<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">python3-virtualbox-6.1.26-3.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11501</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">python3-virtualbox-6.1.26-3.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the python3-virtualbox-6.1.26-3.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11501</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11501</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10392/</URL>
      <Description>SUSE CVE CVE-2017-10392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3316/</URL>
      <Description>SUSE CVE CVE-2017-3316 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3559/</URL>
      <Description>SUSE CVE CVE-2017-3559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3561/</URL>
      <Description>SUSE CVE CVE-2017-3561 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0732/</URL>
      <Description>SUSE CVE CVE-2018-0732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0739/</URL>
      <Description>SUSE CVE CVE-2018-0739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11763/</URL>
      <Description>SUSE CVE CVE-2018-11763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11784/</URL>
      <Description>SUSE CVE CVE-2018-11784 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2689/</URL>
      <Description>SUSE CVE CVE-2018-2689 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2694/</URL>
      <Description>SUSE CVE CVE-2018-2694 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2842/</URL>
      <Description>SUSE CVE CVE-2018-2842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3005/</URL>
      <Description>SUSE CVE CVE-2018-3005 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3087/</URL>
      <Description>SUSE CVE CVE-2018-3087 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3288/</URL>
      <Description>SUSE CVE CVE-2018-3288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3294/</URL>
      <Description>SUSE CVE CVE-2018-3294 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2450/</URL>
      <Description>SUSE CVE CVE-2019-2450 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2500/</URL>
      <Description>SUSE CVE CVE-2019-2500 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2501/</URL>
      <Description>SUSE CVE CVE-2019-2501 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2521/</URL>
      <Description>SUSE CVE CVE-2019-2521 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2656/</URL>
      <Description>SUSE CVE CVE-2019-2656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2678/</URL>
      <Description>SUSE CVE CVE-2019-2678 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2722/</URL>
      <Description>SUSE CVE CVE-2019-2722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2848/</URL>
      <Description>SUSE CVE CVE-2019-2848 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2859/</URL>
      <Description>SUSE CVE CVE-2019-2859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2926/</URL>
      <Description>SUSE CVE CVE-2019-2926 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2984/</URL>
      <Description>SUSE CVE CVE-2019-2984 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3028/</URL>
      <Description>SUSE CVE CVE-2019-3028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14628/</URL>
      <Description>SUSE CVE CVE-2020-14628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14673/</URL>
      <Description>SUSE CVE CVE-2020-14673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14677/</URL>
      <Description>SUSE CVE CVE-2020-14677 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14700/</URL>
      <Description>SUSE CVE CVE-2020-14700 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14703/</URL>
      <Description>SUSE CVE CVE-2020-14703 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14713/</URL>
      <Description>SUSE CVE CVE-2020-14713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14715/</URL>
      <Description>SUSE CVE CVE-2020-14715 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2674/</URL>
      <Description>SUSE CVE CVE-2020-2674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2681/</URL>
      <Description>SUSE CVE CVE-2020-2681 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2704/</URL>
      <Description>SUSE CVE CVE-2020-2704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2074/</URL>
      <Description>SUSE CVE CVE-2021-2074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2145/</URL>
      <Description>SUSE CVE CVE-2021-2145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2264/</URL>
      <Description>SUSE CVE CVE-2021-2264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2281/</URL>
      <Description>SUSE CVE CVE-2021-2281 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2287/</URL>
      <Description>SUSE CVE CVE-2021-2287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2310/</URL>
      <Description>SUSE CVE CVE-2021-2310 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python3-virtualbox-6.1.26-3.2">
      <FullProductName ProductID="python3-virtualbox-6.1.26-3.2">python3-virtualbox-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-6.1.26-3.2">virtualbox-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-devel-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-devel-6.1.26-3.2">virtualbox-devel-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-desktop-icons-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-guest-desktop-icons-6.1.26-3.2">virtualbox-guest-desktop-icons-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-source-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-guest-source-6.1.26-3.2">virtualbox-guest-source-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-tools-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-guest-tools-6.1.26-3.2">virtualbox-guest-tools-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-guest-x11-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-guest-x11-6.1.26-3.2">virtualbox-guest-x11-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-host-source-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-host-source-6.1.26-3.2">virtualbox-host-source-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-qt-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-qt-6.1.26-3.2">virtualbox-qt-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-vnc-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-vnc-6.1.26-3.2">virtualbox-vnc-6.1.26-3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="virtualbox-websrv-6.1.26-3.2">
      <FullProductName ProductID="virtualbox-websrv-6.1.26-3.2">virtualbox-websrv-6.1.26-3.2</FullProductName>
    </Branch>
