<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">java-1_8_0-openjdk-1.8.0.302-2.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10876</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">java-1_8_0-openjdk-1.8.0.302-2.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.302-2.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10876</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10876</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10165/</URL>
      <Description>SUSE CVE CVE-2016-10165 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2183/</URL>
      <Description>SUSE CVE CVE-2016-2183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5546/</URL>
      <Description>SUSE CVE CVE-2016-5546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5547/</URL>
      <Description>SUSE CVE CVE-2016-5547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5548/</URL>
      <Description>SUSE CVE CVE-2016-5548 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5549/</URL>
      <Description>SUSE CVE CVE-2016-5549 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5552/</URL>
      <Description>SUSE CVE CVE-2016-5552 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9840/</URL>
      <Description>SUSE CVE CVE-2016-9840 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9843/</URL>
      <Description>SUSE CVE CVE-2016-9843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10053/</URL>
      <Description>SUSE CVE CVE-2017-10053 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10067/</URL>
      <Description>SUSE CVE CVE-2017-10067 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10074/</URL>
      <Description>SUSE CVE CVE-2017-10074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10078/</URL>
      <Description>SUSE CVE CVE-2017-10078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10081/</URL>
      <Description>SUSE CVE CVE-2017-10081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10086/</URL>
      <Description>SUSE CVE CVE-2017-10086 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10087/</URL>
      <Description>SUSE CVE CVE-2017-10087 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10089/</URL>
      <Description>SUSE CVE CVE-2017-10089 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10090/</URL>
      <Description>SUSE CVE CVE-2017-10090 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10096/</URL>
      <Description>SUSE CVE CVE-2017-10096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10101/</URL>
      <Description>SUSE CVE CVE-2017-10101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10102/</URL>
      <Description>SUSE CVE CVE-2017-10102 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10105/</URL>
      <Description>SUSE CVE CVE-2017-10105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10107/</URL>
      <Description>SUSE CVE CVE-2017-10107 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10108/</URL>
      <Description>SUSE CVE CVE-2017-10108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10109/</URL>
      <Description>SUSE CVE CVE-2017-10109 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10110/</URL>
      <Description>SUSE CVE CVE-2017-10110 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10111/</URL>
      <Description>SUSE CVE CVE-2017-10111 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10114/</URL>
      <Description>SUSE CVE CVE-2017-10114 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10115/</URL>
      <Description>SUSE CVE CVE-2017-10115 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10116/</URL>
      <Description>SUSE CVE CVE-2017-10116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10118/</URL>
      <Description>SUSE CVE CVE-2017-10118 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10125/</URL>
      <Description>SUSE CVE CVE-2017-10125 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10135/</URL>
      <Description>SUSE CVE CVE-2017-10135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10176/</URL>
      <Description>SUSE CVE CVE-2017-10176 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10193/</URL>
      <Description>SUSE CVE CVE-2017-10193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10198/</URL>
      <Description>SUSE CVE CVE-2017-10198 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10243/</URL>
      <Description>SUSE CVE CVE-2017-10243 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10274/</URL>
      <Description>SUSE CVE CVE-2017-10274 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10281/</URL>
      <Description>SUSE CVE CVE-2017-10281 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10285/</URL>
      <Description>SUSE CVE CVE-2017-10285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10295/</URL>
      <Description>SUSE CVE CVE-2017-10295 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10345/</URL>
      <Description>SUSE CVE CVE-2017-10345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10346/</URL>
      <Description>SUSE CVE CVE-2017-10346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10347/</URL>
      <Description>SUSE CVE CVE-2017-10347 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10348/</URL>
      <Description>SUSE CVE CVE-2017-10348 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10349/</URL>
      <Description>SUSE CVE CVE-2017-10349 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10350/</URL>
      <Description>SUSE CVE CVE-2017-10350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10355/</URL>
      <Description>SUSE CVE CVE-2017-10355 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10356/</URL>
      <Description>SUSE CVE CVE-2017-10356 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10357/</URL>
      <Description>SUSE CVE CVE-2017-10357 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10388/</URL>
      <Description>SUSE CVE CVE-2017-10388 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3231/</URL>
      <Description>SUSE CVE CVE-2017-3231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3241/</URL>
      <Description>SUSE CVE CVE-2017-3241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3252/</URL>
      <Description>SUSE CVE CVE-2017-3252 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3253/</URL>
      <Description>SUSE CVE CVE-2017-3253 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3260/</URL>
      <Description>SUSE CVE CVE-2017-3260 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3261/</URL>
      <Description>SUSE CVE CVE-2017-3261 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3272/</URL>
      <Description>SUSE CVE CVE-2017-3272 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3289/</URL>
      <Description>SUSE CVE CVE-2017-3289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3509/</URL>
      <Description>SUSE CVE CVE-2017-3509 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3511/</URL>
      <Description>SUSE CVE CVE-2017-3511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3512/</URL>
      <Description>SUSE CVE CVE-2017-3512 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3514/</URL>
      <Description>SUSE CVE CVE-2017-3514 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3526/</URL>
      <Description>SUSE CVE CVE-2017-3526 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3533/</URL>
      <Description>SUSE CVE CVE-2017-3533 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3539/</URL>
      <Description>SUSE CVE CVE-2017-3539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3544/</URL>
      <Description>SUSE CVE CVE-2017-3544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11212/</URL>
      <Description>SUSE CVE CVE-2018-11212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13785/</URL>
      <Description>SUSE CVE CVE-2018-13785 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16435/</URL>
      <Description>SUSE CVE CVE-2018-16435 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2579/</URL>
      <Description>SUSE CVE CVE-2018-2579 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2582/</URL>
      <Description>SUSE CVE CVE-2018-2582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2588/</URL>
      <Description>SUSE CVE CVE-2018-2588 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2599/</URL>
