<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">php7-7.4.24-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11167-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">php7-7.4.24-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the php7-7.4.24-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11167</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3353/</URL>
      <Description>SUSE CVE CVE-2005-3353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3388/</URL>
      <Description>SUSE CVE CVE-2005-3388 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3389/</URL>
      <Description>SUSE CVE CVE-2005-3389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3390/</URL>
      <Description>SUSE CVE CVE-2005-3390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3391/</URL>
      <Description>SUSE CVE CVE-2005-3391 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3392/</URL>
      <Description>SUSE CVE CVE-2005-3392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-0996/</URL>
      <Description>SUSE CVE CVE-2006-0996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1017/</URL>
      <Description>SUSE CVE CVE-2006-1017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1490/</URL>
      <Description>SUSE CVE CVE-2006-1490 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1494/</URL>
      <Description>SUSE CVE CVE-2006-1494 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1991/</URL>
      <Description>SUSE CVE CVE-2006-1991 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4783/</URL>
      <Description>SUSE CVE CVE-2007-4783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4887/</URL>
      <Description>SUSE CVE CVE-2007-4887 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0599/</URL>
      <Description>SUSE CVE CVE-2008-0599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9120/</URL>
      <Description>SUSE CVE CVE-2017-9120 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000222/</URL>
      <Description>SUSE CVE CVE-2018-1000222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000888/</URL>
      <Description>SUSE CVE CVE-2018-1000888 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12882/</URL>
      <Description>SUSE CVE CVE-2018-12882 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14851/</URL>
      <Description>SUSE CVE CVE-2018-14851 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17082/</URL>
      <Description>SUSE CVE CVE-2018-17082 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19935/</URL>
      <Description>SUSE CVE CVE-2018-19935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20783/</URL>
      <Description>SUSE CVE CVE-2018-20783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11034/</URL>
      <Description>SUSE CVE CVE-2019-11034 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11035/</URL>
      <Description>SUSE CVE CVE-2019-11035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11036/</URL>
      <Description>SUSE CVE CVE-2019-11036 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11039/</URL>
      <Description>SUSE CVE CVE-2019-11039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11040/</URL>
      <Description>SUSE CVE CVE-2019-11040 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11041/</URL>
      <Description>SUSE CVE CVE-2019-11041 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11042/</URL>
      <Description>SUSE CVE CVE-2019-11042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11043/</URL>
      <Description>SUSE CVE CVE-2019-11043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11046/</URL>
      <Description>SUSE CVE CVE-2019-11046 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9020/</URL>
      <Description>SUSE CVE CVE-2019-9020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9021/</URL>
      <Description>SUSE CVE CVE-2019-9021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9022/</URL>
      <Description>SUSE CVE CVE-2019-9022 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9023/</URL>
      <Description>SUSE CVE CVE-2019-9023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9024/</URL>
      <Description>SUSE CVE CVE-2019-9024 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9637/</URL>
      <Description>SUSE CVE CVE-2019-9637 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9638/</URL>
      <Description>SUSE CVE CVE-2019-9638 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9640/</URL>
      <Description>SUSE CVE CVE-2019-9640 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9641/</URL>
      <Description>SUSE CVE CVE-2019-9641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9675/</URL>
      <Description>SUSE CVE CVE-2019-9675 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7062/</URL>
      <Description>SUSE CVE CVE-2020-7062 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7063/</URL>
      <Description>SUSE CVE CVE-2020-7063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21706/</URL>
      <Description>SUSE CVE CVE-2021-21706 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="php7-7.4.24-1.1">
      <FullProductName ProductID="php7-7.4.24-1.1">php7-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-bcmath-7.4.24-1.1">
      <FullProductName ProductID="php7-bcmath-7.4.24-1.1">php7-bcmath-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-bz2-7.4.24-1.1">
      <FullProductName ProductID="php7-bz2-7.4.24-1.1">php7-bz2-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-calendar-7.4.24-1.1">
      <FullProductName ProductID="php7-calendar-7.4.24-1.1">php7-calendar-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-cli-7.4.24-1.1">
      <FullProductName ProductID="php7-cli-7.4.24-1.1">php7-cli-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-ctype-7.4.24-1.1">
      <FullProductName ProductID="php7-ctype-7.4.24-1.1">php7-ctype-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-curl-7.4.24-1.1">
      <FullProductName ProductID="php7-curl-7.4.24-1.1">php7-curl-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-dba-7.4.24-1.1">
      <FullProductName ProductID="php7-dba-7.4.24-1.1">php7-dba-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-devel-7.4.24-1.1">
      <FullProductName ProductID="php7-devel-7.4.24-1.1">php7-devel-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-dom-7.4.24-1.1">
      <FullProductName ProductID="php7-dom-7.4.24-1.1">php7-dom-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-enchant-7.4.24-1.1">
      <FullProductName ProductID="php7-enchant-7.4.24-1.1">php7-enchant-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-exif-7.4.24-1.1">
