobe Reader plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"15.006.30174","maxVersion":"15.006.30174","severity":0,"vulnerabilityStatus":1}],"id":"eba24802-0c93-b8d4-ca2d-c9c194c7462b","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","matchDescription":"^Shockwave Flash 11.(0|1) r[0-9]{1,3}$","blockID":"p332","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349146047,"details":{"who":"All Firefox users who have these versions of the Adobe Flash Player plugin installed.","created":"2013-03-26T09:46:14Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=854550","name":"Adobe Flash for Linux 11.0 to 11.1.* (click-to-play)","why":"Old versions of the Adobe Flash Player plugin are potentially insecure and unstable. All users are recommended to visit our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check</a> to check for updates."},"versionRange":[{"targetApplication":[{"minVersion":"19.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.16a1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"},{"minVersion":"17.0.4","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.*"}],"severity":0,"vulnerabilityStatus":1}],"id":"38797744-cb92-1a49-4c81-2a900691fdba","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 7 U1[2-5](\\s[^\\d\\._U]|$)","blockID":"p294","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349146005,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-02-25T12:33:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=843373","name":"Java Plugin 7 update 12 to 15 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"ab8aff96-ead4-615d-be44-bcb7c31699f0","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1065","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349145967,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-12-21T13:42:42Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1231191","name":"Flash Player Plugin on Linux 11.2.202.540 to 11.2.202.548 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.540","maxVersion":"11.2.202.548","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"6bd57804-385b-ec8b-d4ff-3997597c3924","schema":1480349144394},{"matchName":"Java(\\(TM\\))? Plug-in ((1\\.7\\.0_(2[5-9]|3\\d|4[0-4]))|(10\\.4[0-4](\\.[0-9]+)?))([^\\d\\._]|$)","blockID":"p457","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349145942,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-10-16T16:28:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=927273","name":"Java Plugin 7 update 25 to 44 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"5ca97332-f4b7-81f5-d441-6acb1834f332","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1236","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145917,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-06-23T12:55:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1280125","name":"Flash Player Plugin 21.0.0.226 to 21.0.0.242 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"21.0.0.226","maxVersion":"21.0.0.242","severity":0,"vulnerabilityStatus":1}],"id":"392c2c9b-f2a7-1bd5-c01c-6035e810cbaf","schema":1480349144394},{"blockID":"p138","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349145894,"details":{"who":"All Firefox users who have the Java 7 plugin, update 6 and below.","created":"2012-09-13T14:49:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=794247","name":"Java Plugin","why":"The Java 7 Runtime Environment, update versions 6 and below, has a <a href=\"https://blog.mozilla.org/security/2012/08/28/protecting-users-against-java-security-vulnerability/\">serious security vulnerability</a> that is fixed in the latest update. All Firefox users are strongly encouraged to update as soon as possible. This can be done on the <a href=\"http://www.mozilla.com/plugincheck/\">Plugin Check</a> page."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"minVersion":"Java 7 Update 01","maxVersion":"Java 7 Update 06","severity":1}],"id":"5e898a46-8ea9-2fab-5dfe-a43e51641d81","schema":1480349144394},{"blockID":"p31","enabled":true,"matchFilename":"NPMySrch.dll","last_modified":1480349145872,"details":{"who":"All users of MyWebSearch for all Mozilla applications.","created":"2011-03-31T16:28:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=449062","name":"MyWebSearch","why":"This plugin causes a high volume of Firefox crashes."},"versionRange":[{"targetApplication":[],"maxVersion":"*"}],"id":"2b2b85e9-4f64-9894-e3fa-3c05ead892b3","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p260","enabled":true,"matchFilename":"(NPSWF32\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145849,"details":{"who":"All users who have these versions of the Flash plugin installed in Firefox 18 and above.","created":"2013-01-29T11:29:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=832038","name":"Flash Player Plugin 10.2.* and lower (click-to-play)","why":"Old versions of the Flash Player plugin are potentially insecure and unstable. All users are strongly recommended to check for updates at our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>.\r\n\r\nFor more information and feedback, please <a href=\"https://blog.mozilla.org/addons/2013/01/29/flash-10-2-lower-now-click-to-play/\">visit this post</a>."},"versionRange":[{"targetApplication":[{"minVersion":"18.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14a1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"},{"minVersion":"17.0.4","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.*"}],"minVersion":"0","maxVersion":"10.2.9999","severity":0,"vulnerabilityStatus":1}],"id":"ce0495ed-72b8-9cb4-7a1b-eaf7f77586f7","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1272","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349145825,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-09-23T15:27:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1302525","name":"Flash Player Plugin on Linux 11.2.202.626 to 11.2.202.632 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.626","maxVersion":"11.2.202.632","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"c6add809-fcd0-c504-c126-077800ebfdae","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1139","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145802,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-03-18T15:34:16Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255519","name":"Flash Player Plugin 18.0.0.326 to 18.0.0.329 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.326","maxVersion":"18.0.0.329","severity":0,"vulnerabilityStatus":1}],"id":"0a890ad6-f9f3-7df4-5154-966368c1789d","schema":1480349144394},{"blockID":"p572","enabled":true,"matchFilename":"npdjvu\\.dll","last_modified":1480349145775,"details":{"who":"All Firefox users who have this plugin installed. Updated versions can be found <a href=\"https://www.cuminas.jp/en/downloads/download/?pid=1\">on this site</a>.","created":"2014-04-08T14:42:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=992976","name":"DjVu Plugin Viewer 6.1.4.27993 and earlier (Windows)","why":"Versions 6.1.4.27993 and earlier of this plugin are known to have security vulnerabilities."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"6.1.4.27993","severity":0,"vulnerabilityStatus":1}],"id":"8a416fb1-29bf-ace9-02de-605d805b6e79","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1273","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145748,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-09-23T15:28:24Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1302525","name":"Flash Player Plugin 18.0.0.360 to 18.0.0.366 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.360","maxVersion":"18.0.0.366","severity":0,"vulnerabilityStatus":1}],"id":"72e5f878-3202-b97a-d419-6e1e86a2fb18","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1044","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349145406,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-10-21T14:11:52Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1214459","name":"Flash Player Plugin on Linux 11.2.202.509 to 11.2.202.539 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.509","maxVersion":"11.2.202.539","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"10b322e3-61ec-1066-a88b-cd12c1da339b","schema":1480349144394},{"blockID":"p592","enabled":true,"matchFilename":"CiscoWebCommunicator\\.plugin","last_modified":1480349145382,"details":{"who":"All Firefox users who have installed a version of the Cisco Web Communicator plugin lower than 3.0.6.","created":"2014-06-11T16:48:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=980355","name":"Cisco Web Communicator < 3.0.6 (Mac OS X)","why":"Versions lower than 3.0.6 of the Cisco Web Communicator plugin are known to have security issues and should not be used. All users should update to version 3.0.6 or later. <a href=\"https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user\">Find updates here.</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.0.5.99999999999999","severity":0,"vulnerabilityStatus":1}],"id":"1f9f9b90-e733-3929-821f-1b78a8698747","schema":1480349144394},{"matchName":"^Yahoo Application State Plugin$","blockID":"p29","enabled":true,"matchFilename":"npYState.dll","last_modified":1480349145359,"details":{"who":"Users of all versions of Yahoo Application State Plugin for Firefox 3 and later.\r\n\r\nUsers of all versions of Yahoo Application State Plugin for SeaMonkey 1.0.0.5 and later.","created":"2011-03-31T16:28:26Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=421993","name":"Yahoo Application State Plugin (SeaMonkey)","why":"This plugin causes a high volume of Firefox and SeaMonkey crashes."