      <Description>SUSE CVE CVE-2018-2599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2602/</URL>
      <Description>SUSE CVE CVE-2018-2602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2603/</URL>
      <Description>SUSE CVE CVE-2018-2603 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2618/</URL>
      <Description>SUSE CVE CVE-2018-2618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2629/</URL>
      <Description>SUSE CVE CVE-2018-2629 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2633/</URL>
      <Description>SUSE CVE CVE-2018-2633 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2634/</URL>
      <Description>SUSE CVE CVE-2018-2634 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2637/</URL>
      <Description>SUSE CVE CVE-2018-2637 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2641/</URL>
      <Description>SUSE CVE CVE-2018-2641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2663/</URL>
      <Description>SUSE CVE CVE-2018-2663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2677/</URL>
      <Description>SUSE CVE CVE-2018-2677 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2678/</URL>
      <Description>SUSE CVE CVE-2018-2678 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2790/</URL>
      <Description>SUSE CVE CVE-2018-2790 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2794/</URL>
      <Description>SUSE CVE CVE-2018-2794 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2795/</URL>
      <Description>SUSE CVE CVE-2018-2795 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2796/</URL>
      <Description>SUSE CVE CVE-2018-2796 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2797/</URL>
      <Description>SUSE CVE CVE-2018-2797 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2798/</URL>
      <Description>SUSE CVE CVE-2018-2798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2799/</URL>
      <Description>SUSE CVE CVE-2018-2799 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2800/</URL>
      <Description>SUSE CVE CVE-2018-2800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2814/</URL>
      <Description>SUSE CVE CVE-2018-2814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2815/</URL>
      <Description>SUSE CVE CVE-2018-2815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2938/</URL>
      <Description>SUSE CVE CVE-2018-2938 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2940/</URL>
      <Description>SUSE CVE CVE-2018-2940 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2952/</URL>
      <Description>SUSE CVE CVE-2018-2952 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2973/</URL>
      <Description>SUSE CVE CVE-2018-2973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3136/</URL>
      <Description>SUSE CVE CVE-2018-3136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3139/</URL>
      <Description>SUSE CVE CVE-2018-3139 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3149/</URL>
      <Description>SUSE CVE CVE-2018-3149 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3169/</URL>
      <Description>SUSE CVE CVE-2018-3169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3180/</URL>
      <Description>SUSE CVE CVE-2018-3180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3183/</URL>
      <Description>SUSE CVE CVE-2018-3183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3214/</URL>
      <Description>SUSE CVE CVE-2018-3214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3639/</URL>
      <Description>SUSE CVE CVE-2018-3639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2422/</URL>
      <Description>SUSE CVE CVE-2019-2422 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2426/</URL>
      <Description>SUSE CVE CVE-2019-2426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2602/</URL>
      <Description>SUSE CVE CVE-2019-2602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2684/</URL>
      <Description>SUSE CVE CVE-2019-2684 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2698/</URL>
      <Description>SUSE CVE CVE-2019-2698 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2745/</URL>
      <Description>SUSE CVE CVE-2019-2745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2762/</URL>
      <Description>SUSE CVE CVE-2019-2762 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2766/</URL>
      <Description>SUSE CVE CVE-2019-2766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2769/</URL>
      <Description>SUSE CVE CVE-2019-2769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2786/</URL>
      <Description>SUSE CVE CVE-2019-2786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2816/</URL>
      <Description>SUSE CVE CVE-2019-2816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2842/</URL>
      <Description>SUSE CVE CVE-2019-2842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2894/</URL>
      <Description>SUSE CVE CVE-2019-2894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2933/</URL>
      <Description>SUSE CVE CVE-2019-2933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2945/</URL>
      <Description>SUSE CVE CVE-2019-2945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2949/</URL>
      <Description>SUSE CVE CVE-2019-2949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2958/</URL>
      <Description>SUSE CVE CVE-2019-2958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2962/</URL>
      <Description>SUSE CVE CVE-2019-2962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2964/</URL>
      <Description>SUSE CVE CVE-2019-2964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2973/</URL>
      <Description>SUSE CVE CVE-2019-2973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2975/</URL>
      <Description>SUSE CVE CVE-2019-2975 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2978/</URL>
      <Description>SUSE CVE CVE-2019-2978 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2981/</URL>
      <Description>SUSE CVE CVE-2019-2981 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2983/</URL>
      <Description>SUSE CVE CVE-2019-2983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2987/</URL>
      <Description>SUSE CVE CVE-2019-2987 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2988/</URL>
      <Description>SUSE CVE CVE-2019-2988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2989/</URL>
      <Description>SUSE CVE CVE-2019-2989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2992/</URL>
      <Description>SUSE CVE CVE-2019-2992 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2999/</URL>
      <Description>SUSE CVE CVE-2019-2999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7317/</URL>
      <Description>SUSE CVE CVE-2019-7317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14556/</URL>
      <Description>SUSE CVE CVE-2020-14556 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14577/</URL>
      <Description>SUSE CVE CVE-2020-14577 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14578/</URL>
      <Description>SUSE CVE CVE-2020-14578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14579/</URL>
      <Description>SUSE CVE CVE-2020-14579 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14581/</URL>
      <Description>SUSE CVE CVE-2020-14581 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14583/</URL>
      <Description>SUSE CVE CVE-2020-14583 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14593/</URL>
      <Description>SUSE CVE CVE-2020-14593 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14621/</URL>
      <Description>SUSE CVE CVE-2020-14621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14779/</URL>
      <Description>SUSE CVE CVE-2020-14779 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14781/</URL>
      <Description>SUSE CVE CVE-2020-14781 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14782/</URL>
      <Description>SUSE CVE CVE-2020-14782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14792/</URL>
      <Description>SUSE CVE CVE-2020-14792 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14796/</URL>
      <Description>SUSE CVE CVE-2020-14796 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14797/</URL>
      <Description>SUSE CVE CVE-2020-14797 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14798/</URL>
      <Description>SUSE CVE CVE-2020-14798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14803/</URL>