    <Relationship ProductReference="python3-virtualbox-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2">python3-virtualbox-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-6.1.26-3.2">virtualbox-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-devel-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2">virtualbox-devel-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-desktop-icons-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2">virtualbox-guest-desktop-icons-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-source-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2">virtualbox-guest-source-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-tools-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2">virtualbox-guest-tools-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-guest-x11-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2">virtualbox-guest-x11-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-host-source-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2">virtualbox-host-source-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-qt-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2">virtualbox-qt-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-vnc-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2">virtualbox-vnc-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="virtualbox-websrv-6.1.26-3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2">virtualbox-websrv-6.1.26-3.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.30. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10392.html</URL>
        <Description>CVE-2017-10392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064200</URL>
        <Description>SUSE Bug 1064200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Confidentiality, Integrity and Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3316</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3316.html</URL>
        <Description>CVE-2017-3316</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020856</URL>
        <Description>SUSE Bug 1020856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3559.html</URL>
        <Description>CVE-2017-3559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034854</URL>
        <Description>SUSE Bug 1034854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3561</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3561.html</URL>
        <Description>CVE-2017-3561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034854</URL>
        <Description>SUSE Bug 1034854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).</Note>
    </Notes>
    <CVE>CVE-2018-0732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0732.html</URL>
        <Description>CVE-2018-0732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077628</URL>
        <Description>SUSE Bug 1077628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097158</URL>
        <Description>SUSE Bug 1097158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099502</URL>
        <Description>SUSE Bug 1099502</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106692</URL>
        <Description>SUSE Bug 1106692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108542</URL>
        <Description>SUSE Bug 1108542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110163</URL>
        <Description>SUSE Bug 1110163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112097</URL>
        <Description>SUSE Bug 1112097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148697</URL>
        <Description>SUSE Bug 1148697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).</Note>
    </Notes>
    <CVE>CVE-2018-0739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0739.html</URL>
        <Description>CVE-2018-0739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087102</URL>
        <Description>SUSE Bug 1087102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089997</URL>
        <Description>SUSE Bug 1089997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094291</URL>
        <Description>SUSE Bug 1094291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108542</URL>
        <Description>SUSE Bug 1108542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.</Note>
    </Notes>
    <CVE>CVE-2018-11763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11763.html</URL>
        <Description>CVE-2018-11763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109961</URL>
        <Description>SUSE Bug 1109961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122212</URL>
        <Description>SUSE Bug 1122212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.</Note>
    </Notes>
    <CVE>CVE-2018-11784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11784.html</URL>
        <Description>CVE-2018-11784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110850</URL>
        <Description>SUSE Bug 1110850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122212</URL>
        <Description>SUSE Bug 1122212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2689.html</URL>
        <Description>CVE-2018-2689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076372</URL>
        <Description>SUSE Bug 1076372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2694.html</URL>
        <Description>CVE-2018-2694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076372</URL>
        <Description>SUSE Bug 1076372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.36 and Prior to 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2842.html</URL>
        <Description>CVE-2018-2842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089997</URL>
        <Description>SUSE Bug 1089997</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 4.0 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2018-3005</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3005.html</URL>
        <Description>CVE-2018-3005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101667</URL>
        <Description>SUSE Bug 1101667</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3087</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3087.html</URL>
        <Description>CVE-2018-3087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101667</URL>
        <Description>SUSE Bug 1101667</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3288.html</URL>
        <Description>CVE-2018-3288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112097</URL>
        <Description>SUSE Bug 1112097</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3294</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3294.html</URL>
        <Description>CVE-2018-3294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112097</URL>
        <Description>SUSE Bug 1112097</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2450</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2450.html</URL>
        <Description>CVE-2019-2450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122212</URL>
        <Description>SUSE Bug 1122212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2500.html</URL>
        <Description>CVE-2019-2500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122212</URL>
        <Description>SUSE Bug 1122212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2501.html</URL>
        <Description>CVE-2019-2501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122212</URL>
        <Description>SUSE Bug 1122212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2521</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2521.html</URL>
        <Description>CVE-2019-2521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122212</URL>
