<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libjavascriptcoregtk-4_0-18-2.32.4-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11506</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libjavascriptcoregtk-4_0-18-2.32.4-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.32.4-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11506</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4692/</URL>
      <Description>SUSE CVE CVE-2016-4692 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4743/</URL>
      <Description>SUSE CVE CVE-2016-4743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7589/</URL>
      <Description>SUSE CVE CVE-2016-7589 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7598/</URL>
      <Description>SUSE CVE CVE-2016-7598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7641/</URL>
      <Description>SUSE CVE CVE-2016-7641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7654/</URL>
      <Description>SUSE CVE CVE-2016-7654 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7656/</URL>
      <Description>SUSE CVE CVE-2016-7656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000121/</URL>
      <Description>SUSE CVE CVE-2017-1000121 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13798/</URL>
      <Description>SUSE CVE CVE-2017-13798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13803/</URL>
      <Description>SUSE CVE CVE-2017-13803 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13866/</URL>
      <Description>SUSE CVE CVE-2017-13866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-13884/</URL>
      <Description>SUSE CVE CVE-2017-13884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2350/</URL>
      <Description>SUSE CVE CVE-2017-2350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2365/</URL>
      <Description>SUSE CVE CVE-2017-2365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2371/</URL>
      <Description>SUSE CVE CVE-2017-2371 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2373/</URL>
      <Description>SUSE CVE CVE-2017-2373 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2496/</URL>
      <Description>SUSE CVE CVE-2017-2496 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2510/</URL>
      <Description>SUSE CVE CVE-2017-2510 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2538/</URL>
      <Description>SUSE CVE CVE-2017-2538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5753/</URL>
      <Description>SUSE CVE CVE-2017-5753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7006/</URL>
      <Description>SUSE CVE CVE-2017-7006 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7019/</URL>
      <Description>SUSE CVE CVE-2017-7019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7020/</URL>
      <Description>SUSE CVE CVE-2017-7020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7030/</URL>
      <Description>SUSE CVE CVE-2017-7030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7039/</URL>
      <Description>SUSE CVE CVE-2017-7039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7043/</URL>
      <Description>SUSE CVE CVE-2017-7043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7046/</URL>
      <Description>SUSE CVE CVE-2017-7046 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7052/</URL>
      <Description>SUSE CVE CVE-2017-7052 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7056/</URL>
      <Description>SUSE CVE CVE-2017-7056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7081/</URL>
      <Description>SUSE CVE CVE-2017-7081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7089/</URL>
      <Description>SUSE CVE CVE-2017-7089 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7093/</URL>
      <Description>SUSE CVE CVE-2017-7093 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7098/</URL>
      <Description>SUSE CVE CVE-2017-7098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7104/</URL>
      <Description>SUSE CVE CVE-2017-7104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7117/</URL>
      <Description>SUSE CVE CVE-2017-7117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7156/</URL>
      <Description>SUSE CVE CVE-2017-7156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7157/</URL>
      <Description>SUSE CVE CVE-2017-7157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7161/</URL>
      <Description>SUSE CVE CVE-2017-7161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11646/</URL>
      <Description>SUSE CVE CVE-2018-11646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12911/</URL>
      <Description>SUSE CVE CVE-2018-12911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4088/</URL>
      <Description>SUSE CVE CVE-2018-4088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4101/</URL>
      <Description>SUSE CVE CVE-2018-4101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4117/</URL>
      <Description>SUSE CVE CVE-2018-4117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4120/</URL>
      <Description>SUSE CVE CVE-2018-4120 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4127/</URL>
      <Description>SUSE CVE CVE-2018-4127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4133/</URL>
      <Description>SUSE CVE CVE-2018-4133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4162/</URL>
      <Description>SUSE CVE CVE-2018-4162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4190/</URL>
      <Description>SUSE CVE CVE-2018-4190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4191/</URL>
      <Description>SUSE CVE CVE-2018-4191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4200/</URL>
      <Description>SUSE CVE CVE-2018-4200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4204/</URL>
      <Description>SUSE CVE CVE-2018-4204 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4207/</URL>
      <Description>SUSE CVE CVE-2018-4207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4212/</URL>
      <Description>SUSE CVE CVE-2018-4212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4222/</URL>
      <Description>SUSE CVE CVE-2018-4222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4261/</URL>
      <Description>SUSE CVE CVE-2018-4261 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4264/</URL>
      <Description>SUSE CVE CVE-2018-4264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4270/</URL>
      <Description>SUSE CVE CVE-2018-4270 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4284/</URL>
