<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025-20065-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-11-19T16:45:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-11-19T16:45:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-11-19T16:45:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox fixes the following issues:

Changes in MozillaFirefox:

Firefox Extended Support Release 140.5.0 ESR:

* Fixed: Various security fixes (MFSA 2025-88 bsc#1253188):

  * CVE-2025-13012
    Race condition in the Graphics component
  * CVE-2025-13016
    Incorrect boundary conditions in the JavaScript: WebAssembly
    component
  * CVE-2025-13017
    Same-origin policy bypass in the DOM: Notifications component
  * CVE-2025-13018
    Mitigation bypass in the DOM: Security component
  * CVE-2025-13019
    Same-origin policy bypass in the DOM: Workers component
  * CVE-2025-13013
    Mitigation bypass in the DOM: Core &amp; HTML component
  * CVE-2025-13020
    Use-after-free in the WebRTC: Audio/Video component
  * CVE-2025-13014
    Use-after-free in the Audio/Video component
  * CVE-2025-13015
    Spoofing issue in Firefox

- Firefox Extended Support Release 140.4.0 ESR
  * Fixed: Various security fixes.
  MFSA 2025-83 (bsc#1251263)
  * CVE-2025-11708
    Use-after-free in MediaTrackGraphImpl::GetInstance()
  * CVE-2025-11709
    Out of bounds read/write in a privileged process triggered by
    WebGL textures
  * CVE-2025-11710
    Cross-process information leaked due to malicious IPC
    messages
  * CVE-2025-11711
    Some non-writable Object properties could be modified
  * CVE-2025-11712
    An OBJECT tag type attribute overrode browser behavior on web
    resources without a content-type
  * CVE-2025-11713
    Potential user-assisted code execution in “Copy as cURL”
    command
  * CVE-2025-11714
    Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR
    140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144
  * CVE-2025-11715
    Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird
    ESR 140.4, Firefox 144 and Thunderbird 144

- Firefox Extended Support Release 140.3.1 ESR (bsc#1250452)
  * Fixed: Improved reliability when HTTP/3 connections fail:
    Firefox no longer forces HTTP/2 during fallback, allowing the
    server to choose the protocol and preventing stalls on some
    sites.

Firefox Extended Support Release 140.3.0 ESR

* Fixed: Various security fixes (MFSA 2025-75 bsc#1249391)

