<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libjavascriptcoregtk-1_0-0-2.4.11-3.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10461-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libjavascriptcoregtk-1_0-0-2.4.11-3.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libjavascriptcoregtk-1_0-0-2.4.11-3.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10461</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5112/</URL>
      <Description>SUSE CVE CVE-2012-5112 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5133/</URL>
      <Description>SUSE CVE CVE-2012-5133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1344/</URL>
      <Description>SUSE CVE CVE-2014-1344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1384/</URL>
      <Description>SUSE CVE CVE-2014-1384 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1385/</URL>
      <Description>SUSE CVE CVE-2014-1385 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1386/</URL>
      <Description>SUSE CVE CVE-2014-1386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1387/</URL>
      <Description>SUSE CVE CVE-2014-1387 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1388/</URL>
      <Description>SUSE CVE CVE-2014-1388 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1389/</URL>
      <Description>SUSE CVE CVE-2014-1389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1390/</URL>
      <Description>SUSE CVE CVE-2014-1390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1748/</URL>
      <Description>SUSE CVE CVE-2014-1748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1071/</URL>
      <Description>SUSE CVE CVE-2015-1071 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1076/</URL>
      <Description>SUSE CVE CVE-2015-1076 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1081/</URL>
      <Description>SUSE CVE CVE-2015-1081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1083/</URL>
      <Description>SUSE CVE CVE-2015-1083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1120/</URL>
      <Description>SUSE CVE CVE-2015-1120 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1122/</URL>
      <Description>SUSE CVE CVE-2015-1122 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1127/</URL>
      <Description>SUSE CVE CVE-2015-1127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1153/</URL>
      <Description>SUSE CVE CVE-2015-1153 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1155/</URL>
      <Description>SUSE CVE CVE-2015-1155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2330/</URL>
      <Description>SUSE CVE CVE-2015-2330 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3658/</URL>
      <Description>SUSE CVE CVE-2015-3658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3659/</URL>
      <Description>SUSE CVE CVE-2015-3659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3727/</URL>
      <Description>SUSE CVE CVE-2015-3727 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3731/</URL>
      <Description>SUSE CVE CVE-2015-3731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3741/</URL>
      <Description>SUSE CVE CVE-2015-3741 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3743/</URL>
      <Description>SUSE CVE CVE-2015-3743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3745/</URL>
      <Description>SUSE CVE CVE-2015-3745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3747/</URL>
      <Description>SUSE CVE CVE-2015-3747 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3748/</URL>
      <Description>SUSE CVE CVE-2015-3748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3749/</URL>
      <Description>SUSE CVE CVE-2015-3749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3752/</URL>
      <Description>SUSE CVE CVE-2015-3752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5788/</URL>
      <Description>SUSE CVE CVE-2015-5788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5794/</URL>
      <Description>SUSE CVE CVE-2015-5794 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5801/</URL>
      <Description>SUSE CVE CVE-2015-5801 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5809/</URL>
      <Description>SUSE CVE CVE-2015-5809 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5822/</URL>
      <Description>SUSE CVE CVE-2015-5822 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5928/</URL>
      <Description>SUSE CVE CVE-2015-5928 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-1_0-0-2.4.11-3.3">
      <FullProductName ProductID="libjavascriptcoregtk-1_0-0-2.4.11-3.3">libjavascriptcoregtk-1_0-0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3">
      <FullProductName ProductID="libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3">libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-3_0-0-2.4.11-3.3">
      <FullProductName ProductID="libjavascriptcoregtk-3_0-0-2.4.11-3.3">libjavascriptcoregtk-3_0-0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3">
      <FullProductName ProductID="libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3">libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-1_0-0-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk-1_0-0-2.4.11-3.3">libwebkitgtk-1_0-0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-1_0-0-32bit-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk-1_0-0-32bit-2.4.11-3.3">libwebkitgtk-1_0-0-32bit-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-3_0-0-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk-3_0-0-2.4.11-3.3">libwebkitgtk-3_0-0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-3_0-0-32bit-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk-3_0-0-32bit-2.4.11-3.3">libwebkitgtk-3_0-0-32bit-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-devel-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk-devel-2.4.11-3.3">libwebkitgtk-devel-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk2-lang-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk2-lang-2.4.11-3.3">libwebkitgtk2-lang-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk3-devel-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk3-devel-2.4.11-3.3">libwebkitgtk3-devel-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk3-lang-2.4.11-3.3">
      <FullProductName ProductID="libwebkitgtk3-lang-2.4.11-3.3">libwebkitgtk3-lang-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3">typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3">typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit-1_0-2.4.11-3.3">
      <FullProductName ProductID="typelib-1_0-WebKit-1_0-2.4.11-3.3">typelib-1_0-WebKit-1_0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit-3_0-2.4.11-3.3">
      <FullProductName ProductID="typelib-1_0-WebKit-3_0-2.4.11-3.3">typelib-1_0-WebKit-3_0-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-1-2.4.11-3.3">
      <FullProductName ProductID="webkit-jsc-1-2.4.11-3.3">webkit-jsc-1-2.4.11-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-3-2.4.11-3.3">
      <FullProductName ProductID="webkit-jsc-3-2.4.11-3.3">webkit-jsc-3-2.4.11-3.3</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-1_0-0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3">libjavascriptcoregtk-1_0-0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3">libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-3_0-0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3">libjavascriptcoregtk-3_0-0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3">libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-1_0-0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3">libwebkitgtk-1_0-0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-1_0-0-32bit-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3">libwebkitgtk-1_0-0-32bit-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-3_0-0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3">libwebkitgtk-3_0-0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-3_0-0-32bit-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3">libwebkitgtk-3_0-0-32bit-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-devel-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3">libwebkitgtk-devel-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk2-lang-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3">libwebkitgtk2-lang-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk3-devel-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3">libwebkitgtk3-devel-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk3-lang-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3">libwebkitgtk3-lang-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3">typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3">typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit-1_0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3">typelib-1_0-WebKit-1_0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit-3_0-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3">typelib-1_0-WebKit-3_0-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-1-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3">webkit-jsc-1-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-3-2.4.11-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3">webkit-jsc-3-2.4.11-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2012-5112</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5112.html</URL>