      <Description>SUSE CVE CVE-2018-4284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4306/</URL>
      <Description>SUSE CVE CVE-2018-4306 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4315/</URL>
      <Description>SUSE CVE CVE-2018-4315 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4319/</URL>
      <Description>SUSE CVE CVE-2018-4319 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4345/</URL>
      <Description>SUSE CVE CVE-2018-4345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4359/</URL>
      <Description>SUSE CVE CVE-2018-4359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4372/</URL>
      <Description>SUSE CVE CVE-2018-4372 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4375/</URL>
      <Description>SUSE CVE CVE-2018-4375 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4382/</URL>
      <Description>SUSE CVE CVE-2018-4382 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4437/</URL>
      <Description>SUSE CVE CVE-2018-4437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4441/</URL>
      <Description>SUSE CVE CVE-2018-4441 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4443/</URL>
      <Description>SUSE CVE CVE-2018-4443 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6212/</URL>
      <Description>SUSE CVE CVE-2019-6212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6216/</URL>
      <Description>SUSE CVE CVE-2019-6216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6229/</URL>
      <Description>SUSE CVE CVE-2019-6229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6251/</URL>
      <Description>SUSE CVE CVE-2019-6251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7285/</URL>
      <Description>SUSE CVE CVE-2019-7285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8375/</URL>
      <Description>SUSE CVE CVE-2019-8375 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8518/</URL>
      <Description>SUSE CVE CVE-2019-8518 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8524/</URL>
      <Description>SUSE CVE CVE-2019-8524 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8551/</URL>
      <Description>SUSE CVE CVE-2019-8551 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8595/</URL>
      <Description>SUSE CVE CVE-2019-8595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8625/</URL>
      <Description>SUSE CVE CVE-2019-8625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8644/</URL>
      <Description>SUSE CVE CVE-2019-8644 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8666/</URL>
      <Description>SUSE CVE CVE-2019-8666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8669/</URL>
      <Description>SUSE CVE CVE-2019-8669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8671/</URL>
      <Description>SUSE CVE CVE-2019-8671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8681/</URL>
      <Description>SUSE CVE CVE-2019-8681 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8684/</URL>
      <Description>SUSE CVE CVE-2019-8684 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8686/</URL>
      <Description>SUSE CVE CVE-2019-8686 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8719/</URL>
      <Description>SUSE CVE CVE-2019-8719 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8726/</URL>
      <Description>SUSE CVE CVE-2019-8726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8766/</URL>
      <Description>SUSE CVE CVE-2019-8766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8768/</URL>
      <Description>SUSE CVE CVE-2019-8768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8771/</URL>
      <Description>SUSE CVE CVE-2019-8771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8783/</URL>
      <Description>SUSE CVE CVE-2019-8783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8812/</URL>
      <Description>SUSE CVE CVE-2019-8812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8816/</URL>
      <Description>SUSE CVE CVE-2019-8816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8821/</URL>
      <Description>SUSE CVE CVE-2019-8821 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8835/</URL>
      <Description>SUSE CVE CVE-2019-8835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10018/</URL>
      <Description>SUSE CVE CVE-2020-10018 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11793/</URL>
      <Description>SUSE CVE CVE-2020-11793 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13558/</URL>
      <Description>SUSE CVE CVE-2020-13558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13584/</URL>
      <Description>SUSE CVE CVE-2020-13584 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13753/</URL>
      <Description>SUSE CVE CVE-2020-13753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27918/</URL>
      <Description>SUSE CVE CVE-2020-27918 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3862/</URL>
      <Description>SUSE CVE CVE-2020-3862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3867/</URL>
      <Description>SUSE CVE CVE-2020-3867 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3895/</URL>
      <Description>SUSE CVE CVE-2020-3895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3899/</URL>
      <Description>SUSE CVE CVE-2020-3899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3902/</URL>
      <Description>SUSE CVE CVE-2020-3902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9802/</URL>
      <Description>SUSE CVE CVE-2020-9802 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9806/</URL>
      <Description>SUSE CVE CVE-2020-9806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9862/</URL>
      <Description>SUSE CVE CVE-2020-9862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9895/</URL>
      <Description>SUSE CVE CVE-2020-9895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9947/</URL>
      <Description>SUSE CVE CVE-2020-9947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1788/</URL>
      <Description>SUSE CVE CVE-2021-1788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1789/</URL>
      <Description>SUSE CVE CVE-2021-1789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1817/</URL>
      <Description>SUSE CVE CVE-2021-1817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21775/</URL>
      <Description>SUSE CVE CVE-2021-21775 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21806/</URL>
      <Description>SUSE CVE CVE-2021-21806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30661/</URL>