      <FullProductName ProductID="php7-exif-7.4.24-1.1">php7-exif-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-fileinfo-7.4.24-1.1">
      <FullProductName ProductID="php7-fileinfo-7.4.24-1.1">php7-fileinfo-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-ftp-7.4.24-1.1">
      <FullProductName ProductID="php7-ftp-7.4.24-1.1">php7-ftp-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-gd-7.4.24-1.1">
      <FullProductName ProductID="php7-gd-7.4.24-1.1">php7-gd-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-gettext-7.4.24-1.1">
      <FullProductName ProductID="php7-gettext-7.4.24-1.1">php7-gettext-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-gmp-7.4.24-1.1">
      <FullProductName ProductID="php7-gmp-7.4.24-1.1">php7-gmp-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-iconv-7.4.24-1.1">
      <FullProductName ProductID="php7-iconv-7.4.24-1.1">php7-iconv-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-intl-7.4.24-1.1">
      <FullProductName ProductID="php7-intl-7.4.24-1.1">php7-intl-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-json-7.4.24-1.1">
      <FullProductName ProductID="php7-json-7.4.24-1.1">php7-json-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-ldap-7.4.24-1.1">
      <FullProductName ProductID="php7-ldap-7.4.24-1.1">php7-ldap-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-mbstring-7.4.24-1.1">
      <FullProductName ProductID="php7-mbstring-7.4.24-1.1">php7-mbstring-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-mysql-7.4.24-1.1">
      <FullProductName ProductID="php7-mysql-7.4.24-1.1">php7-mysql-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-odbc-7.4.24-1.1">
      <FullProductName ProductID="php7-odbc-7.4.24-1.1">php7-odbc-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-opcache-7.4.24-1.1">
      <FullProductName ProductID="php7-opcache-7.4.24-1.1">php7-opcache-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-openssl-7.4.24-1.1">
      <FullProductName ProductID="php7-openssl-7.4.24-1.1">php7-openssl-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-pcntl-7.4.24-1.1">
      <FullProductName ProductID="php7-pcntl-7.4.24-1.1">php7-pcntl-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-pdo-7.4.24-1.1">
      <FullProductName ProductID="php7-pdo-7.4.24-1.1">php7-pdo-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-pgsql-7.4.24-1.1">
      <FullProductName ProductID="php7-pgsql-7.4.24-1.1">php7-pgsql-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-phar-7.4.24-1.1">
      <FullProductName ProductID="php7-phar-7.4.24-1.1">php7-phar-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-posix-7.4.24-1.1">
      <FullProductName ProductID="php7-posix-7.4.24-1.1">php7-posix-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-readline-7.4.24-1.1">
      <FullProductName ProductID="php7-readline-7.4.24-1.1">php7-readline-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-shmop-7.4.24-1.1">
      <FullProductName ProductID="php7-shmop-7.4.24-1.1">php7-shmop-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-snmp-7.4.24-1.1">
      <FullProductName ProductID="php7-snmp-7.4.24-1.1">php7-snmp-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-soap-7.4.24-1.1">
      <FullProductName ProductID="php7-soap-7.4.24-1.1">php7-soap-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-sockets-7.4.24-1.1">
      <FullProductName ProductID="php7-sockets-7.4.24-1.1">php7-sockets-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-sodium-7.4.24-1.1">
      <FullProductName ProductID="php7-sodium-7.4.24-1.1">php7-sodium-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-sqlite-7.4.24-1.1">
      <FullProductName ProductID="php7-sqlite-7.4.24-1.1">php7-sqlite-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-sysvmsg-7.4.24-1.1">
      <FullProductName ProductID="php7-sysvmsg-7.4.24-1.1">php7-sysvmsg-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-sysvsem-7.4.24-1.1">
      <FullProductName ProductID="php7-sysvsem-7.4.24-1.1">php7-sysvsem-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-sysvshm-7.4.24-1.1">
      <FullProductName ProductID="php7-sysvshm-7.4.24-1.1">php7-sysvshm-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-tidy-7.4.24-1.1">
      <FullProductName ProductID="php7-tidy-7.4.24-1.1">php7-tidy-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-tokenizer-7.4.24-1.1">
      <FullProductName ProductID="php7-tokenizer-7.4.24-1.1">php7-tokenizer-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-xmlreader-7.4.24-1.1">
      <FullProductName ProductID="php7-xmlreader-7.4.24-1.1">php7-xmlreader-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-xmlrpc-7.4.24-1.1">
      <FullProductName ProductID="php7-xmlrpc-7.4.24-1.1">php7-xmlrpc-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-xmlwriter-7.4.24-1.1">
      <FullProductName ProductID="php7-xmlwriter-7.4.24-1.1">php7-xmlwriter-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-xsl-7.4.24-1.1">
      <FullProductName ProductID="php7-xsl-7.4.24-1.1">php7-xsl-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-zip-7.4.24-1.1">
      <FullProductName ProductID="php7-zip-7.4.24-1.1">php7-zip-7.4.24-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php7-zlib-7.4.24-1.1">
      <FullProductName ProductID="php7-zlib-7.4.24-1.1">php7-zlib-7.4.24-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="php7-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-7.4.24-1.1">php7-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-bcmath-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1">php7-bcmath-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-bz2-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-bz2-7.4.24-1.1">php7-bz2-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-calendar-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-calendar-7.4.24-1.1">php7-calendar-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-cli-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-cli-7.4.24-1.1">php7-cli-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-ctype-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-ctype-7.4.24-1.1">php7-ctype-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-curl-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-curl-7.4.24-1.1">php7-curl-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-dba-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-dba-7.4.24-1.1">php7-dba-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-devel-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-devel-7.4.24-1.1">php7-devel-