},"versionRange":[{"targetApplication":[{"minVersion":"1.0.0.5","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}]}],"matchDescription":"^Yahoo Application State Plugin$","id":"8f52a562-5438-731b-5c64-7f76009f1489","schema":1480349144394},{"matchName":"Java\\(TM\\) Plug-in 1\\.6\\.0_4[2-5]([^\\d\\._]|$)","blockID":"p412","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349145336,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-06-28T12:42:20Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=885362","name":"Java Plugin 6 updates 42 to 45 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"8f652c63-cda4-1640-0b0c-23025e336b20","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1412","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349145312,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-10-28T17:14:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1313435","name":"Flash Player Plugin on Linux 11.2.202.632 to 11.2.202.637 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.632","maxVersion":"11.2.202.637","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"c7393e90-d75b-2aac-21de-a0c460387ff5","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p176","enabled":true,"matchFilename":"(NPSWF32\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145289,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2012-10-30T14:02:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=803152","name":"Flash Player Plugin 10.3 to 10.3.183.19 (click-to-play)","why":"Old versions of the Flash Player plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"19.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.16a1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"},{"minVersion":"17.0.4","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.*"}],"minVersion":"10.3","maxVersion":"10.3.183.18.999","severity":0,"vulnerabilityStatus":1}],"id":"3b6278ac-d613-6769-c299-89385b8075d1","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1413","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145265,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-10-28T17:15:49Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1313435","name":"Flash Player Plugin 22.0.0.211 to 23.0.0.185 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"22.0.0.211","maxVersion":"23.0.0.185","severity":0,"vulnerabilityStatus":1}],"id":"4fe73208-9a72-bea4-cd97-c106e6503d2e","schema":1480349144394},{"matchName":"Java\\(TM\\) Plug-in 1\\.7\\.0(_0?([0-9]|(1[0-1]))?)?([^\\d\\._]|$)","blockID":"p184","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349145223,"details":{"who":"All users who have these versions of the plugin installed in Firefox 17 and above.","created":"2012-10-30T14:39:15Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829111","name":"Java Plugin 7 update 11 and lower (click-to-play), Linux","why":"The Java plugin is causing significant security problems. All users are strongly recommended to keep the plugin disabled unless necessary."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"06621403-39a8-3867-ba6e-406dc20c88af","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p932","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349145175,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-06-30T14:12:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1177214","name":"Flash Player Plugin on Linux 11.2.202.442 to 11.2.202.467 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.442","maxVersion":"11.2.202.467","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"f136f459-8d42-f2a1-5cd3-e8d24dd8f70d","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1121","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145144,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-02-17T16:26:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1247032","name":"Flash Player Plugin 20.0.0.235 to 20.0.0.286 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"20.0.0.235","maxVersion":"20.0.0.286","severity":0,"vulnerabilityStatus":1}],"id":"c7d33934-7875-1e9e-ebcc-1a73e359951d","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 11\\.(\\d|[1-3]\\d|4[0-4])(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p912","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349145119,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-05-19T09:05:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1159917","name":"Java Plugin 8 update 44 and lower (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"f0a40537-9a13-1b4b-60e5-b9121835c1ca","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 8( U([1-3]?\\d|4[0-4]))?(\\s[^\\d\\._U]|$)","blockID":"p908","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349145082,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-05-19T09:03:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1159917","name":"Java Plugin 8 update 44 and lower (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"79e165b4-599b-433d-d618-146f0c121ead","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 11\\.(6[4-9]|7[0-6])(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p1146","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349145057,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2016-03-31T16:19:31Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1259458","name":"Java Plugin 8 update 64 to 76 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"bc99ed93-b527-12e2-c6e6-c61668a2e7d0","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1254","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349145005,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-07-25T13:24:40Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286380","name":"Flash Player Plugin 21.0.0.242 to 22.0.0.192 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"21.0.0.242","maxVersion":"22.0.0.192","severity":0,"vulnerabilityStatus":1}],"id":"d9e50e5f-ffff-35d1-c0d0-66d0f1daef77","schema":1480349144394},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 7 U(79|80)(\\s[^\\d\\._U]|$)","blockID":"p958","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349144983,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-07-15T10:49:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183369","name":"Java Plugin 7 update 79 to 80 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"2cfa79ef-a2ab-d868-467d-d182242136a5","schema":1480349144394},{"blockID":"p156","enabled":true,"matchFilename":"nppdf32\\.dll","last_modified":1480349144959,"details":{"who":"All Firefox users who have this plugin installed.","created":"2012-10-05T10:38:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=797378","name":"Adobe Reader 9.5.1 and lower","why":"This plugin is outdated and is potentially insecure. Affected users should go to  <a href=\"http://www.mozilla.com/plugincheck/\">the plugin check page</a> and update to the latest version."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"9.5.1","severity":0,"vulnerabilityStatus":1}],"id":"0dce3611-19e7-e8e4-5b5c-13593230f83c","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1123","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349144934,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-02-17T16:28:21Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1247032","name":"Flash Player Plugin on Linux 11.2.202.554 to 11.2.202.559 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.554","maxVersion":"11.2.202.559","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"dd7b1070-3be3-d859-ac45-691892512e3f","schema":1480349144394},{"blockID":"p574","enabled":true,"matchFilename":"NPDjVu\\.plugin","last_modified":1480349144910,"details":{"who":"All Firefox users who have this plugin installed. Updated versions can be found <a href=\"https://www.cuminas.jp/en/downloads/download/?pid=1\">on this site</a>.","created":"2014-04-08T14:43:54Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=992976","name":"DjVu Plugin Viewer 6.1.1 and earlier (Mac OS)","why":"Versions 6.1.1 and earlier of this plugin are known to have security vulnerabilities.\r\n"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"6.1.1","severity":0,"vulnerabilityStatus":1}],"id":"c841472f-f976-c49a-169e-0c751012c3b1","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p798","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349144887,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2014-12-12T16:06:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1109795","name":"Flash Player Plugin 14.0 to 15.0.0.242 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities (CVE-2014-9163). All users are strongly recommended to <a href=\"https://get.adobe.com/flashplayer/\">update their Flash plugin</a>."},"versionRange":[{"targetApplication":[],"minVersion":"14.0","maxVersion":"15.0.0.242","severity":0,"vulnerabilityStatus":1}],"id":"975c8d44-21f4-91f3-2e5a-44e0cfd33d06","schema":1480349144394},{"blockID":"p556","enabled":true,"matchFilename":"npUnity3D32\\.dll","last_modified":1480349144865,"details":{"who":"All Firefox users who have these versions of the plugin installed.","created":"2014-02-25T08:29:41Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=974012","name":"Unity Web Player 4.6.6f1 and lower (click-to-play), Windows","why":"Current versions of the Unity Web Player plugin have known vulnerabilities that can put users at risk."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"4.6.6f1","severity":0,"vulnerabilityStatus":1}],"id":"b90eb83c-1314-5b27-687b-98d8115b6106","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 6 U4[2-5](\\s[^\\d\\._U]|$)","blockID":"p414","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349144842,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-06-28T12:43:43Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=885362","name":"Java Plugin 6 updates 42 to 45 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"severity":0,"vulnerabilityStatus":1}],"id":"e36516a6-8bb3-09cc-02e3-72c67046b42e","schema":1480349144394},{"matchName":"Java\\(TM\\) Platform SE 7 U7(\\s[^\\d\\._U]|$)","blockID":"p214","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349144817,"details":{"who":"All Firefox users who have the Java 7 plugin, updates 7 and below.","created":"2012-11-22T09:34:13Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812896","name":"Java Plugin 1.7u7 (Windows)","why":"The Java 7 Runtime Environment, update version 7 and below, has a <a href=\"http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html\">serious security vulnerability</a> that is fixed in the latest update. All Firefox users are strongly encouraged to update as soon as possible. This can be done on the <a href=\"http://www.mozilla.com/plugincheck/\">Plugin Check</a> page."