      <Description>SUSE CVE CVE-2020-14803 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2583/</URL>
      <Description>SUSE CVE CVE-2020-2583 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2590/</URL>
      <Description>SUSE CVE CVE-2020-2590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2593/</URL>
      <Description>SUSE CVE CVE-2020-2593 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2601/</URL>
      <Description>SUSE CVE CVE-2020-2601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2604/</URL>
      <Description>SUSE CVE CVE-2020-2604 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2654/</URL>
      <Description>SUSE CVE CVE-2020-2654 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2659/</URL>
      <Description>SUSE CVE CVE-2020-2659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2754/</URL>
      <Description>SUSE CVE CVE-2020-2754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2755/</URL>
      <Description>SUSE CVE CVE-2020-2755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2756/</URL>
      <Description>SUSE CVE CVE-2020-2756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2757/</URL>
      <Description>SUSE CVE CVE-2020-2757 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2773/</URL>
      <Description>SUSE CVE CVE-2020-2773 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2781/</URL>
      <Description>SUSE CVE CVE-2020-2781 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2800/</URL>
      <Description>SUSE CVE CVE-2020-2800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2803/</URL>
      <Description>SUSE CVE CVE-2020-2803 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2805/</URL>
      <Description>SUSE CVE CVE-2020-2805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2830/</URL>
      <Description>SUSE CVE CVE-2020-2830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2161/</URL>
      <Description>SUSE CVE CVE-2021-2161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2163/</URL>
      <Description>SUSE CVE CVE-2021-2163 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2341/</URL>
      <Description>SUSE CVE CVE-2021-2341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2369/</URL>
      <Description>SUSE CVE CVE-2021-2369 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2388/</URL>
      <Description>SUSE CVE CVE-2021-2388 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openjdk-1.8.0.302-2.2">
      <FullProductName ProductID="java-1_8_0-openjdk-1.8.0.302-2.2">java-1_8_0-openjdk-1.8.0.302-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openjdk-accessibility-1.8.0.302-2.2">
      <FullProductName ProductID="java-1_8_0-openjdk-accessibility-1.8.0.302-2.2">java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openjdk-demo-1.8.0.302-2.2">
      <FullProductName ProductID="java-1_8_0-openjdk-demo-1.8.0.302-2.2">java-1_8_0-openjdk-demo-1.8.0.302-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openjdk-devel-1.8.0.302-2.2">
      <FullProductName ProductID="java-1_8_0-openjdk-devel-1.8.0.302-2.2">java-1_8_0-openjdk-devel-1.8.0.302-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openjdk-headless-1.8.0.302-2.2">
      <FullProductName ProductID="java-1_8_0-openjdk-headless-1.8.0.302-2.2">java-1_8_0-openjdk-headless-1.8.0.302-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openjdk-javadoc-1.8.0.302-2.2">
      <FullProductName ProductID="java-1_8_0-openjdk-javadoc-1.8.0.302-2.2">java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openjdk-src-1.8.0.302-2.2">
      <FullProductName ProductID="java-1_8_0-openjdk-src-1.8.0.302-2.2">java-1_8_0-openjdk-src-1.8.0.302-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="java-1_8_0-openjdk-1.8.0.302-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2">java-1_8_0-openjdk-1.8.0.302-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openjdk-accessibility-1.8.0.302-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2">java-1_8_0-openjdk-accessibility-1.8.0.302-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openjdk-demo-1.8.0.302-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2">java-1_8_0-openjdk-demo-1.8.0.302-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openjdk-devel-1.8.0.302-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2">java-1_8_0-openjdk-devel-1.8.0.302-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openjdk-headless-1.8.0.302-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2">java-1_8_0-openjdk-headless-1.8.0.302-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openjdk-javadoc-1.8.0.302-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2">java-1_8_0-openjdk-javadoc-1.8.0.302-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openjdk-src-1.8.0.302-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2">java-1_8_0-openjdk-src-1.8.0.302-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.</Note>
    </Notes>
    <CVE>CVE-2016-10165</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10165.html</URL>
        <Description>CVE-2016-10165</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021364</URL>
        <Description>SUSE Bug 1021364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064069</URL>
        <Description>SUSE Bug 1064069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.</Note>
    </Notes>
    <CVE>CVE-2016-2183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2183.html</URL>
        <Description>CVE-2016-2183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001912</URL>
        <Description>SUSE Bug 1001912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027038</URL>
        <Description>SUSE Bug 1027038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034689</URL>
        <Description>SUSE Bug 1034689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056614</URL>
        <Description>SUSE Bug 1056614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171693</URL>
        <Description>SUSE Bug 1171693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995359</URL>
        <Description>SUSE Bug 995359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).</Note>
    </Notes>
    <CVE>CVE-2016-5546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5546.html</URL>
        <Description>CVE-2016-5546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2016-5547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5547.html</URL>
        <Description>CVE-2016-5547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).</Note>
    </Notes>
    <CVE>CVE-2016-5548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5548.html</URL>
        <Description>CVE-2016-5548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).</Note>
    </Notes>
    <CVE>CVE-2016-5549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5549.html</URL>
        <Description>CVE-2016-5549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).</Note>
    </Notes>
    <CVE>CVE-2016-5552</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5552.html</URL>
        <Description>CVE-2016-5552</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.</Note>
    </Notes>
    <CVE>CVE-2016-9840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9840.html</URL>
        <Description>CVE-2016-9840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003579</URL>
        <Description>SUSE Bug 1003579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022633</URL>
        <Description>SUSE Bug 1022633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023215</URL>
        <Description>SUSE Bug 1023215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062104</URL>
        <Description>SUSE Bug 1062104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120866</URL>
        <Description>SUSE Bug 1120866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123150</URL>
        <Description>SUSE Bug 1123150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127473</URL>
        <Description>SUSE Bug 1127473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184301</URL>
        <Description>SUSE Bug 1184301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.</Note>
    </Notes>
    <CVE>CVE-2016-9843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9843.html</URL>
        <Description>CVE-2016-9843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003580</URL>