      <Description>SUSE CVE CVE-2021-30661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30665/</URL>
      <Description>SUSE CVE CVE-2021-30665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30666/</URL>
      <Description>SUSE CVE CVE-2021-30666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30682/</URL>
      <Description>SUSE CVE CVE-2021-30682 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30744/</URL>
      <Description>SUSE CVE CVE-2021-30744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30758/</URL>
      <Description>SUSE CVE CVE-2021-30758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30799/</URL>
      <Description>SUSE CVE CVE-2021-30799 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30858/</URL>
      <Description>SUSE CVE CVE-2021-30858 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.32.4-1.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.32.4-1.1">libjavascriptcoregtk-4_0-18-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1">libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.32.4-1.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.32.4-1.1">libwebkit2gtk-4_0-37-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.32.4-1.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.32.4-1.1">libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.32.4-1.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.32.4-1.1">libwebkit2gtk3-lang-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1">typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.32.4-1.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.32.4-1.1">typelib-1_0-WebKit2-4_0-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.32.4-1.1">
      <FullProductName ProductID="webkit-jsc-4-2.32.4-1.1">webkit-jsc-4-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.32.4-1.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.32.4-1.1">webkit2gtk-4_0-injected-bundles-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.32.4-1.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.32.4-1.1">webkit2gtk3-devel-2.32.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.32.4-1.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.32.4-1.1">webkit2gtk3-minibrowser-2.32.4-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1">libjavascriptcoregtk-4_0-18-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1">libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1">libwebkit2gtk-4_0-37-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1">libwebkit2gtk-4_0-37-32bit-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1">libwebkit2gtk3-lang-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1">typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1">typelib-1_0-WebKit2-4_0-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1">webkit-jsc-4-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1">webkit2gtk-4_0-injected-bundles-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1">webkit2gtk3-devel-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.32.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1">webkit2gtk3-minibrowser-2.32.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-4692</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4692.html</URL>
        <Description>CVE-2016-4692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020950</URL>
        <Description>SUSE Bug 1020950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-4743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4743.html</URL>
        <Description>CVE-2016-4743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020950</URL>
        <Description>SUSE Bug 1020950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-7589</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7589.html</URL>
        <Description>CVE-2016-7589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020950</URL>
        <Description>SUSE Bug 1020950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-7598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7598.html</URL>
        <Description>CVE-2016-7598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020950</URL>
        <Description>SUSE Bug 1020950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-7641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7641.html</URL>
        <Description>CVE-2016-7641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020950</URL>
        <Description>SUSE Bug 1020950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-7654</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7654.html</URL>
        <Description>CVE-2016-7654</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020950</URL>
        <Description>SUSE Bug 1020950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-7656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7656.html</URL>
        <Description>CVE-2016-7656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020950</URL>
        <Description>SUSE Bug 1020950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.</Note>
    </Notes>
    <CVE>CVE-2017-1000121</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000121.html</URL>
        <Description>CVE-2017-1000121</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078996</URL>
        <Description>SUSE Bug 1078996</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-13798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13798.html</URL>
        <Description>CVE-2017-13798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069925</URL>
        <Description>SUSE Bug 1069925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-13803</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13803.html</URL>
        <Description>CVE-2017-13803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069925</URL>
        <Description>SUSE Bug 1069925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-13866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13866.html</URL>
        <Description>CVE-2017-13866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073654</URL>
        <Description>SUSE Bug 1073654</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-13884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13884.html</URL>
        <Description>CVE-2017-13884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075775</URL>
        <Description>SUSE Bug 1075775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077535</URL>