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"severity":1}],"id":"524ff62f-9564-a2b2-2585-88b88ea4c2f9","schema":1480349144394},{"infoURL":"https://java.com/","blockID":"p956","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349144793,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-07-15T10:48:44Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183369","name":"Java Plugin 8 update 45 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 8 Update 45","maxVersion":"Java 8 Update 45","severity":0,"vulnerabilityStatus":1}],"id":"111881f9-a5bd-4919-4bab-9d7581d959d3","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p824","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349144769,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-01-28T14:35:08Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1124654","name":"Flash Player Plugin 13.0.0.259 to 13.0.0.263 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"13.0.0.259","maxVersion":"13.0.0.263","severity":0,"vulnerabilityStatus":1}],"id":"dc56898f-fb0f-23ce-f507-8b50206c5444","schema":1480349144394},{"matchName":"\\(TM\\)","blockID":"p80","enabled":true,"matchFilename":"(npjp2\\.dll)|(libnpjp2\\.so)","last_modified":1480349144745,"details":{"who":"All Firefox users who have installed the Java plugin, JRE versions below 1.6.0_31 or between 1.7.0 and 1.7.0_2.","created":"2012-04-02T15:18:50Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=739955","name":"Java Plugin","why":"Outdated versions of the Java plugin are vulnerable to an actively exploited security issue. All users are strongly encouraged to <a href=\"http://java.com/inc/BrowserRedirect1.jsp\">update their Java plugin</a>. For more information, please <a href=\"http://blog.mozilla.com/addons/2012/04/02/blocking-java/\">read our blog post</a> or <a href=\"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html\">Oracle's Advisory</a>."},"versionRange":[{"targetApplication":[],"severity":1}],"matchDescription":"[^\\d\\._]((0(\\.\\d+(\\.\\d+([_\\.]\\d+)?)?)?)|(1\\.(([0-5](\\.\\d+([_\\.]\\d+)?)?)|(6(\\.0([_\\.](0?\\d|1\\d|2\\d|30))?)?)|(7(\\.0([_\\.][0-2])?)?))))([^\\d\\._]|$)","id":"34deed93-d9d9-81b4-7983-0594fb829ae7","schema":1480349144394},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p946","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349144384,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-07-13T16:01:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1182751","name":"Flash Player Plugin 18.0.0.203 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.203","maxVersion":"18.0.0.203","severity":0,"vulnerabilityStatus":1}],"id":"503ba184-168d-1fcd-9a4d-62a6f8a79d68","schema":1480343754054},{"matchName":"Java\\(TM\\) Plug-in 1\\.7\\.0(_0?7)?([^\\d\\._]|$)","blockID":"p210","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349144360,"details":{"who":"All Firefox users who have the Java 7 plugin, updates 7 and below.","created":"2012-11-22T09:31:33Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=812896","name":"Java Plugin 1.7u7 (Linux)","why":"The Java 7 Runtime Environment, update version 7, has a <a href=\"http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html\">serious security vulnerability</a> that is fixed in the latest update. All Firefox users are strongly encouraged to update as soon as possible. This can be done on the <a href=\"http://www.mozilla.com/plugincheck/\">Plugin Check</a> page."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"severity":1}],"id":"8e562dba-7ae7-fa85-2c31-479c4e661056","schema":1480343754054},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p794","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349144337,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2014-12-11T05:48:53Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1109795","name":"Flash Player Plugin 10.3.183.66 to 13.0.0.258 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities (CVE-2014-9163). All users are strongly recommended to <a href=\"https://get.adobe.com/flashplayer/\">update their Flash plugin</a>."},"versionRange":[{"targetApplication":[],"minVersion":"10.3.183.66","maxVersion":"13.0.0.258","severity":0,"vulnerabilityStatus":1}],"id":"a2933e35-58b8-6560-ba75-c763481ed59f","schema":1480343754054},{"blockID":"p328","enabled":true,"matchFilename":"Silverlight\\.plugin","last_modified":1480349144312,"details":{"who":"All Firefox users who have these versions of the plugin installed.","created":"2013-03-26T09:35:05Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=853629","name":"Silverlight for Mac OS X between 5.1 and 5.1.20124.* (click-to-play)","why":"Old versions of this plugin are potentially insecure and unstable. All affected users should visit the <a href=\"http://www.mozilla.com/plugincheck/\">plugin check</a> page to look for updates for their Silverlight plugin."},"versionRange":[{"targetApplication":[{"minVersion":"19.0a1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.16a1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"},{"minVersion":"17.0.4","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.0.*"}],"minVersion":"5.1","maxVersion":"5.1.20124.9999","severity":0,"vulnerabilityStatus":1}],"id":"dd81b232-09cb-e31d-ed8b-c5cc6ea28dd0","schema":1480343754054},{"infoURL":"https://java.com/","blockID":"p1052","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349144290,"details":{"who":"All users who have this version of the plugin installed.","created":"2015-11-06T13:30:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=829111","name":"Java Plugin 7 update 11 (click-to-play), Mac OS X","why":"The Java plugin is causing significant security problems. All users are strongly recommended to keep the plugin disabled unless necessary."},"versionRange":[{"targetApplication":[],"minVersion":"Java 7 Update 11","maxVersion":"Java 7 Update 11","severity":0,"vulnerabilityStatus":1}],"id":"c62a171f-7564-734f-0310-bae88c3baf85","schema":1480343754054},{"matchName":"Java\\(TM\\) Plug-in 1\\.(6\\.0_(\\d|[0-2]\\d?|3[0-2])|7\\.0(_0?([1-4]))?)([^\\d\\._]|$)","blockID":"p119","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349144265,"details":{"who":"All Firefox users who have installed the Java plugin, JRE versions below 1.6.0_33 or between 1.7.0 and 1.7.0_4.","created":"2012-08-14T09:27:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=780717","name":"Java Plugin","why":"Outdated versions of the Java plugin are vulnerable to an actively exploited security issue. All users are strongly encouraged to <a href=\"http://java.com/inc/BrowserRedirect1.jsp\">update their Java plugin</a>. For more information, please <a href=\"http://blog.mozilla.org/addons/2012/08/14/new-java-blocklist/\">read our blog post</a> or <a href=\"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\">Oracle's Advisory</a>."},"versionRange":[{"targetApplication":[{"minVersion":"0.1","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"17.*"},{"minVersion":"0.1","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"2.14.*"}],"severity":1}],"id":"d1aa9366-d40b-a68d-b3ed-4b36e4939442","schema":1480343754054},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 10\\.(4[5-9]|(5|6)\\d|7[0-8])(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p910","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349144233,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-05-19T09:04:46Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1159917","name":"Java Plugin 7 update 45 to 78 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"f322be12-1b08-0d57-ed51-f7a6d6ec2c17","schema":1480343754054},{"blockID":"p428","enabled":true,"matchFilename":"np[dD]eployJava1\\.dll","last_modified":1480349144210,"details":{"who":"All Firefox users who have this plugin installed.","created":"2013-07-18T15:39:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=636633","name":"Java Deployment Toolkit (click-to-play)","why":"The Java Deployment Toolkit plugin is known to be insecure and is unnecessary in most cases. Users should keep it disabled unless strictly necessary."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":2}],"id":"d30a5b90-b84a-dfec-6147-fc04700a0d8b","schema":1480343754054},{"blockID":"p416","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349144187,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2013-06-28T12:44:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=885362","name":"Java Plugin 6 updates 42 to 45 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[{"minVersion":"17.0","guid":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","maxVersion":"*"},{"minVersion":"2.14","guid":"{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}","maxVersion":"*"}],"minVersion":"Java 6 Update 42","maxVersion":"Java 6 Update 45","severity":0,"vulnerabilityStatus":1}],"id":"02a5865d-f6ea-a330-674e-7dea7390680f","schema":1480343754054},{"blockID":"p594","enabled":true,"matchFilename":"npCiscoWebCommunicator\\.dll","last_modified":1480349144164,"details":{"who":"All Firefox users who have installed a version of the Cisco Web Communicator plugin lower than 3.0.6.","created":"2014-06-11T16:49:00Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=980355","name":"Cisco Web Communicator < 3.0.6 (Windows)","why":"Versions lower than 3.0.6 of the Cisco Web Communicator plugin are known to have security issues and should not be used. All users should update to version 3.0.6 or later. <a href=\"https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user\">Find updates here.