        <Description>SUSE Bug 1003580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013882</URL>
        <Description>SUSE Bug 1013882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062104</URL>
        <Description>SUSE Bug 1062104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120866</URL>
        <Description>SUSE Bug 1120866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123150</URL>
        <Description>SUSE Bug 1123150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127473</URL>
        <Description>SUSE Bug 1127473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184301</URL>
        <Description>SUSE Bug 1184301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10053.html</URL>
        <Description>CVE-2017-10053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049305</URL>
        <Description>SUSE Bug 1049305</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10067</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10067.html</URL>
        <Description>CVE-2017-10067</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049306</URL>
        <Description>SUSE Bug 1049306</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10074.html</URL>
        <Description>CVE-2017-10074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049307</URL>
        <Description>SUSE Bug 1049307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10078.html</URL>
        <Description>CVE-2017-10078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049308</URL>
        <Description>SUSE Bug 1049308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10081.html</URL>
        <Description>CVE-2017-10081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049309</URL>
        <Description>SUSE Bug 1049309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10086</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10086.html</URL>
        <Description>CVE-2017-10086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049310</URL>
        <Description>SUSE Bug 1049310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10087</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10087.html</URL>
        <Description>CVE-2017-10087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049311</URL>
        <Description>SUSE Bug 1049311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10089</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10089.html</URL>
        <Description>CVE-2017-10089</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049312</URL>
        <Description>SUSE Bug 1049312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10090</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10090.html</URL>
        <Description>CVE-2017-10090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049313</URL>
        <Description>SUSE Bug 1049313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10096.html</URL>
        <Description>CVE-2017-10096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049314</URL>
        <Description>SUSE Bug 1049314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10101.html</URL>
        <Description>CVE-2017-10101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049315</URL>
        <Description>SUSE Bug 1049315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10102</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10102.html</URL>
        <Description>CVE-2017-10102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049316</URL>
        <Description>SUSE Bug 1049316</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10105.html</URL>
        <Description>CVE-2017-10105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049317</URL>
        <Description>SUSE Bug 1049317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10107</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10107.html</URL>
        <Description>CVE-2017-10107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049318</URL>
        <Description>SUSE Bug 1049318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10108.html</URL>
        <Description>CVE-2017-10108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049319</URL>
        <Description>SUSE Bug 1049319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10109</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10109.html</URL>
        <Description>CVE-2017-10109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049320</URL>
        <Description>SUSE Bug 1049320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10110</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10110.html</URL>
        <Description>CVE-2017-10110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049321</URL>
        <Description>SUSE Bug 1049321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10111</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10111.html</URL>
        <Description>CVE-2017-10111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049322</URL>
        <Description>SUSE Bug 1049322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10114.html</URL>
        <Description>CVE-2017-10114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049323</URL>
        <Description>SUSE Bug 1049323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10115</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10115.html</URL>
        <Description>CVE-2017-10115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049324</URL>
        <Description>SUSE Bug 1049324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10116.html</URL>
        <Description>CVE-2017-10116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049325</URL>
        <Description>SUSE Bug 1049325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10118</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10118.html</URL>
        <Description>CVE-2017-10118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049326</URL>
        <Description>SUSE Bug 1049326</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10125.html</URL>
        <Description>CVE-2017-10125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049327</URL>
        <Description>SUSE Bug 1049327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10135.html</URL>
        <Description>CVE-2017-10135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049328</URL>
        <Description>SUSE Bug 1049328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10176</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10176.html</URL>
        <Description>CVE-2017-10176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049329</URL>
        <Description>SUSE Bug 1049329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10193.html</URL>
        <Description>CVE-2017-10193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049330</URL>
        <Description>SUSE Bug 1049330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10198</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10198.html</URL>
        <Description>CVE-2017-10198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049331</URL>
        <Description>SUSE Bug 1049331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10243</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10243.html</URL>
        <Description>CVE-2017-10243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049332</URL>
        <Description>SUSE Bug 1049332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049333</URL>
        <Description>SUSE Bug 1049333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10274</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10274.html</URL>
        <Description>CVE-2017-10274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064071</URL>
        <Description>SUSE Bug 1064071</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10281</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10281.html</URL>
        <Description>CVE-2017-10281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064072</URL>
        <Description>SUSE Bug 1064072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10285.html</URL>
        <Description>CVE-2017-10285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064073</URL>
        <Description>SUSE Bug 1064073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10295</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10295.html</URL>