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-dom-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-dom-7.4.24-1.1">php7-dom-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-enchant-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-enchant-7.4.24-1.1">php7-enchant-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-exif-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-exif-7.4.24-1.1">php7-exif-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-fileinfo-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1">php7-fileinfo-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-ftp-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-ftp-7.4.24-1.1">php7-ftp-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-gd-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-gd-7.4.24-1.1">php7-gd-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-gettext-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-gettext-7.4.24-1.1">php7-gettext-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-gmp-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-gmp-7.4.24-1.1">php7-gmp-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-iconv-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-iconv-7.4.24-1.1">php7-iconv-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-intl-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-intl-7.4.24-1.1">php7-intl-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-json-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-json-7.4.24-1.1">php7-json-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-ldap-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-ldap-7.4.24-1.1">php7-ldap-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-mbstring-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1">php7-mbstring-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-mysql-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-mysql-7.4.24-1.1">php7-mysql-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-odbc-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-odbc-7.4.24-1.1">php7-odbc-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-opcache-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-opcache-7.4.24-1.1">php7-opcache-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-openssl-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-openssl-7.4.24-1.1">php7-openssl-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-pcntl-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1">php7-pcntl-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-pdo-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-pdo-7.4.24-1.1">php7-pdo-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-pgsql-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1">php7-pgsql-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-phar-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-phar-7.4.24-1.1">php7-phar-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-posix-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-posix-7.4.24-1.1">php7-posix-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-readline-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-readline-7.4.24-1.1">php7-readline-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-shmop-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-shmop-7.4.24-1.1">php7-shmop-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-snmp-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-snmp-7.4.24-1.1">php7-snmp-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-soap-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-soap-7.4.24-1.1">php7-soap-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-sockets-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-sockets-7.4.24-1.1">php7-sockets-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-sodium-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-sodium-7.4.24-1.1">php7-sodium-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-sqlite-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1">php7-sqlite-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-sysvmsg-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1">php7-sysvmsg-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-sysvsem-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1">php7-sysvsem-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-sysvshm-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1">php7-sysvshm-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-tidy-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-tidy-7.4.24-1.1">php7-tidy-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-tokenizer-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1">php7-tokenizer-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-xmlreader-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1">php7-xmlreader-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-xmlrpc-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1">php7-xmlrpc-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-xmlwriter-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1">php7-xmlwriter-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-xsl-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-xsl-7.4.24-1.1">php7-xsl-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-zip-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-zip-7.4.24-1.1">php7-zip-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-zlib-7.4.24-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:php7-zlib-7.4.24-1.1">php7-zlib-7.4.24-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.</Note>
    </Notes>
    <CVE>CVE-2005-3353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3353.html</URL>
        <Description>CVE-2005-3353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/118976</URL>
        <Description>SUSE Bug 118976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/120087</URL>
        <Description>SUSE Bug 120087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/130227</URL>
        <Description>SUSE Bug 130227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131578</URL>
        <Description>SUSE Bug 131578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131579</URL>
        <Description>SUSE Bug 131579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131580</URL>
        <Description>SUSE Bug 131580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132684</URL>
        <Description>SUSE Bug 132684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/135480</URL>
        <Description>SUSE Bug 135480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/529198</URL>