        <Description>SUSE Bug 1122212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2656.html</URL>
        <Description>CVE-2019-2656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132827</URL>
        <Description>SUSE Bug 1132827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2678.html</URL>
        <Description>CVE-2019-2678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132827</URL>
        <Description>SUSE Bug 1132827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2722.html</URL>
        <Description>CVE-2019-2722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132827</URL>
        <Description>SUSE Bug 1132827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2848.html</URL>
        <Description>CVE-2019-2848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141801</URL>
        <Description>SUSE Bug 1141801</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2859.html</URL>
        <Description>CVE-2019-2859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141801</URL>
        <Description>SUSE Bug 1141801</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.34 and prior to 6.0.14. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 2.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2019-2926</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2926.html</URL>
        <Description>CVE-2019-2926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154166</URL>
        <Description>SUSE Bug 1154166</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.34 and prior to 6.0.14. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2984.html</URL>
        <Description>CVE-2019-2984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154166</URL>
        <Description>SUSE Bug 1154166</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.34 and prior to 6.0.14. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-3028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3028.html</URL>
        <Description>CVE-2019-3028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154166</URL>
        <Description>SUSE Bug 1154166</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14628 is applicable to Windows VM only. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-14628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14628.html</URL>
        <Description>CVE-2020-14628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174159</URL>
        <Description>SUSE Bug 1174159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14673.html</URL>
        <Description>CVE-2020-14673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174159</URL>
        <Description>SUSE Bug 1174159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-14677</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14677.html</URL>
        <Description>CVE-2020-14677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174159</URL>
        <Description>SUSE Bug 1174159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14700</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14700.html</URL>
        <Description>CVE-2020-14700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174159</URL>
        <Description>SUSE Bug 1174159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-14703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14703.html</URL>
        <Description>CVE-2020-14703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174159</URL>
        <Description>SUSE Bug 1174159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-14713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14713.html</URL>
        <Description>CVE-2020-14713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174159</URL>
        <Description>SUSE Bug 1174159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-14715</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14715.html</URL>
        <Description>CVE-2020-14715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174159</URL>
        <Description>SUSE Bug 1174159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-2674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2674.html</URL>
        <Description>CVE-2020-2674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161050</URL>
        <Description>SUSE Bug 1161050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-2681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2681.html</URL>
        <Description>CVE-2020-2681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161050</URL>
        <Description>SUSE Bug 1161050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2020-2704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2704.html</URL>
        <Description>CVE-2020-2704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161050</URL>
        <Description>SUSE Bug 1161050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2074.html</URL>
        <Description>CVE-2021-2074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181197</URL>
        <Description>SUSE Bug 1181197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181199</URL>
        <Description>SUSE Bug 1181199</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2145.html</URL>
        <Description>CVE-2021-2145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185211</URL>
        <Description>SUSE Bug 1185211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 8.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2021-2264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2264.html</URL>
        <Description>CVE-2021-2264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184542</URL>
        <Description>SUSE Bug 1184542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185211</URL>
        <Description>SUSE Bug 1185211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2021-2281</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2281.html</URL>
        <Description>CVE-2021-2281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185211</URL>
        <Description>SUSE Bug 1185211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2021-2287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2287.html</URL>
        <Description>CVE-2021-2287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185211</URL>
        <Description>SUSE Bug 1185211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2310</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python3-virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-devel-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-desktop-icons-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-tools-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-guest-x11-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-host-source-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-qt-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-vnc-6.1.26-3.2</ProductID>
        <ProductID>openSUSE Tumbleweed:virtualbox-websrv-6.1.26-3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2310.html</URL>
        <Description>CVE-2021-2310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185211</URL>
        <Description>SUSE Bug 1185211</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