        <Description>CVE-2017-10295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064075</URL>
        <Description>SUSE Bug 1064075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10345.html</URL>
        <Description>CVE-2017-10345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064077</URL>
        <Description>SUSE Bug 1064077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.7</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10346.html</URL>
        <Description>CVE-2017-10346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064078</URL>
        <Description>SUSE Bug 1064078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10347.html</URL>
        <Description>CVE-2017-10347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064079</URL>
        <Description>SUSE Bug 1064079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10348.html</URL>
        <Description>CVE-2017-10348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064080</URL>
        <Description>SUSE Bug 1064080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10349.html</URL>
        <Description>CVE-2017-10349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064081</URL>
        <Description>SUSE Bug 1064081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10350.html</URL>
        <Description>CVE-2017-10350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064082</URL>
        <Description>SUSE Bug 1064082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10355.html</URL>
        <Description>CVE-2017-10355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064083</URL>
        <Description>SUSE Bug 1064083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-10356</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10356.html</URL>
        <Description>CVE-2017-10356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064084</URL>
        <Description>SUSE Bug 1064084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10357.html</URL>
        <Description>CVE-2017-10357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064085</URL>
        <Description>SUSE Bug 1064085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10388.html</URL>
        <Description>CVE-2017-10388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064086</URL>
        <Description>SUSE Bug 1064086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070162</URL>
        <Description>SUSE Bug 1070162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3231.html</URL>
        <Description>CVE-2017-3231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3241.html</URL>
        <Description>CVE-2017-3241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163365</URL>
        <Description>SUSE Bug 1163365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3252.html</URL>
        <Description>CVE-2017-3252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3253</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3253.html</URL>
        <Description>CVE-2017-3253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3260</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3260.html</URL>
        <Description>CVE-2017-3260</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3261.html</URL>
        <Description>CVE-2017-3261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.9</BaseScore>
        <Vector>AV:N/AC:M/Au:M/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3272.html</URL>
        <Description>CVE-2017-3272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3289.html</URL>
        <Description>CVE-2017-3289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020905</URL>
        <Description>SUSE Bug 1020905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163365</URL>
        <Description>SUSE Bug 1163365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3509</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3509.html</URL>
        <Description>CVE-2017-3509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3511.html</URL>
        <Description>CVE-2017-3511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3512.html</URL>
        <Description>CVE-2017-3512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3514</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3514.html</URL>
        <Description>CVE-2017-3514</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3526</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3526.html</URL>
        <Description>CVE-2017-3526</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3533</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3533.html</URL>
        <Description>CVE-2017-3533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3539.html</URL>
        <Description>CVE-2017-3539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005522</URL>
        <Description>SUSE Bug 1005522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3544.html</URL>
        <Description>CVE-2017-3544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034849</URL>
        <Description>SUSE Bug 1034849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2018-11212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11212.html</URL>
        <Description>CVE-2018-11212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122299</URL>
        <Description>SUSE Bug 1122299</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-13785</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13785.html</URL>
        <Description>CVE-2018-13785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100687</URL>
        <Description>SUSE Bug 1100687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112153</URL>
        <Description>SUSE Bug 1112153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.</Note>
    </Notes>
    <CVE>CVE-2018-16435</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16435.html</URL>
        <Description>CVE-2018-16435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108813</URL>
        <Description>SUSE Bug 1108813</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2579</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2579.html</URL>
        <Description>CVE-2018-2579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2582.html</URL>
        <Description>CVE-2018-2582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2588.html</URL>
        <Description>CVE-2018-2588</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2599.html</URL>
        <Description>CVE-2018-2599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2602.html</URL>
        <Description>CVE-2018-2602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2603</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2603.html</URL>
        <Description>CVE-2018-2603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2618.html</URL>
        <Description>CVE-2018-2618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2629.html</URL>
        <Description>CVE-2018-2629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2633.html</URL>
        <Description>CVE-2018-2633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2634.html</URL>
        <Description>CVE-2018-2634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2637.html</URL>
        <Description>CVE-2018-2637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2641.html</URL>
        <Description>CVE-2018-2641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2663.html</URL>
        <Description>CVE-2018-2663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2677</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2677.html</URL>
        <Description>CVE-2018-2677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2678.html</URL>
        <Description>CVE-2018-2678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076366</URL>
        <Description>SUSE Bug 1076366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082810</URL>
        <Description>SUSE Bug 1082810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2790</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2790.html</URL>
        <Description>CVE-2018-2790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090023</URL>
        <Description>SUSE Bug 1090023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101637</URL>
        <Description>SUSE Bug 1101637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2794</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2794.html</URL>