        <Description>SUSE Bug 529198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a "stacked array assignment."</Note>
    </Notes>
    <CVE>CVE-2005-3388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3388.html</URL>
        <Description>CVE-2005-3388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/120087</URL>
        <Description>SUSE Bug 120087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131578</URL>
        <Description>SUSE Bug 131578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131579</URL>
        <Description>SUSE Bug 131579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131580</URL>
        <Description>SUSE Bug 131580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132684</URL>
        <Description>SUSE Bug 132684</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.</Note>
    </Notes>
    <CVE>CVE-2005-3389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3389.html</URL>
        <Description>CVE-2005-3389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/118976</URL>
        <Description>SUSE Bug 118976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/120087</URL>
        <Description>SUSE Bug 120087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/130227</URL>
        <Description>SUSE Bug 130227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131578</URL>
        <Description>SUSE Bug 131578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131579</URL>
        <Description>SUSE Bug 131579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131580</URL>
        <Description>SUSE Bug 131580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132684</URL>
        <Description>SUSE Bug 132684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/135480</URL>
        <Description>SUSE Bug 135480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/307272</URL>
        <Description>SUSE Bug 307272</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.</Note>
    </Notes>
    <CVE>CVE-2005-3390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3390.html</URL>
        <Description>CVE-2005-3390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/118976</URL>
        <Description>SUSE Bug 118976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/120087</URL>
        <Description>SUSE Bug 120087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/130227</URL>
        <Description>SUSE Bug 130227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131578</URL>
        <Description>SUSE Bug 131578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131579</URL>
        <Description>SUSE Bug 131579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131580</URL>
        <Description>SUSE Bug 131580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132684</URL>
        <Description>SUSE Bug 132684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/135480</URL>
        <Description>SUSE Bug 135480</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple vulnerabilities in PHP before 4.4.1 allow remote attackers to bypass safe_mode and open_basedir restrictions via unknown attack vectors in (1) ext/curl and (2) ext/gd.</Note>
    </Notes>
    <CVE>CVE-2005-3391</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3391.html</URL>
        <Description>CVE-2005-3391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131580</URL>
        <Description>SUSE Bug 131580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/135673</URL>
        <Description>SUSE Bug 135673</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives.</Note>
    </Notes>
    <CVE>CVE-2005-3392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3392.html</URL>
        <Description>CVE-2005-3392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/131580</URL>
        <Description>SUSE Bug 131580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/135673</URL>
        <Description>SUSE Bug 135673</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.</Note>
    </Notes>
    <CVE>CVE-2006-0996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-0996.html</URL>
        <Description>CVE-2006-0996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/164804</URL>
        <Description>SUSE Bug 164804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/164845</URL>
        <Description>SUSE Bug 164845</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions.</Note>
    </Notes>
    <CVE>CVE-2006-1017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1017.html</URL>
        <Description>CVE-2006-1017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/154317</URL>
        <Description>SUSE Bug 154317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/279863</URL>
        <Description>SUSE Bug 279863</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.</Note>
    </Notes>
    <CVE>CVE-2006-1490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1490.html</URL>
        <Description>CVE-2006-1490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/161718</URL>
        <Description>SUSE Bug 161718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/164845</URL>
        <Description>SUSE Bug 164845</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.</Note>
    </Notes>
    <CVE>CVE-2006-1494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1494.html</URL>
        <Description>CVE-2006-1494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/164845</URL>
        <Description>SUSE Bug 164845</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The substr_compare function in string.c in PHP 5.1.2 allows context-dependent attackers to cause a denial of service (memory access violation) via an out-of-bounds offset argument.</Note>
    </Notes>
    <CVE>CVE-2006-1991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1991.html</URL>
        <Description>CVE-2006-1991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/169038</URL>
        <Description>SUSE Bug 169038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv_substr function in PHP 5.2.4 and earlier allows context-dependent attackers to cause (1) a denial of service (application crash) via a long string in the charset parameter, probably also requiring a long string in the str parameter; or (2) a denial of service (temporary application hang) via a long string in the str parameter.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.</Note>
    </Notes>
    <CVE>CVE-2007-4783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4783.html</URL>
        <Description>CVE-2007-4783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/308069</URL>
        <Description>SUSE Bug 308069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/325827</URL>