        <Description>SUSE Bug 1077535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-2350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2350.html</URL>
        <Description>CVE-2017-2350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024749</URL>
        <Description>SUSE Bug 1024749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-2365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2365.html</URL>
        <Description>CVE-2017-2365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024749</URL>
        <Description>SUSE Bug 1024749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "WebKit" component, which allows remote attackers to launch popups via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-2371</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2371.html</URL>
        <Description>CVE-2017-2371</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024749</URL>
        <Description>SUSE Bug 1024749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-2373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2373.html</URL>
        <Description>CVE-2017-2373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024749</URL>
        <Description>SUSE Bug 1024749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-2496</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2496.html</URL>
        <Description>CVE-2017-2496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with pageshow events.</Note>
    </Notes>
    <CVE>CVE-2017-2510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2510.html</URL>
        <Description>CVE-2017-2510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-2538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2538.html</URL>
        <Description>CVE-2017-2538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045460</URL>
        <Description>SUSE Bug 1045460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2017-5753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5753.html</URL>
        <Description>CVE-2017-5753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068032</URL>
        <Description>SUSE Bug 1068032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074562</URL>
        <Description>SUSE Bug 1074562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074578</URL>
        <Description>SUSE Bug 1074578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075006</URL>
        <Description>SUSE Bug 1075006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075419</URL>
        <Description>SUSE Bug 1075419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075748</URL>
        <Description>SUSE Bug 1075748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080039</URL>
        <Description>SUSE Bug 1080039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087084</URL>
        <Description>SUSE Bug 1087084</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087939</URL>
        <Description>SUSE Bug 1087939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089055</URL>
        <Description>SUSE Bug 1089055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136865</URL>
        <Description>SUSE Bug 1136865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209547</URL>
        <Description>SUSE Bug 1209547</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct a timing side-channel attack to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses SVG filters.</Note>
    </Notes>
    <CVE>CVE-2017-7006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7006.html</URL>
        <Description>CVE-2017-7006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit Page Loading" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7019.html</URL>
        <Description>CVE-2017-7019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7020.html</URL>
        <Description>CVE-2017-7020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7030.html</URL>
        <Description>CVE-2017-7030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7039.html</URL>
        <Description>CVE-2017-7039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7043.html</URL>
        <Description>CVE-2017-7043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7046</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7046.html</URL>
        <Description>CVE-2017-7046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7052.html</URL>
        <Description>CVE-2017-7052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7056.html</URL>
        <Description>CVE-2017-7056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050469</URL>
        <Description>SUSE Bug 1050469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7081.html</URL>
        <Description>CVE-2017-7081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066892</URL>
        <Description>SUSE Bug 1066892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.</Note>
    </Notes>
    <CVE>CVE-2017-7089</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7089.html</URL>
        <Description>CVE-2017-7089</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066892</URL>
        <Description>SUSE Bug 1066892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7093</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7093.html</URL>
        <Description>CVE-2017-7093</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066892</URL>
        <Description>SUSE Bug 1066892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7098.html</URL>
        <Description>CVE-2017-7098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066892</URL>
        <Description>SUSE Bug 1066892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7104.html</URL>
        <Description>CVE-2017-7104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066892</URL>
        <Description>SUSE Bug 1066892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7117.html</URL>
        <Description>CVE-2017-7117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066892</URL>
        <Description>SUSE Bug 1066892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7156.html</URL>
        <Description>CVE-2017-7156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073654</URL>
        <Description>SUSE Bug 1073654</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2017-7157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7157.html</URL>
        <Description>CVE-2017-7157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073654</URL>