</a>"},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"3.0.5.99999999999999","severity":0,"vulnerabilityStatus":1}],"id":"f11f91d6-f65e-8a05-310b-ad20494a868a","schema":1480343754054},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p938","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349144141,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-07-10T13:37:02Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181458","name":"Flash Player Plugin 18.0.0.194 to 18.0.0.202 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"18.0.0.194","maxVersion":"18.0.0.202","severity":0,"vulnerabilityStatus":1}],"id":"1b954bda-3ae4-ce14-29fb-be2c94f1d89a","schema":1480343754054},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1226","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349144119,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-05-31T15:21:48Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1275307","name":"Flash Player Plugin 21.0.0.197 to 21.0.0.226 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"21.0.0.197","maxVersion":"21.0.0.226","severity":0,"vulnerabilityStatus":1}],"id":"8478742b-e3a9-aa23-c9a6-dc9c3cb90291","schema":1480343754054},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 11\\.(4[6-9]|5\\d|6[0-4])(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p1064","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349144096,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-12-02T12:42:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1217932","name":"Java Plugin 8 update 46 to 64 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"d5cb1745-d144-5375-f3ff-cd603d4c2cee","schema":1480343754054},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 7 U(4[5-9]|(5|6)\\d|7[0-8])(\\s[^\\d\\._U]|$)","blockID":"p906","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349144073,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-05-19T09:02:45Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1159917","name":"Java Plugin 7 update 45 to 78 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"f254e5bc-12c7-7954-fe6b-8f1fdab0ae88","schema":1480343754054},{"blockID":"p240","enabled":true,"matchFilename":"DivXBrowserPlugin\\.plugin","last_modified":1480349144049,"details":{"who":"All Firefox users who have versions of the DivX Web Player plugin lower than 1.4.","created":"2012-12-19T13:03:27Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=821972","name":"DivX Web Player 1.4 (DivX 7) and below","why":"Old versions of the DivX Web Player plugin are causing significant stability problems on Firefox 18 and above, on Mac OS X. All users should update their DivX software to the latest available version, available at <a href=\"http://www.divx.com\">divx.com</a>."},"versionRange":[{"targetApplication":[],"minVersion":"0","maxVersion":"1.4","severity":1}],"id":"d7f644bb-61aa-4594-f9fc-8dba7d9f3306","schema":1480343754054},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 10\\.(79|80)(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p962","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349144026,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-07-15T10:51:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183369","name":"Java Plugin 7 update 79 to 80 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"7120e3c2-b293-65b5-2498-6451eab1e2c5","schema":1480343754054},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p936","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349144002,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-07-10T13:35:04Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181458","name":"Flash Player Plugin on Linux 11.2.202.468 to 11.2.202.480 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.468","maxVersion":"11.2.202.480","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"44b7040d-1567-110d-6ec5-44673c052bd8","schema":1480343754054},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1028","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349143976,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2015-10-01T09:50:47Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206889","name":"Flash Player Plugin on Linux 11.2.202.482 to 11.2.202.508 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.482","maxVersion":"11.2.202.508","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"0cc10d08-5e0c-47ea-614a-61f0f4a765d0","schema":1480343754054},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p940","enabled":true,"matchFilename":"(NPSWF32.*\\.dll)|(NPSWF64.*\\.dll)|(Flash\\ Player\\.plugin)","last_modified":1480349143953,"details":{"who":"All users who have these versions of the plugin installed in Firefox.","created":"2015-07-10T13:38:10Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1181458","name":"Flash Player Plugin 13.0.0.296 to 13.0.0.301  (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"13.0.0.296","maxVersion":"13.0.0.301","severity":0,"vulnerabilityStatus":1}],"id":"de82ceab-e70e-06f4-3b83-8c7a4c99c589","schema":1480343754054},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 8 U(4[6-9]|5\\d|6[0-4])(\\s[^\\d\\._U]|$)","blockID":"p1062","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349143930,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-12-02T12:40:28Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1217932","name":"Java Plugin 8 update 46 to 64 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"a20c77af-721b-833b-8fa8-49091d1c69d4","schema":1480343754054},{"infoURL":"https://java.com/","matchName":"Java\\(TM\\) Platform SE 7 U(9[1-7])(\\s[^\\d\\._U]|$)","blockID":"p1143","enabled":true,"matchFilename":"npjp2\\.dll","last_modified":1480349143905,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2016-03-31T16:17:32Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1259458","name":"Java Plugin 7 update 91 to 97 (click-to-play), Windows","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"be53f658-e719-fa77-e7fe-6bd6086f888e","schema":1480343754054},{"infoURL":"https://java.com/","blockID":"p954","enabled":true,"matchFilename":"JavaAppletPlugin\\.plugin","last_modified":1480349143879,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-07-15T10:47:55Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1183369","name":"Java Plugin 7 update 79 to 80 (click-to-play), Mac OS X","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"Java 7 Update 79","maxVersion":"Java 7 Update 80","severity":0,"vulnerabilityStatus":1}],"id":"9b6830b4-a4b0-ee63-ee21-e0bd6ba0d6fe","schema":1480343754054},{"infoURL":"https://get.adobe.com/reader","blockID":"p1246","enabled":true,"matchFilename":"(nppdf32\\.dll)|(AdobePDFViewerNPAPI\\.plugin)","last_modified":1480349143855,"details":{"who":"All users who have this plugin installed.","created":"2016-07-20T19:19:58Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1286972","name":"Adobe Reader 10.1.6 to 11.0.16","why":"Old versions of the Adobe Reader plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"10.1.6","maxVersion":"11.0.16 ","severity":0,"vulnerabilityStatus":1}],"id":"4e29bd83-d074-bd40-f238-5ea38ff0d8d0","schema":1480343754054},{"infoURL":"https://java.com/","matchName":"Java(\\(TM\\))? Plug-in 10\\.(8[1-9]|90)(\\.[0-9]+)?([^\\d\\._]|$)","blockID":"p1063","enabled":true,"matchFilename":"libnpjp2\\.so","last_modified":1480349143832,"details":{"who":"All users who have these versions of the Java plugin installed.","created":"2015-12-02T12:41:34Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1217932","name":"Java Plugin 7 update 81 to 90 (click-to-play), Linux","why":"Old versions of the Java plugin are potentially insecure and unstable. All users are strongly recommended to update on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"severity":0,"vulnerabilityStatus":1}],"id":"b6b9c6b9-b8c4-66a9-ed07-125b32e7a5ef","schema":1480343754054},{"infoURL":"https://get.adobe.com/flashplayer/","blockID":"p1138","enabled":true,"matchFilename":"libflashplayer\\.so","last_modified":1480349143807,"details":{"who":"All users who have these versions of the Flash plugin installed.","created":"2016-03-18T15:33:12Z","bug":"https://bugzilla.mozilla.org/show_bug.cgi?id=1255519","name":"Flash Player Plugin on Linux 11.2.202.559 to 11.2.202.569 (click-to-play)","why":"Old versions of the Flash Player plugin have known vulnerabilities. All users are strongly recommended to check for updates on our <a href=\"http://www.mozilla.com/plugincheck/\">plugin check page</a>."},"versionRange":[{"targetApplication":[],"minVersion":"11.2.202.559","maxVersion":"11.2.202.569","severity":0,"vulnerabilityStatus":1}],"os":"Linux","id":"f7b02575-c0a6-2198-dc9f-5deadbcccbb2","schema":1480343754054}]}
\ No newline at end of file
new file mode 100644
--- /dev/null
+++ b/services/blocklists/readme.md
@@ -0,0 +1,29 @@
+# Blocklist
+
+The blocklist entries are synchronized locally from the Firefox Settings service.
+
+https://firefox.settings.services.mozilla.com
+
+In order to reduce the amount of data to be downloaded on first synchronization,
+a JSON dump from the records present on the remote server is shipped with the
+release.
+
+## How to update the JSON files ?
+
+Even though it is not a problem if the dumps are not up-to-date when shipped, here
+are the commands to update them:
+
+```
+SERVICE_URL="https://firefox.settings.services.mozilla.com/v1"
+
+curl "$SERVICE_URL/buckets/blocklists/collections/certificates/records?"  > services/blocklists/certificates.json
+curl "$SERVICE_URL/buckets/blocklists/collections/gfx/records?"  > services/blocklists/gfx.json
+curl "$SERVICE_URL/buckets/blocklists/collections/plugins/records?"  > services/blocklists/plugins.json
+curl "$SERVICE_URL/buckets/blocklists/collections/addons/records?"  > services/blocklists/addons.json
+
+curl "$SERVICE_URL/buckets/pinning/collections/pins/records?"  > services/blocklists/pins.json
+```
+
+## TODO
+
+- Setup a bot to update it regularly.
--- a/services/common/blocklist-clients.js
+++ b/services/common/blocklist-clients.js
@@ -2,34 +2,35 @@
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 "use strict";
 