        <Description>CVE-2018-2794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090024</URL>
        <Description>SUSE Bug 1090024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2795</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2795.html</URL>
        <Description>CVE-2018-2795</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090025</URL>
        <Description>SUSE Bug 1090025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2796</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2796.html</URL>
        <Description>CVE-2018-2796</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090026</URL>
        <Description>SUSE Bug 1090026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2797</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2797.html</URL>
        <Description>CVE-2018-2797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090027</URL>
        <Description>SUSE Bug 1090027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2798.html</URL>
        <Description>CVE-2018-2798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090028</URL>
        <Description>SUSE Bug 1090028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2799.html</URL>
        <Description>CVE-2018-2799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090029</URL>
        <Description>SUSE Bug 1090029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2800.html</URL>
        <Description>CVE-2018-2800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090030</URL>
        <Description>SUSE Bug 1090030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2814.html</URL>
        <Description>CVE-2018-2814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090032</URL>
        <Description>SUSE Bug 1090032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093311</URL>
        <Description>SUSE Bug 1093311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2815.html</URL>
        <Description>CVE-2018-2815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090033</URL>
        <Description>SUSE Bug 1090033</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2938.html</URL>
        <Description>CVE-2018-2938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101644</URL>
        <Description>SUSE Bug 1101644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2940</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2940.html</URL>
        <Description>CVE-2018-2940</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101645</URL>
        <Description>SUSE Bug 1101645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101656</URL>
        <Description>SUSE Bug 1101656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-2952</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2952.html</URL>
        <Description>CVE-2018-2952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101645</URL>
        <Description>SUSE Bug 1101645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101651</URL>
        <Description>SUSE Bug 1101651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101656</URL>
        <Description>SUSE Bug 1101656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2973.html</URL>
        <Description>CVE-2018-2973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101645</URL>
        <Description>SUSE Bug 1101645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101656</URL>
        <Description>SUSE Bug 1101656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3136.html</URL>
        <Description>CVE-2018-3136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112142</URL>
        <Description>SUSE Bug 1112142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112143</URL>
        <Description>SUSE Bug 1112143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112144</URL>
        <Description>SUSE Bug 1112144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112146</URL>
        <Description>SUSE Bug 1112146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112148</URL>
        <Description>SUSE Bug 1112148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112152</URL>
        <Description>SUSE Bug 1112152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3139.html</URL>
        <Description>CVE-2018-3139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112142</URL>
        <Description>SUSE Bug 1112142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112143</URL>
        <Description>SUSE Bug 1112143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112144</URL>
        <Description>SUSE Bug 1112144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112146</URL>
        <Description>SUSE Bug 1112146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112148</URL>
        <Description>SUSE Bug 1112148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112152</URL>
        <Description>SUSE Bug 1112152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3149</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3149.html</URL>
        <Description>CVE-2018-3149</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112142</URL>
        <Description>SUSE Bug 1112142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112143</URL>
        <Description>SUSE Bug 1112143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112144</URL>
        <Description>SUSE Bug 1112144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112146</URL>
        <Description>SUSE Bug 1112146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112148</URL>
        <Description>SUSE Bug 1112148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112152</URL>
        <Description>SUSE Bug 1112152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3169.html</URL>
        <Description>CVE-2018-3169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112142</URL>
        <Description>SUSE Bug 1112142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112143</URL>
        <Description>SUSE Bug 1112143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112144</URL>
        <Description>SUSE Bug 1112144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112146</URL>
        <Description>SUSE Bug 1112146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112148</URL>
        <Description>SUSE Bug 1112148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112152</URL>
        <Description>SUSE Bug 1112152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-3180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3180.html</URL>
        <Description>CVE-2018-3180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112142</URL>
        <Description>SUSE Bug 1112142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112143</URL>
        <Description>SUSE Bug 1112143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112144</URL>
        <Description>SUSE Bug 1112144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112146</URL>
        <Description>SUSE Bug 1112146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112147</URL>
        <Description>SUSE Bug 1112147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112148</URL>
        <Description>SUSE Bug 1112148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112152</URL>
        <Description>SUSE Bug 1112152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3183.html</URL>
        <Description>CVE-2018-3183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112142</URL>
        <Description>SUSE Bug 1112142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112143</URL>
        <Description>SUSE Bug 1112143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112144</URL>
        <Description>SUSE Bug 1112144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112146</URL>
        <Description>SUSE Bug 1112146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112148</URL>
        <Description>SUSE Bug 1112148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112152</URL>
        <Description>SUSE Bug 1112152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120714</URL>
        <Description>SUSE Bug 1120714</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-3214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3214.html</URL>
        <Description>CVE-2018-3214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112142</URL>
        <Description>SUSE Bug 1112142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112143</URL>