        <Description>SUSE Bug 1073654</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. Safari before 11.0.2 is affected. The issue involves the "WebKit Web Inspector" component. It allows remote attackers to execute arbitrary code via special characters that trigger command injection.</Note>
    </Notes>
    <CVE>CVE-2017-7161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7161.html</URL>
        <Description>CVE-2017-7161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075775</URL>
        <Description>SUSE Bug 1075775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077535</URL>
        <Description>SUSE Bug 1077535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.</Note>
    </Notes>
    <CVE>CVE-2018-11646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11646.html</URL>
        <Description>CVE-2018-11646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095611</URL>
        <Description>SUSE Bug 1095611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.</Note>
    </Notes>
    <CVE>CVE-2018-12911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12911.html</URL>
        <Description>CVE-2018-12911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101999</URL>
        <Description>SUSE Bug 1101999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104169</URL>
        <Description>SUSE Bug 1104169</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4088.html</URL>
        <Description>CVE-2018-4088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075775</URL>
        <Description>SUSE Bug 1075775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077535</URL>
        <Description>SUSE Bug 1077535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4101.html</URL>
        <Description>CVE-2018-4101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4117.html</URL>
        <Description>CVE-2018-4117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102530</URL>
        <Description>SUSE Bug 1102530</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4120.html</URL>
        <Description>CVE-2018-4120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4127.html</URL>
        <Description>CVE-2018-4127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. Safari before 11.1 is affected. The issue involves the "WebKit" component. A Safari cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via a crafted URL.</Note>
    </Notes>
    <CVE>CVE-2018-4133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4133.html</URL>
        <Description>CVE-2018-4133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4162.html</URL>
        <Description>CVE-2018-4162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch.</Note>
    </Notes>
    <CVE>CVE-2018-4190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4190.html</URL>
        <Description>CVE-2018-4190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4191.html</URL>
        <Description>CVE-2018-4191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.</Note>
    </Notes>
    <CVE>CVE-2018-4200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4200.html</URL>
        <Description>CVE-2018-4200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092280</URL>
        <Description>SUSE Bug 1092280</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4204</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4204.html</URL>
        <Description>CVE-2018-4204</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092279</URL>
        <Description>SUSE Bug 1092279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4207.html</URL>
        <Description>CVE-2018-4207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4212.html</URL>
        <Description>CVE-2018-4212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.</Note>
    </Notes>
    <CVE>CVE-2018-4222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4222.html</URL>
        <Description>CVE-2018-4222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.</Note>
    </Notes>
    <CVE>CVE-2018-4261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4261.html</URL>
        <Description>CVE-2018-4261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104169</URL>
        <Description>SUSE Bug 1104169</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.</Note>
    </Notes>
    <CVE>CVE-2018-4264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4264.html</URL>
        <Description>CVE-2018-4264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104169</URL>
        <Description>SUSE Bug 1104169</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.</Note>
    </Notes>
    <CVE>CVE-2018-4270</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4270.html</URL>
        <Description>CVE-2018-4270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104169</URL>
        <Description>SUSE Bug 1104169</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.</Note>
    </Notes>
    <CVE>CVE-2018-4284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4284.html</URL>
        <Description>CVE-2018-4284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104169</URL>
        <Description>SUSE Bug 1104169</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4306</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4306.html</URL>
        <Description>CVE-2018-4306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4315</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4315.html</URL>
        <Description>CVE-2018-4315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue affected versions prior to iOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4319</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4319.html</URL>
        <Description>CVE-2018-4319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4345.html</URL>
        <Description>CVE-2018-4345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4359.html</URL>
        <Description>CVE-2018-4359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4372.html</URL>
        <Description>CVE-2018-4372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4375.html</URL>
        <Description>CVE-2018-4375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4382</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4382.html</URL>
        <Description>CVE-2018-4382</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4437.html</URL>
        <Description>CVE-2018-4437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119553</URL>
        <Description>SUSE Bug 1119553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4441</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4441.html</URL>