 this.EXPORTED_SYMBOLS = ["AddonBlocklistClient",
                          "GfxBlocklistClient",
                          "OneCRLBlocklistClient",
-                         "PluginBlocklistClient",
                          "PinningBlocklistClient",
-                         "FILENAME_ADDONS_JSON",
-                         "FILENAME_GFX_JSON",
-                         "FILENAME_PLUGINS_JSON"];
+                         "PluginBlocklistClient"];
 
 const { classes: Cc, interfaces: Ci, utils: Cu } = Components;
 
 Cu.import("resource://gre/modules/Services.jsm");
+Cu.import("resource://gre/modules/XPCOMUtils.jsm");
 const { Task } = Cu.import("resource://gre/modules/Task.jsm", {});
 const { OS } = Cu.import("resource://gre/modules/osfile.jsm", {});
 Cu.importGlobalProperties(["fetch"]);
 
 const { Kinto } = Cu.import("resource://services-common/kinto-offline-client.js", {});
 const { KintoHttpClient } = Cu.import("resource://services-common/kinto-http-client.js", {});
 const { FirefoxAdapter } = Cu.import("resource://services-common/kinto-storage-adapter.js", {});
 const { CanonicalJSON } = Components.utils.import("resource://gre/modules/CanonicalJSON.jsm", {});
 
+XPCOMUtils.defineLazyModuleGetter(this, "FileUtils", "resource://gre/modules/FileUtils.jsm");
+
+const KEY_APPDIR                             = "XCurProcD";
 const PREF_SETTINGS_SERVER                   = "services.settings.server";
 const PREF_BLOCKLIST_BUCKET                  = "services.blocklist.bucket";
 const PREF_BLOCKLIST_ONECRL_COLLECTION       = "services.blocklist.onecrl.collection";
 const PREF_BLOCKLIST_ONECRL_CHECKED_SECONDS  = "services.blocklist.onecrl.checked";
 const PREF_BLOCKLIST_ADDONS_COLLECTION       = "services.blocklist.addons.collection";
 const PREF_BLOCKLIST_ADDONS_CHECKED_SECONDS  = "services.blocklist.addons.checked";
 const PREF_BLOCKLIST_PLUGINS_COLLECTION      = "services.blocklist.plugins.collection";
 const PREF_BLOCKLIST_PLUGINS_CHECKED_SECONDS = "services.blocklist.plugins.checked";
@@ -43,19 +44,16 @@ const PREF_BLOCKLIST_ENFORCE_SIGNING    
 
 const INVALID_SIGNATURE = "Invalid content/signature";
 
 // FIXME: this was the default path in earlier versions of
 // FirefoxAdapter, so for backwards compatibility we maintain this
 // filename, even though it isn't descriptive of who is using it.
 this.KINTO_STORAGE_PATH    = "kinto.sqlite";
 
-this.FILENAME_ADDONS_JSON  = "blocklist-addons.json";
-this.FILENAME_GFX_JSON     = "blocklist-gfx.json";
-this.FILENAME_PLUGINS_JSON = "blocklist-plugins.json";
 
 
 function mergeChanges(collection, localRecords, changes) {
   const records = {};
   // Local records by id.
   localRecords.forEach((record) => records[record.id] = collection.cleanLocalFields(record));
   // All existing records are replaced by the version from the server.
   changes.forEach((record) => records[record.id] = record);
@@ -99,16 +97,39 @@ class BlocklistClient {
     this.signerName = signerName;
 
     this._kinto = new Kinto({
       bucket: bucketName,
       adapter: FirefoxAdapter,
     });
   }
 
+  get filename() {
+    return `${this.bucketName}/${this.collectionName}.json`;
+  }
+
+  /**
+   * Load the the JSON file distributed with the release for this blocklist.
+   *
+   * For Bug 1257565 this method will have to try to load the file from the profile,
+   * in order to leverage the updateJSONBlocklist() below, which writes a new
+   * dump each time the collection changes.
+   */
+  loadDumpFile() {
+    const fileURI = `resource://app/defaults/${this.filename}`;
+    return Task.spawn(function* loadFile() {
+      const response = yield fetch(fileURI);
+      if (!response.ok) {
+        throw new Error(`Could not read from '${fileURI}'`);
+      }
+      // Will be rejected if JSON is invalid.
+      return yield response.json();
+    });
+  }
+
   validateCollectionSignature(remote, payload, collection, options = {}) {
     const {ignoreLocal} = options;
 
     return Task.spawn((function* () {
       // this is a content-signature field from an autograph response.
       const {x5u, signature} = yield fetchCollectionMetadata(remote, collection);
       const certChain = yield fetch(x5u).then((res) => res.text());
 
@@ -140,24 +161,27 @@ class BlocklistClient {
       }
       throw new Error(INVALID_SIGNATURE);
     }).bind(this));
   }
 
   /**
    * Synchronize from Kinto server, if necessary.
    *
-   * @param {int}  lastModified the lastModified date (on the server) for
-                                the remote collection.
-   * @param {Date} serverTime   the current date return by the server.
-   * @return {Promise}          which rejects on sync or process failure.
+   * @param {int}  lastModified     the lastModified date (on the server) for
+                                    the remote collection.
+   * @param {Date} serverTime       the current date return by the server.
+   * @param {Object} options        additional advanced options.
+   * @param {bool} options.loadDump load initial dump from disk on first sync (default: true)
+   * @return {Promise}              which rejects on sync or process failure.
    */
-  maybeSync(lastModified, serverTime) {
+  maybeSync(lastModified, serverTime, options = {loadDump: true}) {
+    const {loadDump} = options;
     const remote = Services.prefs.getCharPref(PREF_SETTINGS_SERVER);
-    let enforceCollectionSigning =
+    const enforceCollectionSigning =
       Services.prefs.getBoolPref(PREF_BLOCKLIST_ENFORCE_SIGNING);
 
     // if there is a signerName and collection signing is enforced, add a
     // hook for incoming changes that validates the signature
     let hooks;
     if (this.signerName && enforceCollectionSigning) {
       hooks = {
         "incoming-changes": [(payload, collection) => {
@@ -172,23 +196,40 @@ class BlocklistClient {
         // Synchronize remote data into a local Sqlite DB.
         sqliteHandle = yield FirefoxAdapter.openConnection({path: KINTO_STORAGE_PATH});
         const options = {
           hooks,
           adapterOptions: {sqliteHandle},
         };
         const collection = this._kinto.collection(this.collectionName, options);
 