        <Description>SUSE Bug 1112143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112144</URL>
        <Description>SUSE Bug 1112144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112146</URL>
        <Description>SUSE Bug 1112146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112148</URL>
        <Description>SUSE Bug 1112148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112152</URL>
        <Description>SUSE Bug 1112152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092631</URL>
        <Description>SUSE Bug 1092631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092885</URL>
        <Description>SUSE Bug 1092885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111963</URL>
        <Description>SUSE Bug 1111963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215674</URL>
        <Description>SUSE Bug 1215674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2422</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2422.html</URL>
        <Description>CVE-2019-2422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122293</URL>
        <Description>SUSE Bug 1122293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2426.html</URL>
        <Description>CVE-2019-2426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134297</URL>
        <Description>SUSE Bug 1134297</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2602.html</URL>
        <Description>CVE-2019-2602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132728</URL>
        <Description>SUSE Bug 1132728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134718</URL>
        <Description>SUSE Bug 1134718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2684.html</URL>
        <Description>CVE-2019-2684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132732</URL>
        <Description>SUSE Bug 1132732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134718</URL>
        <Description>SUSE Bug 1134718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184734</URL>
        <Description>SUSE Bug 1184734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2698.html</URL>
        <Description>CVE-2019-2698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132729</URL>
        <Description>SUSE Bug 1132729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134718</URL>
        <Description>SUSE Bug 1134718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163365</URL>
        <Description>SUSE Bug 1163365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2745.html</URL>
        <Description>CVE-2019-2745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141784</URL>
        <Description>SUSE Bug 1141784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2762</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2762.html</URL>
        <Description>CVE-2019-2762</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141782</URL>
        <Description>SUSE Bug 1141782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147021</URL>
        <Description>SUSE Bug 1147021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2766.html</URL>
        <Description>CVE-2019-2766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141789</URL>
        <Description>SUSE Bug 1141789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147021</URL>
        <Description>SUSE Bug 1147021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2769.html</URL>
        <Description>CVE-2019-2769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141783</URL>
        <Description>SUSE Bug 1141783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147021</URL>
        <Description>SUSE Bug 1147021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2786.html</URL>
        <Description>CVE-2019-2786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141787</URL>
        <Description>SUSE Bug 1141787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147021</URL>
        <Description>SUSE Bug 1147021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2816.html</URL>
        <Description>CVE-2019-2816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141785</URL>
        <Description>SUSE Bug 1141785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147021</URL>
        <Description>SUSE Bug 1147021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2842.html</URL>
        <Description>CVE-2019-2842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141786</URL>
        <Description>SUSE Bug 1141786</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2894.html</URL>
        <Description>CVE-2019-2894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152856</URL>
        <Description>SUSE Bug 1152856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2933.html</URL>
        <Description>CVE-2019-2933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2945.html</URL>
        <Description>CVE-2019-2945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2949.html</URL>
        <Description>CVE-2019-2949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2958.html</URL>
        <Description>CVE-2019-2958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2962.html</URL>
        <Description>CVE-2019-2962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2964.html</URL>
        <Description>CVE-2019-2964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2973.html</URL>
        <Description>CVE-2019-2973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2975.html</URL>
        <Description>CVE-2019-2975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2978.html</URL>
        <Description>CVE-2019-2978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2981</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2981.html</URL>
        <Description>CVE-2019-2981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2983.html</URL>
        <Description>CVE-2019-2983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2987</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2987.html</URL>
        <Description>CVE-2019-2987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2988.html</URL>
        <Description>CVE-2019-2988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2989.html</URL>
        <Description>CVE-2019-2989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2992.html</URL>
        <Description>CVE-2019-2992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2999.html</URL>
        <Description>CVE-2019-2999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154212</URL>
        <Description>SUSE Bug 1154212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158442</URL>
        <Description>SUSE Bug 1158442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.</Note>
    </Notes>
    <CVE>CVE-2019-7317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7317.html</URL>
        <Description>CVE-2019-7317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124211</URL>
        <Description>SUSE Bug 1124211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135824</URL>
        <Description>SUSE Bug 1135824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141780</URL>
        <Description>SUSE Bug 1141780</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147021</URL>
        <Description>SUSE Bug 1147021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165297</URL>
        <Description>SUSE Bug 1165297</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14556</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14556.html</URL>
        <Description>CVE-2020-14556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14577.html</URL>
        <Description>CVE-2020-14577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-14578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14578.html</URL>
        <Description>CVE-2020-14578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-14579</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14579.html</URL>
        <Description>CVE-2020-14579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14581.html</URL>
        <Description>CVE-2020-14581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-14583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14583.html</URL>
        <Description>CVE-2020-14583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14593.html</URL>