        <Description>CVE-2012-5112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/786698</URL>
        <Description>SUSE Bug 786698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.</Note>
    </Notes>
    <CVE>CVE-2012-5133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5133.html</URL>
        <Description>CVE-2012-5133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/791234</URL>
        <Description>SUSE Bug 791234</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1.</Note>
    </Notes>
    <CVE>CVE-2014-1344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1344.html</URL>
        <Description>CVE-2014-1344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/879607</URL>
        <Description>SUSE Bug 879607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.</Note>
    </Notes>
    <CVE>CVE-2014-1384</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1384.html</URL>
        <Description>CVE-2014-1384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892084</URL>
        <Description>SUSE Bug 892084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.</Note>
    </Notes>
    <CVE>CVE-2014-1385</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1385.html</URL>
        <Description>CVE-2014-1385</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892084</URL>
        <Description>SUSE Bug 892084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.</Note>
    </Notes>
    <CVE>CVE-2014-1386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1386.html</URL>
        <Description>CVE-2014-1386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892084</URL>
        <Description>SUSE Bug 892084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.</Note>
    </Notes>
    <CVE>CVE-2014-1387</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1387.html</URL>
        <Description>CVE-2014-1387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892084</URL>
        <Description>SUSE Bug 892084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.</Note>
    </Notes>
    <CVE>CVE-2014-1388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1388.html</URL>
        <Description>CVE-2014-1388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892084</URL>
        <Description>SUSE Bug 892084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.</Note>
    </Notes>
    <CVE>CVE-2014-1389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1389.html</URL>
        <Description>CVE-2014-1389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892084</URL>
        <Description>SUSE Bug 892084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.</Note>
    </Notes>
    <CVE>CVE-2014-1390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1390.html</URL>
        <Description>CVE-2014-1390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892084</URL>
        <Description>SUSE Bug 892084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.</Note>
    </Notes>
    <CVE>CVE-2014-1748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1748.html</URL>
        <Description>CVE-2014-1748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909707</URL>
        <Description>SUSE Bug 909707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1071.html</URL>
        <Description>CVE-2015-1071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1076</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1076.html</URL>
        <Description>CVE-2015-1076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1081.html</URL>
        <Description>CVE-2015-1081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1083.html</URL>
        <Description>CVE-2015-1083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.</Note>
    </Notes>
    <CVE>CVE-2015-1120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1120.html</URL>
        <Description>CVE-2015-1120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928380</URL>
        <Description>SUSE Bug 928380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.</Note>
    </Notes>
    <CVE>CVE-2015-1122</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1122.html</URL>
        <Description>CVE-2015-1122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082221</URL>
        <Description>SUSE Bug 1082221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928380</URL>
        <Description>SUSE Bug 928380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.</Note>
    </Notes>
    <CVE>CVE-2015-1127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1127.html</URL>
        <Description>CVE-2015-1127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928380</URL>
        <Description>SUSE Bug 928380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.</Note>
    </Notes>
    <CVE>CVE-2015-1153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1153.html</URL>
        <Description>CVE-2015-1153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-1155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1155.html</URL>
        <Description>CVE-2015-1155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082221</URL>
        <Description>SUSE Bug 1082221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Late TLS certificate verification in WebKitGTK+ prior to 2.6.6 allows remote attackers to view a secure HTTP request, including, for example, secure cookies.</Note>
    </Notes>
    <CVE>CVE-2015-2330</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2330.html</URL>
        <Description>CVE-2015-2330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922895</URL>
        <Description>SUSE Bug 922895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-3658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3658.html</URL>
        <Description>CVE-2015-3658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-3659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3659.html</URL>
        <Description>CVE-2015-3659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936835</URL>
        <Description>SUSE Bug 936835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936836</URL>
        <Description>SUSE Bug 936836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-3727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3727.html</URL>
        <Description>CVE-2015-3727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3731.html</URL>
        <Description>CVE-2015-3731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3741</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3741.html</URL>
        <Description>CVE-2015-3741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3743.html</URL>
        <Description>CVE-2015-3743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3745.html</URL>
        <Description>CVE-2015-3745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3747</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3747.html</URL>
        <Description>CVE-2015-3747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3748.html</URL>
        <Description>CVE-2015-3748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3749.html</URL>
        <Description>CVE-2015-3749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.</Note>
    </Notes>
    <CVE>CVE-2015-3752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3752.html</URL>
        <Description>CVE-2015-3752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element.</Note>
    </Notes>
    <CVE>CVE-2015-5788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5788.html</URL>
        <Description>CVE-2015-5788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5794</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5794.html</URL>
        <Description>CVE-2015-5794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5801.html</URL>
        <Description>CVE-2015-5801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5809.html</URL>
        <Description>CVE-2015-5809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5822</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5822.html</URL>
        <Description>CVE-2015-5822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.</Note>
    </Notes>
    <CVE>CVE-2015-5928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-1_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-3_0-0-32bit-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk2-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-devel-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkitgtk3-lang-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-1_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit-3_0-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-1-2.4.11-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-3-2.4.11-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5928.html</URL>
        <Description>CVE-2015-5928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