-        const collectionLastModified = yield collection.db.getLastModified();
+        let collectionLastModified = yield collection.db.getLastModified();
+
+        // If there is no data currently in the collection, attempt to import
+        // initial data from the application defaults.
+        // This allows to avoid synchronizing the whole collection content on
+        // cold start.
+        if (!collectionLastModified && loadDump) {
+          try {
+            const initialData = yield this.loadDumpFile();
+            yield collection.db.loadDump(initialData.data);
+            collectionLastModified = yield collection.db.getLastModified();
+          } catch (e) {
+            // Report but go-on.
+            Cu.reportError(e);
+          }
+        }
+
         // If the data is up to date, there's no need to sync. We still need
         // to record the fact that a check happened.
         if (lastModified <= collectionLastModified) {
           this.updateLastCheck(serverTime);
           return;
         }
+
         // Fetch changes from server.
         try {
           const {ok} = yield collection.sync({remote});
           if (!ok) {
             throw new Error("Sync failed");
           }
         } catch (e) {
           if (e.message == INVALID_SIGNATURE) {
@@ -310,20 +351,23 @@ function* updatePinningList(records) {
  * Write list of records into JSON file, and notify nsBlocklistService.
  *
  * @param {String} filename  path relative to profile dir.
  * @param {Object} records   current records in the local db.
  */
 function* updateJSONBlocklist(filename, records) {
   // Write JSON dump for synchronous load at startup.
   const path = OS.Path.join(OS.Constants.Path.profileDir, filename);
+  const blocklistFolder = OS.Path.dirname(path);
+
+  yield OS.File.makeDir(blocklistFolder, {from: OS.Constants.Path.profileDir});
+
   const serialized = JSON.stringify({data: records}, null, 2);
   try {
     yield OS.File.writeAtomic(path, serialized, {tmpPath: path + ".tmp"});
-
     // Notify change to `nsBlocklistService`
     const eventData = {filename};
     Services.cpmm.sendAsyncMessage("Blocklist:reload-from-disk", eventData);
   } catch (e) {
     Cu.reportError(e);
   }
 }
 
@@ -333,31 +377,31 @@ this.OneCRLBlocklistClient = new Blockli
   updateCertBlocklist,
   Services.prefs.getCharPref(PREF_BLOCKLIST_BUCKET),
   "onecrl.content-signature.mozilla.org"
 );
 
 this.AddonBlocklistClient = new BlocklistClient(
   Services.prefs.getCharPref(PREF_BLOCKLIST_ADDONS_COLLECTION),
   PREF_BLOCKLIST_ADDONS_CHECKED_SECONDS,
-  updateJSONBlocklist.bind(undefined, FILENAME_ADDONS_JSON),
+  (records) => updateJSONBlocklist(this.AddonBlocklistClient.filename, records),
   Services.prefs.getCharPref(PREF_BLOCKLIST_BUCKET)
 );
 
 this.GfxBlocklistClient = new BlocklistClient(
   Services.prefs.getCharPref(PREF_BLOCKLIST_GFX_COLLECTION),
   PREF_BLOCKLIST_GFX_CHECKED_SECONDS,
-  updateJSONBlocklist.bind(undefined, FILENAME_GFX_JSON),
+  (records) => updateJSONBlocklist(this.GfxBlocklistClient.filename, records),
   Services.prefs.getCharPref(PREF_BLOCKLIST_BUCKET)
 );
 
 this.PluginBlocklistClient = new BlocklistClient(
   Services.prefs.getCharPref(PREF_BLOCKLIST_PLUGINS_COLLECTION),
   PREF_BLOCKLIST_PLUGINS_CHECKED_SECONDS,
-  updateJSONBlocklist.bind(undefined, FILENAME_PLUGINS_JSON),
+  (records) => updateJSONBlocklist(this.PluginBlocklistClient.filename, records),
   Services.prefs.getCharPref(PREF_BLOCKLIST_BUCKET)
 );
 
 this.PinningPreloadClient = new BlocklistClient(
   Services.prefs.getCharPref(PREF_BLOCKLIST_PINNING_COLLECTION),
   PREF_BLOCKLIST_PINNING_CHECKED_SECONDS,
   updatePinningList,
   Services.prefs.getCharPref(PREF_BLOCKLIST_PINNING_BUCKET),
--- a/services/common/tests/unit/test_blocklist_certificates.js
+++ b/services/common/tests/unit/test_blocklist_certificates.js
@@ -7,19 +7,20 @@ const { Kinto } = Cu.import("resource://
 const { FirefoxAdapter } = Cu.import("resource://services-common/kinto-storage-adapter.js", {});
 
 const BinaryInputStream = CC("@mozilla.org/binaryinputstream;1",
   "nsIBinaryInputStream", "setInputStream");
 
 let server;
 
 // set up what we need to make storage adapters
-const kintoFilename = "kinto.sqlite";
+let sqliteHandle;
+const KINTO_FILENAME = "kinto.sqlite";
 
-function do_get_kinto_collection(collectionName, sqliteHandle) {
+function do_get_kinto_collection(collectionName) {
   let config = {
     // Set the remote to be some server that will cause test failure when
     // hit since we should never hit the server directly, only via maybeSync()
     remote: "https://firefox.settings.services.mozilla.com/v1/",
     // Set up the adapter and bucket as normal
     adapter: FirefoxAdapter,
     adapterOptions: {sqliteHandle},
     bucket: "blocklists"
@@ -30,18 +31,18 @@ function do_get_kinto_collection(collect
 // Some simple tests to demonstrate that the logic inside maybeSync works
 // correctly and that simple kinto operations are working as expected. There
 // are more tests for core Kinto.js (and its storage adapter) in the
 // xpcshell tests under /services/common
 add_task(function* test_something() {
   const configPath = "/v1/";
   const recordsPath = "/v1/buckets/blocklists/collections/certificates/records";
 
-  Services.prefs.setCharPref("services.settings.server",
-                             `http://localhost:${server.identity.primaryPort}/v1`);
+  const dummyServerURL = `http://localhost:${server.identity.primaryPort}/v1`;
+  Services.prefs.setCharPref("services.settings.server", dummyServerURL);
 
   // register a handler
   function handleResponse(request, response) {
     try {
       const sample = getSampleResponse(request, server.identity.primaryPort);
       if (!sample) {
         do_throw(`unexpected ${request.method} request for ${request.path}?${request.queryString}`);
       }
@@ -61,34 +62,55 @@ add_task(function* test_something() {
     }
   }
   server.registerPathHandler(configPath, handleResponse);
   server.registerPathHandler(recordsPath, handleResponse);
 
   // Test an empty db populates
   yield OneCRLBlocklistClient.maybeSync(2000, Date.now());
 
+  sqliteHandle = yield FirefoxAdapter.openConnection({path: KINTO_FILENAME});
+  const collection = do_get_kinto_collection("certificates");
+
   // Open the collection, verify it's been populated:
-  // Our test data has a single record; it should be in the local collection
-  let sqliteHandle = yield FirefoxAdapter.openConnection({path: kintoFilename});
-  let collection = do_get_kinto_collection("certificates", sqliteHandle);
   let list = yield collection.list();
+  // We know there will be initial values from the JSON dump.
+  // (at least as many as in the dump shipped when this test was written).
+  do_check_true(list.data.length >= 363);
+
+  // No sync will be intented if maybeSync() is up-to-date.
+  Services.prefs.clearUserPref("services.settings.server");
+  Services.prefs.setIntPref("services.blocklist.onecrl.checked", 0);
+  // Use any last_modified older than highest shipped in JSON dump.
+  yield OneCRLBlocklistClient.maybeSync(123456, Date.now());
+  // Last check value was updated.
+  do_check_neq(0, Services.prefs.getIntPref("services.blocklist.onecrl.checked"));
+
+  // Restore server pref.
+  Services.prefs.setCharPref("services.settings.server", dummyServerURL);
+  // clear the collection, save a non-zero lastModified so we don't do
+  // import of initial data when we sync again.
+  yield collection.clear();
+  // a lastModified value of 1000 means we get a remote collection with a
+  // single record
+  yield collection.db.saveLastModified(1000);
+  yield OneCRLBlocklistClient.maybeSync(2000, Date.now());
+
+  // Open the collection, verify it's been updated:
+  // Our test data now has two records; both should be in the local collection
+  list = yield collection.list();
   do_check_eq(list.data.length, 1);
-  yield sqliteHandle.close();
 