        <Description>CVE-2018-4441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119555</URL>
        <Description>SUSE Bug 1119555</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4443.html</URL>
        <Description>CVE-2018-4443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119557</URL>
        <Description>SUSE Bug 1119557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6212.html</URL>
        <Description>CVE-2019-6212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6216.html</URL>
        <Description>CVE-2019-6216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-6229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6229.html</URL>
        <Description>CVE-2019-6229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.</Note>
    </Notes>
    <CVE>CVE-2019-6251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6251.html</URL>
        <Description>CVE-2019-6251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121894</URL>
        <Description>SUSE Bug 1121894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-7285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7285.html</URL>
        <Description>CVE-2019-7285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The UIProcess subsystem in WebKit, as used in WebKitGTK through 2.23.90 and WebKitGTK+ through 2.22.6 and other products, does not prevent the script dialog size from exceeding the web view size, which allows remote attackers to cause a denial of service (Buffer Overflow) or possibly have unspecified other impact, related to UIProcess/API/gtk/WebKitScriptDialogGtk.cpp, UIProcess/API/gtk/WebKitScriptDialogImpl.cpp, and UIProcess/API/gtk/WebKitWebViewGtk.cpp, as demonstrated by GNOME Web (aka Epiphany).</Note>
    </Notes>
    <CVE>CVE-2019-8375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8375.html</URL>
        <Description>CVE-2019-8375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126768</URL>
        <Description>SUSE Bug 1126768</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8518</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8518.html</URL>
        <Description>CVE-2019-8518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8524.html</URL>
        <Description>CVE-2019-8524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8551.html</URL>
        <Description>CVE-2019-8551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8595.html</URL>
        <Description>CVE-2019-8595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135715</URL>
        <Description>SUSE Bug 1135715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8625.html</URL>
        <Description>CVE-2019-8625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8644.html</URL>
        <Description>CVE-2019-8644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8666.html</URL>
        <Description>CVE-2019-8666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8669.html</URL>
        <Description>CVE-2019-8669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8671.html</URL>
        <Description>CVE-2019-8671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8681.html</URL>
        <Description>CVE-2019-8681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8684.html</URL>
        <Description>CVE-2019-8684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8686</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8686.html</URL>
        <Description>CVE-2019-8686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8719</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8719.html</URL>
        <Description>CVE-2019-8719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8726.html</URL>
        <Description>CVE-2019-8726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8766.html</URL>
        <Description>CVE-2019-8766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">"Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history items.</Note>
    </Notes>
    <CVE>CVE-2019-8768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8768.html</URL>
        <Description>CVE-2019-8768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy.</Note>
    </Notes>
    <CVE>CVE-2019-8771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8771.html</URL>
        <Description>CVE-2019-8771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8783.html</URL>
        <Description>CVE-2019-8783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8812.html</URL>
        <Description>CVE-2019-8812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8816.html</URL>
        <Description>CVE-2019-8816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8821</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8821.html</URL>
        <Description>CVE-2019-8821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8835.html</URL>
        <Description>CVE-2019-8835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161719</URL>
        <Description>SUSE Bug 1161719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memory handling.</Note>
    </Notes>
    <CVE>CVE-2020-10018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10018.html</URL>
        <Description>CVE-2020-10018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165528</URL>
        <Description>SUSE Bug 1165528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).</Note>
    </Notes>
    <CVE>CVE-2020-11793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11793.html</URL>
        <Description>CVE-2020-11793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169658</URL>
        <Description>SUSE Bug 1169658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.</Note>
    </Notes>
    <CVE>CVE-2020-13558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13558.html</URL>
        <Description>CVE-2020-13558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182286</URL>
        <Description>SUSE Bug 1182286</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2020-13584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13584.html</URL>
        <Description>CVE-2020-13584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179122</URL>
        <Description>SUSE Bug 1179122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179910</URL>
        <Description>SUSE Bug 1179910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179911</URL>
        <Description>SUSE Bug 1179911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179912</URL>