        <Description>CVE-2020-14593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14621.html</URL>
        <Description>CVE-2020-14621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174157</URL>
        <Description>SUSE Bug 1174157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175259</URL>
        <Description>SUSE Bug 1175259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-14779</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14779.html</URL>
        <Description>CVE-2020-14779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180063</URL>
        <Description>SUSE Bug 1180063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14781.html</URL>
        <Description>CVE-2020-14781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180063</URL>
        <Description>SUSE Bug 1180063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14782.html</URL>
        <Description>CVE-2020-14782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180063</URL>
        <Description>SUSE Bug 1180063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14792</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14792.html</URL>
        <Description>CVE-2020-14792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180063</URL>
        <Description>SUSE Bug 1180063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14796</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14796.html</URL>
        <Description>CVE-2020-14796</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180063</URL>
        <Description>SUSE Bug 1180063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14797</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14797.html</URL>
        <Description>CVE-2020-14797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180063</URL>
        <Description>SUSE Bug 1180063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14798.html</URL>
        <Description>CVE-2020-14798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180063</URL>
        <Description>SUSE Bug 1180063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14803</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14803.html</URL>
        <Description>CVE-2020-14803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177943</URL>
        <Description>SUSE Bug 1177943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181239</URL>
        <Description>SUSE Bug 1181239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182186</URL>
        <Description>SUSE Bug 1182186</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2583.html</URL>
        <Description>CVE-2020-2583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160968</URL>
        <Description>SUSE Bug 1160968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162972</URL>
        <Description>SUSE Bug 1162972</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-2590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2590.html</URL>
        <Description>CVE-2020-2590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160968</URL>
        <Description>SUSE Bug 1160968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-2593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2593.html</URL>
        <Description>CVE-2020-2593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160968</URL>
        <Description>SUSE Bug 1160968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162972</URL>
        <Description>SUSE Bug 1162972</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-2601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2601.html</URL>
        <Description>CVE-2020-2601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160968</URL>
        <Description>SUSE Bug 1160968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-2604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2604.html</URL>
        <Description>CVE-2020-2604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160968</URL>
        <Description>SUSE Bug 1160968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162972</URL>
        <Description>SUSE Bug 1162972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165863</URL>
        <Description>SUSE Bug 1165863</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2654</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2654.html</URL>
        <Description>CVE-2020-2654</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160968</URL>
        <Description>SUSE Bug 1160968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2659.html</URL>
        <Description>CVE-2020-2659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160968</URL>
        <Description>SUSE Bug 1160968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162972</URL>
        <Description>SUSE Bug 1162972</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2754.html</URL>
        <Description>CVE-2020-2754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="162">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2755.html</URL>
        <Description>CVE-2020-2755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="163">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2756.html</URL>
        <Description>CVE-2020-2756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="164">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2757.html</URL>
        <Description>CVE-2020-2757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="165">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2773.html</URL>
        <Description>CVE-2020-2773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="166">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2781.html</URL>
        <Description>CVE-2020-2781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="167">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-2800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2800.html</URL>
        <Description>CVE-2020-2800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="168">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-2803</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2803.html</URL>
        <Description>CVE-2020-2803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="169">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-2805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2805.html</URL>
        <Description>CVE-2020-2805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="170">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2020-2830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2830.html</URL>
        <Description>CVE-2020-2830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169511</URL>
        <Description>SUSE Bug 1169511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172277</URL>
        <Description>SUSE Bug 1172277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="171">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2021-2161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2161.html</URL>
        <Description>CVE-2021-2161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185056</URL>
        <Description>SUSE Bug 1185056</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="172">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2021-2163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2163.html</URL>
        <Description>CVE-2021-2163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185055</URL>
        <Description>SUSE Bug 1185055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="173">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2021-2341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2341.html</URL>
        <Description>CVE-2021-2341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188564</URL>
        <Description>SUSE Bug 1188564</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="174">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2021-2369</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2369.html</URL>
        <Description>CVE-2021-2369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188565</URL>
        <Description>SUSE Bug 1188565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="175">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2388.html</URL>
        <Description>CVE-2021-2388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188566</URL>
        <Description>SUSE Bug 1188566</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