        <Description>SUSE Bug 325827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dl function in PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in the library parameter.  NOTE: there are limited usage scenarios under which this would be a vulnerability.</Note>
    </Notes>
    <CVE>CVE-2007-4887</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4887.html</URL>
        <Description>CVE-2007-4887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/325657</URL>
        <Description>SUSE Bug 325657</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.</Note>
    </Notes>
    <CVE>CVE-2008-0599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0599.html</URL>
        <Description>CVE-2008-0599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/387745</URL>
        <Description>SUSE Bug 387745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/393279</URL>
        <Description>SUSE Bug 393279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.</Note>
    </Notes>
    <CVE>CVE-2017-9120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9120.html</URL>
        <Description>CVE-2017-9120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103661</URL>
        <Description>SUSE Bug 1103661</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5.</Note>
    </Notes>
    <CVE>CVE-2018-1000222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000222.html</URL>
        <Description>CVE-2018-1000222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105434</URL>
        <Description>SUSE Bug 1105434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this-&gt;_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4.</Note>
    </Notes>
    <CVE>CVE-2018-1000888</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000888.html</URL>
        <Description>CVE-2018-1000888</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.</Note>
    </Notes>
    <CVE>CVE-2018-12882</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12882.html</URL>
        <Description>CVE-2018-12882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099098</URL>
        <Description>SUSE Bug 1099098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.</Note>
    </Notes>
    <CVE>CVE-2018-14851</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14851.html</URL>
        <Description>CVE-2018-14851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103659</URL>
        <Description>SUSE Bug 1103659</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.</Note>
    </Notes>
    <CVE>CVE-2018-17082</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17082.html</URL>
        <Description>CVE-2018-17082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108753</URL>
        <Description>SUSE Bug 1108753</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.</Note>
    </Notes>
    <CVE>CVE-2018-19935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19935.html</URL>
        <Description>CVE-2018-19935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118832</URL>
        <Description>SUSE Bug 1118832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.</Note>
    </Notes>
    <CVE>CVE-2018-20783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20783.html</URL>
        <Description>CVE-2018-20783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126713</URL>
        <Description>SUSE Bug 1126713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127122</URL>
        <Description>SUSE Bug 1127122</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.</Note>
    </Notes>
    <CVE>CVE-2019-11034</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11034.html</URL>
        <Description>CVE-2019-11034</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132838</URL>
        <Description>SUSE Bug 1132838</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.</Note>
    </Notes>
    <CVE>CVE-2019-11035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11035.html</URL>
        <Description>CVE-2019-11035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132837</URL>
        <Description>SUSE Bug 1132837</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.</Note>
    </Notes>
    <CVE>CVE-2019-11036</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11036.html</URL>
        <Description>CVE-2019-11036</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134322</URL>
        <Description>SUSE Bug 1134322</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.</Note>
    </Notes>
    <CVE>CVE-2019-11039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11039.html</URL>
        <Description>CVE-2019-11039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138173</URL>
        <Description>SUSE Bug 1138173</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.</Note>
    </Notes>
    <CVE>CVE-2019-11040</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11040.html</URL>
        <Description>CVE-2019-11040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138172</URL>
        <Description>SUSE Bug 1138172</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.</Note>
    </Notes>
    <CVE>CVE-2019-11041</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11041.html</URL>
        <Description>CVE-2019-11041</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146360</URL>
        <Description>SUSE Bug 1146360</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.</Note>
    </Notes>
    <CVE>CVE-2019-11042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11042.html</URL>
        <Description>CVE-2019-11042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145095</URL>
        <Description>SUSE Bug 1145095</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.</Note>
    </Notes>
    <CVE>CVE-2019-11043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11043.html</URL>
        <Description>CVE-2019-11043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154999</URL>
        <Description>SUSE Bug 1154999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.</Note>
    </Notes>
    <CVE>CVE-2019-11046</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11046.html</URL>
        <Description>CVE-2019-11046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159924</URL>
        <Description>SUSE Bug 1159924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.</Note>
    </Notes>
    <CVE>CVE-2019-9020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9020.html</URL>
        <Description>CVE-2019-9020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126711</URL>
        <Description>SUSE Bug 1126711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.</Note>