  * CVE-2025-10527
    Sandbox escape due to use-after-free in the Graphics:
    Canvas2D component
  * CVE-2025-10528
    Sandbox escape due to undefined behavior, invalid pointer in
    the Graphics: Canvas2D component
  * CVE-2025-10529
    Same-origin policy bypass in the Layout component
  * CVE-2025-10532
    Incorrect boundary conditions in the JavaScript: GC component
  * CVE-2025-10533
    Integer overflow in the SVG component
  * CVE-2025-10536
    Information disclosure in the Networking: Cache component
  * CVE-2025-10537
    Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird
    ESR 140.3, Firefox 143 and Thunderbird 143
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-39</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249391</URL>
      <Description>SUSE Bug 1249391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250452</URL>
      <Description>SUSE Bug 1250452</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251263</URL>
      <Description>SUSE Bug 1251263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1253188</URL>
      <Description>SUSE Bug 1253188</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10527/</URL>
      <Description>SUSE CVE CVE-2025-10527 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10528/</URL>
      <Description>SUSE CVE CVE-2025-10528 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10529/</URL>
      <Description>SUSE CVE CVE-2025-10529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10532/</URL>
      <Description>SUSE CVE CVE-2025-10532 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10533/</URL>
      <Description>SUSE CVE CVE-2025-10533 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10536/</URL>
      <Description>SUSE CVE CVE-2025-10536 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10537/</URL>
      <Description>SUSE CVE CVE-2025-10537 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11708/</URL>
      <Description>SUSE CVE CVE-2025-11708 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11709/</URL>
      <Description>SUSE CVE CVE-2025-11709 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11710/</URL>
      <Description>SUSE CVE CVE-2025-11710 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11711/</URL>
      <Description>SUSE CVE CVE-2025-11711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11712/</URL>
      <Description>SUSE CVE CVE-2025-11712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11713/</URL>
      <Description>SUSE CVE CVE-2025-11713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11714/</URL>
      <Description>SUSE CVE CVE-2025-11714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11715/</URL>
      <Description>SUSE CVE CVE-2025-11715 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13012/</URL>
      <Description>SUSE CVE CVE-2025-13012 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13013/</URL>
      <Description>SUSE CVE CVE-2025-13013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13014/</URL>
      <Description>SUSE CVE CVE-2025-13014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13015/</URL>
      <Description>SUSE CVE CVE-2025-13015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13016/</URL>
      <Description>SUSE CVE CVE-2025-13016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13017/</URL>
      <Description>SUSE CVE CVE-2025-13017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13018/</URL>
      <Description>SUSE CVE CVE-2025-13018 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13019/</URL>
      <Description>SUSE CVE CVE-2025-13019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13020/</URL>
      <Description>SUSE CVE CVE-2025-13020 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-140.5.0-160000.1.1">
      <FullProductName ProductID="MozillaFirefox-140.5.0-160000.1.1">MozillaFirefox-140.5.0-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-140.5.0-160000.1.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-140.5.0-160000.1.1">MozillaFirefox-branding-upstream-140.5.0-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-140.5.0-160000.1.1">
      <FullProductName ProductID="MozillaFirefox-devel-140.5.0-160000.1.1">MozillaFirefox-devel-140.5.0-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-140.5.0-160000.1.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-140.5.0-160000.1.1">MozillaFirefox-translations-common-140.5.0-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-140.5.0-160000.1.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-140.5.0-160000.1.1">MozillaFirefox-translations-other-140.5.0-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-140.5.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1">MozillaFirefox-140.5.0-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-140.5.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1">MozillaFirefox-branding-upstream-140.5.0-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-140.5.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1">MozillaFirefox-devel-140.5.0-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-140.5.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1">MozillaFirefox-translations-common-140.5.0-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-140.5.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1">MozillaFirefox-translations-other-140.5.0-160000.1.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 143, Firefox ESR &lt; 140.3, Thunderbird &lt; 143, and Thunderbird &lt; 140.3.</Note>
    </Notes>
    <CVE>CVE-2025-10527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10527.html</URL>
        <Description>CVE-2025-10527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249391</URL>
        <Description>SUSE Bug 1249391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 143, Firefox ESR &lt; 140.3, Thunderbird &lt; 143, and Thunderbird &lt; 140.3.</Note>
    </Notes>
    <CVE>CVE-2025-10528</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10528.html</URL>
        <Description>CVE-2025-10528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249391</URL>
        <Description>SUSE Bug 1249391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Same-origin policy bypass in the Layout component. This vulnerability affects Firefox &lt; 143, Firefox ESR &lt; 140.3, Thunderbird &lt; 143, and Thunderbird &lt; 140.3.</Note>
    </Notes>
    <CVE>CVE-2025-10529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10529.html</URL>
        <Description>CVE-2025-10529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249391</URL>
        <Description>SUSE Bug 1249391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect boundary conditions in the JavaScript: GC component. This vulnerability affects Firefox &lt; 143, Firefox ESR &lt; 140.3, Thunderbird &lt; 143, and Thunderbird &lt; 140.3.</Note>
    </Notes>
    <CVE>CVE-2025-10532</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10532.html</URL>
        <Description>CVE-2025-10532</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249391</URL>
        <Description>SUSE Bug 1249391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the SVG component. This vulnerability affects Firefox &lt; 143, Firefox ESR &lt; 115.28, Firefox ESR &lt; 140.3, Thunderbird &lt; 143, and Thunderbird &lt; 140.3.</Note>
    </Notes>
    <CVE>CVE-2025-10533</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10533.html</URL>
        <Description>CVE-2025-10533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249391</URL>
        <Description>SUSE Bug 1249391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Information disclosure in the Networking: Cache component. This vulnerability affects Firefox &lt; 143, Firefox ESR &lt; 140.3, Thunderbird &lt; 143, and Thunderbird &lt; 140.3.</Note>
    </Notes>
    <CVE>CVE-2025-10536</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10536.html</URL>
        <Description>CVE-2025-10536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249391</URL>
        <Description>SUSE Bug 1249391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 143, Firefox ESR &lt; 140.3, Thunderbird &lt; 143, and Thunderbird &lt; 140.3.</Note>
    </Notes>
    <CVE>CVE-2025-10537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10537.html</URL>
        <Description>CVE-2025-10537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249391</URL>
        <Description>SUSE Bug 1249391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free in MediaTrackGraphImpl::GetInstance() This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11708.html</URL>
        <Description>CVE-2025-11708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11709</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11709.html</URL>
        <Description>CVE-2025-11709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11710.html</URL>
        <Description>CVE-2025-11710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11711.html</URL>
        <Description>CVE-2025-11711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11712.html</URL>
        <Description>CVE-2025-11712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient escaping in the "Copy as cURL" feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11713.html</URL>
        <Description>CVE-2025-11713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11714.html</URL>
        <Description>CVE-2025-11714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11715</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11715.html</URL>
        <Description>CVE-2025-11715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the Graphics component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Firefox ESR &lt; 115.30, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13012</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13012.html</URL>
        <Description>CVE-2025-13012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mitigation bypass in the DOM: Core &amp; HTML component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Firefox ESR &lt; 115.30, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13013.html</URL>
        <Description>CVE-2025-13013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free in the Audio/Video component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Firefox ESR &lt; 115.30, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13014.html</URL>
        <Description>CVE-2025-13014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Spoofing issue in Firefox. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Firefox ESR &lt; 115.30, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13015.html</URL>
        <Description>CVE-2025-13015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13016.html</URL>
        <Description>CVE-2025-13016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Same-origin policy bypass in the DOM: Notifications component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13017.html</URL>
        <Description>CVE-2025-13017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13018.html</URL>
        <Description>CVE-2025-13018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13019.html</URL>
        <Description>CVE-2025-13019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free in the WebRTC: Audio/Video component. This vulnerability affects Firefox &lt; 145, Firefox ESR &lt; 140.5, Thunderbird &lt; 145, and Thunderbird &lt; 140.5.</Note>
    </Notes>
    <CVE>CVE-2025-13020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1</ProductID>
        <ProductID>openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13020.html</URL>
        <Description>CVE-2025-13020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253188</URL>
        <Description>SUSE Bug 1253188</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