   // Test the db is updated when we call again with a later lastModified value
   yield OneCRLBlocklistClient.maybeSync(4000, Date.now());
 
   // Open the collection, verify it's been updated:
   // Our test data now has two records; both should be in the local collection
-  sqliteHandle = yield FirefoxAdapter.openConnection({path: kintoFilename});
-  collection = do_get_kinto_collection("certificates", sqliteHandle);
   list = yield collection.list();
   do_check_eq(list.data.length, 3);
-  yield sqliteHandle.close();
 
   // Try to maybeSync with the current lastModified value - no connection
   // should be attempted.
   // Clear the kinto base pref so any connections will cause a test failure
   Services.prefs.clearUserPref("services.settings.server");
   yield OneCRLBlocklistClient.maybeSync(4000, Date.now());
 
   // Try again with a lastModified value at some point in the past
@@ -99,34 +121,34 @@ add_task(function* test_something() {
   Services.prefs.setIntPref("services.blocklist.onecrl.checked", 0);
   yield OneCRLBlocklistClient.maybeSync(3000, Date.now());
   let newValue = Services.prefs.getIntPref("services.blocklist.onecrl.checked");
   do_check_neq(newValue, 0);
 
   // Check that a sync completes even when there's bad data in the
   // collection. This will throw on fail, so just calling maybeSync is an
   // acceptible test.
-  Services.prefs.setCharPref("services.settings.server",
-                             `http://localhost:${server.identity.primaryPort}/v1`);
+  Services.prefs.setCharPref("services.settings.server", dummyServerURL);
   yield OneCRLBlocklistClient.maybeSync(5000, Date.now());
 });
 
 function run_test() {
   // Ensure that signature verification is disabled to prevent interference
   // with basic certificate sync tests
   Services.prefs.setBoolPref("services.blocklist.signing.enforced", false);
 
   // Set up an HTTP Server
   server = new HttpServer();
   server.start(-1);
 
   run_next_test();
 
   do_register_cleanup(function() {
     server.stop(() => { });
+    return sqliteHandle.close();
   });
 }
 
 // get a response for a given request from sample data
 function getSampleResponse(req, port) {
   const responses = {
     "OPTIONS": {
       "sampleHeaders": [
@@ -150,16 +172,27 @@ function getSampleResponse(req, port) {
       "responseBody": JSON.stringify({"settings":{"batch_max_requests":25}, "url":`http://localhost:${port}/v1/`, "documentation":"https://kinto.readthedocs.org/", "version":"1.5.1", "commit":"cbc6f58", "hello":"kinto"})
     },
     "GET:/v1/buckets/blocklists/collections/certificates/records?_sort=-last_modified": {
       "sampleHeaders": [
         "Access-Control-Allow-Origin: *",
         "Access-Control-Expose-Headers: Retry-After, Content-Length, Alert, Backoff",
         "Content-Type: application/json; charset=UTF-8",
         "Server: waitress",
+        "Etag: \"1000\""
+      ],
+      "status": {status: 200, statusText: "OK"},
+      "responseBody": JSON.stringify({"data":[{}]})
+    },
+    "GET:/v1/buckets/blocklists/collections/certificates/records?_sort=-last_modified&_since=1000": {
+      "sampleHeaders": [
+        "Access-Control-Allow-Origin: *",
+        "Access-Control-Expose-Headers: Retry-After, Content-Length, Alert, Backoff",
+        "Content-Type: application/json; charset=UTF-8",
+        "Server: waitress",
         "Etag: \"3000\""
       ],
       "status": {status: 200, statusText: "OK"},
       "responseBody": JSON.stringify({"data":[{
         "issuerName": "MEQxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwx0aGF3dGUsIEluYy4xHjAcBgNVBAMTFXRoYXd0ZSBFViBTU0wgQ0EgLSBHMw==",
         "serialNumber":"CrTHPEE6AZSfI3jysin2bA==",
         "id":"78cf8900-fdea-4ce5-f8fb-b78710617718",
         "last_modified":3000
--- a/services/common/tests/unit/test_blocklist_clients.js
+++ b/services/common/tests/unit/test_blocklist_clients.js
@@ -12,19 +12,19 @@ const { Kinto } = Cu.import("resource://
 const { FirefoxAdapter } = Cu.import("resource://services-common/kinto-storage-adapter.js", {});
 const BlocklistClients = Cu.import("resource://services-common/blocklist-clients.js", {});
 
 const BinaryInputStream = CC("@mozilla.org/binaryinputstream;1",
   "nsIBinaryInputStream", "setInputStream");
 const kintoFilename = "kinto.sqlite";
 
 const gBlocklistClients = [
-  {client: BlocklistClients.AddonBlocklistClient, filename: BlocklistClients.FILENAME_ADDONS_JSON, testData: ["i808", "i720", "i539"]},
-  {client: BlocklistClients.PluginBlocklistClient, filename: BlocklistClients.FILENAME_PLUGINS_JSON, testData: ["p1044", "p32", "p28"]},
-  {client: BlocklistClients.GfxBlocklistClient, filename: BlocklistClients.FILENAME_GFX_JSON, testData: ["g204", "g200", "g36"]},
+  {client: BlocklistClients.AddonBlocklistClient, testData: ["i808", "i720", "i539"]},
+  {client: BlocklistClients.PluginBlocklistClient, testData: ["p1044", "p32", "p28"]},
+  {client: BlocklistClients.GfxBlocklistClient, testData: ["g204", "g200", "g36"]},
 ];
 
 
 let server;
 
 function kintoCollection(collectionName, sqliteHandle) {
   const config = {
     // Set the remote to be some server that will cause test failure when
@@ -52,24 +52,20 @@ function* clear_state() {
     let sqliteHandle;
     try {
       sqliteHandle = yield FirefoxAdapter.openConnection({path: kintoFilename});
       const collection = kintoCollection(client.collectionName, sqliteHandle);
       yield collection.clear();
     } finally {
       yield sqliteHandle.close();
     }
-  }
 
-  // Remove profile data.
-  for (let {filename} of gBlocklistClients) {
-    const blocklist = FileUtils.getFile(KEY_PROFILEDIR, [filename]);
-    if (blocklist.exists()) {
-      blocklist.remove(true);
-    }
+    // Remove profile data.
+    const path = OS.Path.join(OS.Constants.Path.profileDir, client.filename);
+    yield OS.File.remove(path, { ignoreAbsent: true });
   }
 }
 
 
 function run_test() {
   // Set up an HTTP Server
   server = new HttpServer();
   server.start(-1);
@@ -116,35 +112,35 @@ function run_test() {
   do_register_cleanup(function() {
     server.stop(() => { });
   });
 }
 
 add_task(function* test_records_obtained_from_server_are_stored_in_db() {
   for (let {client} of gBlocklistClients) {
     // Test an empty db populates
-    yield client.maybeSync(2000, Date.now());
+    yield client.maybeSync(2000, Date.now(), {loadDump: false});
 
     // Open the collection, verify it's been populated:
     // Our test data has a single record; it should be in the local collection
     const sqliteHandle = yield FirefoxAdapter.openConnection({path: kintoFilename});
     let collection = kintoCollection(client.collectionName, sqliteHandle);
     let list = yield collection.list();
     equal(list.data.length, 1);
     yield sqliteHandle.close();
   }
 });
 add_task(clear_state);
 
 add_task(function* test_list_is_written_to_file_in_profile() {
-  for (let {client, filename, testData} of gBlocklistClients) {
-    const profFile = FileUtils.getFile(KEY_PROFILEDIR, [filename]);
+  for (let {client, testData} of gBlocklistClients) {
+    const profFile = FileUtils.getFile(KEY_PROFILEDIR, client.filename.split("/"));
     strictEqual(profFile.exists(), false);
 