    </Notes>
    <CVE>CVE-2019-9021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9021.html</URL>
        <Description>CVE-2019-9021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126713</URL>
        <Description>SUSE Bug 1126713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.</Note>
    </Notes>
    <CVE>CVE-2019-9022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9022.html</URL>
        <Description>CVE-2019-9022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126827</URL>
        <Description>SUSE Bug 1126827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.</Note>
    </Notes>
    <CVE>CVE-2019-9023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9023.html</URL>
        <Description>CVE-2019-9023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126823</URL>
        <Description>SUSE Bug 1126823</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.</Note>
    </Notes>
    <CVE>CVE-2019-9024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9024.html</URL>
        <Description>CVE-2019-9024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126821</URL>
        <Description>SUSE Bug 1126821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.</Note>
    </Notes>
    <CVE>CVE-2019-9637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9637.html</URL>
        <Description>CVE-2019-9637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128892</URL>
        <Description>SUSE Bug 1128892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note-&gt;offset relationship to value_len.</Note>
    </Notes>
    <CVE>CVE-2019-9638</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9638.html</URL>
        <Description>CVE-2019-9638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128889</URL>
        <Description>SUSE Bug 1128889</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.</Note>
    </Notes>
    <CVE>CVE-2019-9640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9640.html</URL>
        <Description>CVE-2019-9640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128883</URL>
        <Description>SUSE Bug 1128883</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.</Note>
    </Notes>
    <CVE>CVE-2019-9641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9641.html</URL>
        <Description>CVE-2019-9641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128722</URL>
        <Description>SUSE Bug 1128722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."</Note>
    </Notes>
    <CVE>CVE-2019-9675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9675.html</URL>
        <Description>CVE-2019-9675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128886</URL>
        <Description>SUSE Bug 1128886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.</Note>
    </Notes>
    <CVE>CVE-2020-7062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7062.html</URL>
        <Description>CVE-2020-7062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165280</URL>
        <Description>SUSE Bug 1165280</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.</Note>
    </Notes>
    <CVE>CVE-2020-7063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7063.html</URL>
        <Description>CVE-2020-7063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165289</URL>
        <Description>SUSE Bug 1165289</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.</Note>
    </Notes>
    <CVE>CVE-2021-21706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:php7-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bcmath-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-bz2-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-calendar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-cli-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ctype-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-curl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dba-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-devel-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-dom-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-enchant-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-exif-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-fileinfo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ftp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gd-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gettext-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-gmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-iconv-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-intl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-json-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-ldap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mbstring-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-mysql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-odbc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-opcache-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-openssl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pcntl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pdo-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-pgsql-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-phar-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-posix-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-readline-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-shmop-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-snmp-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-soap-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sockets-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sodium-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sqlite-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvmsg-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvsem-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-sysvshm-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tidy-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-tokenizer-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlreader-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlrpc-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xmlwriter-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-xsl-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zip-7.4.24-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:php7-zlib-7.4.24-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21706.html</URL>
        <Description>CVE-2021-21706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191314</URL>
        <Description>SUSE Bug 1191314</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
