<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">seamonkey-2.53.9.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10590</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">seamonkey-2.53.9.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the seamonkey-2.53.9.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10590</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10590</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4879/</URL>
      <Description>SUSE CVE CVE-2007-4879 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0412/</URL>
      <Description>SUSE CVE CVE-2008-0412 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0414/</URL>
      <Description>SUSE CVE CVE-2008-0414 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0415/</URL>
      <Description>SUSE CVE CVE-2008-0415 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0418/</URL>
      <Description>SUSE CVE CVE-2008-0418 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0419/</URL>
      <Description>SUSE CVE CVE-2008-0419 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0592/</URL>
      <Description>SUSE CVE CVE-2008-0592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0593/</URL>
      <Description>SUSE CVE CVE-2008-0593 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1195/</URL>
      <Description>SUSE CVE CVE-2008-1195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1233/</URL>
      <Description>SUSE CVE CVE-2008-1233 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1236/</URL>
      <Description>SUSE CVE CVE-2008-1236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1238/</URL>
      <Description>SUSE CVE CVE-2008-1238 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1241/</URL>
      <Description>SUSE CVE CVE-2008-1241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12359/</URL>
      <Description>SUSE CVE CVE-2018-12359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12360/</URL>
      <Description>SUSE CVE CVE-2018-12360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12362/</URL>
      <Description>SUSE CVE CVE-2018-12362 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12363/</URL>
      <Description>SUSE CVE CVE-2018-12363 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12364/</URL>
      <Description>SUSE CVE CVE-2018-12364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12365/</URL>
      <Description>SUSE CVE CVE-2018-12365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12366/</URL>
      <Description>SUSE CVE CVE-2018-12366 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5156/</URL>
      <Description>SUSE CVE CVE-2018-5156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5188/</URL>
      <Description>SUSE CVE CVE-2018-5188 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="seamonkey-2.53.9.1-1.1">
      <FullProductName ProductID="seamonkey-2.53.9.1-1.1">seamonkey-2.53.9.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="seamonkey-dom-inspector-2.53.9.1-1.1">
      <FullProductName ProductID="seamonkey-dom-inspector-2.53.9.1-1.1">seamonkey-dom-inspector-2.53.9.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="seamonkey-irc-2.53.9.1-1.1">
      <FullProductName ProductID="seamonkey-irc-2.53.9.1-1.1">seamonkey-irc-2.53.9.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="seamonkey-2.53.9.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1">seamonkey-2.53.9.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="seamonkey-dom-inspector-2.53.9.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1">seamonkey-dom-inspector-2.53.9.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="seamonkey-irc-2.53.9.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1">seamonkey-irc-2.53.9.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.</Note>
    </Notes>
    <CVE>CVE-2007-4879</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4879.html</URL>
        <Description>CVE-2007-4879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/370353</URL>
        <Description>SUSE Bug 370353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.</Note>
    </Notes>
    <CVE>CVE-2008-0412</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0412.html</URL>
        <Description>CVE-2008-0412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/354469</URL>
        <Description>SUSE Bug 354469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."</Note>
    </Notes>
    <CVE>CVE-2008-0414</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0414.html</URL>
        <Description>CVE-2008-0414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/354469</URL>
        <Description>SUSE Bug 354469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."</Note>
    </Notes>
    <CVE>CVE-2008-0415</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0415.html</URL>
        <Description>CVE-2008-0415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/354469</URL>
        <Description>SUSE Bug 354469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.</Note>
    </Notes>
    <CVE>CVE-2008-0418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0418.html</URL>
        <Description>CVE-2008-0418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/354469</URL>
        <Description>SUSE Bug 354469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.</Note>
    </Notes>
    <CVE>CVE-2008-0419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0419.html</URL>
        <Description>CVE-2008-0419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/354469</URL>
        <Description>SUSE Bug 354469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.</Note>
    </Notes>
    <CVE>CVE-2008-0592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0592.html</URL>
        <Description>CVE-2008-0592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/354469</URL>
        <Description>SUSE Bug 354469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.</Note>
    </Notes>
    <CVE>CVE-2008-0593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0593.html</URL>
        <Description>CVE-2008-0593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/354469</URL>
        <Description>SUSE Bug 354469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.</Note>
    </Notes>
    <CVE>CVE-2008-1195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1195.html</URL>
        <Description>CVE-2008-1195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/368134</URL>
        <Description>SUSE Bug 368134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/370353</URL>
        <Description>SUSE Bug 370353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/379038</URL>
        <Description>SUSE Bug 379038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/404983</URL>
        <Description>SUSE Bug 404983</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."</Note>
    </Notes>
    <CVE>CVE-2008-1233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1233.html</URL>
        <Description>CVE-2008-1233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/370353</URL>
        <Description>SUSE Bug 370353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.</Note>
    </Notes>
    <CVE>CVE-2008-1236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1236.html</URL>
        <Description>CVE-2008-1236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/370353</URL>
        <Description>SUSE Bug 370353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.</Note>
    </Notes>
    <CVE>CVE-2008-1238</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1238.html</URL>
        <Description>CVE-2008-1238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/370353</URL>
        <Description>SUSE Bug 370353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.</Note>
    </Notes>
    <CVE>CVE-2008-1241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1241.html</URL>
        <Description>CVE-2008-1241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/370353</URL>
        <Description>SUSE Bug 370353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12359.html</URL>
        <Description>CVE-2018-12359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12360.html</URL>
        <Description>CVE-2018-12360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12362</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12362.html</URL>
        <Description>CVE-2018-12362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12363</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12363.html</URL>
        <Description>CVE-2018-12363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12364.html</URL>
        <Description>CVE-2018-12364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12365.html</URL>
        <Description>CVE-2018-12365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12366</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12366.html</URL>
        <Description>CVE-2018-12366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-5156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5156.html</URL>
        <Description>CVE-2018-5156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-5188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5188.html</URL>
        <Description>CVE-2018-5188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