-    yield client.maybeSync(2000, Date.now());
+    yield client.maybeSync(2000, Date.now(), {loadDump: false});
 
     strictEqual(profFile.exists(), true);
     const content = yield readJSON(profFile.path);
     equal(content.data[0].blockID, testData[testData.length - 1]);
   }
 });
 add_task(clear_state);
 
@@ -154,19 +150,19 @@ add_task(function* test_current_server_t
     yield client.maybeSync(2000, serverTime);
     const after = Services.prefs.getIntPref(client.lastCheckTimePref);
     equal(after, Math.round(serverTime / 1000));
   }
 });
 add_task(clear_state);
 
 add_task(function* test_update_json_file_when_addons_has_changes() {
-  for (let {client, filename, testData} of gBlocklistClients) {
-    yield client.maybeSync(2000, Date.now() - 1000);
-    const profFile = FileUtils.getFile(KEY_PROFILEDIR, [filename]);
+  for (let {client, testData} of gBlocklistClients) {
+    yield client.maybeSync(2000, Date.now() - 1000, {loadDump: false});
+    const profFile = FileUtils.getFile(KEY_PROFILEDIR, client.filename.split("/"));
     const fileLastModified = profFile.lastModifiedTime = profFile.lastModifiedTime - 1000;
     const serverTime = Date.now();
 
     yield client.maybeSync(3001, serverTime);
 
     // File was updated.
     notEqual(fileLastModified, profFile.lastModifiedTime);
     const content = yield readJSON(profFile.path);
@@ -174,34 +170,34 @@ add_task(function* test_update_json_file
     // Server time was updated.
     const after = Services.prefs.getIntPref(client.lastCheckTimePref);
     equal(after, Math.round(serverTime / 1000));
   }
 });
 add_task(clear_state);
 
 add_task(function* test_sends_reload_message_when_blocklist_has_changes() {
-  for (let {client, filename} of gBlocklistClients) {
+  for (let {client} of gBlocklistClients) {
     let received = yield new Promise((resolve, reject) => {
       Services.ppmm.addMessageListener("Blocklist:reload-from-disk", {
         receiveMessage(aMsg) { resolve(aMsg) }
       });
 
-      client.maybeSync(2000, Date.now() - 1000);
+      client.maybeSync(2000, Date.now() - 1000, {loadDump: false});
     });
 
-    equal(received.data.filename, filename);
+    equal(received.data.filename, client.filename);
   }
 });
 add_task(clear_state);
 
 add_task(function* test_do_nothing_when_blocklist_is_up_to_date() {
-  for (let {client, filename} of gBlocklistClients) {
-    yield client.maybeSync(2000, Date.now() - 1000);
-    const profFile = FileUtils.getFile(KEY_PROFILEDIR, [filename]);
+  for (let {client} of gBlocklistClients) {
+    yield client.maybeSync(2000, Date.now() - 1000, {loadDump: false});
+    const profFile = FileUtils.getFile(KEY_PROFILEDIR, client.filename.split("/"));
     const fileLastModified = profFile.lastModifiedTime = profFile.lastModifiedTime - 1000;
     const serverTime = Date.now();
 
     yield client.maybeSync(3000, serverTime);
 
     // File was not updated.
     equal(fileLastModified, profFile.lastModifiedTime);
     // Server time was updated.
--- a/services/common/tests/unit/test_blocklist_signatures.js
+++ b/services/common/tests/unit/test_blocklist_signatures.js
@@ -289,17 +289,18 @@ add_task(function* test_check_signatures
       [RESPONSE_META_EMPTY_SIG]
   };
 
   // .. and use this map to register handlers for each path
   registerHandlers(emptyCollectionResponses);
 
   // With all of this set up, we attempt a sync. This will resolve if all is
   // well and throw if something goes wrong.
-  yield OneCRLBlocklistClient.maybeSync(1000, startTime);
+  // We don't want to load initial json dumps in this test suite.
+  yield OneCRLBlocklistClient.maybeSync(1000, startTime, {loadDump: false});
 
   // Check that some additions (2 records) to the collection have a valid
   // signature.
 
   // This response adds two entries (RECORD1 and RECORD2) to the collection
   const RESPONSE_TWO_ADDED = {
     comment: "RESPONSE_TWO_ADDED",
     sampleHeaders: [
--- a/services/common/tests/unit/xpcshell.ini
+++ b/services/common/tests/unit/xpcshell.ini
@@ -4,16 +4,18 @@ firefox-appdir = browser
 support-files =
   test_storage_adapter/**
   test_blocklist_signatures/**
 
 # Test load modules first so syntax failures are caught early.
 [test_load_modules.js]
 
 [test_blocklist_certificates.js]
+# Initial JSON data for blocklists are not shipped on Android.
+skip-if = os == "android"
 [test_blocklist_clients.js]
 [test_blocklist_updater.js]
 [test_blocklist_pinning.js]
 
 [test_kinto.js]
 [test_blocklist_signatures.js]
 [test_storage_adapter.js]
 
--- a/services/moz.build
+++ b/services/moz.build
@@ -5,15 +5,18 @@
 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
 
 DIRS += [
     'common',
     'crypto',
 ]
 
 if CONFIG['MOZ_WIDGET_TOOLKIT'] != 'android':
-    DIRS += ['fxaccounts']
+    DIRS += [
+        'fxaccounts',
+        'blocklists',
+    ]
 
 if CONFIG['MOZ_SERVICES_SYNC']:
     DIRS += ['sync']
 
 if CONFIG['MOZ_SERVICES_CLOUDSYNC']:
     DIRS += ['cloudsync']
--- a/tools/lint/eslint/modules.json
+++ b/tools/lint/eslint/modules.json
@@ -12,17 +12,17 @@
   "AppData.jsm": ["makeFakeAppDir"],
   "AppInfo.jsm": ["newAppInfo", "getAppInfo", "updateAppInfo"],
   "arrays.js": ["inArray", "getSet", "indexOf", "remove", "rindexOf", "compare"],
   "assertions.js": ["Assert", "Expect"],
   "async.js": ["Async"],
   "AsyncSpellCheckTestHelper.jsm": ["onSpellCheck"],
   "AutoMigrate.jsm": ["AutoMigrate"],
   "Battery.jsm": ["GetBattery", "Battery"],
-  "blocklist-clients.js": ["AddonBlocklistClient", "GfxBlocklistClient", "OneCRLBlocklistClient", "PluginBlocklistClient", "FILENAME_ADDONS_JSON", "FILENAME_GFX_JSON", "FILENAME_PLUGINS_JSON"],
+  "blocklist-clients.js": ["AddonBlocklistClient", "GfxBlocklistClient", "OneCRLBlocklistClient", "PluginBlocklistClient"],
   "blocklist-updater.js": ["checkVersions", "addTestBlocklistClient"],
   "bogus_element_type.jsm": [],
   "bookmark_validator.js": ["BookmarkValidator", "BookmarkProblemData"],
   "bookmarks.js": ["BookmarksEngine", "PlacesItem", "Bookmark", "BookmarkFolder", "BookmarkQuery", "Livemark", "BookmarkSeparator"],
   "bookmarks.jsm": ["PlacesItem", "Bookmark", "Separator", "Livemark", "BookmarkFolder", "DumpBookmarks"],
   "BootstrapMonitor.jsm": ["monitor"],
   "browser-loader.js": ["BrowserLoader"],
   "browserid_identity.js": ["BrowserIDManager", "AuthenticationError"],