        <Description>SUSE Bug 1179912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.</Note>
    </Notes>
    <CVE>CVE-2020-13753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13753.html</URL>
        <Description>CVE-2020-13753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173998</URL>
        <Description>SUSE Bug 1173998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-27918</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27918.html</URL>
        <Description>CVE-2020-27918</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-3862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3862.html</URL>
        <Description>CVE-2020-3862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163809</URL>
        <Description>SUSE Bug 1163809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2020-3867</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3867.html</URL>
        <Description>CVE-2020-3867</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163809</URL>
        <Description>SUSE Bug 1163809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-3895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3895.html</URL>
        <Description>CVE-2020-3895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170643</URL>
        <Description>SUSE Bug 1170643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-3899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3899.html</URL>
        <Description>CVE-2020-3899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170643</URL>
        <Description>SUSE Bug 1170643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.</Note>
    </Notes>
    <CVE>CVE-2020-3902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3902.html</URL>
        <Description>CVE-2020-3902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170643</URL>
        <Description>SUSE Bug 1170643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-9802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9802.html</URL>
        <Description>CVE-2020-9802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173998</URL>
        <Description>SUSE Bug 1173998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-9806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9806.html</URL>
        <Description>CVE-2020-9806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173998</URL>
        <Description>SUSE Bug 1173998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.</Note>
    </Notes>
    <CVE>CVE-2020-9862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9862.html</URL>
        <Description>CVE-2020-9862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174662</URL>
        <Description>SUSE Bug 1174662</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-9895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9895.html</URL>
        <Description>CVE-2020-9895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174662</URL>
        <Description>SUSE Bug 1174662</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-9947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9947.html</URL>
        <Description>CVE-2020-9947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-1788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1788.html</URL>
        <Description>CVE-2021-1788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184155</URL>
        <Description>SUSE Bug 1184155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-1789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1789.html</URL>
        <Description>CVE-2021-1789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-1817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1817.html</URL>
        <Description>CVE-2021-1817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.</Note>
    </Notes>
    <CVE>CVE-2021-21775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21775.html</URL>
        <Description>CVE-2021-21775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2021-21806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21806.html</URL>
        <Description>CVE-2021-21806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188294</URL>
        <Description>SUSE Bug 1188294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..</Note>
    </Notes>
    <CVE>CVE-2021-30661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30661.html</URL>
        <Description>CVE-2021-30661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..</Note>
    </Notes>
    <CVE>CVE-2021-30665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30665.html</URL>
        <Description>CVE-2021-30665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..</Note>
    </Notes>
    <CVE>CVE-2021-30666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30666.html</URL>
        <Description>CVE-2021-30666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.</Note>
    </Notes>
    <CVE>CVE-2021-30682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30682.html</URL>
        <Description>CVE-2021-30682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2021-30744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30744.html</URL>
        <Description>CVE-2021-30744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30758.html</URL>
        <Description>CVE-2021-30758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30799.html</URL>
        <Description>CVE-2021-30799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.</Note>
    </Notes>
    <CVE>CVE-2021-30858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libjavascriptcoregtk-4_0-18-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk-4_0-37-32bit-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libwebkit2gtk3-lang-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-JavaScriptCore-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit-jsc-4-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk-4_0-injected-bundles-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-devel-2.32.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:webkit2gtk3-minibrowser-2.32.4-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30858.html</URL>
        <Description>CVE-2021-30858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190701</URL>
        <Description>SUSE Bug 1190701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191298</URL>
        <Description>SUSE Bug 1191298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191301</URL>
        <Description>SUSE Bug 1191301</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
